Take Control of Cloud Costs on AWS

  • Buy Link or Shortcode: {j2store}425|cart{/j2store}
  • member rating overall impact: 9.3/10 Overall Impact
  • member rating average dollars saved: $62,500 Average $ Saved
  • member rating average days saved: 26 Average Days Saved
  • Parent Category Name: Cloud Strategy
  • Parent Category Link: /cloud-strategy
  • Traditional IT budgeting and procurement processes don't work for public cloud services.
  • The self-service nature of the cloud means that often the people provisioning cloud resources aren't accountable for the cost of those resources.
  • Without centralized control or oversight, organizations can quickly end up with massive AWS bills that exceed their IT salary cost.

Our Advice

Critical Insight

  • Most engineers care more about speed of feature delivery and reliability of the system than they do about cost.
  • Often there are no consequences for over architecting or overspending on AWS.
  • Many organizations lack sufficient visibility into their AWS spend, making it impossible to establish accountability and controls.

Impact and Result

  • Define roles and responsibilities.
  • Establish visibility.
  • Develop processes, procedures, and policies.

Take Control of Cloud Costs on AWS Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should take control of cloud costs, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Build cost accountability framework

Assess your current state, define your cost allocation model, and define roles and responsibilities.

  • Cloud Cost Management Worksheet
  • Cloud Cost Management Capability Assessment
  • Cloud Cost Management Policy
  • Cloud Cost Glossary of Terms

2. Establish visibility

Define dashboards and reports, and document account structure and tagging requirements.

  • Service Cost Cheat Sheet

3. Define processes and procedures

Establish governance for tagging and cost control, define processes for right-sizing, and define processes for purchasing commitment discounts.

  • Right-Sizing Workflow (Visio)
  • Right-Sizing Workflow (PDF)
  • Commitment Purchasing Workflow (Visio)
  • Commitment Purchasing Workflow (PDF)

4. Build implementation plan

Document process interactions, establish program KPIs, and build implementation roadmap and communication plan.

  • Cloud Cost Management Task List

Infographic

Workshop: Take Control of Cloud Costs on AWS

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Build Cost Accountability Framework

The Purpose

Establish clear lines of accountability and document roles and responsibilities to effectively manage cloud costs.

Key Benefits Achieved

Chargeback/showback model to provide clear accountability for costs.

Understanding of key areas to focus on to improve cloud cost management capabilities.

Activities

1.1 Assess current state

1.2 Determine cloud cost model

1.3 Define roles and responsibilities

Outputs

Cloud cost management capability assessment

Cloud cost model

Roles and responsibilities

2 Establish Visibility

The Purpose

Establish visibility into cloud costs and drivers of those costs.

Key Benefits Achieved

Better understanding of what is driving costs and how to keep them in check.

Activities

2.1 Develop architectural patterns

2.2 Define dashboards and reports

2.3 Define account structure

2.4 Document tagging requirements

Outputs

Architectural patterns; service cost cheat sheet

Dashboards and reports

Account structure

Tagging scheme

3 Define Processes and Procedures

The Purpose

Develop processes, procedures, and policies to control cloud costs.

Key Benefits Achieved

Improved capability of reducing costs.

Documented processes and procedures for continuous improvement.

Activities

3.1 Establish governance for tagging

3.2 Establish governance for costs

3.3 Define right-sizing process

3.4 Define purchasing process

3.5 Define notification and alerts

Outputs

Tagging policy

Cost control policy

Right-sizing process

Commitment purchasing process

Notifications and Alerts

4 Build Implementation Plan

The Purpose

Document next steps to implement and improve cloud cost management program.

Key Benefits Achieved

Concrete roadmap to stand up and/or improve the cloud cost management program.

Activities

4.1 Document process interaction changes

4.2 Define cloud cost program KPIs

4.3 Build implementation roadmap

4.4 Build communication plan

Outputs

Changes to process interactions

Cloud cost program KPIs

Implementation roadmap

Communication plan

Maximize Business Value From IT Through Benefits Realization

  • Buy Link or Shortcode: {j2store}337|cart{/j2store}
  • member rating overall impact: 6.0/10 Overall Impact
  • member rating average dollars saved: 4 Average Days Saved
  • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
  • Parent Category Name: IT Governance, Risk & Compliance
  • Parent Category Link: /it-governance-risk-and-compliance
  • IT and the business are often misaligned because business value is not well defined or communicated.
  • Decisions are made without a shared perspective of value. This results in cost misallocation and unexploited opportunities to improve efficiency and drive innovation.

Our Advice

Critical Insight

  • IT exists to provide business value and is part of the business value chain. Most IT organizations lack a way to define value, which complicates the process of making value-based strategic business decisions.
  • IT must link its spend to business value to justify its investments. IT doesn’t have an established process to govern benefits realization and struggles to demonstrate how it provides value from its investments.
  • Pursue value, not technology. The inability to articulate value leads to IT being perceived as a cost center.

Impact and Result

  • Ensure there is a common understanding within the organization of what is valuable to drive growth and consistent strategic decision making.
  • Equip IT to evaluate, direct, and monitor investments to support the achievement of organizational values and business benefits.
  • Align IT spend with business value through an enhanced governance structure to achieve cost optimization. Ensure IT visibly contributes to the creation and maintenance of value.

Maximize Business Value From IT Through Benefits Realization Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should establish a benefits realization process, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Understand business value

Ensure that all key strategic stakeholders hold a current understanding of what is valuable to the organization and a sense of what will be valuable based on future needs.

  • Maximize Business Value from IT Through Benefits Realization – Phase 1: Understand Business Value
  • Business Value Statement Template
  • Business Value Statement Example
  • Value Statement Email Communication Template
  • Feedback Consolidation Tool

2. Incorporate benefits realization into governance

Establish the process to evaluate spend on IT initiatives based on expected benefits, and implement the methods to monitor how well the initiatives achieve these benefits.

  • Maximize Business Value from IT Through Benefits Realization – Phase 2: Incorporate Benefits Realization into Governance
  • Business Value Executive Presentation Template

3. Ensure an accurate reference of value

Re-evaluate, on a consistent basis, the accuracy of the value drivers stated in the value statement with respect to the organization’s current internal and external environments.

  • Maximize Business Value from IT Through Benefits Realization – Phase 3: Ensure an Accurate Reference of Value
[infographic]

Workshop: Maximize Business Value From IT Through Benefits Realization

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Understand Business Value

The Purpose

Establish the business value statement.

Understand the importance of implementing a benefits realization process.

Key Benefits Achieved

Unified stakeholder perspectives of business value drivers

Establish supporters of the initiative

Activities

1.1 Understand what governance is and how a benefits realization process in governance will benefit the company.

1.2 Discuss the mission and vision of the company, and why it is important to establish the target state prior to defining value.

1.3 Brainstorm and narrow down organization value drivers.

Outputs

Stakeholder buy-in on benefits realization process

Understanding of interrelations of mission, vision, and business value drivers

Final three prioritized value drivers

Completed business value statement

2 Incorporate Benefits Realization Into Governance

The Purpose

Establish the intake, assessment and prioritization, and output and monitoring processes that are involved with implementing benefits realization.

Assign cut-over dates and accountabilities.

Establish monitoring and tracking processes.

Key Benefits Achieved

A thorough implementation plan that can be incorporated into existing governance documents

Stakeholder understanding of implemented process, process ownership

Activities

2.1 Devise the benefits realization process.

2.2 Establish launch dates, accountabilities, and exception handling on processes.

2.3 Devise compliance monitoring and exception tracking methods on the benefits realization process.

Outputs

Benefits realization process incorporated into governance documentation

Actionable plan to implement benefits realization process

Reporting processes to ensure the successful delivery of the improved governance process

3 Ensure an Accurate Reference of Value

The Purpose

Implement a process to ensure that business value drivers remain current to the organization.

Key Benefits Achieved

Align IT with the business and business to its environment

Activities

3.1 Determine regular review cycle to reassess business value drivers.

3.2 Determine the trigger events that may cause off-cycle revisits to value.

3.3 Devise compliance monitoring on value definition.

Outputs

Agenda and tools to assess the business context to verify the accuracy of value

List of possible trigger events specific to your organization

Reporting processes to ensure the continuous adherence to the business value definition

AI and the Future of Enterprise Productivity

  • Buy Link or Shortcode: {j2store}329|cart{/j2store}
  • member rating overall impact: 9.0/10 Overall Impact
  • member rating average dollars saved: $12,399 Average $ Saved
  • member rating average days saved: 10 Average Days Saved
  • Parent Category Name: Innovation
  • Parent Category Link: /innovation
  • We’re witnessing a fundamental transformation in how businesses operate and productivity is achieved.
  • Advances in narrow but powerful forms of artificial intelligence (AI) are being driven by a cluster of factors.
  • Applications for enterprise AI aren’t waiting for the emergence of a general AI. They’re being rapidly deployed in task-specific domains. From robotic process automation (RPA) to demand forecasting, from real-world robotics to AI-driven drug development, AI is boosting enterprise productivity in significant ways.

Our Advice

Critical Insight

Algorithms are becoming more advanced, data is now richer and easier to collect, and hardware is cheaper and more powerful. All of this is true and contributes to the excitement around enterprise AI applications, but the biggest difference today is that enterprises are redesigning their processes around AI, rather than simply adding AI to their existing processes.

Impact and Result

This report outlines six emerging ways AI is being used in the enterprise, with four future scenarios outlining their possible trajectories. These are designed to guide strategic decision making and facilitate future-focused ideation.

AI and the Future of Enterprise Productivity Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Read the trend report

This report outlines six emerging ways AI is being used in the enterprise, with four future scenarios outlining their possible trajectories. These are designed to guide strategic decision making and facilitate future-focused ideation.

  • AI and the Future of Enterprise Productivity Trend Report
  • AI and the Future of Enterprise Productivity Trend Report (PDF)
[infographic]

Negotiate SaaS Agreements That Are Built to Last

  • Buy Link or Shortcode: {j2store}137|cart{/j2store}
  • member rating overall impact: 9.4/10 Overall Impact
  • member rating average dollars saved: $72,298 Average $ Saved
  • member rating average days saved: 10 Average Days Saved
  • Parent Category Name: Vendor Management
  • Parent Category Link: /vendor-management
  • Internal stakeholders usually have different – and often conflicting – needs and expectations that require careful facilitation and management.
  • SaaS solutions bring forth a unique form of “switching costs” that can make a decision to migrate solutions financially, technically, and politically painful.

Our Advice

Critical Insight

  • Conservatively, it’s possible to save 5% of the overall IT budget through comprehensive software and SaaS contract review.
  • Focus on the terms and conditions, not just the price.
  • Learning to negotiate is crucial.

Impact and Result

  • Take control of your SaaS contract negotiations from the beginning.
  • Look at your contract holistically to find cost savings.
  • Guide communication between vendors and your organization for the duration of contract negotiations.
  • Redline the terms and conditions of your SaaS contract.
  • Prioritize crucial terms and conditions to negotiate.

Negotiate SaaS Agreements That Are Built to Last Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out how to redline and negotiate a SaaS agreement, review Info-Tech’s methodology, and understand the different ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Gather requirements

Build and manage the stakeholder team, and then document the business use case.

  • Negotiate SaaS Agreements That Are Built to Last – Phase 1: Gather Requirements
  • RASCI Chart
  • Vendor Communication Management Plan
  • Software Business Use Case Template
  • SaaS TCO Calculator

2. Redline contract

Redline the proposed SaaS contract.

  • Negotiate SaaS Agreements That Are Built to Last – Phase 2: Redline Contract
  • SaaS Terms and Conditions Evaluation Tool

3. Negotiate contract

Create a thorough negotiation plan.

  • Negotiate SaaS Agreements That Are Built to Last – Phase 3: Negotiate Contract
  • SaaS Contract Negotiation Terms Prioritization Checklist
  • Controlled Vendor Communications Letter
  • Key Vendor Fiscal Year End Calendar
  • Contract Negotiation Tactics Playbook
[infographic]

Workshop: Negotiate SaaS Agreements That Are Built to Last

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Collect and Review Data

The Purpose

Assemble documentation.

Key Benefits Achieved

Understand current position before going forward.

Activities

1.1 Assemble existing contracts.

1.2 Document their strategic and tactical objectives.

1.3 Identify current status of the vendor relationship and any historical context.

1.4 Clarify goals for ideal future state.

Outputs

Business Use Case.

2 Define the Business Use Case and Build a Stakeholder Team

The Purpose

Define the business use case and build a stakeholder team.

Key Benefits Achieved

Create a business use case to document functional and non-functional requirements.

Build an internal cross-functional stakeholder team to negotiate the contract.

Activities

2.1 Establish a negotiation team and define roles.

2.2 Write a communication plan.

2.3 Complete a business use case.

Outputs

RASCI Matrix

Communications Plan

SaaS TCO Calculator

Business Use Case

3 Redline the Contract

The Purpose

Examine terms and conditions and prioritize for negotiation.

Key Benefits Achieved

Discover cost savings.

Improve agreement terms.

Prioritize terms for negotiation.

Activities

3.1 Review general terms and conditions.

3.2 Review license and application specific terms and conditions.

3.3 Match to business and technical requirements.

3.4 Redline the agreement.

Outputs

SaaS Terms and Conditions Evaluation Tool

SaaS Contract Negotiation Terms Prioritization Checklist

4 Build a Negotiation Strategy

The Purpose

Create a negotiation strategy.

Key Benefits Achieved

Controlled communication established.

Negotiation tactics chosen.

Negotiation timeline plotted.

Activities

4.1 Review vendor and application specific negotiation tactics.

4.2 Build negotiation strategy.

Outputs

Contract Negotiation Tactics Playbook

Controlled Vendor Communications Letter

Key Vendor Fiscal Year End Calendar

Mitigate the Risk of Cloud Downtime and Data Loss

  • Buy Link or Shortcode: {j2store}412|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: DR and Business Continuity
  • Parent Category Link: /business-continuity
  • Senior leadership is asking difficult questions about the organization’s dependency on third-party cloud services and the risk that poses.
  • IT leaders have limited control over third-party incidents and that includes cloud services. Yet they are on the hot seat when cloud services go down.
  • While vendors have swooped in to provide resilience options for the more-common SaaS solutions, it is not the case for all cloud services.

Our Advice

Critical Insight

  • No control over the software does not mean no recovery options. Solutions range from designing an IT workaround using alternate technologies to pre-defined third-party service continuity options (e.g. see options for O365) to business workarounds.
  • Even where there is limited control, you can at least define an incident response plan to streamline notification, assessment, and implementation of workarounds. Leadership wants more options than simply waiting for the service to come back online.
  • At a minimum, IT’s responsibility is to identify and communicate risk to senior leadership. That starts with a vendor review to identify SLA issues and overall resilience gaps.

Impact and Result

  • Follow a structured process to assess cloud resilience risk.
  • Identify opportunities to mitigate risk – at the very least, ensure critical data is protected.
  • Summarize cloud services risk, mitigation options, and incident response for senior leadership.

Mitigate the Risk of Cloud Downtime and Data Loss Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Mitigate the Risk of Cloud Downtime and Data Loss – Step-by-step guide to assess risk, identify risk mitigation options, and create an incident response plan.

Even where there is limited control, you can define an incident response plan to streamline notification, assessment, and implementation of workarounds.

  • Mitigate the Risk of Cloud Downtime and Data Loss Storyboard

2. Cloud Services Incident Risk and Mitigation Review – Review your key cloud vendors’ SLAs, incident preparedness, and data protection strategy.

At a minimum, IT’s responsibility is to identify and communicate risk to senior leadership. That starts with a vendor review to identify SLA and overall resilience gaps.

  • Cloud Services Incident Risk and Mitigation Review Tool

3. SaaS Incident Response Workflows – Use these examples to guide your efforts to create cloud incident response workflows.

The examples illustrate different approaches to incident response depending on the criticality of the service and options available.

  • SaaS Incident Response Workflows (Visio)
  • SaaS Incident Response Workflows (PDF)

4. Cloud Services Resilience Summary – Use this template to capture your results.

Summarize cloud services risk, mitigation options, and incident response for senior leadership.

  • Cloud Services Resilience Summary
[infographic]

Further reading

Mitigate the Risk of Cloud Downtime and Data Loss

Resilience and disaster recovery in an increasingly Cloudy and SaaSy world.

Analyst Perspective

If you think cloud means you don’t need a response plan, then get your resume ready.

Frank Trovato

Most organizations are now recognizing that they can’t ignore the risk of a cloud outage or data loss, and the challenge is “what can I do about it?” since there is limited control.

If you still think “it’s in the cloud, so I don’t need to worry about it,” then get your resume ready. When O365 goes down, your executives are calling IT, not Microsoft, for an answer of what’s being done and what can they do in the meantime to get the business up and running again.

The key is to recognize what you can control and what actions you can take to evaluate and mitigate risk. At a minimum, you can ensure senior leadership is aware of the risk and define a plan for how you will respond to an incident, even if that is limited to monitoring and communicating status.

Often you can do more, including defining IT workarounds, backing up your SaaS data for additional protection, and using business process workarounds to bridge the gap, as illustrated in the case studies in this blueprint.

Frank Trovato
Research Director, Infrastructure & Operations

Info-Tech Research Group

Use this blueprint to expand your DRP and BCP to account for cloud services

As more applications are migrated to cloud-based services, disaster recovery (DR) and business continuity plans (BCP) must include an understanding of cloud risks and actions to mitigate those risks. This includes evaluating vendor and service reliability and resilience, security measures, data protection capabilities, and technology and business workarounds if there is a cloud outage or incident.

Use the risk assessments and cloud service incident response plans developed through this blueprint to supplement your DRP and BCP as well as further inform your crisis management plans (e.g. account for cloud risks in your crisis communication planning).

Overall Business Continuity Plan

IT Disaster Recovery Plan

A plan to restore IT application and infrastructure services following a disruption.

Info-Tech’s Disaster Recovery Planning blueprint provides a methodology for creating the IT DRP. Leverage this blueprint to validate and provide inputs for your IT DRP.

BCP for Each Business Unit

A set of plans to resume business processes for each business unit.

Info-Tech’s Develop a Business Continuity Plan blueprint provides a methodology for creating business unit BCPs as part of an overall BCP for the organization.

Crisis Management Plan

A plan to manage a wide range of crises, from health and safety incidents to business disruptions to reputational damage.

Info-Tech’s Implement Crisis Management Best Practices blueprint provides a framework for planning a response to any crisis, from health and safety incidents to reputational damage.

Executive Summary

Your Challenge

Common Obstacles

Info-Tech’s Approach

  • Senior leadership is asking difficult questions about the organization’s dependency on third-party cloud services and the risk that poses.
  • Migrating to cloud services transfers much of the responsibility for day-to-day platform maintenance but not accountability for resilience.
  • IT leaders are often responsible for not just the organization’s IT DRP but also BCP and other elements of overall resilience. Cloud risk adds another element IT leaders need to consider.
  • IT leaders have limited control over third-party incidents and that includes cloud services. With SaaS services in particular, recovery or continuity options may be limited.
  • While vendors have swooped in to provide resilience options for the more common SaaS solutions, that is not the case for all cloud services.
  • Part of the solution is defining business process workarounds and that depends on cooperation from business leaders.
  • At a minimum, IT’s responsibility is to identify and communicate risk to senior leadership. That starts with a vendor review to identify SLA and overall resilience gaps.
  • Adapt how you approach downtime and data loss risk, particularly for SaaS solutions where there is limited or no control over the system.
  • Even where there is limited control, you can define an incident response plan to streamline notification, assessment, and implementation of workarounds. Leadership wants more options than simply waiting for the service to come back online.

Info-Tech Insight

Asking vendors about their DRP, BCP, and overall resilience has become commonplace. Expect your vendors to provide answers so you can assess risk. Furthermore, your vendor may have additional offerings to increase resilience or recommendations for third parties who can further assist your goals of improving cloud service resilience.

Key deliverable

Cloud Services Resilience Summary

Provide leadership with a summary of cloud risk, downtime workarounds implemented, and additional data protection.

The image contains a screenshot of the Cloud Services Resilience Summary.

Additional tools and templates in this blueprint

Cloud Services Incident Risk and Mitigation Review Tool

Use this tool to gather vendor input, evaluate vendor SLAs and overall resilience, and track your own risk mitigation efforts.

The image contains a screenshot of the Cloud Services Incident Risk and Mitigation Review Tool.

SaaS Incident Response Workflows

Use the examples in this document as a model to develop your own incident response workflows for cloud outages or data loss.

The image contains a screenshot of the SaaS Incident Response Workflows.

This blueprint will step you through the following actions to evaluate and mitigate cloud services risk

  1. Assess your cloud risk
  • Review your cloud services to determine potential impact of downtime/data loss, vendor SLA gaps, and vendor’s current resilience.
  • Identify options to mitigate risk
    • Explore your cloud vendor’s resilience offerings, third-party solutions, DIY recovery options, and business workarounds.
  • Create an incident response plan
    • Document your cloud risk mitigation strategy and incident response plan, which might include a failover strategy, data protection, and/or business continuity.

    Cloud Risk Mitigation

    Identify options to mitigate risk

    Create an incident response plan

    Assess risk

    Phase 1: Assess your cloud risk

    Phase 1

    Phase 2

    Phase 3

    Assess your cloud risk

    Identify options to mitigate risk

    Create an incident response plan

    Cloud does not guarantee uptime

    Public cloud services (e.g. Azure, GCP, AWS) and popular SaaS solutions experience downtime every year.

    A few cloud outage examples:

    • Microsoft Azure AD outage, March 15, 2022:
      Many users could not log into O365, Dynamics, or the Azure Portal.
      Cause: software change.
    • Three AWS outages in December 2021: December 7 (Netflix and others impacted), December 15 (Duo, Zoom, Slack, others), December 20 (Slack, Epic Games, others). Cause: network issues, power outage.
    • Salesforce outage, May 12, 2022: Users could not access the Lightning platform. Cause: expired certificate.

    Cloud availability

    • Migrating to cloud services can improve availability, as they typically offer more resilience than most organizations can afford to implement themselves.
    • However, having multiple data centers, zones, and regions doesn’t prevent all outages, as we see every year with even the largest cloud vendors.

    DR challenges for IaaS, PaaS, and cloud-native

    While there are limits to what you control, often traditional “failover” DR strategy can apply.

    High-level challenges and resilience options:

    • IaaS: No control over the hardware, but you can failover to another region. This is fairly similar to traditional DR.
    • PaaS: No control over the software platform (e.g. SQL server as a service), but you can back up your data and explore vendor options to replicate your environment.
    • Cloud-native applications: As with PaaS, you can back up your data and explore vendor options to replicate your environment.

    Plan for resilience

    • Include DR requirements when designing cloud service implementation. For example, for IaaS solutions, identify what data would need to be replicated and what services may need to be “always on” (e.g. database services where high-availability is demanded).
    • Similarly, for PaaS and cloud-native solutions, consult your vendor regarding options to build in resilience options (e.g. ability to failover to another environment).

    DR challenges for SaaS solutions

    SaaS is the biggest challenge because you have no control over any part of the base application stack.

    High-level challenges and resilience options:

    • No control over the hardware (or the facility, maintenance processes, and so on).
    • No control over the base application (control is limited to configuration settings and add-on customizations or integrations).
    • Options to back up your data will depend on the service.

    Note: The rest of this blueprint is focused primarily on SaaS resilience due to the challenges listed here. For other cloud services, leverage traditional DR strategies and vendor management to mitigate risk (as summarized on the previous slides).

    Focus on what you can control

    • For SaaS solutions in particular, you must toss out traditional DR. If Salesforce has an outage, you won’t be involved in recovering the system.
    • Instead, DR for SaaS needs to focus on improving resilience where you do have control and implementing business workarounds to bridge the gap.

    Evaluate your cloud services to clarify your specific risks

    Time and money is limited, so focus first on cloud services that are most critical and evaluate the vendors’ SLA and existing resilience capabilities.

    The activities on the next two slides will evaluate risk through two approaches:

    Activity 1: Estimate potential impact of downtime and data loss to quantify the risk and determine which cloud services are most critical and need to be prioritized. This is done through a business impact analysis that assesses:

    • Impact on revenue or costs (if applicable).
    • Impact on reputation (e.g. customer impact).
    • Impact on regulatory compliance and health and safety (if applicable).

    Activity 2: Review the vendor to identify risks and gaps. Specifically, evaluate the following:

    • Incident Management SLAs (e.g. does the SLA include RTO/RPO commitments? Do they meet your requirements?)
    • Incident Response Preparedness (e.g. does the vendor have a DRP, BCP, and security incident response plan?)
    • Data Protection (e.g. does their backup strategy and data security meet your standards?)

    Activity 1: Quantify potential impact and prioritize cloud services using a business impact analysis (BIA)

    1-3 hours

    1. Download the latest version of our DRP BIA: DRP Business Impact Analysis Tool. The tool includes instructions.
    2. Include the cloud services you want to assess in the list of applications/systems (see the tool excerpt below), and follow the BIA methodology outlined in the Create a Right-Sized Disaster Recovery Plan blueprint.
    3. Use the results to quantify potential impact and prioritize your efforts on the most-critical cloud services.

    The image contains a screenshot of the DRP Business Impact Analysis Tool.

    Materials
    • DRP BIA Tool
    Participants
    • Core group of IT management and staff who can provide a well-rounded perspective on potential impact. They will create the first draft of the BIA.
    • Review the draft BIA with relevant business leaders to refine and validate the results.

    Activity 2: Review your key cloud vendors’ SLAs, incident preparedness, and data protection strategy

    1-3 hours

    Use the Cloud Services Incident Risk and Mitigation Review Tool as follows:

    1. Send the Vendor Questionnaire tab to your cloud vendors to gather input, and review your existing agreements.
    2. Copy the vendor responses into the tool (see the instructions in the tool) and evaluate. See the example excerpt below.
    3. Identify action items to clarify gaps or address risks. Some action items might not be defined yet and will need to wait until you have had a chance to further explore risk mitigation options.

    The image contains a screenshot of the Cloud Services Incident Risk and Mitigation Review Tool.

    Materials
    • Cloud Services Incident Risk and Mitigation Review Tool
    Participants
    • Core group of IT management and staff tasked with evaluating and improving cloud services’ resilience.

    Phase 2: Identify options to mitigate risk

    Phase 1

    Phase 2

    Phase 3

    Assess your cloud risk

    Identify options to mitigate risk

    Create an incident response plan

    Consult your vendor to identify options to improve resilience, as a starting point

    Your vendor might also be able to suggest third parties that offer additional support, backup, or service continuity options.

    • The Vendor Questionnaire tab in the Cloud Services Incident Risk and Mitigation Review Tool includes a section at the bottom where your vendor can name additional options to improve resilience (e.g. premium support packages, potentially their own DR services).
    • If your vendor has not completed that part of the questionnaire, meet with them to discuss this. Asking service vendors about resilience has become commonplace, so they should be prepared to answer questions about their own offerings and potentially can name trusted third-party vendors who can further assist you.
    • Leverage Info-Tech’s advisory services to evaluate options outlined by your vendor and potential third-party options (e.g. enterprise backup solutions that support backing up SaaS data).

    Some SaaS solutions have plenty of resilience options; others not so much

    • The pervasiveness of O365 has led vendors to close the service continuity gap, with options to send and receive email during an outage and back up your data.
    • With many SaaS solutions, there isn’t going to be a third-party service continuity option, but you might still be able to at least back up your data and implement business process workarounds to close the service gap.

    Example SaaS risk and mitigation: O365

    Risk

    • Several outages every year (e.g. MS Teams July 20, 2022).
    • SLA exceptions include “Scheduled Downtime,” which can occur with just five days’ notice.
    • The Recycling Bin is your data backup, depending on your setup.

    Options to mitigate risk (not an exhaustive list):

    • Third-party solutions for email service continuity.
    • Several backup vendors (e.g. Veeam, Rubrik) can protect most of your O365 suite.
    • Business continuity workarounds leveraging synced OneDrive, SharePoint, and Outlook (access to calendar invites).

    Example SaaS risk and mitigation: Salesforce

    Risk

    • Downtime has been infrequent, but Salesforce did have a major outage in May 2021 (DNS issue) and May 2022 (expired certificate).
    • At the time of this writing, the Main Services Agreement does not commit to a specific uptime value and specifies the usual exclusions.
    • Similarly, there are limited commitments regarding data protection.

    Options to mitigate risk (not an exhaustive list):

    • Salesforce provides a backup and restore service offering.
    • In addition, some third-party vendors support backing up Salesforce data for additional protection against data corruption or data loss.
    • Business continuity workarounds can further reduce the impact of downtime (e.g. record updates in MS Word and leverage Outlook for contact info until Salesforce is recovered).

    Establish a baseline standard for risk mitigation, regardless of cloud service

    At a minimum, set a goal to review vendor risk at least annually, define standard processes for monitoring outages, and review options to back up your SaaS data.

    Example baseline standard for cloud risk mitigation

    • Review vendor risk at least annually. This includes reviewing SLAs, vendor’s incident preparedness (e.g. do they have a current DRP, BCP, and Security IRP?), and the vendor’s data protection strategy.
    • Incident response plans must include, at a minimum, steps to monitor vendor outage and communicate status to relevant stakeholders. Where possible, business process workarounds are defined to bridge the service gap.
    • For critical data (based on your BIA and an evaluation of risk), maintain your own backups of SaaS data for additional protection.

    Embed risk mitigation standards into existing IT operations

    • Include specific SLA requirements, including incident management processes, in your RFP process and annual vendor review.
    • Define cloud incident response in your incident management procedures.
    • Include cloud data considerations in your backup strategy reviews.

    Phase 3: Create an incident response plan

    Phase 1

    Phase 2

    Phase 3

    Assess your cloud risk

    Identify options to mitigate risk

    Create an incident response plan

    Activity 1: Review the example incident response workflows and case studies as a starting point

    1-3 hours

    1. Review the SaaS Incident Response Workflows examples. The examples illustrate different approaches to incident response depending on the criticality of the service and options available.
    2. Review the case studies on the next few slides, which further illustrate the resilience and incident response solutions implemented.
    3. Note the key elements:
    • Detection
    • Assessment
    • Monitoring status / contacting the vendor
    • Communication with key stakeholders
    • Invoking workarounds, if applicable

    Example SaaS Incident Response Workflow Excerpt

    The image contains a screenshot of an example of the SaaS Incident Response Workflow Excerpt.
    Materials
    • SaaS Incident Response Workflows examples
    Participants
    • Core group of IT management and staff tasked with evaluating and improving cloud services’ resilience.
    • Relevant business process owners to provide input and define business workarounds, where applicable.

    Case Study 1: Recovery plan for critical fundraising event

    If either critical SaaS dependency fails, the following plan is executed:

    1. Donors are redirected to a predefined alternate donation page hosted by a different service. The alternate page connects to the backup payment processing service (with predefined integrations).
    2. Marketing communications support the redirect.
    3. While the backup solution doesn’t gather as much data, the payment details provide enough information to follow up with donors where necessary.

    Criticality justified a failover option

    The Annual Day of Giving generates over 50% of fundraising for the year. It’s critically dependent on two SaaS solutions that host the donation page and payment processing.

    To mitigate the risk, the organization implemented the ability to failover to an alternate “environment” – much like a traditional DR solution – supported by workarounds to manage data collection.

    Case Study 2: Protecting customer data

    Daily exports from a SaaS-hosted donations site reduce potential data loss:

    1. Daily exports to a CRM support donor profile updates and follow-ups (tax receipts, thank-you letters, etc.).
    2. The exports also mitigate the risk of data loss due to an incident with the SaaS-hosted donation site.
    3. This company is exploring more-frequent exports to further reduce the risk of data loss.

    Protecting your data gives you options

    For critical data, do you want to rely solely on the vendor’s default backup strategy?

    If your SaaS vendor is hit by ransomware or if their backup frequency doesn’t meet your needs, having your own data backup gives you options.

    It can also support business process workarounds that need to access that data while waiting for SaaS recovery.

    Case Study 3: Recovery plan for payroll

    To enable a more accurate payroll workaround, the following is done:

    1. After each payroll run, export the payroll data from the SaaS solution to a secure location.
    2. If there is a SaaS outage when payroll must be submitted, the exported data can be modified and converted to an ACH file.
    3. The ACH file is submitted to the bank, which has preapproved this workaround.

    BCP can bridge the gap

    When leadership looks to IT to mitigate cloud risk, include BCP in the discussion.

    Payroll is a good example where the best recovery option might be a business continuity workaround.

    IT often still has a role in business continuity workarounds, as in this case study: specifically, providing a solution to modify and convert the payroll data to an ACH file.

    Activity 2: Run tabletop planning exercises as a starting point to build your incident response plan

    1-3 hours

    1. Follow the tabletop planning instructions provided in the Create a Right-Sized Disaster Recovery Plan blueprint.
    2. Run the exercise for each cloud service. Keep the scenario generic at first (e.g. cloud service is down with no reported root cause) so you can focus on your response. Capture response steps and gaps.
    3. Add complexity in subsequent exercises (e.g. data loss plus downtime), and use that to expand and refine the workflow as needed.
    4. Use the resulting workflows as the core piece of your incident response plan.
    5. Supplement the workflow with relevant checklists or procedures. At this point you can choose to incorporate this into your DRP or BCP or maintain these documents as supplements to those plans.
      See the DRP Case Study and BCP Case Study for an example of DRP-BCP documentation.

    Example tabletop planning results excerpt with gaps identified

    The image contains an example tabletop planning results excerpt with gaps identified.

    Materials
    • SaaS Incident Response Workflows examples
    Participants
    • Core group of IT management and staff tasked with evaluating and improving cloud services’ resilience.
    • Review results with relevant business process owners to provide input and define business workarounds where applicable.

    Activity 3: Summarize cloud services resilience to inform senior leadership of current risks and mitigation efforts

    1-3 hours

    1. Use the Cloud Services Resilience Summary example as a template to capture the following:
    • The results of your vendor review (i.e. incident management SLAs, incident response preparedness, data protections strategy).
    • The current state of your downtime workarounds and additional data loss protection.
    • Your baseline standard for cloud services risk mitigation.
    • Summary of resilience, risks, workarounds, and data loss protection for each individual cloud service that you have reviewed.
  • Present the results to senior leadership to:
    • Highlight risks to inform business decisions to mitigate or accept those risks.
    • Summarize actions already taken to mitigate risks.
    • Communicate next steps (e.g. action items to address remaining risks).

    Cloud Services Resilience Summary – Table of Contents

    The image contains a screenshot of Cloud Services Resilience Summary – Table of Contents.
    Materials
    • Cloud Services Resilience Summary
    Participants
    • Core group of IT management and staff tasked with evaluating and improving cloud services’ resilience.
    • Review results with relevant business process owners to provide input and define business workarounds where applicable.

    Summary: For cloud services, after evaluating risk, IT must adapt how they approach risk mitigation

    1. Identify failover options where possible
    • A failover strategy is possible for many cloud services (e.g. IaaS replication to another region, or failing over SaaS to an alternate solution as in case study 1).
  • At least protect your data
    • Explore supplementary backup options to protect against ransomware, data corruption, or data loss and support business continuity workarounds (see case study 2).
  • Leverage BCP to close the gap
    • This doesn’t absolve IT of its role in mitigating cloud incident risk, but business process workarounds can bridge the gap where IT options are limited (see case study 3).

    Related Info-Tech Research

    IT DRP Maturity Assessment

    Get an objective assessment of your DRP program and recommendations for improvement.

    Create a Right-Sized Disaster Recovery Plan

    Close the gap between your DR capabilities and service continuity requirements.

    Develop a Business Continuity Plan

    Streamline the traditional approach to make BCP development manageable and repeatable.

    Implement Crisis Management Best Practices

    Don’t be another example of what not to do. Implement an effective crisis response plan to minimize the impact on business continuity, reputation, and profitability.

    Implement an IT Chargeback System

    • Buy Link or Shortcode: {j2store}71|cart{/j2store}
    • member rating overall impact: 8.0/10 Overall Impact
    • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
    • member rating average days saved: Read what our members are saying
    • Parent Category Name: Cost & Budget Management
    • Parent Category Link: /cost-and-budget-management
    • Business units voraciously consume IT services and don’t understand the actual costs of IT. This is due to lack of IT cost transparency and business stakeholder accountability for consumption of IT services.
    • Business units perceive IT costs as uncompetitive, resulting in shadow IT and a negative perception of IT.
    • Business executives have decided to implement an IT chargeback program and IT must ensure the program succeeds.

    Our Advice

    Critical Insight

    Price IT services so that business consumers find them meaningful, measurable, and manageable:

    • The business must understand what they are being charged for. If they can’t understand the value, you’ve chosen the wrong basis for charge.
    • Business units must be able to control and track their consumption levels, or they will feel powerless to control costs and you’ll never attain real buy-in.

    Impact and Result

    • Explain IT costs in ways that matter to the business. Instead of focusing on what IT pays for, discuss the value that IT brings to the business by defining IT services and how they serve business users.
    • Develop a chargeback model that brings transparency to the flow of IT costs through to business value. Demonstrate how a good chargeback model can bring about fair “pay-for-value” and “pay-for-what-you-use” pricing.
    • Communicate IT chargeback openly and manage change effectively. Business owners will want to know how their profit and loss statements will be affected by the new pricing model.

    Implement an IT Chargeback System Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should implement an IT chargeback program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Launch

    Make the case for IT chargeback, then assess the financial maturity of the organization and identify a pathway to success. Create a chargeback governance model.

    • Implement IT Chargeback – Phase 1: Launch
    • IT Chargeback Kick-Off Presentation

    2. Define

    Develop a chargeback model, including identifying user-facing IT services, allocating IT costs to services, and setting up the chargeback program.

    • Implement IT Chargeback – Phase 2: Define
    • IT Chargeback Program Development & Management Tool

    3. Implement

    Communicate the rollout of the IT chargeback model and establish a process for recovering IT services costs from business units.

    • Implement IT Chargeback – Phase 3: Implement
    • IT Chargeback Communication Plan
    • IT Chargeback Rollout Presentation
    • IT Chargeback Financial Presentation

    4. Revise

    Gather and analyze feedback from business owners, making necessary modifications to the chargeback model and communicating the implications.

    • Implement IT Chargeback – Phase 4: Revise
    • IT Chargeback Change Communication Template
    [infographic]

    Workshop: Implement an IT Chargeback System

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Kick-Off IT Chargeback

    The Purpose

    Make the case for IT chargeback.

    Identify the current and target state of chargeback maturity.

    Establish a chargeback governance model.

    Key Benefits Achieved

    Investigated the benefits and challenges of implementing IT chargeback.

    Understanding of the reasons why traditional chargeback approaches fail.

    Identified the specific pathway to chargeback success.

    Activities

    1.1 Investigate the benefits and challenges of implementing IT chargeback

    1.2 Educate business owners and executives on IT chargeback

    1.3 Identify the current and target state of chargeback maturity

    1.4 Establish chargeback governance

    Outputs

    Defined IT chargeback mandate

    IT chargeback kick-off presentation

    Chargeback maturity assessment

    IT chargeback governance model

    2 Develop the Chargeback Model

    The Purpose

    Develop a chargeback model.

    Identify the customers and user-facing services.

    Allocate IT costs.

    Determine chargeable service units.

    Key Benefits Achieved

    Identified IT customers.

    Identified user-facing services and generated descriptions for them.

    Allocated IT costs to IT services.

    Identified meaningful, measurable, and manageable chargeback service units.

    Activities

    2.1 Identify user-facing services and generate descriptions

    2.2 Allocate costs to user-facing services

    2.3 Determine chargeable service units and pricing

    2.4 Track consumption

    2.5 Determine service charges

    Outputs

    High-level service catalog

    Chargeback model

    3 Communicate IT Chargeback

    The Purpose

    Communicate the implementation of IT chargeback.

    Establish a process for recovering the costs of IT services from business units.

    Share the financial results of the charge cycle with business owners.

    Key Benefits Achieved

    Managed the transition to charging and recovering the costs of IT services from business units.

    Communicated the implementation of IT chargeback and shared the financial results with business owners.

    Activities

    3.1 Create a communication plan

    3.2 Deliver a chargeback rollout presentation

    3.3 Establish a process for recovering IT costs from business units

    3.4 Share the financial results from the charge cycle with business owners

    Outputs

    IT chargeback communication plan

    IT chargeback rollout presentation

    IT service cost recovery process

    IT chargeback financial presentation

    4 Review the Chargeback Model

    The Purpose

    Gather and analyze feedback from business owners on the chargeback model.

    Make necessary modifications to the chargeback model and communicate implications.

    Key Benefits Achieved

    Gathered business stakeholder feedback on the chargeback model.

    Made necessary modifications to the chargeback model to increase satisfaction and accuracy.

    Managed changes by communicating the implications to business owners in a structured manner.

    Activities

    4.1 Address stakeholder pain points and highly disputed costs

    4.2 Update the chargeback model

    4.3 Communicate the chargeback model changes and implications to business units

    Outputs

    Revised chargeback model with business feedback, change log, and modifications

    Chargeback change communication

    Cookie Notice

    Gert Taeymans BV wants to inform you about our cookie notice on the Gert Taeymans BV websites via this document. Please also see the privacy policy which you can find here.

    This website is owned by Gert Taeymans BV

    Contact details:
    Gert Taeymans BV
    Koning Albertstraat 136
    2070 Burcht
    Belgium
    Company number: 0685974694
    Phone: +32 3 289 41 09
    email: gtbvba@gerttaeymans.com

    Site Scope

    The websites in scope of this notice are:

    • tymansgroup.com
    • gerttaeymans.consulting
    • gerttaeymans.site
    • gerttaeymans.audio

    Cookie Types

    We differentiate 4 types of cookies

    • Necessary cookies
      Necessary cookies help make our website usable by enabling basic functions like page navigation and access to secure areas of the website. While you can decline them, The website cannot function properly without these cookies.
    • Preferences cookies
      Preference cookies enable our website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in. They may include cookies from 3rd party providers whose content we show or reference on our site. Those cookies are outside of our control and these providers may change their terms and policies at any time.
    • Statistics cookies
      Statistic cookies help our company to understand how visitors interact with our website by collecting and reporting statistical information pseudonymously. That means that eg. your IP address is scrambled in such a way that it will always be the same upon each subsequent visit to our site, so that Google can process the visit as a return visit. This helps with basic statistics, but also is a factor in how well we rank in future searches. Many returning visitors means that you like our site and that is a ranking element.
      Due to the ECJ striking down the  EU-US Privacy Shield agreement, this leaves us with a open gap. The resulting implications and actions to take are not yet clear. However, when agreeing to statistics cookies, you agree that your data may be processed in the United States under less strict privacy laws and that your data will be exposed to all associated risks. Such risks include the US government being able to investigate you, simply for being a non-US citizen due to provision 702 of the FISA act, which they are able to do anyway, with or without the cookie. Also, the laws in the United States are less strict with regards to selling information to third parties.
    • Marketing cookies
      Marketing cookies are used to track you across websites. The intention is to display ads that are relevant and engaging for you and thereby more valuable for publishers and third party advertisers. At this point we do not allow ads to display on our site, so no third-party trackers are defined on our site. We may add a 1st party (us) tracker to our site at any time.

    Actual cookies used

    Necessary cookies (all sites in site scope)

    Name     Contents Expiration Reason for the cookie
    Session cookie (displayed as a long series of numbers and letters) The active session ID When you close your broser, clear your cookie's cache in your browser or after 60 minutes of inactivity on the site. The cookie may remain in your machine but is no longer valid after the mentioned tile of inactivity    

    The browser cookie is simply a random string of characters to identify the visitor. There are no personally identifable details in the cookie and no real data of use at all. The cookie is marked as a 'session' type of cookie, which means it will expire (be deleted automatically) when the browser is closed or cleaned by the browser after a set period of non-use; for instance, you haven't visited a page on the site that has used the cookie for 1 week. This latter case is useful for people that leave their computer running and never close their browser.

    The use of a cookie is what gives your website a short-term memory. By providing it with each request, Joomla can look up the history of the current viewing session in the database record below.

    cookieconsent_status allow 1 year This cookie stores that you have consented to the use of cookies on our site. It is there to avoid that you have to give your consent again at every page load.

    Preferences cookies

    Site Name     Contents Expiration Reason for the cookie
    gerttaeymans.consulting None at this stage N/A N/A   N/A
    tymansgroup.com None at this stage N/A N/A N/A
             
             

    Statistical cookies

    Site Name     Contents Expiration Reason for the cookie
    All Scope _ga Google Analytics type and account identifier 2 years This cookie identifies our domain (gerttaeymans.consulting) and sends visit information to Google. information may include, but not limited to: browser identifiable information, page visited, visit duration, etc. This information does not contain user identifiable information
    All Scope _gat_gtag_UA_140807308_3 Google Analytics type and account identifier 2 years This cookie also identifies our domain (gerttaeymans.consulting) and sends visit information to Google. information may include, but not limited to: browser identifiable information, page visited, visit duration, etc. This information does not contain user identifiable information
    All Scope _gid Google Analytics type and account identifier 1 day This cookie also identifies our domain (gerttaeymans.consulting) and sends visit information to Google. information may include, but not limited to: browser identifiable information, page visited, visit duration, etc. This information does not contain user identifiable information
             
             

    Marketing cookies

    Name     Contents Expiration Reason for the cookie
    None at this stage N/A N/A N/A
           
           

     

    Managing cookies

    You are not required to accept any cookies . Our cookies toolbar allows you to fine tune which cookies you accespt or want to revoke consent for. The resulting experience may however be affected by your decision not to accept cookies.

    Eg. not accepting or revoking consent for the “Necessary” category cookies will result in your inability to log into the site, even if you have previously accepted the cookies and paid for service.

    Not accepting or revoking consent for “Preference” category cookies may impede on your ability to watch instructional videos on our site, even if you have previously accepted the cookies and paid for service.

    Not accepting or revoking consent for ‘Statistical” category cookies will result in us not seeing where visitors stay longer or shorter on our site. While the immediate experience will not degrade for you, it may impede us in better understanding where we need to improve our service, thereby denying you a potentially improved experience in the future.

    Not accepting or revoking consent for “Marketing” category cookies may result in you seeing irrelevant ads, if we make the decision to allow carefully selected partners to offer their services through our site.

    Removing cookies from your device

    You can delete all cookies that are already on your device by clearing the browsing history of your browser. This will remove all cookies from all websites you have visited.

    Be aware though that you may also lose some saved information (e.g. saved login details, site preferences).

    Managing site-specific cookies

    For more detailed control over site-specific cookies, check the privacy and cookie settings in your preferred browser

    Blocking cookies

    You can set most modern browsers to prevent any cookies being placed on your device, but you may then have to manually adjust some preferences every time you visit a site/page. And some services and functionalities may not work properly at all (e.g. profile logging-in).

    Portfolio Management

    • Buy Link or Shortcode: {j2store}47|cart{/j2store}
    • Related Products: {j2store}47|crosssells{/j2store}
    • member rating overall impact: 9.6/10
    • member rating average dollars saved: $40,234
    • member rating average days saved: 30
    • Parent Category Name: Applications
    • Parent Category Link: /applications

    The challenge

    • Typically your business wants much more than your IT development organization can deliver with the available resources at the requested quality levels.
    • Over-damnd has a negative influence on delivery throughput. IT starts many projects (or features) but has trouble delivering most of them within the set parameters of scope, time, budget, and quality. Some requested deliverables may even be of questionable value to the business.
    • You may not have the right project portfolio management (PPM) strategy to bring order in IT's delivery activities and to maximize business value.

    Our advice

    Insight

    • Many in IT mix PPM and project management. Your project management playbook does not equate to the holistic view a real PPM practice gives you.
    • Some organizations also mistake PPM for a set of processes. Processes are needed, but a real strategy works towards tangible goals.
    • PPM works at the strategic level of the company; hence executive buy-in is critical. Without executive support, any effort to reconcile supply and demand will be tough to achieve.

    Impact and results 

    • PPM is a coherent business-aligned strategy that maximizes business value creation across the entire portfolio, rather than in each project.
    • Our methodology tackles the most pressing challenge upfront: get executive buy-in before you start defining your goals. With senior management behind the plan, implementation will become easier.
    • Create PPM processes that are a cultural fit for your company. Define your short and long-term goals for your strategy and support them with fully embedded portfolio management processes.

    The roadmap

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    Get started.

    Read our executive brief to understand why you should develop a PPM strategy and understand how our methodology can help you. We show you how we can support you.

    Obtain executive buy-in for your strategy

    Ensure your strategy is a cultural fit or cultural-add for your company.

    • Develop a Project Portfolio Management Strategy – Phase 1: Get Executive Buy-In for Your PPM Strategy (ppt)
    • PPM High-Level Supply-Demand Calculator (xls)
    • PPM Strategic Plan Template (ppt)
    • PPM Strategy-Process Goals Translation Matrix Template (xls)

    Align the PPM processes to your company's strategic goals

    Use the advice and tools in this stage to align the PPM processes.

    • Develop a Project Portfolio Management Strategy – Phase 2: Align PPM Processes to Your Strategic Goals (ppt)
    • PPM Strategy Development Tool (xls)

    Refine and complete your plan

    Use the inputs from the previous stages and add a cost-benefit analysis and tool recommendation.

    • Streamline Application Maintenance – Phase 3: Optimize Maintenance Capabilities (ppt)

    Streamline your maintenance delivery

    Define quality standards in maintenance practices. Enforce these in alignment with the governance you have set up. Show a high degree of transparency and open discussions on development challenges.

    • Develop a Project Portfolio Management Strategy – Phase 3: Complete Your PPM Strategic Plan (ppt)
    • Project Portfolio Analyst / PMO Analyst (doc)

     

     

    Threat Preparedness Using MITRE ATT&CK®

    • Buy Link or Shortcode: {j2store}252|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Security Strategy & Budgeting
    • Parent Category Link: /security-strategy-and-budgeting
    • To effectively protect your business interests, you need to be able to address what the most pressing vulnerabilities in your network are. Which attack vectors should you model first? How do you adequately understand your threat vectors when attacks continually change and adapt?
    • Security can often be asked the world but given a minimal budget with which to accomplish it.
    • Security decisions are always under pressure from varying demands that pull even the most well-balanced security team in every direction.
    • Adequately modeling any and every possible scenario is ineffective and haphazard at best. Hoping that you have chosen the most pressing attack vectors to model will not work in the modern day of threat tactics.

    Our Advice

    Critical Insight

    • Precision is critical to being able to successfully defend against threats.
      • Traditional threat modeling such as STRIDE or PASTA is based on a spray-and-pray approach to identifying your next potential threat vector. Instead, take a structured risk-based approach to understanding both an attacker’s tactics and how they may be used against your enterprise. Threat preparedness requires precision, not guesswork.
    • Knowing is half the battle.
      • You may be doing better than you think. Undoubtedly, there is a large surface area to cover with threat modeling. By preparing beforehand, you can separate what’s important from what’s not and identify which attack vectors are the most pressing for your business.
    • Be realistic and measured.
      • Do not try to remediate everything. Some attack vectors and approaches are nearly impossible to account for. Take control of the areas that have reasonable mitigation methods and act on those.
    • Identify blind spots.
      • Understand what is out there and how other enterprises are being attacked and breached. See how you stack up to the myriad of attack tactics that have been used in real-life breaches and how prepared you are. Know what you’re ready for and what you’re not ready for.
    • Analyze the most pressing vectors.
      • Prioritize the attack vectors that are relevant to you. If an attack vector is an area of concern for your business, start there. Do not cover the entire tactics list if certain areas are not relevant.
    • Detection and mitigation lead to better remediation.
      • For each relevant tactic and techniques, there are actionable detection and mitigation methods to add to your list of remediation efforts.

    Impact and Result

    Using the MITRE ATT&CK® framework, Info-Tech’s approach helps you understand your preparedness and effective detection and mitigation actions.

    • Learn about potential attack vectors and the techniques that hostile actors will use to breach and maintain a presence on your network.
    • Analyze your current protocols versus the impact of an attack technique on your network.
    • Discover detection and mitigation actions.
    • Create a prioritized series of security considerations, with basic actionable remediation items. Plan your next threat model by knowing what you’re vulnerable to.
    • Ensure business data cannot be leaked or stolen.
    • Maintain privacy of data and other information.
    • Secure the network connection points.
    • Mitigate risks with the appropriate services.

    This blueprint and associated tool are scalable for all types of organizations within various industry sectors, allowing them to know what types of risk they are facing and what security services are recommended to mitigate those risks.

    Threat Preparedness Using MITRE ATT&CK® Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why threat preparedness is a crucial first step in defending your network against any attack type. Review Info-Tech’s methodology and understand the ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Attack tactics and techniques

    Review a breakdown of each of the various attack vectors and their techniques for additional context and insight into the most prevalent attack tactics.

    • Threat Preparedness Using MITRE ATT&CK® – Phase 1: Attack Tactics and Techniques

    2. Threat Preparedness Workbook mapping

    Map your current security protocols against the impacts of various techniques on your network to determine your risk preparedness.

    • Threat Preparedness Using MITRE ATT&CK® – Phase 2: Threat Preparedness Workbook Mapping
    • Enterprise Threat Preparedness Workbook

    3. Execute remediation and detective measures

    Use your prioritized attack vectors to plan your next threat modeling session with confidence that the most pressing security concerns are being addressed with substantive remediation actions.

    • Threat Preparedness Using MITRE ATT&CK® – Phase 3: Execute Remediation and Detective Measures
    [infographic]

    Establish a Foresight Capability

    • Buy Link or Shortcode: {j2store}88|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Innovation
    • Parent Category Link: /innovation
    • To be recognized and validated as a forward-thinking CIO, you must establish a structured approach to innovation that considers external trends as well as internal processes.
    • The CEO is expecting an investment in IT innovation to yield either cost reduction or revenue growth, but growth cannot happen without opportunity identification.

    Our Advice

    Critical Insight

    • Technological innovation is disrupting business models – and it’s happening faster than organizations can react.
    • Smaller, more agile organizations have an advantage because they have less resources tied to existing operations and can move faster.

    Impact and Result

    • Be the disruptor, not the disrupted. This blueprint will help you plan proactively and identify opportunities before your competitors.
    • Strategic foresight gives you the tools you need to effectively process the signals in your environment, build an understanding of relevant trends, and turn this understanding into action.

    Establish a Foresight Capability Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how to effectively apply strategic foresight, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Signal gathering

    Develop a better understanding of your external environment and build a database of signals.

    • Establish a Foresight Capability – Phase 1: Signal Gathering
    • Foresight Process Tool

    2. Trends and drivers

    Select and analyze trends to uncover drivers.

    • Establish a Foresight Capability – Phase 2: Trends and Drivers

    3. Scenario building

    Use trends and drivers to build plausible scenarios and brainstorm strategic initiatives.

    • Establish a Foresight Capability – Phase 3: Scenario Building

    4. Idea selection

    Apply the wind tunneling technique to assess strategic initiatives and determine which are most likely to succeed in the face of uncertainty.

    • Establish a Foresight Capability – Phase 4: Idea Selection
    [infographic]

    Workshop: Establish a Foresight Capability

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Pre-workshop – Gather Signals and Build a Repository

    The Purpose

    Note: this is preparation for the workshop and is not offered onsite.

    Gather relevant signals that will inform your organization about what is happening in the external competitive environment.

    Key Benefits Achieved

    A better understanding of the competitive landscape.

    Activities

    1.1 Gather relevant signals.

    1.2 Store signals in a repository for quick and easy recall during the workshop.

    Outputs

    A set of signal items ready for analysis

    2 Identify Trends and Uncover Drivers

    The Purpose

    Uncover trends in your environment and assess their potential impact.

    Determine the causal forces behind relevant trends to inform strategic decisions.

    Key Benefits Achieved

    An understanding of the underlying causal forces that are influencing a trend that is affecting your organization.

    Activities

    2.1 Cluster signals into trends.

    2.2 Analyze trend impact and select a key trend.

    2.3 Perform causal analysis.

    2.4 Select drivers.

    Outputs

    A collection of relevant trends with a key trend selected

    A set of drivers influencing the key trend with primary drivers selected

    3 Build Scenarios and Ideate

    The Purpose

    Leverage your understanding of trends and drivers to build plausible scenarios and apply them as a canvas for ideation.

    Key Benefits Achieved

    A set of potential responses or reactions to trends that are affecting your organization.

    Activities

    3.1 Build scenarios.

    3.2 Brainstorm potential strategic initiatives (ideation).

    Outputs

    Four plausible scenarios for ideation purposes

    A potential strategic initiative that addresses each scenario

    4 Apply Wind Tunneling and Select Ideas

    The Purpose

    Assess the various ideas based on which are most likely to succeed in the face of uncertainty.

    Key Benefits Achieved

    An idea that you have tested in terms of risk and uncertainty.

    An idea that can be developed and pitched to the business or stored for later use. 

    Activities

    4.1 Assign probabilities to scenarios.

    4.2 Apply wind tunneling.

    4.3 Select ideas.

    4.4 Discuss next steps and prototyping.

    Outputs

    A strategic initiative (idea) that is ready to move into prototyping

    Measure IT Project Value

    • Buy Link or Shortcode: {j2store}431|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $5,549 Average $ Saved
    • member rating average days saved: 6 Average Days Saved
    • Parent Category Name: Portfolio Management
    • Parent Category Link: /portfolio-management
    • People treat benefits as a box to tick on the business case, deflating or inflating them to facilitate project approval.
    • Even if benefits are properly defined, they are usually forgotten once the project is underway.
    • Subsequent changes to project scope may impact the viability of the project’s business benefits, resulting in solutions that do not deliver expected value.

    Our Advice

    Critical Insight

    • It is rare for project teams or sponsors to be held accountable for managing and/or measuring benefits. The assumption is often that no one will ask if benefits have been realized after the project is closed.
    • The focus is largely on the project’s schedule, budget, and scope, with little attention paid to the value that the project is meant to deliver to the organization.
    • Without an objective stakeholder to hold people accountable for defining benefits and demonstrating their delivery, benefits will continue to be treated as red tape.
    • Sponsors will not take the time to define benefits properly, if at all. The project team will not take the time to ensure they are still achievable as the project progresses. When the project is complete, no one will investigate actual project success.

    Impact and Result

    • The project sponsor and business unit leaders must own project benefits; IT is only accountable for delivering the solution.
    • IT can play a key role in this process by establishing and supporting a benefits realization process. They can help business unit leaders and sponsors define benefits properly, identify meaningful metrics, and report on benefits realization effectively.
    • The project management office is ideally suited to facilitate this process by providing tools and templates, and a consistent and comparable view across projects.
    • Project managers are accountable for delivering the project, not for delivering the benefits of the project itself. However, they must ensure that changes to project scope are assessed for impact on benefits viability.

    Measure IT Project Value Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should establish a benefits legitimacy practice, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Establish benefits legitimacy during portfolio Intake

    This phase will help you define a benefits management process to help support effective benefits definition during portfolio intake.

    • Deliver Project Value With a Benefits Legitimacy Initiative – Phase 1: Establish Benefits Legitimacy During Portfolio Intake
    • Project Sponsor Role Description Template
    • Benefits Commitment Form Template
    • Right-Sized Business Case Template

    2. Maintain benefits legitimacy throughout project planning and execution

    This phase will help you define a process for effective benefits management during project planning and the execution intake phase.

    • Deliver Project Value With a Benefits Legitimacy Initiative – Phase 2: Maintain Benefits Legitimacy Throughout Project Planning and Execution
    • Project Benefits Documentation Workbook
    • Benefits Legitimacy Workflow Template (PDF)
    • Benefits Legitimacy Workflow Template (Visio)

    3. Close the deal on project benefits

    This phase will help you define a process for effectively tracking and reporting on benefits realization post-project.

    • Deliver Project Value With a Benefits Legitimacy Initiative – Phase 3: Close the Deal on Project Benefits
    • Portfolio Benefits Tracking Tool
    • Benefits Lag Report Template
    • Benefits Legitimacy Handbook Template
    [infographic]

    Workshop: Measure IT Project Value

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Analyze the Current State of Benefits Management

    The Purpose

    Assess the current state of benefits management at your organization and establish a realistic target state.

    Establish project and portfolio baselines for benefits management.

    Key Benefits Achieved

    Set achievable workshop goals and align stakeholder expectations.

    Establish a solid foundation for benefits management success.

    Activities

    1.1 Introductions and overview.

    1.2 Discuss attendee expectations and goals.

    1.3 Complete Info-Tech’s PPM Current State Scorecard.

    1.4 Perform right-wrong-confusing-missing analysis.

    1.5 Define target state for benefits management.

    1.6 Refine project levels.

    Outputs

    Info-Tech’s PPM Current State Scorecard report

    Right-wrong-confusing-missing analysis

    Stakeholder alignment around workshop goals and target state

    Info-Tech’s Project Intake Classification Matrix

    2 Establish Benefits Legitimacy During Portfolio Intake

    The Purpose

    Establish organizationally specific benefit metrics and KPIs.

    Develop clear roles and accountabilities for benefits management.

    Key Benefits Achieved

    An articulation of project benefits and measurements.

    Clear checkpoints for benefits communication during the project are defined.

    Activities

    2.1 Map the current portfolio intake process.

    2.2 Establish project sponsor responsibilities and accountabilities for benefits management.

    2.3 Develop organizationally specific benefit metrics and KPIs.

    2.4 Integrate intake legitimacy into portfolio intake processes.

    Outputs

    Info-Tech’s Project Sponsor Role Description Template

    Info-Tech’s Benefits Commitment Form Template

    Intake legitimacy process flow and RASCI chart

    Intake legitimacy SOP

    3 Maintain Benefits Legitimacy Throughout Project Planning and Execution

    The Purpose

    Develop a customized SOP for benefits management during project planning and execution.

    Key Benefits Achieved

    Ensure that all changes to the project have been recorded and benefits have been updated in preparation for deployment.

    Updated benefits expectations are included in the final sign-off package.

    Activities

    3.1 Map current project management process and audit project management documentation.

    3.2 Identify appropriate benefits control points.

    3.3 Customize project management documentation to integrate benefits.

    3.4 Develop a deployment legitimacy process flow.

    Outputs

    Customized project management toolkit

    Info-Tech’s Project Benefits Documentation Workbook

    Deployment of legitimacy process flow and RASCI chart

    Deployment of legitimacy SOP

    4 Close the Deal on Project Benefits

    The Purpose

    Develop a post-project benefits realization process.

    Key Benefits Achieved

    Clear project sponsorship accountabilities for post-project benefits tracking and reporting.

    A portfolio level benefits tracking tool for reporting on benefits attainment.

    Activities

    4.1 Identify appropriate benefits control points in the post-project process.

    4.2 Configure Info-Tech’s Portfolio Benefits Tracking Tool.

    4.3 Define a post-project benefits reporting process.

    4.4 Formalize protocol for reporting on, and course correcting, benefit lags.

    4.5 Develop a post-project legitimacy process flow.

    Outputs

    Info-Tech’s Portfolio Benefits Tracking Tool

    Post-Project legitimacy process flow and RASCI chart

    Post-Project Legitimacy SOP

    Info-Tech’s Benefits Legitimacy Handbook

    Info-Tech’s Benefits Legitimacy Workflow Template

    Automate Testing to Get More Done

    • Buy Link or Shortcode: {j2store}285|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $29,139 Average $ Saved
    • member rating average days saved: 5 Average Days Saved
    • Parent Category Name: Testing, Deployment & QA
    • Parent Category Link: /testing-deployment-and-qa
    • Today’s rapidly changing software products and operational processes create mounting pressure on software delivery teams to release new features and changes quickly while meeting high and demanding quality standards.
    • Most organizations see automated testing as a solution to meet this demand alongside their continuous delivery pipeline. However, they often lack the critical foundations, skills, and practices that are imperative for success.
    • The technology is available to enable automated testing for many scenarios and systems, but industry noise and an expansive tooling marketplace create confusion for those interested in adopting this technology.

    Our Advice

    Critical Insight

    • Good automated testing improves development throughput. No matter how quickly you put changes into production, end users will not accept them if they do not meet quality standards. Escaped defects, refactoring, and technical debt can significantly hinder your team’s ability to deliver software on time and on budget. In fact, 65% of organizations saw a reduction of test cycle time and 62% saw reductions in test costs with automated testing (Sogeti, World Quality Report 2020–21).
    • Start automation with unit and functional tests. Automated testing has a sharp learning curve, due to either the technical skills to implement and operate it or the test cases you are asked to automate. Unit tests and functional tests are ideal starting points in your automation journey because of the available tools and knowledge in the industry, the contained nature of the tests you are asked to execute, and the repeated use of the artifacts in more complicated tests (such as performance and integration tests). After all, you want to make sure the application works before stressing it.
    • Automated testing is a cross-functional practice, not a silo. A core component of successful software delivery throughput is recognizing and addressing defects, bugs, and other system issues early and throughout the software development lifecycle (SDLC). This involves having all software delivery roles collaborate on and participate in automated test case design, configure and orchestrate testing tools with other delivery tools, and proactively prepare the necessary test data and environments for test types.

    Impact and Result

    • Bring the right people to the table. Automated testing involves significant people, process and technology changes across multiple software delivery roles. These roles will help guide how automated testing will compliment and enhance their responsibilities.
    • Build a foundation. Review your current circumstances to understand the challenges blocking automated testing. Establish a strong base of good practices to support the gradually adoption of automated testing across all test types.
    • Start with one application. Verify and validate the automated testing practices used in one application and their fit for other applications and systems. Develop a reference guide to assist new teams.

    Automate Testing to Get More Done Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should automate testing, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    2. Adopt good automated testing practices

    Develop and implement practices that mature your automated testing capabilities.

    • Automated Testing Quick Reference Template

    Infographic

    Workshop: Automate Testing to Get More Done

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Adopt Good Automated Testing Practices

    The Purpose

    Understand the goals of and your vision for your automated testing practice.

    Develop your automated testing foundational practices.

    Adopt good practices for each test type.

    Key Benefits Achieved

    Level set automated testing expectations and objectives.

    Learn the key practices needed to mature and streamline your automated testing across all test types.

    Activities

    1.1 Build a foundation.

    1.2 Automate your test types.

    Outputs

    Automated testing vision, expectations, and metrics

    Current state of your automated testing practice

    Ownership of the implementation and execution of automated testing foundations

    List of practices to introduce automation to for each test type

    Improve Incident and Problem Management

    • Buy Link or Shortcode: {j2store}290|cart{/j2store}
    • member rating overall impact: 9.6/10 Overall Impact
    • member rating average dollars saved: $43,761 Average $ Saved
    • member rating average days saved: 23 Average Days Saved
    • Parent Category Name: Incident and problem management
    • Parent Category Link: /improve-your-core-processes/infra-and-operations/i-and-o-process-management/incident-and-problem-management
    • IT infrastructure managers have conflicting accountabilities. It can be difficult to fight fires as they appear while engaging in systematic fire prevention.
    • Repetitive interruptions erode faith in IT. If incidents recur consistently, why should the business trust IT to resolve them?

    Continue reading

    Implement Hardware Asset Management

    • Buy Link or Shortcode: {j2store}312|cart{/j2store}
    • member rating overall impact: 9.4/10 Overall Impact
    • member rating average dollars saved: $29,447 Average $ Saved
    • member rating average days saved: 25 Average Days Saved
    • Parent Category Name: Asset Management
    • Parent Category Link: /asset-management
    • Executives are often aware of the benefits asset management offers, but many organizations lack a defined program to manage their hardware.
    • Efforts to implement hardware asset management (HAM) are stalled because organizations feel overwhelmed navigating the process or under use the data, failing to deliver value.

    Our Advice

    Critical Insight

    • Organizations often implement an asset management program as a one-off project and let it stagnate.
    • Organizations often fail to dedicate adequate resources to the HAM process, leading to unfinished processes and inconsistent standards.
    • Hardware asset management programs yield a large amount of useful data. Unfortunately, this data is often underutilized. Departments within IT become data siloes, preventing effective use of the data.

    Impact and Result

    • As the IT environment continues to change, it is important to establish consistency in the standards around IT asset management.
    • A current state assessment of your HAM program will shed light on the steps needed to safeguard your processes.
    • Define the assets that will need to be managed to inform the scope of the ITAM program before defining processes.
    • Build and involve an ITAM team in the process from the beginning to help embed the change.
    • Define standard policies, processes, and procedures for each stage of the hardware asset lifecycle, from procurement through to disposal.

    Implement Hardware Asset Management Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should Implement Hardware Asset Management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Lay foundations

    Build the foundations for the program to succeed.

    • Implement Hardware Asset Management – Phase 1: Lay Foundations
    • HAM Standard Operating Procedures
    • HAM Maturity Assessment Tool
    • IT Asset Manager
    • IT Asset Administrator

    2. Procure & receive

    Define processes for requesting, procuring, receiving, and deploying hardware.

    • Implement Hardware Asset Management – Phase 2: Procure and Receive
    • HAM Process Workflows (Visio)
    • HAM Process Workflows (PDF)
    • Non-Standard Hardware Request Form
    • Purchasing Policy

    3. Maintain & dispose

    Define processes and policies for managing, securing, and maintaining assets then disposing or redeploying them.

    • Implement Hardware Asset Management – Phase 3: Maintain and Dispose
    • Asset Security Policy
    • Hardware Asset Disposition Policy

    4. Plan implementation

    Plan the hardware budget, then build a communication plan and roadmap to implement the project.

    • Implement Hardware Asset Management – Phase 4: Plan Implementation 
    • HAM Budgeting Tool
    • HAM Communication Plan
    • HAM Implementation Roadmap
    [infographic]

    Workshop: Implement Hardware Asset Management

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Lay Foundations

    The Purpose

    Build the foundations for the program to succeed.

    Key Benefits Achieved

    Evaluation of current challenges and maturity level

    Defined scope for HAM program

    Defined roles and responsibilities

    Identified metrics and reporting requirements

    Activities

    1.1 Outline hardware asset management challenges.

    1.2 Conduct HAM maturity assessment.

    1.3 Classify hardware assets to define scope of the program.

    1.4 Define responsibilities.

    1.5 Use a RACI chart to determine roles.

    1.6 Identify HAM metrics and reporting requirements.

    Outputs

    HAM Maturity Assessment

    Classified hardware assets

    Job description templates

    RACI Chart

    2 Procure & Receive

    The Purpose

    Define processes for requesting, procuring, receiving, and deploying hardware.

    Key Benefits Achieved

    Defined standard and non-standard requests for hardware

    Documented procurement, receiving, and deployment processes

    Standardized asset tagging method

    Activities

    2.1 Identify IT asset procurement challenges.

    2.2 Define standard hardware requests.

    2.3 Document standard hardware request procedure.

    2.4 Build a non-standard hardware request form.

    2.5 Make lease vs. buy decisions for hardware assets.

    2.6 Document procurement workflow.

    2.7 Select appropriate asset tagging method.

    2.8 Design workflow for receiving and inventorying equipment.

    2.9 Document the deployment workflow(s).

    Outputs

    Non-standard hardware request form

    Procurement workflow

    Receiving and tagging workflow

    Deployment workflow

    3 Maintain & Dispose

    The Purpose

    Define processes and policies for managing, securing, and maintaining assets then disposing or redeploying them.

    Key Benefits Achieved

    Policies and processes for hardware maintenance and asset security

    Documented workflows for hardware disposal and recovery/redeployment

    Activities

    3.1 Build a MAC policy, request form, and workflow.

    3.2 Design process and policies for hardware maintenance, warranty, and support documentation handling.

    3.3 Revise or create an asset security policy.

    3.4 Identify challenges with IT asset recovery and disposal and design hardware asset recovery and disposal workflows.

    Outputs

    User move workflow

    Asset security policy

    Asset disposition policy, recovery and disposal workflows

    4 Plan Implementation

    The Purpose

    Select tools, plan the hardware budget, then build a communication plan and roadmap to implement the project.

    Key Benefits Achieved

    Shortlist of ITAM tools

    Hardware asset budget plan

    Communication plan and HAM implementation roadmap

    Activities

    4.1 Generate a shortlist of ITAM tools that will meet requirements.

    4.2 Use Info-Tech’s HAM Budgeting Tool to plan your hardware asset budget.

    4.3 Build HAM policies.

    4.4 Develop a communication plan.

    4.5 Develop a HAM implementation roadmap.

    Outputs

    HAM budget

    Additional HAM policies

    HAM communication plan

    HAM roadmap tool

    Further reading

    Implement Hardware Asset Management

    Build IT services value on the foundation of a proactive asset management program.

    ANALYST PERSPECTIVE

    IT asset data impacts the entire organization. It’s time to harness that potential.

    "Asset management is like exercise: everyone is aware of the benefits, but many struggle to get started because the process seems daunting. Others fail to recognize the integrative potential that asset management offers once an effective program has been implemented.

    A proper hardware asset management (HAM) program will allow your organization to cut spending, eliminate wasteful hardware, and improve your organizational security. More data will lead to better business decision-making across the organization.

    As your program matures and your data gathering and utility improves, other areas of your organization will experience similar improvements. The true value of asset management comes from improved IT services built upon the foundation of a proactive asset management program." - Sandi Conrad, Practice Lead, Infrastructure & Operations Info-Tech Research Group

    Our understanding of the problem

    This Research Is Designed For:

    • Asset Managers and Service Delivery Managers tasked with developing an asset management program who need a quick start.
    • CIOs and CFOs who want to reduce or improve budgeting of hardware lifecycle costs.
    • Information Security Officers who need to mitigate the risk of sensitive data loss due to insecure assets.

    This Research Will Help You:

    • Develop a hardware asset management (HAM) standard operating procedure (SOP) that documents:
      • Process roles and responsibilities.
      • Data classification scheme.
      • Procurement standards, processes, and workflows for hardware assets.
      • Hardware deployment policies, processes, and workflows.
      • Processes and workflows for hardware asset security and disposal.
    • Identify requirements for an IT asset management (ITAM) solution to help generate a shortlist.
    • Develop a hardware asset management implementation roadmap.
    • Draft a communication plan for the initiative.

    Executive summary

    Situation

    • Executives are aware of the numerous benefits asset management offers, but many organizations lack a defined ITAM program and especially a HAM program.
    • Efforts to implement HAM are stalled because organizations cannot establish and maintain defined processes and policies.

    Complication

    • Organizations often implement an asset management program as a one- off project and let it stagnate, but asset management needs to be a dynamic, continually involving process to succeed.
    • Organizations often fail to dedicate adequate resources to the HAM process, leading to unfinished processes and inconsistent standards.
    • Hardware asset management programs yield a large amount of useful data. Unfortunately, this data is often underused. Departments within IT become data siloes, preventing effective use of the data.

    Resolution

    • As the IT environment continues to change, it is important to establish consistency in the standards around IT asset management.
    • A current state assessment of your HAM program will shed light on the steps needed to safeguard your processes.
    • Define the assets that will need to be managed to inform the scope of the ITAM program before defining processes.
    • Build and involve an ITAM team in the process from the beginning to help embed the change.
    • Define standard policies, processes, and procedures for each stage of the hardware asset lifecycle, from procurement through to disposal.
    • Pace yourself; a staged implementation will make your ITAM program a success.

    Info-Tech Insight

    1. HAM is more than just tracking inventory. A mature asset management program provides data for proactive planning and decision making to reduce operating costs and mitigate risk.
    2. ITAM is not just IT. IT leaders need to collaborate with Finance, Procurement, Security, and other business units to make informed decisions and create value across the enterprise.
    3. Treat HAM like a process, not a project. HAM is a dynamic process that must react and adapt to the needs of the business.

    Implement HAM to reduce and manage costs, gain efficiencies, and ensure regulatory compliance

    Save & Manage Money

    • Companies with effective HAM practices achieve cost savings through redeployment, reduction of lost or stolen equipment, power management, and on-time lease returns.
    • The right HAM system will enable more accurate planning and budgeting by business units.

    Improve Contract Management

    • Real-time asset tracking to vendor terms and conditions allows for more effective negotiation.

    Inform Technology Refresh

    • HAM provides accurate information on hardware capacity and compatibility to inform upgrade and capacity planning

    Gain Service Efficiencies

    • Integrating the hardware lifecycle with the service desk will enable efficiencies through Install/Moves/Adds/Changes (IMAC) processes, for larger organizations.

    Meet Regulatory Requirements

    • You can’t secure organizational assets if you don’t know where they are! Meet governance and privacy laws by knowing asset location and that data is secure.

    Prevent Risk

    • Ensure data is properly destroyed through disposal processes, track lost and stolen hardware, and monitor hardware to quickly identify and isolate vulnerabilities.

    HAM is more than just inventory; 92% of organizations say that it helps them provide better customer support

    Hardware asset management (HAM) provides a framework for managing equipment throughout its entire lifecycle. HAM is more than just keeping an inventory; it focuses on knowing where the product is, what costs are associated with it, and how to ensure auditable disposition according to best options and local environmental laws.

    Implementing a HAM practice enables integration of data and enhancement of many other IT services such as financial reporting, service management, green IT, and data and asset security.

    Cost savings and efficiency gains will vary based on the organization’s starting state and what measures are implemented, but most organizations who implement HAM benefit from it. As organizations increase in size, they will find the greatest gains operationally by becoming more efficient at handling assets and identifying costs associated with them.

    A 2015 survey by HDI of 342 technical support professionals found that 92% say that HAM has helped their teams provide better support to customers on hardware-related issues. Seventy-seven percent have improved customer satisfaction through managing hardware assets. (HDI, 2015)

    HAM delivers cost savings beyond only the procurementstage

    HAM cost savings aren’t necessarily realized through the procurement process or reduced purchase price of assets, but rather through the cost of managing the assets.

    HAM delivers cost savings in several ways:

    • Use a discovery tool to identify assets that may be retired, redeployed, or reused to cut or reallocate their costs.
    • Enforce power management policies to reduce energy consumption as well as costs associated with wasted energy.
    • Enforce policies to lock down unauthorized devices and ensure that confidential information isn’t lost (and you don’t have to waste money recovering lost data).
    • Know the location of all your assets and which are connected to the network to ensure patches are up to date and avoid costly security risks and unplanned downtime.
    • Scan assets to identify and remediate vulnerabilities that can cause expensive security attacks.
    • Improve vendor and contract management to identify areas of hardware savings.

    The ROI for HAM is significant and measurable

    Benefit Calculation Sample Annual Savings

    Reduced help desk support

    • The length of support calls should be reduced by making it easier for technicians to identify PC configuration.
    # of hardware-related support tickets per year * cost per ticket * % reduction in average call length 2,000 * $40 * 20% = $16,000

    Greater inventory efficiency

    • An ITAM solution can automate and accelerate inventory preparation and tasks.
    Hours required to complete inventory * staff required * hourly pay rate for staff * number of times a year inventory required 8 hours * 5 staff * $33 per hour * 2 times a year = $2,640

    Improved employee productivity

    • Organizations can monitor and detect unapproved programs that result in lost productivity.
    # of employees * percentage of employees who encounter productivity loss through unauthorized software * number of hours per year spent using unauthorized software * average hourly pay rate 500 employees * 10% * 156 hours * $18 = $140,400

    Improved security

    • Improved asset tracking and stronger policy enforcement will reduce lost and stolen devices and data.
    # of devices lost or stolen last year * average replacement value of device + # of devices stolen * value of data lost from device (50 * $1,000) + (50 * $5,000) = $300,000
    Total Savings: $459,040
    1. Weigh the return against the annual cost of investing in an ITAM solution to calculate the ROI.
    2. Don’t forget about the intangible benefits that are more difficult to quantify but still significant, such as increased visibility into hardware, more accurate IT planning and budgeting, improved service delivery, and streamlined operations.

    Avoid these common barriers to ITAM success

    Organizations that struggle to implement ITAM successfully usually fall victim to these barriers:

    Organizational resistance to change

    Senior-level sponsorship, engagement, and communication is necessary to achieve the desired outcomes of ITAM; without it, ITAM implementations stall and fail or lack the necessary resources to deliver the value.

    Lack of dedicated resources

    ITAM often becomes an added responsibility for resources who already have other full-time responsibilities, which can quickly cause the program to lose focus. Increase the chance of success through dedicated resources.

    Focus on tool over process

    Many organizations buy a tool thinking it will do most of the work for them, but without supporting processes to define ITAM, the data within the tool can become unreliable.

    Choosing a tool or process that doesn’t scale

    Some organizations are able to track assets through manual discovery, but as their network and user base grows, this quickly becomes impossible. Choose a tool and build processes that will support the organization as it grows.

    Using data only to respond to an audit without understanding root causes

    Often, organizations implement ITAM only to the extent necessary to achieve compliance for audits, but without investigating the underlying causes of non-compliance and thus not solving the real problems.

    To help you make quick progress, Info-Tech Research Group parses hardware asset management into essential processes

    Focus on hardware asset lifecycle management essentials:

    IT Asset Procurement:

    • Define procurement standards for new hardware along with related warranties and support options.
    • Develop processes and workflows for purchasing and work out financial implications to inform budgeting later.

    IT Asset Intake and Deployment:

    • Define policies, processes, and workflows for hardware and receiving, inventory, and tracking practices.
    • Develop processes and workflows for managing imaging, change and moves, and large-scale rollouts.

    IT Asset Security and Maintenance:

    • Develop processes, policies, and workflows for asset tracking and security.
    • Maintain contracts and agreements.

    IT Asset Disposal or Recovery:

    • Manage the employee termination and equipment recovery cycle.
    • Securely wipe and dispose of assets that have reached retirement stage.

    The image is a circular graphic, with Implement HAM written in the middle. Around the centre circle are four phrases: Recover or Dispose; Plan & Procure; Receive & Deploy; Secure & Maintain. Around that circle are six words: Retire; Plan; Request; Procure; Receive; Manage.

    Follow Info-Tech’s methodology to build a plan to implement hardware asset management

    Phase 1: Assess & Plan Phase 2: Procure & Receive Phase 3: Maintain & Dispose Phase 4: Plan Budget & Build Roadmap
    1.1 Assess current state & plan scope 2.1 Request & procure 3.1 Manage & maintain 4.1 Plan budget
    1.2 Build team & define metrics 2.2 Receive & deploy 3.2 Redeploy or dispose 4.2 Communicate & build roadmap
    Deliverables
    Standard Operating Procedure (SOP)
    HAM Maturity Assessment Procurement workflow User move workflow HAM Budgeting Tool
    Classified hardware assets Non-standard hardware request form Asset security policy HAM Communication Plan
    RACI Chart Receiving & tagging workflow Asset disposition policy HAM Roadmap Tool
    Job Descriptions Deployment workflow Asset recovery & disposal workflows Additional HAM policies

    Asset management is a key piece of Info-Tech's COBIT- inspired IT Management and Governance Framework

    The image shows a graphic which is a large grid, showing Info-Tech's research, sorted into categories.

    Cisco IT reduced costs by upwards of $50 million through implementing ITAM

    CASE STUDY

    Industry IT

    Source Cisco Systems, Inc.

    Cisco Systems, Inc.

    Cisco Systems, Inc. is the largest networking company in the world. Headquartered in San Jose, California, the company employees over 70,000 people.

    Asset Management

    As is typical with technology companies, Cisco boasted a proactive work environment that encouraged individualism amongst employees. Unfortunately, this high degree of freedom combined with the rapid mobilization of PCs and other devices created numerous headaches for asset tracking. At its peak, spending on hardware alone exceeded $100 million per year.

    Results

    Through a comprehensive ITAM implementation, the new asset management program at Cisco has been a resounding success. While employees did have to adjust to new rules, the process as a whole has been streamlined and user-satisfaction levels have risen. Centralized purchasing and a smaller number of hardware platforms have allowed Cisco to cut its hardware spend in half, according to Mark Edmondson, manager of IT services expenses for Cisco Finance.

    This case study continues in phase 1

    The image shows four bars, from bottom to top: 1. Asset Gathering; 2. Asset Distribution; 3. Asset Protection; 4. Asset Data. On the right, there is an arrow pointing upwards labelled ITAM Program Maturity.

    Info-Tech delivers: Use our tools and templates to accelerate your project to completion

    HAM Standard Operating Procedures (SOP)

    HAM Maturity Assessment

    Non-Standard Hardware Request Form

    HAM Visio Process Workflows

    HAM Policy Templates

    HAM Budgeting Tool

    HAM Communication Plan

    HAM Implementation Roadmap Tool

    Measured value for Guided Implementations (GIs)

    Engaging in GIs doesn’t just offer valuable project advice, it also results in significant cost savings.

    GI Measured Value
    Phase 1: Lay Foundations
    • Time, value, and resources saved by using Info-Tech’s tools and templates to assess current state and maturity, plan scope of HAM program, and define roles and metrics.
    • For example, 2 FTEs * 14 days * $80,000/year = $8,615
    Phase 2: Procure & Receive
    • Time, value, and resources saved by using Info-Tech’s tools and templates to build processes for hardware request, procurement, receiving, and deployment.
    • For example, 2 FTEs * 14 days * $80,000/year = $8,615
    Phase 3: Maintain & Dispose
    • Time, value, and resources saved by following Info-Tech’s tools and methodology to build processes and policies for managing and maintaining hardware and disposing or redeploying of equipment.
    • For example, 2 FTE * 14 days * $80,000/year = $8,615
    Phase 4: Plan Implementation
    • Time, value, and resources saved by following Info-Tech’s tools and methodology to select tools, plan the hardware budget, and build a roadmap.
    • For example, 2 FTE * 14 days * $80,000/year = $8,615
    Total savings $25,845

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Guided Implementation overview

    1. Lay Foundations 2. Procure & Receive 3. Maintain & Dispose 4. Budget & Implementation
    Best-Practice Toolkit

    1.1 Assess current state & plan scope

    1.2 Build team & define metrics

    2.1 Request & procure

    2.2 Receive & deploy

    3.1 Manage & maintain

    3.2 Redeploy or dispose

    4.1 Plan budget

    4.2 Communicate & build roadmap

    Guided Implementation
    • Assess current state.
    • Define scope of HAM program.
    • Define roles and metrics.
    • Define standard and non-standard hardware.
    • Build procurement process.
    • Determine asset tagging method and build equipment receiving and deployment processing.
    • Define processes for managing and maintaining equipment.
    • Define policies for maintaining asset security.
    • Build process for redeploying or disposing of assets.
    • Discuss best practices for effectively managing a hardware budget.
    • Build communications plan and roadmap.
    Results & Outcomes
    • Evaluation of current maturity level of HAM
    • Defined scope for the HAM program including list of hardware to track as assets
    • Defined roles and responsibilities
    • Defined and documented KPIs and metrics to meet HAM reporting requirements
    • Defined standard and non- standard requests and processes
    • Defined and documented procurement workflow and purchasing policy
    • Asset tagging method and process
    • Documented equipment receiving and deployment processes
    • MAC policies and workflows
    • Policies and processes for hardware maintenance and asset security
    • Documented workflows for hardware disposal and recovery/redeployment
    • Shortlist of ITAM tools
    • Hardware asset budget plan
    • Communication plan and HAM implementation roadmap

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.comfor more information.

    Phases: Teams, Scope & Hardware Procurement Hardware Procurement and Receiving Hardware Maintenance & Disposal Budgets, Roadmap & Communications
    Duration* 1 day 1 day 1 day 1 day
    * Activities across phases may overlap to ensure a timely completion of the engagement
    Projected Activities
    • Outline hardware asset management goals
    • Review HAM maturity and anticipated milestones
    • Define scope and classify hardware assets
    • Define roles and responsibilities
    • Define metrics and reporting requirements
    • Define standard and non-standard hardware requests
    • Review and document procurement workflow
    • Discuss appropriate asset tagging method
    • Design and document workflow for receiving and inventorying equipment
    • Review/create policy for hardware procurement and receiving
    • Identify data sources and methodology for inventory and data collection
    • Define install/moves/adds/changes (MAC) policy
    • Build workflows to document user MAC processes and design request form
    • Design process and policies for hardware maintenance, warranty, and support documentation handling
    • Design hardware asset recovery and disposal workflows
    • Define budgeting process and review Info-Tech’s HAM Budgeting Tool
    • Develop a communication plan
    • Develop a HAM implementation plan
    Projected Deliverables
    • Standard operating procedures for hardware
    • Visio diagrams for all workflows
    • Workshop summary with milestones and task list
    • Budget template
    • Policy draft

    Phase 1

    Lay Foundations

    Implement Hardware Asset Management

    A centralized procurement process helped cut Cisco’s hardware spend in half

    CASE STUDY

    Industry IT

    Source Cisco Systems, Inc.

    Challenge

    Cisco Systems’ hardware spend was out of control. Peaking at $100 million per year, the technology giant needed to standardize procurement processes in its highly individualized work environment.

    Users had a variety of demands related to hardware and network availability. As a result, data was spread out amongst multiple databases and was managed by different teams.

    Solution

    The IT team at Cisco set out to solve their hardware-spend problem using a phased project approach.

    The first major step was to identify and use the data available within various departments and databases. The heavily siloed nature of these databases was a major roadblock for the asset management program.

    This information had to be centralized, then consolidated and correlated into a meaningful format.

    Results

    The centralized tracking system allowed a single point of contact (POC) for the entire lifecycle of a PC. This also created a centralized source of information about all the PC assets at the company.

    This reduced the number of PCs that were unaccounted for, reducing the chance that Cisco IT would overspend based on its hardware needs.

    There were still a few limitations to address following the first step in the project, which will be described in more detail further on in this blueprint.

    This case study continues in phase 2

    Step 1.1: Assess current state and plan scope

    Phase 1: Assess & Plan

    1.1 Assess current state & plan scope

    1.2 Build team & define metrics

    This step will walk you through the following activities:

    1.1.1 Complete MGD (optional)

    1.1.2 Outline hardware asset management challenges

    1.1.3 Conduct HAM maturity assessment

    1.1.4 Classify hardware assets to define scope of the program

    This step involves the following participants:

    • CIO/CFO
    • IT Director
    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Security (optional)
    • Operations (optional)

    Step Outcomes

    • Understand key challenges related to hardware asset management within your organization to inform program development.
    • Evaluate current maturity level of hardware asset management components and overall program to determine starting point.
    • Define scope for the ITAM program including list of hardware to track as assets.

    Complete the Management & Governance Diagnostic (MGD) to weigh the effectiveness of ITAM against other services

    1.1.1 Optional Diagnostic

    The MGD helps you get the data you need to confirm the importance of improving the effectiveness of your asset management program.

    The MGD allows you to understand the landscape of all IT processes, including asset management. Evaluate all team members’ perceptions of each process’ importance and effectiveness.

    Use the results to understand the urgency to change asset management and its relevant impact on the organization.

    Establish process owners and hold team members accountable for process improvement initiatives to ensure successful implementation and realize the benefits from more effective processes.

    To book a diagnostic, or get a copy of our questions to inform your own survey, visit Info-Tech’s Benchmarking Tools, contact your account manager, or call toll-free 1-888-670-8889 (US) or 1-844-618-3192 (CAN).

    Sketch out challenges related to hardware asset management to shape the direction of the project

    Common HAM Challenges

    Processes and Policies:

    • Existing asset management practices are labor intensive and time consuming
    • Manual spreadsheets are used, making collaboration and automation difficult
    • Lack of HAM policies and standard operating procedures
    • Asset management data is not centralized
    • Lack of clarity on roles and responsibilities for ITAM functions
    • End users don’t understand the value of asset management

    Tracking:

    • Assets move across multiple locations and are difficult to track
    • Hardware asset data comes from multiple sources, creating fragmented datasets
    • No location data is available for hardware
    • No data on ownership of assets

    Security and Risk:

    • No insight into which assets contain sensitive data
    • There is no information on risks by asset type
    • Rogue systems need to be identified as part of risk management best practices
    • No data exists for assets that contain critical/sensitive data

    Procurement:

    • No centralized procurement department
    • Multiple quotes from vendors are not currently part of the procurement process
    • A lack of formal process can create issues surrounding employee onboarding such as long lead times
    • Not all procurement standards are currently defined
    • Rogue purchases create financial risk

    Receiving:

    • No formal process exists, resulting in no assigned receiving location and no assigned receiving role
    • No automatic asset tracking system exists

    Disposal:

    • No insight into where disposed assets go
    • Formal refresh and disposal system is needed

    Contracts:

    • No central repository exists for contracts
    • No insight into contract lifecycle, hindering negotiation effectiveness and pricing optimization

    Outline hardware asset management challenges

    1.1.1 Brainstorm HAM challenges

    Participants

    • CIO/CFO
    • IT Director
    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Security
    • Operations (optional)

    A. As a group, outline the hardware asset management challenges facing the organization.

    Use the previous slide to help you get started. You can use the following headings as a guide or think of your own:

    • Processes and Policies
    • Tracking
    • Procurement
    • Receiving
    • Security and Risk
    • Disposal
    • Contracts

    B. If you get stuck, use the Hardware Asset Management Maturity Assessment Tool to get a quick view of your challenges and maturity targets and kick-start the conversation.

    To be effective with hardware asset management, understand the drivers and potential impact to the organization

    Drivers of effective HAM Results of effective HAM
    Contracts and vendor licensing programs are complex and challenging to administer without data related to assets and their environment. Improved access to accurate data on contracts, licensing, warranties, installed hardware and software for new contracts, renewals, and audit requests.
    Increased need to meet compliance requires a formal approach to tracking and managing assets, regardless of device type. Encryption, hardware tracking and discovery, software application controls, and change notifications all contribute to better asset controls and data security.
    Cost cutting is on the agenda, and management is looking to reduce overall IT spend in the organization in any possible way. Reduction of hardware spend by as much as 5% of the total budget through data for better forecasting and planning.
    Assets with sensitive data are not properly secured, go missing, or are not safely disposed of when retired. Document and enforce security policies for end users and IT staff to ensure sensitive data is properly secured, preventing costs much larger than the cost of only the device.

    Each level of HAM maturity comes with its own unique challenges

    Maturity People & Policies Processes Technology
    Chaos
    • No dedicated staff
    • No policies published
    • Procedures not documented or standardized
    • Hardware not safely secured or tagged
    • Hardware purchasing decisions not based on data
    • Minimal tracking tools in place
    Reactive
    • Semi-focused HAM manager
    • No policies published
    • Reliance on suppliers to provide reports for hardware purchases
    • Hardware standards are enforced
    • Discovery tools and spreadsheets used to manage hardware
    Controlled
    • Full-time HAM manager
    • End-user policies published
    • HAM manager involved in budgeting and planning sessions
    • Inventory tracking is in place
    • Hardware is secured and tagged
    • Discovery and inventory tools used to manage hardware
    • Compliance reports run as needed
    Proactive
    • Extended HAM team, including Help Desk, HR, Purchasing
    • Corporate hardware use policies in place and enforced
    • HAM process integrated with help desk and HR processes
    • More complex reporting and integrated financial information and contracts with asset data
    • Hardware requests are automated where possible
    • Product usage reports and alerts in place to harvest and reuse licenses
    • Compliance and usage reports used to negotiate software contracts
    Optimized
    • HAM manager trained and certified
    • Working with HR, Legal, Finance, and IT to enforce policies
    • Quarterly meetings with ITAM team to review policies, procedures, upcoming contracts, and rollouts; data is reviewed before any financial decisions made
    • Full transparency into hardware lifecycle
    • Aligned with business objectives
    • Detailed savings reports provided to executive team annually
    • Automated policy enforcement and process workflows

    Conduct a hardware maturity assessment to understand your starting point and challenges

    1.1.3 Complete HAM Maturity Assessment Tool

    Complete the Hardware Asset Management Maturity Assessment Tool to understand your organization’s overall maturity level in HAM, as well as the starting maturity level aligned with each step of the blueprint, in order to identify areas of strength and weakness to plan the project. Use this to track progress on the project.

    An effective asset management project has four essential components, with varying levels of management required

    The hardware present in your organization can be classified into four categories of ascending strategic complexity: commodity, inventory, asset, and configuration.

    Commodity items are devices that are low-cost, low-risk items, where tracking is difficult and of low value.

    Inventory is tracked primarily to identify location and original expense, which may be depreciated by Finance. Typically there will not be data on these devices and they’ll be replaced as they lose functionality.

    Assets will need the full lifecycle managed. They are identified by cost and risk. Often there is data on these devices and they are typically replaced proactively before they become unstable.

    Configuration items will generally be tracked in a configuration management database (CMDB) for the purpose of enabling the support teams to make decisions involving dependencies, configurations, and impact analysis. Some data will be duplicated between systems, but should be synchronized to improve accuracy between systems.

    See Harness Configuration Management Superpowers to learn more about building a CMDB.

    Classify your hardware assets to determine the scope and strategy of the program

    Asset: A unique device or configuration of devices that enables a user to perform productive work tasks and has a defined location and ownership attributes.

    • Hardware asset management involves tracking and managing physical components from procurement through to retirement. It provides the base for software asset management and is an important process that can lead to improved lifecycle management, service request fulfillment, security, and cost savings through harvesting and redeployment.
    • When choosing your strategy, focus on those devices that are high cost and high risk/function such as desktops, laptops, servers, and mobile devices.

    ASSET - Items of high importance and may contain data, such as PCs, mobile devices, and servers.

    INVENTORY - Items that require significant financial investment but no tracking beyond its existence, such as a projector.

    COMMODITY - Items that are often in use but are of relatively low cost, such as keyboards or mice.

    Classify your hardware assets to define the scope of the program

    1.1.4 Define the assets to be tracked within your organization

    Participants

    • Participants
    • CIO/CFO
    • IT Director
    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Security (optional)
    • Operations (optional)

    Document

    Document in the Standard Operating Procedures, Section 1 – Overview & Scope

    1. Determine value/risk threshold at which items should be tracked (e.g. over $1,000 and holding data).
    2. Divide a whiteboard or flip chart into three columns: commodity, asset, and inventory.
    3. Divide participants into groups by functional role to brainstorm devices in use within the organization. Write them down on sticky notes.
    4. Place the sticky notes in the column that best describes the role of the product in your organization.

    Align the scope of the program with business requirements

    CASE STUDY

    Industry Public Administration

    Source Client Case Study

    Situation

    A state government designed a process to track hardware worth more than $1,000. Initially, most assets consisted of end-user computing devices.

    The manual tracking process, which relied on a series of Excel documents, worked well enough to track the lifecycle of desktop and laptop assets.

    However, two changes upended the organization’s program: the cost of end-user computing devices dropped dramatically and the demand for network services led to the proliferation of expensive equipment all over the state.

    Complication

    The existing program was no longer robust enough to meet business requirements. Networking equipment was not only more expensive than end-user computing devices, but also more critical to IT services.

    What was needed was a streamlined process for procuring high-cost, high-utility equipment, tracking their location, and managing their lifecycle costs without compromising services.

    Resolution

    The organization decided to formalize, document, and automate hardware asset management processes to meet the new challenges and focus efforts on high-cost, high-utility end-user computing devices only.

    Step 1.2: Build team and define metrics

    Phase 1: Assess & Plan

    1.1 Assess current state & plan scope

    1.2 Build team and define metrics

    This step will walk you through the following activities:

    1.2.1 Define responsibilities for Asset Manager and Asset Administrator

    1.2.2 Use a RACI chart to determine roles within HAM team

    1.2.3 Further clarify HAM responsibilities for each role

    1.2.4 Identify HAM reporting requirements

    This step involves the following participants:

    • CIO/CFO
    • IT Director
    • IT Managers
    • Asset Manager
    • Asset Coordinators
    • ITAM Team
    • Service Desk
    • End-User Device Support Team

    Step Outcomes:

    • Defined responsibilities for Asset Manager and Asset Administrator
    • Documented RACI chart assigning responsibility and accountability for core HAM processes
    • Documented responsibilities for ITAM/HAM team
    • Defined and documented KPIs and metrics to meet HAM reporting requirements

    Form an asset management team to lead the project

    Asset management is an organizational change. To gain buy-in for the new processes and workflows that will be put in place, a dedicated, passionate team needs to jump-start the project.

    Delegate the following roles to team members and grow your team accordingly.

    Asset Manager

    • Responsible for setting policy and governance of process and data accuracy
    • Support budget process
    • Support asset tracking processes in the field
    • Train employees in asset tracking processes

    Asset Administrator

    • The front-lines of asset management
    • Communicates with and supports asset process implementation teams
    • Updates and contributes information to asset databases
    Service Desk, IT Operations, Applications
    • Responsible for advising asset team of changes to the IT environment, which may impact pricing or ability to locate devices
    • Works with Asset Coordinator/Manager to set standards for lifecycle stages
    • The ITAM team should visit and consult with each component of the business as well as IT.
    • Engage with leaders in each department to determine what their pain points are.
    • The needs of each department are different and their responses will assist the ITAM team when designing goals for asset management.
    • Consultations within each department also communicates the change early, which will help with the transition to the new ITAM program.

    Info-Tech Insight

    Ensure that there is diversity within the ITAM team. Assets for many organizations are diverse and the composition of your team should reflect that. Have multiple departments and experience levels represented to ensure a balanced view of the current situation.

    Define the responsibilities for core ITAM/HAM roles of Asset Manager and Asset Administrator

    1.2.1 Use Info-Tech’s job description templates to define roles

    The role of the IT Asset Manager is to oversee the daily and long-term strategic management of software and technology- related hardware within the organization. This includes:

    • Planning, monitoring, and recording software licenses and/or hardware assets to ensure compliance with vendor contracts.
    • Forming procurement strategies to optimize technology spend across the organization.
    • Developing and implementing procedures for tracking company assets to oversee quality control throughout their lifecycles.

    The role of the IT Asset Administrator is to actively manage hardware and software assets within the organization. This includes:

    • Updating and maintaining accurate asset records.
    • Planning, monitoring, and recording software licenses and/or hardware assets to ensure compliance with vendor contracts.
    • Administrative duties within procurement and inventory management.
    • Maintaining records and databases regarding warranties, service agreements, and lifecycle management.
    • Product standardization and tracking.

    Use Info-Tech’s job description templates to assist in defining the responsibilities for these roles.

    Organize your HAM team based on where they fit within the strategic, tactical, and operational components

    Typically the asset manager will answer to either the CFO or CIO. Occasionally they answer to a vendor manager executive. The hierarchy may vary based on experience and how strategic a role the asset manager will play.

    The image shows a flowchart for organizing the HAM team, structured by three components: Strategic (at the top); Tactical (in the middle); and Operational (at the bottom). The chart shows how the job roles flow together within the hierarchy.

    Determine the roles and responsibilities of the team who will support your HAM program

    1.2.2 Complete a RACI

    A RACI chart will identify who should be responsible, accountable, consulted, and informed for each key activity during the consolidation.

    Participants

    • Project Sponsor
    • IT Director, CIO
    • Project Manager
    • IT Managers and Asset Manager(s)
    • ITAM Team

    Document

    Document in the Standard Operating Procedure.

    Instructions:

    1. Write out the list of all stakeholders along the top of a whiteboard. Write out the key initiative steps for the consolidation project along the left side (use this list as a starting point).
    2. For each initiative, identify each team member’s role. Are they:
      • Responsible? The one responsible for getting the job done.
      • Accountable? Only one person can be accountable for each task.
      • Consulted? Involved through input of knowledge and information.
      • Informed? Receive information about process execution and quality.
    3. As you proceed through the initiative, continue to add tasks and assign responsibility to this RACI chart.

    A sample RACI chart is provided on the next slide

    Start with a RACI chart to determine the responsibilities

    1.2.2 Complete a RACI chart for your organization

    HAM Tasks CIO CFO HAM Manager HAM Administrator Service Desk (T1,T2, T3) IT Operations Security Procurement HR Business Unit Leaders Compliance /Legal Project Manager
    Policies and governance A I R I I C I C C I I
    Strategy A R R R R
    Data entry and quality management C I A I C C I I C C
    Risk management and asset security A R C C R C C
    Process compliance auditing A R I I I I I
    Awareness, education, and training I A I I C
    Printer contracts C A C C C R C C
    Hardware contract management A I R R I I R R I I
    Workflow review and revisions I A C C C C
    Budgeting A R C I C
    Asset acquisition A R C C C C I C C
    Asset receiving (inspection/acceptance) I A R R I
    Asset deployment A R R I I
    Asset recovery/harvesting A R R I I
    Asset disposal C A R R I I
    Asset inventory (input/validate/maintain) I I A/R R R R I I I

    Further clarify HAM responsibilities for each role

    1.2.3 Define roles and responsibilities for the HAM team

    Participants

    • Participants IT Asset Managers and Coordinators
    • ITAM Team
    • IT Managers and IT Director

    Document

    1. Discuss and finalize positions to be established within the ITAM/HAM office as well as additional roles that will be involved in HAM.
    2. Review the sample responsibilities below and revise or create responsibilities for each key position within the HAM team.
    3. Document in the HAM Standard Operating Procedures.
    Role Responsibility
    IT Manager
    • Responsible for writing policies regarding asset management and approving final documents
    • Build and revise budget, tracking actual spend vs. budget, seeking final approvals from the business
    • Process definition, communication, reporting and ensuring people are following process
    • Awareness campaign for new policy and process
    Asset Managers
    • Approval of purchases up to $10,000
    • Inventory and contract management including contract review and recommendations based on business and IT requirements
    • Liaison between business and IT regarding software and hardware
    • Monitor and improve workflows and asset related processes
    • Monitor controls, audit and recommend policies and procedures as needed
    • Validate, manage and analyze data as related to asset management
    • Provide reports as needed for decision making and reporting on risk, process effectiveness and other purposes as required
    • Asset acquisition and disposal
    Service Desk
    Desktop team
    Security
    Infrastructure teams

    Determine criteria for success: establish metrics to quantify and demonstrate the results and value of the HAM function

    HAM metrics fall in the following categories:

    HAM Metrics

    • Quantity e.g. inventory levels and need
    • Cost e.g. value of assets, budget for hardware
    • Compliance e.g. contracts, policies
    • Quality e.g. accuracy of data
    • Duration e.g. time to procure or deploy hardware

    Follow a process for establishing metrics:

    1. Identify and obtain consensus on the organization’s ITAM objectives, prioritized if possible.
    2. For each ITAM objective, select two or three metrics in the applicable categories (not all categories will apply to all objectives); be sure to select metrics that are achievable with reasonable effort.
    3. Establish a baseline measurement for each metric.
    4. Establish a method and accountability for ongoing measurement and analysis/reporting.
    5. Establish accountability for taking action on reported results.
    6. As ITAM expands and matures, change or expand the metrics as appropriate.

    Define KPIs and associated metrics

    • Identify the critical success factors (CSFs) for your hardware asset management program based on strategic goals.
    • For each success factor, identify the key performance indicators (KPIs) to measure success and specific metrics that will be tracked and reported on.
    • Sample metrics are below:
    CSF KPI Metrics
    Improve accuracy of IT budget and forecasting
    • Asset costs and value
    • Average cost of workstation
    • Total asset spending
    • Total value of assets
    • Budget vs. spend
    Identify discrepancies in IT environment
    • Unauthorized or failing assets
    • Number of unauthorized assets
    • Assets identified as cause of service failure
    Avoid over purchasing equipment
    • Number of unused and underused computers
    • Number of unaccounted-for computers
    • Money saved from harvesting equipment instead of purchasing new
    Make more-effective purchasing decisions
    • Predicted replacement time and cost of assets
    • Deprecation rate of assets
    • Average cost of maintaining an asset
    • Number of workstations in repair
    Improve accuracy of data
    • Accuracy of asset data
    • Accuracy rate of inventory data
    • Percentage improvement in accuracy of audit of assets
    Improved service delivery
    • Time to deploy new hardware
    • Mean time to purchase new hardware
    • Mean time to deploy new hardware

    Identify hardware asset reporting requirements and the data you need to collect to meet them

    1.2.4 Identify asset reporting requirements

    Participants

    • CIO/CFO
    • IT Director
    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Operations (optional)

    Document

    Document in the Standard Operating Procedures, Section 13: Reporting

    1. Discuss the goals and objectives of implementing or improving hardware asset management, based on challenges identified in Step 1.2.
    2. From the goals, identify the critical success factors for the HAM program
    3. For each CSF, identify one to three key performance indicators to evaluate achievement of the success factor.
    4. For each KPI, identify one to three metrics that can be tracked and reported on to measure success. Ensure that the metrics are tangible and measurable and will be useful for decision making or to take action.
    5. Determine who needs this information and the frequency of reporting.
    6. If you have existing ITAM data, record the baseline metric.
    CSF KPI Metrics Stakeholder/frequency

    Phase 1 Guided Implementation

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Lay Foundations

    Proposed Time to Completion: 4 weeks

    Step 1.1: Assess current state and plan scope

    Start with an analyst kick-off call:

    • Review challenges.
    • Assess current HAM maturity level.
    • Define scope of HAM program.

    Then complete these activities…

    • Complete MGD (optional).
    • Outline hardware asset management challenges.
    • Conduct HAM maturity assessment.
    • Classify hardware assets to define scope of the program.

    With these tools & templates:

    HAM Maturity Assessment

    Standard Operating Procedures

    Step 1.2: Build team and define metrics

    Review findings with analyst:

    • Define roles and responsibilities.
    • Assess reporting requirements.
    • Document metrics to track.

    Then complete these activities…

    • Define responsibilities for Asset Manager and Asset Administrator.
    • Use a RACI chart to determine roles within HAM team.
    • Document responsibilities for HAM roles.
    • Identify HAM reporting requirements.

    With these tools & templates:

    RACI Chart

    Asset Manager and Asset Administrator Job Descriptions

    Standard Operating Procedures

    Phase 1 Results & Insights:

    For asset management to succeed, it needs to support the business. Engage business leaders to determine needs and build your HAM program around these goals.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    1.1.4 Classify hardware assets to define scope of the program

    Determine value/risk threshold at which assets should be tracked, then divide a whiteboard into four quadrants representing four categories of assets. Participants write assets down on sticky notes and place them in the appropriate quadrant to classify assets.

    1.2.2 Build a RACI chart to determine responsibilities

    Identify all roles within the organization that will play a part in hardware asset management, then document all core HAM processes and tasks. For each task, assign each role to be responsible, accountable, consulted, or informed.

    Phase 2

    Procure and Receive

    Implement Hardware Asset Management

    Step 2.1: Request and Procure Hardware

    Phase 2: Procure & Receive

    2.1 Request & Procure

    2.2 Receive & Deploy

    This step will walk you through the following activities:

    2.1.1 Identify IT asset procurement challenges

    2.1.2 Define standard hardware requests

    2.1.3 Document standard hardware request procedure

    2.1.4 Build a non-standard hardware request form

    2.1.5 Make lease vs. buy decisions for hardware assets

    2.1.6 Document procurement workflow

    2.1.7 Build a purchasing policy

    This step involves the following participants:

    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Operations (optional)
    • CFO or other management representative from Finance

    Step Outcomes:

    • Definition of standard hardware requests for roles, including core vs. optional assets
    • End-user request process for standard hardware
    • Non-standard hardware request form
    • Lease vs. buy decisions for major hardware assets
    • Defined and documented procurement workflow
    • Documented purchasing policy

    California saved $40 million per year using a green procurement strategy

    CASE STUDY

    Industry Government

    Source Itassetmanagement.net

    Challenge

    Signed July 27, 2004, Executive order S-20-04, the “Green Building Initiative,” placed strict regulations on energy consumption, greenhouse gas emissions, and raw material usage and waste.

    In compliance with S-20-04, the State of California needed to adopt a new procurement strategy. Its IT department was one of the worst offenders given the intensive energy usage by the variety of assets managed under the IT umbrella.

    Solution

    A green IT initiative was enacted, which involved an extensive hardware refresh based on a combination of agent-less discovery data and market data (device age, expiry dates, power consumption, etc.).

    A hardware refresh of almost a quarter-million PCs, 9,500 servers, and 100 email systems was rolled out as a result.

    Other changes, including improved software license compliance and data center consolidation, were also enacted.

    Results

    Because of the scale of this hardware refresh, the small changes meant big savings.

    A reduction in power consumption equated to savings of over $40 million per year in electricity costs. Additionally, annual carbon emissions were trimmed by 200,000 tons.

    Improve your hardware asset procurement process to…

    Asset Procurement

    • Standardization
    • Aligned procurement processes
    • SLAs
    • TCO reduction
    • Use of centralized/ single POC

    Standardize processes: Using standard products throughout the enterprise lowers support costs by reducing the variety of parts that must be stocked for onsite repairs or for provisioning and supporting equipment.

    Align procurement processes: Procurement processes must be aligned with customers’ business requirements, which can have unique needs.

    Define SLAs: Providing accurate and timely performance metrics for all service activities allows infrastructure management based on fact rather than supposition.

    Reduce TCO: Management recognizes service infrastructure activities as actual cost drivers.

    Implement a single POC: A consolidated service desk is used where the contact understands both standards (products, processes, and practices) and the user’s business and technical environment.

    Identify procurement challenges to identify process improvement needs

    2.1.1 Identify IT asset procurement challenges

    Participants

    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Operations (optional)
    1. As a group, brainstorm existing challenges related to IT hardware requests and procurement.
    2. If you get stuck, consider the common challenges listed below.
    3. Use the results of the discussion to focus on which problems can be resolved and integrated into your organization as operational standards.

    Document hardware standards to speed time to procure and improve communications to users regarding options

    The first step in your procurement workflow will be to determine what is in scope for a standard request, and how non-standard requests will be handled. Questions that should be answered by this procedure include:

    • What constitutes a non-standard request?
    • Who is responsible for evaluating each type of request? Will there be one individual or will each division in IT elect a representative to handle requests specific to their scope of work?
    • What additional security measures need to be taken?
    • Are there exceptions made for specific departments or high-ranking individuals?

    If your end-user device strategy requires an overhaul, schedule time with an Info-Tech analyst to review our blueprint Build an End-User Computing Strategy.

    Once you’ve answered questions like these, you can outline your hardware standards as in the example below:

    Use Case Mobile Standard Mac Standard Mobile Power User
    Asset Lenovo ThinkPad T570 iMac Pro Lenovo ThinkPad P71
    Operating system Windows 10 Pro Mac OSX Windows 10 Pro, 64 bit
    Display 15.6" 21.5" 17.3”

    Memory

    32GB 8GB 64GB
    Processor Intel i7 – 7600U Processor 2.3GHz Xeon E3 v6 Processor
    Drive 500GB 1TB 1TB
    Warranty 3 year 1 year + 2 extended 3 year

    Info-Tech Insight

    Approach hardware standards from a continual improvement frame of mind. Asset management is a dynamic process. Hardware standards will need to adapt over time to match the needs of the business. Plan assessments at routine intervals to ensure your current hardware standards align with business needs.

    Document specifications to meet environmental, security, and manageability requirements

    Determine environmental requirements and constraints.

    Power management

    Compare equipment for power consumption and ability to remotely power down machines when not in use.

    Heat and noise

    Test equipment run to see how hot the device gets, where the heat is expelled, and how much noise is generated. This may be particularly important for users who are working in close quarters.

    Carbon footprint

    Ask what the manufacturer is doing to reduce post-consumer waste and eliminate hazardous materials and chemicals from their products.

    Ensure security requirements can be met.

    • Determine if network/wireless cards meet security requirements and if USB ports can be turned off to prevent removal of data.
    • Understand the level of security needed for mobile devices including encryption, remote shut down or wipe of hard drives, recovery software, or GPS tracking.
    • Decide if fingerprint scanners with password managers would be appropriate to enable tighter security and reduce the forgotten-password support calls.

    Review features available to enhance manageability.

    • Discuss manageability goals with your IT team to see if any can be solved with added features, for example:
      • Remote control for troubleshooting and remote management of data security settings.
      • Asset management software or tags for bar coding, radio frequency identification (RFID), or GPS, which could be used in combination with strong asset management practices to inventory, track, and manage equipment.

    If choosing refurbished equipment, avoid headaches by asking the right questions and choosing the right vendor

    • Is the equipment functional and for how long is it expected to last?
    • How long will the vendor stand behind the product and what support can be expected?
      • This is typically two to five years, but will vary from vendor to vendor.
      • Will they repair or replace machines? Many will just replace the machine.
    • How big is the inventory supply?
      • What kind of inventory does the vendor keep and for how long can you expect the vendor to keep it?
      • How does the vendor source the equipment and do they have large quantities of the same make and model for easier imaging and support?
    • How complete is the refurbishment process?
      • Do they test all components, replace as appropriate, and securely wipe or replace hard drives?
      • Are they authorized to reload MS Windows OEM?
    • Is the product Open Box or used?
      • Open Box is a new product returned back to the vendor. Even if it is not used, the product cannot be resold as a new product. Open Box comes with a manufacturer’s warranty and the latest operating system.
      • If used, how old is the product?

    "If you are looking for a product for two or three years, you can get it for less than half the price of new. I bought refurbished equipment for my call center for years and never had a problem". – Glen Collins, President, Applied Sales Group

    Info-Tech Insight

    Price differences are minimal between large and small vendors when dealing with refurbished machines. The decision to purchase should be based on ability to provide and service equipment.

    Define standard hardware requests, including core and optional assets

    2.1.2 Identify standards for hardware procurement by role

    Participants

    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Operations (optional)
    • Representatives from all other areas of the business

    Document

    Document in the Standard Operating Procedures, Section 7: Procurement.

    1. Divide a whiteboard into columns representing all major areas of the business.
    2. List the approximate number of end users present at each tier and record these totals on the board.
    3. Distribute sticky notes. Use two different sizes: large sizes represent critically important hardware and small sizes represent optional hardware.
    4. Define core hardware assets for each division as well as optional hardware assets.
    5. Focus on the small sticky notes to determine if these optional purchases are necessary.
    6. Finalize the group decision to determine the standard hardware procurement for each role in the organization. Record results in a table similar to the example below:
    Department Core Hardware Assets Optional Hardware Assets
    IT PC, tablet, monitor Second monitor
    Sales PC, monitor Laptop
    HR PC, monitor Laptop
    Marketing PC (iMac) Tablet, laptop

    Document procedures for users to make standard hardware requests

    2.1.3 Document standard hardware request procedure

    Participants

    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Operations (optional)
    • Representatives from all other areas of the business

    Document

    Document in the Standard Operating Procedures, Section 6: End-User Request Process.

    Discuss and document the end-user request process:

    1. In which cases can users request a primary device?
    2. In which cases can users request a secondary (optional device)?
    3. What justification is needed to approve of a secondary device?
      1. E.g. The request for a secondary device should be via email to the IS Projects and Procurements Officer. This email should outline the business case for why multiple devices are required.
    4. Will a service catalog be available and integrated with an ITAM solution for users to make standard requests? If so, can users also configure their options?
    5. Document the process in the standard operating procedure. Example:

    End-User Request Process

    • Hardware and software will be purchased through the user-facing catalog.
    • Peripherals will be ordered as needed.
    • End-user devices will be routed to business managers for approval prior to fulfillment by IT.
    • Requests for secondary devices must be accompanied by a business case.
    • Equipment replacements due to age will be managed through IT replacement processes.

    Improve the process for ordering non-standard hardware by formalizing the request process, including business needs

    2.1.4 Build a non-standard hardware request form

    • Although the goal should be to standardize as much as possible, this isn’t always possible. Ensure users who are requesting non-standard hardware have a streamlined process to follow that satisfies the justifications for increased costs to deliver.
    • Use Info-Tech’s template to build a non-standard hardware request form that may be used by departments/users requesting non-standard hardware in order to collect all necessary information for the request to be evaluated, approved, and sent to procurement.
    • Ensure that the requestor provides detailed information around the equipment requested and the reason standard equipment does not suffice and includes all required approvals.
    • Include instructions for completing and submitting the form as well as expected turnaround time for the approval process.

    Info-Tech Insight

    Include non-standard requests in continual improvement assessment. If a large portion of requests are for non-standard equipment, it’s possible the hardware doesn’t meet the recommended requirements for specialized software in use with many of your business users. Determine if new standards need to be set for all users or just “power users.”

    Identify the information you need to collect to ensure a smooth purchasing process

    Categories Peripherals Desktops/Laptops Servers
    Financial
    • Operational expenses
    • Ordered for inventory with the exceptions of monitors that will be ordered as needed
    • Equipment will be purchased through IT budget
    • Capital expenses
    • Ordered as needed…
    • Inventory kept for…
    • End-user devices will be purchased through departmental budgets
    • Capital expenses
    • Ordered as needed to meet capacity or stability requirements
    • Devices will be purchased through IT budgets
    Request authorization
    • Any user can request
    • Users who are traveling can purchase and expense peripherals as needed, with manager approvals
    • Tier 3 technicians
    Required approvals
    • Manager approvals required for monitors
    • Infrastructure and applications manager up to [$]
    • CIO over [$]
    Warranty requirements
    • None
    • Three years
    • Will be approved with project plan
    Inventory requirements
    • Minimum inventory at each location of 5 of each: mice, keyboards, cables
    • Docking stations will be ordered as needed
    • Laptops (standard): 5
    • Laptops (ultra light): 1
    • Desktops: 5
    • Inventory kept in stock as per DR plan
    Tracking requirements
    • None
    • Added to ITAM database, CMDB
    • Asset tag to be added to all equipment
    • Added to ITAM database, CMDB

    Info-Tech Best Practice

    Take into account the possibility of encountering taxation issues based on where the equipment is being delivered as well as taxes imposed or incurred in the location from which the asset was shipped or sent. This may impact purchasing decisions and shipping instructions.

    Develop a procurement plan to get everyone in the business on the same page

    • Without an efficient and structured process around how IT purchases are budgeted and authorized, maverick spending and dark procurement can result, limiting IT’s control and visibility into purchases.
    • The challenge many IT departments face is that there is a disconnect between meeting the needs of the business and bringing in equipment according to existing policies and procedures.
    • The asset manager should demonstrate how they can bridge the gaps and improve tracking mechanisms at the same time.

    Improve procurement decisions:

    • Demonstrate how technology is a value-add.
    • Make a clear case for the budget by using the same language as the rest of the business.
    • Quantify the output of technology investments in tangible business terms to justify the cost.
    • Include the refresh cycle in the procurement plan to ensure mission- critical systems will include support and appropriate warranty.
    • Plan technology needs for the future and ensure IT technology will continue to meet changing needs.
    • Synchronize redundant organizational procurement chains in order to lower cost.

    Document the following in your procurement procedure:

    • Process for purchase requests
    • Roles and responsibilities, including requestors and approvers
    • Hardware assets to purchase and why they are needed
    • Timelines for purchase
    • Process for vendors

    Info-Tech Insight

    IT procurement teams are often heavily siloed from ITAM teams. The procurement team is typically found in the finance department. One way to bridge the gap is to implement routine, reliable reporting between departments.

    Determine if it makes sense to lease or buy your equipment; weigh the pros and cons of leasing hardware

    Pros

    • Keeps operational costs low in the short term by containing immediate cost.
    • Easy, predictable payments makes it easier to budget for equipment over long term.
    • Get the equipment you need to start doing business right away if you’re just starting out.
    • After the leasing term is up, you can continue the lease and update your hardware to the latest version.
    • Typical leases last 2 or 3 years, meaning your hardware can get upgrades when it needs it and your business is in a better position to keep up with technology.
    • Leasing directly from the vendor provides operational flexibility.
    • Focus on the business and let the vendor focus on equipment service and updates as you don’t have to pay for maintenance.
    • Costs structured as OPEX.

    Cons

    • In the long term, leasing is almost always more expensive than buying because there’s no equity in leased equipment and there may be additional fees and interest.
    • Commitment to payment through the entire lease period even if you’re not using the equipment anymore.
    • Early termination fees if you need to get out of the lease.
    • No option to sell equipment once you’re finished with it to make money back.
    • Maintenance is up to leasing company’s specifications.
    • Product availability may be limited.

    Recommended for:

    • Companies just starting out
    • Business owners with limited capital or budget
    • Organizations with equipment that needs to be upgraded relatively often

    Weigh the pros and cons of purchasing hardware

    Pros

    • Complete control over assets.
    • More flexible and straightforward procurement process.
    • Tax incentives: May be able to fully deduct the cost of some newly purchased assets or write off depreciation for computers and peripherals on taxes.
    • Preferable if your equipment will not be obsolete in the next two or three years.
    • You can resell the asset once you don’t need it anymore to recover some of the cost.
    • Customization and management of equipment is easier when not bound by terms of leasing agreement.
    • No waiting on vendor when maintenance is needed; no permission needed to make changes.

    Cons

    • High initial cost of investment with CAPEX expense model.
    • More paperwork.
    • You (as opposed to vendor) are responsible for equipment disposal in accordance with environmental regulations.
    • You are responsible for keeping up with upgrades, updates, and patches.
    • You risk ending up with out-of-date or obsolete equipment.
    • Hardware may break after terms of warranty are up.

    Recommended for:

    • Established businesses
    • Organizations needing equipment with long-term lifecycles

    Make a lease vs. buy decision for equipment purchases

    2.1.4 Decide whether to purchase or lease

    Participants

    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Operations (optional)
    • Representatives from all other areas of the business

    Document

    Document policy decisions in the Standard Operating Procedures – Section 7: Procurement

    1. Identify hardware equipment that requires a purchase vs. lease decision.
    2. Discuss with Finance whether it makes sense to purchase or lease each major asset, considering the following:
    • Costs of equipment through each method
    • Tax deductions
    • Potential resale value
    • Potential revenue from using the equipment
    • How quickly the equipment will be outdated or require refresh
    • Size of equipment
    • Maintenance and support requirements
    • Overall costs
  • The leasing vs. buying decision should take considerable thought and evaluation to make the decision that best fits your organizational needs and situation.
  • Determine appropriate warranty and service-level agreements for your organization

    Determine acceptable response time, and weigh the cost of warranty against the value of service.

    • Standard warranties vary by manufacturer, but are typically one or three years.
    • Next-day, onsite service may be part of the standard offering or may be available as an uplift.
    • Four-hour, same-day service can also be added for high availability needs.
    • Extended warranties can be purchased beyond three years, although not many organizations take advantage of this offering.
    • Other organizations lower or remove the warranty and have reported savings of as much as $150 per machine.

    Speak to your partner to see how they can help the process of distributing machines.

    • Internal components change frequently with laptops and desktops. If purchasing product over time rather than buying in bulk, ensure the model will be available for a reasonable term to reduce imaging and support challenges.
    • Determine which services are important to your organization and request these services as part of the initial quote. If sending out a formal RFQ or RFP, document required services and use as the basis for negotiating SLAs.
    • Document details of SLA, including expectations of services for manufacturer, vendor, and internal team.
    • If partner will be providing services, request they stock an appropriate number of hot spares for frequently replaced parts.
    • If self-certifying, review resource capabilities, understand skill and certification requirements; for example, A+ certification may be a pre-requisite.
    • Understand DOA policy and negotiate a “lemon policy,” meaning if product dies within 15 or 30 days it can be classified as DOA. Seek clarity on return processes.

    Consider negotiation strategies, including how and when to engage with different partners during acquisition

    Direct Model

    • Dell’s primary sales model is direct either through a sales associate or through its e-commerce site. Promotions are regularly listed on the website, or if customization is required, desktops and laptops have some flexibility in configuration. Discounts can be negotiated with a sales rep on quantity purchases, but the discount level changes based on the model and configuration.
    • Other tier-one manufacturers typically sell direct only from their e-commerce sites, providing promotions based on stock they wish to move, and providing some configuration flexibility. They rely heavily on the channel for the majority of their business.

    Channel Model

    • Most tier one manufacturers have processes in place to manage a smaller number of partners rather than billing and shipping out to individual customers. Deviating from this process and dealing direct with end customers can create order processing issues.
    • Resellers have the ability to negotiate discounts based on quantities. Discounts will vary based on model, timing (quarter or year end), and quantity commitment.
    • Negotiations on large quantities should involve a manufacturer rep as well as the reseller to clearly designate roles and services, ensure processes are in place to fulfill your needs, and agree on pricing scheme. This will prevent misunderstandings and bring clarity to any commitments.
    • Often the channel partners are authorized to provide repair services under warranty for the manufacturer.
    • Dell also uses the channel model for distribution where customers demand additional services.

    Expect discounts to reflect quantity and method of purchase

    Transaction-based purchases will receive the smallest discounting.

    • Understand requirements to find the most appropriate make and model of equipment.
    • Prepare a forecast of expected purchases for the year and discuss discounting.
    • Typically initial discounts will be 3-5% off suggested retail price.
    • Once a history is in place, and the vendor is receiving regular orders, it may extend deeper discounts.

    Bulk purchases will receive more aggressive discounting of 5-15% off suggested retail price, depending on quantities.

    • Examine shipping options and costs to take advantage of bulk deliveries; in some cases vendors may waive shipping fees as an extension of the discounting.
    • If choosing end-of-line product, ensure appropriate quantity of a single model is available to efficiently roll out equipment.
    • Various pricing models can be used to obtain best price.

    Larger quantities rolled out over time will require commitments to the manufacturer to obtain deepest discounts.

    • Discuss all required services as part of negotiation to ensure there are no surprise charges.
    • Several pricing models can be used to obtain the best price.
      • Suggested retail price minus as much as 20%.
      • Cost plus 3% up to 10% or more.
      • Fixed price based on negotiating equipment availability with budget requirements.

    If sending out to bid, determine requirements and scoring criteria

    It’s nearly impossible to find two manufacturers with the exact same specifications, so comparisons between vendors is more art than science.

    New or upgraded components will be introduced into configurations when it makes the most sense in a production cycle. This creates a challenge in comparing products, especially in an RFP. The best way to handle this is to:

    • Define and document minimum technology requirements.
    • Define and document service needs.
    • Compare vendors to see if they’ve met the criteria or not; if yes, compare prices.
    • If the vendors have included additional offerings, see if they make sense for your organization. If they do, include that in the scoring. If not, exclude and score based on price.
    • Recognize that the complexity of the purchase will dictate the complexity of scoring.

    "The hardware is the least important part of the equation. What is important is the warranty, delivery, imaging, asset tagging, and if they cannot deliver all these aspects the hardware doesn’t matter." – Doug Stevens, Assistant Manager Contract Services, Toronto District School Board

    Document and analyze the hardware procurement workflow to streamline process

    The procurement process should balance the need to negotiate appropriate pricing with the need to quickly approve and fulfill requests. The process should include steps to follow for approving, ordering, and tracking equipment until it is ready for receipt.

    Within the process, it is particularly important to decide if this is where equipment is added into the database or if it will happen upon receipt.

    A poorly designed procurement workflow:

    • Includes many bottlenecks, stopping and starting points.
    • May impact project and service requests and requires unrealistic lead times.
    • May lead to lost productivity for users and lost credibility for the IT department.

    A well-designed hardware procurement workflow:

    • Provides reasonable lead times for project managers and service or hardware request fulfillment.
    • Provides predictability for technical resources to plan deployments.
    • Reduces bureaucracy and workload for following up on missing shipments.
    • Enables improved documentation of assets to start lifecycle management.

    Info-Tech Insight

    Where the Hardware Asset Manager is unable to affect procurement processes to reduce time to deliver, consider bringing inventory onsite or having your hardware vendor keep stock, ready to ship on demand. Projects, replacements, and new-user requests cannot be delayed in a service-focused IT organization due to bureaucratic processes.

    Document and analyze your procurement workflow to identify opportunities for improvement and communicate process

    Determine if you need one workflow for all equipment or multiples for small vs. large purchases.

    Occasionally large rollouts require significant changes from lower dollar purchases.

    Watch for:

    • Back and forth communications
    • Delays in approvals
    • Inability to get ETAs from vendors
    • Too many requests for quotes for small purchases
    • Entry into asset database

    This sample can be found in the HAM Process Workflows.

    The image shows a workflow, titled Procurement-Equipment-Small Quantity. On the left, the chart is separated into categories: IT Procurment; Tier 2 or Tier 3; IT Director; CIO.

    Design the process workflow for hardware procurement

    2.1.6 Illustrate procurement workflow with a tabletop exercise

    Participants

    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Operations (optional)
    • CFO or other management representative from Finance

    Document

    Document in the Standard Operating Procedures, Section 7: Procurement

    1. In a group, distribute sticky notes or cue cards.
    2. Designate a space on the table/whiteboard to plot the workflow.
    3. Determine which individuals are responsible for handling non-standard requests. Establish any exceptions that may apply to your defined hardware standard.
    4. Gather input from Finance on what the threshold will be for hardware purchases that will require further approval.
    5. Map the procurement process for a standard hardware purchase.
    6. If applicable, map the procurement process for a non-standard request separately.
    7. Evaluate the workflow to identify any areas of inefficiency and make any changes necessary to improve the process.
    8. Be sure to discuss and include:
      • All necessary approvals
      • Time required for standard equipment process
      • Time required for non-standard equipment process
      • How information will be transferred to ITAM database

    Document and share an organizational purchasing policy

    2.1.7 Build a purchasing policy

    A purchasing policy helps to establish company standards, guidelines, and procedures for the purchase of all information technology hardware, software, and computer-related components as well as the purchase of all technical services.

    The policy will ensure that all purchasing processes are consistent and in alignment with company strategy. The purchasing policy is key to ensuring that corporate purchases are effective and the best value for money is obtained.

    Implement a purchasing policy to prevent or reduce:

    • Costly corporate conflict of interest cases.
    • Unauthorized purchases of non-standard, difficult to support equipment.
    • Unauthorized purchases resulting in non-traceable equipment.
    • Budget overruns due to decentralized, equipment acquisition.

    Download Info-Tech’s Purchasing Policytemplate to build your own purchasing policy.

    Step 2.2: Receive and Deploy Hardware

    Phase 2: Procure & Receive

    2.1 Request & Procure

    2.2 Receive & Deploy

    This step will walk you through the following activities:

    2.2.1 Select appropriate asset tagging method

    2.2.2 Design workflow for receiving and inventorying equipment

    2.2.3 Document the deployment workflow(s)

    This step involves the following participants:

    • Asset Manager
    • Purchasing
    • Receiver (optional)
    • Service Desk Manager
    • Operations (optional)

    Step Outcomes:

    • Understanding of the pros and cons of various asset tagging methods
    • Defined asset tagging method, process, and location by equipment type
    • Identified equipment acceptance, testing, and return procedures
    • Documented equipment receiving and inventorying workflow
    • Documented deployment workflows for desktop hardware and large-scale deployments

    Cisco implemented automation to improve its inventory and deployment system

    CASE STUDY

    Industry Networking

    Source Cisco IT

    Challenge

    Although Cisco Systems had implemented a centralized procurement location for all PCs used in the company, inventory tracking had yet to be addressed.

    Inventory tracking was still a manual process. Given the volume of PCs that are purchased each year, this is an incredibly labor-intensive process.

    Sharing information with management and end users also required the generation of reports – another manual task.

    Solution

    The team at Cisco recognized that automation was the key component holding back the success of the inventory management program.

    Rolling out an automated process across multiple offices and groups, both nationally and internationally, was deemed too difficult to accomplish in the short amount of time needed, so Cisco elected to outsource its PC management needs to an experienced vendor.

    Results

    As a result of the PC management vendor’s industry experience, the implementation of automated tracking and management functions drastically improved the inventory management situation at Cisco.

    The vendor helped determine an ideal leasing set life of 30 months for PCs, while also managing installations, maintenance, and returns.

    Even though automation helped improve inventory and deployment practices, Cisco still needed to address another key facet of asset management: security.

    This case study continues in phase 3.

    An effective equipment intake process is critical to ensure product is correct, documented, and secured

    Examine your current process for receiving assets. Typical problems include:

    Receiving inventory at multiple locations can lead to inconsistent processes. This can make invoice reconciliation challenging and result in untracked or lost equipment and delays in deployment.

    Equipment not received and secured quickly. Idle equipment tends to go missing if left unsupervised for too long. Missed opportunities to manage returns where equipment is incorrect or defective.

    Disconnect between procurement and receiving where ETAs are unknown or incorrect. This can create an issue where no one is prepared for equipment arrival and is especially problematic on large orders.

    How do you solve these problems? Create a standardized workflow that outlines clear steps for asset receiving.

    A workflow will help to answer questions such as:

    • How do you deal with damaged shipments? Incorrect shipments?
    • Did you reach an agreement with the vendor to replace damaged/incorrect shipments within a certain timeframe?
    • When does the product get tagged and entered into the system as received?
    • What information needs to get captured on the asset tag?

    Standardize the process for receiving your hardware assets

    The first step in effective hardware asset intake is establishing proper procedures for receiving and handling of assets.

    Process: Start with information from the procurement process to determine what steps need to follow to receive into appropriate systems and what processes will enable tagging to happen as soon as possible.

    People: Ensure anyone who may impact this process is aware of the importance of documenting before deployment. Having everyone who may be handling equipment on board is key to success.

    Security: Equipment will be secured at the loading dock or reception. It will need to be secured as inventory and be secured if delivering directly to the bench for imaging. Ensure all receiving activities are done before equipment is deployed.

    Tools: A centralized ERP system may already provide a place to receive and reconcile with purchasing and invoicing, but there may still be a need to receive directly into the ITAM and/or CMDB database rather than importing directly from the ERP system.

    Tagging: A variety of methods can be used to tag equipment to assist with inventory. Consider the overall lifecycle management when determining which tagging methods are best.

    Info-Tech Insight

    Decentralized receiving doesn’t have to mean multiple processes. Take advantage of enterprise solutions that will centralize the data and ensure everyone follows the same processes unless there is an uncompromising and compelling logistical reason to deviate.

    Evaluate the pros and cons of different asset tagging methods

    Method Cost Strengths Weaknesses Recommendation
    RFID with barcoding – asset tag with both a barcode and RFID solution $$$$
    • Secure, fast, and robust
    • Track assets in real time
    • Quick and efficient
    • Most expensive option, requiring purchase of barcode scanner with RFID reader and software)
    • Does not work as well in an environment with less control over assets
    • Requires management of asset database
    • Best in a controlled environment with mature processes and requirement for secure assets
    RFID only – small chip with significant data capacity $$$
    • Track assets from remote locations
    • RFID can be read through boxes so you don’t have to unpack equipment
    • Scan multiple RFID-tagged hardware simultaneously
    • Large data capacity on small chip
    • Expensive, requiring purchase of RFID reading equipment and software
    • Ideal if your environment is spread over multiple locations
    Barcoding only – adding tags with unique barcodes $$
    • Reasonable security
    • Report inventory directly to database
    • Relatively low cost
    • Only read one at a time
    • Need to purchase barcode scanners and software
    • Can be labor intensive to deploy with manual scanning of individual assets
    • Less secure
    • Can’t hold as much data
    • Not as secure as barcodes with RFID but works for environments that are more widely distributed and less controlled

    Evaluate the pros and cons of different asset tagging methods

    Method Cost Strengths Weaknesses Recommendation
    QR codes – two-dimensional codes that can store text, binary, image, or URL data $$
    • Easily scannable from many angles
    • Save and print on labels
    • Can be read by barcode scanning apps or mobile phones
    • Can encode more data than barcodes
    • QR codes need to be large enough to be usable, which can be difficult with smaller IT assets
    • Scanning on mobile devices takes longer than scanning barcodes
    • Ideal if you need to include additional data and information in labels and want workers to use smartphones to scan labels
    Manual tags – tag each asset with your own internal labels and naming system $
    • Most affordable
    • Manual
    • Tags are not durable
    • Labor intensive and time consuming
    • Leaves room for error, misunderstanding, and process variances between locations
    • As this is the most time consuming and resource intensive with a low payoff, it is ideal for low maturity organizations looking for a low-cost option for tagging assets
    Asset serial numbers – tag assets using their serial number $
    • Less expensive
    • Unique serial numbers identified by vendor
    • Serial numbers have to be added to database manually, which is labor intensive and leaves room for error
    • Serial numbers can rub off over time
    • Hard to track down already existing assets
    • Doesn’t help track location of assets after deployment
    • Potential for duplicates
    • Inconsistent formats of serial numbers by manufacturers makes this method prone to error and not ideal for asset management

    Select the appropriate method for tagging and tracking your hardware assets

    2.2.1 Select asset tagging method

    Participants

    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Operations (optional)

    Document

    Document in the Standard Operating Procedures, Section 8

    1. Define your asset tagging method. For most organizations, asset tracking is done via barcoding or QR codes, either by using one method or a combination of the two. Other methods, including RFID, may be applicable based on cost or tracking complexity. Overall, barcodes embedded with RFID are the most robust and efficient method for asset tagging, but also the most expensive. Choose the best method for your organization, taking into account affordability, labor-intensiveness, data complexity needs, and ease of deployment.
    2. Define the process for tagging assets, including how soon they should receive the tag, whose responsibility it is, and whether the tag type varies depending on the asset type.
    3. Define the location of asset tags according to equipment type. Example:
    Asset Type Asset Tag Location
    PC desktop Right upper front corner
    Laptop Right corner closest to user when laptop is closed
    Server Right upper front corner
    Printer Right upper front corner
    Modems Top side, right corner

    Inspect and test equipment before accepting it into inventory to ensure it’s working according to specifications

    Upon receipt of procured hardware, validate the equipment before accepting it into inventory.

    1. Receive - Upon taking possession of the equipment, stage them for inspection before placing them into inventory or deploying for immediate use.
    2. Inspect - The inspection process should involve at minimum examining the products that have been delivered to determine conformance to purchase specifications.
    3. Test -Depending on the type and cost of hardware, some assets may benefit from additional testing to determine if they perform at a satisfactory level before being accepted.
    4. Accept - If the products conform to the requirements of the purchase order, acknowledge receipt so the supplier may be paid. Most shipments are automatically considered as accepted and approved for payment within a specific timeframe.

    Assign responsibility and accountability for inspection and acceptance of equipment, verifying the following:

    • The products conform to purchase order requirements.
    • The quantity ordered is the same as the quantity delivered.
    • There is no damage to equipment.
    • Delivery documentation is acceptable.
    • Products are operable and perform according to specifications.
    • If required, document an acceptance testing process as a separate procedure.

    Build the RMA procedure into the receiving process to handle receipt of defective equipment

    The return merchandise authorization (RMA) process should be a standard part of the receiving process to handle the return of defective materials to the vendor for either repair or replacement.

    If there is a standard process in place for all returns in the organization, you can follow the same process for returning hardware equipment:

    • Call the vendor to receive a unique RMA number that will be attached to the equipment to be returned, then follow manufacturer specifications for returning equipment within allowable timelines according to the contract where applicable.
    • Establish a lemon policy with vendors, allowing for full returns up to 30 days after equipment is deployed if the product proves defective after initial acceptance.

    Info-Tech Insight

    Make sure you’re well aware of the stipulations in your contract or purchase order. Sometimes acceptance is assumed after 60 days or less, and oftentimes the clock starts as soon as the equipment is shipped out rather than when it is received.

    Info-Tech Best Practice

    Keep in mind that the serial number on the received assed may not be the asset that ultimately ends up on the user’s desk if the RMA process is initiated. Record the serial number after the RMA process or add a correction process to the workflow to ensure the asset is properly accounted for.

    Determine what equipment should be stocked for quick deployment where demand is high or speed is crucial

    The most important feature of your receiving and inventory process should be categorization. A well-designed inventory system should reflect not only the type of asset, but also the usage level.

    A common technique employed by asset managers is to categorize your assets using an ABC analysis. Assets are classified as either A, B, or C items. The ratings are based on the following criteria:

    A

    A items have the highest usage. Typically, 10-20% of total assets in your inventory account for upwards of 70-80% of the total asset requests.

    A items should be tightly controlled with secure storage areas and policies. Avoiding stock depletion is a top priority.

    B

    B items are assets that have a moderate usage level, with around 30% of total assets accounting for 15-25% of total requests.

    B items must be monitored; B items can transition to A or C items, especially during cycles of heavier business activity.

    C

    C items are assets that have the lowest usage, with upwards of 50% of your total inventory accounting for just 5% of total asset requests.

    C items are reordered the least frequently, and present a low demand and high risk for excessive inventory (especially if they have a short lifecycle). Many organizations look to move towards an on-demand policy to mitigate risk.

    Info-Tech Insight

    Get your vendor to keep stock of your assets. If large quantities of a certain asset are required but you lack the space to securely store them onsite, ask your vendor to keep stock for you and release as you issue purchase orders. This speeds up delivery and delays warranty activation until the item is shipped. This does require an adherence to equipment standards and understanding of demand to be effective.

    Define the process for receiving equipment into inventory

    Define the following in your receiving process:

    • When will equipment be opened once delivered?
    • Who will open and validate equipment upon receipt?
    • How will discrepancies be resolved?
    • When will equipment be tagged and identified in the tracking tool?
    • When will equipment be locked in secure storage?
    • Where will equipment go if it needs to be immediately deployed?

    The image shows a workflow chart titled Receiving and Tagging. The process is split into two sections, labelled on the left as: Desktop Support Team and Procurement.

    Design the workflow for receiving and inventorying equipment

    2.2.2 Illustrate receiving workflow with a tabletop exercise

    Participants

    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Operations (optional)
    • CFO or other management representative from Finance

    Document

    Document in the Standard Operating Procedures, Section 8: Receiving and Equipment Inventory

    Option 1: Whiteboard

    1. Discuss the workflow and draw it on the whiteboard.
    2. Assess whether you are using the best workflow. Modify it if necessary.
    3. Use the sample workflow from this step as a guide if starting from scratch.
    4. Engage the team in refining the process workflow.
    5. Transfer data to Visio and add to the SOP.

    Option 2: Tabletop Exercise

    1. Distribute index cards to each member of the team.
    2. Have each person write a single task they perform on the index card. Be granular. Include the title or the name of the person responsible.
    3. Mark cards that are decision points. Use a card of a different color or use a marker to make a colored dot.
    4. Arrange the index cards in order, removing duplicates.
    5. Assess whether you are using the best workflow. Engage the team to refine it if necessary.
    6. Transfer data to Visio and add to the SOP.

    Improve device deployment by documenting software personas for each role

    • Improve the deployment process for new users by having a comprehensive list of software used by common roles within the organization. With large variations in roles, it may be impossible to build a complete list, but as you start to see patterns in requirements, you may find less distinct personas than anticipated.
    • Consider a survey to business units to determine what they need if this will solve some immediate problems. If this portion of the project will be deferred, use the data uncovered in the discovery process to identify which software is used by which roles.
    • Replacement equipment can have the software footprint created by what was actually utilized by the user, not necessarily what software was installed on the previous device.

    The image shows 4 bubbles, representing software usage. The ARC-GIS bubble is the largest, Auto CAD the second largest, and MS Office and Adobe CS equal in size.

    A software usage snapshot for an urban planner/engineer.

    • Once software needs are determined, use this information to review the appropriate device for each persona.
      • Ensure hardware is appropriate for the type of work the user does and supports required software.
      • If it is more appropriate for a user to have a tablet, ensure the software they use can be used on any device.
    • Review deployment methods to determine if there is any opportunity to improve the imaging or software deployment process with better tools or methodologies.
    • Document the device’s location if it will be static, or if the user may be more mobile, add location information for their primary location.
    • Think about the best place to document – if this information can be stored in Active Directory and imported to the ITAM database, you can update once and use in multiple applications. But this process is built into your add/move/change workflows.

    Maintain a lean library to simplify image management

    Simplify, simplify, simplify. Use a minimal number of desktop images and automate as much as you can.

    • Embrace minimalism. When it comes to managing your desktop image library, your ultimate goal should be to minimize the manual effort involved in provisioning new desktops.
    • Less is more. Try to maintain as few standard desktop images as possible and consider a thin gold image, which can be patched and updated on a regular basis. A thin image with efficient application deployment will improve the provisioning process.
    • Standardize and repeat. System provisioning should be a repeatable process. This means it is ripe for standardization and automation. Look at balancing the imaging process with software provisioning, using group policy and deployment tools to reduce time to provision and deliver equipment.
    • Outsource where appropriate. Imaging is one of the most employed services, where the image is built in-house and deployed by the hardware vendor. As a minimum, quarterly updates should still be provided to integrate the latest patches into the operating system.

    Document the process workflow for hardware deployment

    Define the process for deploying hardware to users.

    Include the following in your workflow:

    • How will equipment be configured and imaged before deployment?
    • Which images will be used for specific roles?
    • Which assets are assigned to specific roles?
    • How will the device status be changed in the ITAM tool once deployed?

    The image shows a workflow chart titled Hardware Deployment. It is divided into two categories, listed on the left: Desktop Support Team and Procurement.

    Large-scale deployments should be run as projects, benefitting from economies of scale in each step

    Large-scale desktop deployments or data center upgrades will likely be managed as projects.

    These projects should include project plans, including resources, timelines, and detailed procedures.

    Define the process for large-scale deployment if it will differ from the regular deployment process.

    The image is a graphic of a flowchart titled Deployment-Equipment-Large Quantity Rollout. It is divided into three categories, listed on the left: IT Procurement; Desktop Rollout Team; Asset Manager.

    Document the deployment workflow(s)

    2.2.3 Document deployment workflows for desktop and large-scale deployment

    Participants

    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Operations (optional)
    • CFO or other management representative from Finance

    Document

    Document in the Standard Operating Procedures, Section 9: Deployment

    Document each step in the system deployment process with notecards or on a whiteboard. Identify the challenges faced by your organization and strategize potential solutions.

    1. Outline each step in the process of desktop deployment. Be as granular as possible. On each card, describe the step as well as the individual responsible for it.
    2. When you are satisfied that each step is accurately captured, use a second color of notecard to document any challenges, inefficiencies, or pains associated with each step. Consider further documenting the time on each task.
    3. Examine each challenge or pain point. Discuss whether or not there is a clear solution to the problem. If yes, document the solution and amend the workflow. If not, engage in a broader discussion of possible solutions, taking into account people, processes, and available technology.
    4. Document separately the process for large-scale deployment if required.

    Look for opportunities to improve the request and deployment process with better communication and tools

    The biggest challenge in deploying equipment is meeting expectations of the business, and without cooperation from multiple departments, this becomes significantly more difficult.

    • Work with the procurement and the services team to ensure inventory is accessible, and regularly validate that inventory levels in the ITAM database are accurate.
    • Work with the HR department to predict (where possible) anticipated new hires. Plan for inventory ebbs and flows to match the hiring timelines where there are large variations.
    • If service catalogs will be made available for communicating options and SLAs for equipment purchases, work with the service catalog administrators to automate inventory checks and notifications. Work with the end-user device managers to set standards and reduce equipment variations to a manageable amount.
    • Where deployments are part of equipment refresh, ensure data is up to date for the services team to plan the project rollouts and know which software should be redeployed with the devices.
    • Infrastructure and security teams may have specific hardware assets relating to networking, data centers, and security, which may bypass the end-user device workflows but need to be tagged and entered into inventory early in the process. Work with these teams to have their equipment follow the same receiving and inventory processes. Deployment will vary based on equipment type and location.

    Automate hardware deployment where users are dispersed and deployment volume is high

    Self-serve kiosks (vending machines) can provide cost reductions in delivery of up to 25%. Organizations that have a high distribution rate are seeing reductions in cost of peripherals averaging 30-35% and a few extreme cases of closer to 85%.

    Benefits of using vending machines:

    • Secure equipment until deployed.
    • Equipment can be either purchased by credit card or linked to employee ID cards, enabling secure transactions and reporting.
    • Access rights can be controlled in real time, preventing terminated employees from accessing equipment or managing how many devices can be deployed to each user.
    • Vending machines can be managed through a cellular or wireless network.
    • Technology partners can be tasked with monitoring and refilling vending machines.
    • Employees are able to access technology wherever a vending machine can be located rather than needing to travel to the help desk.
    • Equipment loans and new employee packages can be managed through vending machines.

    Phase 2 Guided Implementation

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Request, Procure, Receive, and Deploy

    Proposed Time to Completion: 4 weeks

    Step 2.1: Request & Procure

    Start with an analyst kick-off call:

    • Define standard and non-standard hardware.
    • Weigh the pros and cons of leasing vs. buying.
    • Build the procurement process.

    Then complete these activities…

    • Define standard hardware requests.
    • Document standard hardware request procedure.
    • Document procurement workflow.
    • Build a purchasing policy.

    With these tools & templates:

    • Standard Operating Procedures
    • Non-Standard Hardware Request Form
    • Hardware Procurement Workflow
    • Purchasing Policy

    Step 2.2: Receive & Deploy

    Review findings with analyst:

    • Determine appropriate asset tagging method.
    • Define equipment receiving process.
    • Define equipment deployment process.

    Then complete these activities…

    • Select appropriate asset tagging method.
    • Design workflow for receiving and inventorying equipment.
    • Document the deployment workflow(s).

    With these tools & templates:

    • Standard Operating Procedures
    • Equipment Receiving & Tagging Workflow
    • Deployment Workflow

    Phase 2 Insight: Bridge the gap between IT and Finance to build a smoother request and procurement process through communication and routine reporting. If you’re unable to affect procurement processes to reduce time to deliver, consider bringing inventory onsite or having your hardware vendor keep stock, ready to ship on demand.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    2.1.2 Define standard hardware requests

    Divide whiteboard into columns representing core business areas. Define core hardware assets for end users in each division along with optional hardware assets. Discuss optional assets to narrow and define standard equipment requests.

    2.2.1 Select appropriate method for tagging and tracking assets

    Discuss the various asset tagging methods and choose the tagging method that is most appropriate for your organization. Define the process for tagging assets and document the standard asset tag location according to equipment type.

    Phase 3

    Maintain and Dispose

    Implement Hardware Asset Management

    Cisco overcame organizational resistance to change to improve asset security

    CASE STUDY

    Industry Networking

    Source Cisco IT

    Challenge

    Cisco Systems had created a dynamic work environment that prized individuality. This environment created high employee satisfaction, but it also created a great deal of risk surrounding device security.

    Cisco lacked an asset security policy; there were no standards for employees to follow. This created a surplus of not only hardware, but software to support the variety of needs amongst various teams at Cisco.

    Solution

    The ITAM team at Cisco recognized that their largest problem was the lack of standardization with respect to PCs. Variance in cost, lifecycle, and software needs/compatibility were primary issues.

    Cisco introduced a PC leasing program with the help of a PC asset management vendor to correct these issues. The primary goal was to increase on-time returns of PCs. A set life of 30 months was defined by the vendor.

    Results

    Cisco engaged employees to help contribute to improving its asset management protocols, and the approach worked.

    On-time returns increased from 60% to 80%. Costs were reduced due to active tracking and disposal of any owned assets still present.

    A reduction in hardware and software platforms has cut costs and increased security thanks to improved tracking capabilities.

    This case study continues in phase 4

    Step 3.1: Manage, Maintain, and Secure Hardware Assets

    Phase 3: Maintain & Dispose

    3.1 Manage & Maintain

    3.2 Dispose or Redeploy

    This step will walk you through the following activities:

    3.1.1 Build a MAC policy and request form

    3.1.2 Build workflows to document user MAC processes

    3.1.3 Design process and policies for hardware maintenance, warranty, and support documentation handling

    3.1.4 Revise or create an asset security policy

    This step involves the following participants:

    • Asset Manager
    • Service Desk Manager
    • Operations (optional)
    • Security Department

    Step Outcomes

    • Understanding of inventory management process best practices
    • Templates for move/add/change request policy and form
    • Documented process workflows for the user move/add/change process
    • Process and policies for hardware maintenance, warranty, and support documentation handling
    • Defined policies for maintaining asset security

    Determine methods for performing inventory audits on equipment

    Auto-discovery

    • Auto-discovery tools will be crucial to the process of understanding what equipment is connected to the network and in use.
    • The core functionality of discovery tools is to scan the environment and collect configuration data from all connected assets, but most tools can also be used to collect usage data, network monitoring, and software asset management data including software distribution, compliance, and license information.
    • These tools may not connect to peripheral devices such as monitors and external drives, will not scan devices that are turned off or disconnected from the network, may not inventory remote users, and will rarely provide location information. This often results in a need to complete physical audits as well.

    Info-Tech Insight

    One of the most common mistakes we see when it comes to asset management is to assume that the discovery tool will discovery most or all of your inventory and do all the work. It is better to assume only 80-90% coverage by the discovery tool and build ownership records to uncover the unreportable assets that are not tied into the network.

    Physical audit

    • The physical audit can be greatly improved with barcode, RFID, or QR codes, allowing items to be scanned, records opened, then updated.
    • If not everything is tagged or entered into the ITAM database, then searching closets, cabinets, and desk drawers may be required to tag and enter those devices into the database.
    • Provide the inventory team with exact instructions on what needs to be collected, verified, and recorded. Depending on the experience and thoroughness of the team, spot checks early in the process may alleviate quality issues often discovered at the end of the inventory cycle.

    Determine requirements for performing inventory audits on equipment

    Conduct an annual hardware audit to ensure hardware is still assigned to the person and location identified in your ITAM system, and assess its condition.

    Perform a quarterly review of hardware stock levels in order to ensure all equipment is relevant and usable. The table below is an example of how to organize this information.

    Item Target Stock Levels Estimated $ Value
    Desktop computers
    Standard issue laptops
    Mice
    Keyboards
    Network cables
    Phones

    Info-Tech Insight

    Don’t forget about your remotely deployed assets. Think about how you plan to inventory remotely deployed equipment. Some tools will allow data collection through an agent that will talk to the server over the internet, and some will completely ignore those assets or provide a way to manually collect the data and email back to the asset manager. Mobile device management tools may also help with this inventory process. Determine what is most appropriate based on the volume of remote workers and devices.

    Build an inventory management process to maintain an accurate view of owned hardware assets

    • Your inventory should capture which assets are on hand, where they are located, and who owns them, at minimum. Maintaining an accurate, up-to-date view of owned hardware assets allows you to see at any time the actual state of the components that make up your infrastructure across the enterprise.
    • Automated inventory practices save time and effort from doing physical inventories and also reduce the interruption to business users while improving accuracy of data.
    • If you are just starting out, define the process for conducting an inventory of deployed assets, and then define the process for regular upkeep and audit of inventory data.

    Inventory Methods

    • Electronic – captures networked asset information only and can be deployed over the network with no deskside service interaction.
    • Physical – captures environmental detail and must be performed manually by a service technician with possible disruption to users.
    • Full inventory – both physical and electronic inventory of assets.

    Internal asset information to collect electronically

    • Hardware configuration
    • Installed software
    • Operating system
    • System BIOS
    • Network configuration
    • Network drive mappings
    • Printer setups
    • System variables

    External asset information that cannot be detected electronically

    • Assigned user
    • Associated assets
    • Asset/user location
    • Usage of asset
    • Asset tag number

    IMAC (Install, Move, Add, Change) services will form the bulk of asset management work while assets are deployed

    IMAC services are usually performed at a user’s deskside by a services technician and can include:

    • Installing new desktops or peripherals
    • Installing or modifying software
    • Physically moving an end user’s equipment
    • Upgrading or adding components to a desktop

    Specific activities may include:

    Changes

    • Add new user IDs
    • Manage IDs
    • Network changes
    • Run auto-discovery scan

    Moves

    • Perform new location site survey
    • Coordinate with facilities
    • Disconnect old equipment
    • Move to new location
    • Reconnect at new location
    • Test installed asset
    • Obtain customer acceptance
    • Close request

    Installs and Adds

    • Perform site survey
    • Perform final configuration
    • Coordinate with Facilities
    • Asset tagging
    • Transfer data from old desktop
    • Wipe old desktop hard drive
    • Test installed asset
    • Initiate auto-discovery scan
    • Obtain customer acceptance
    • Close request

    A strong IMAC request process will lessen the burden on IT asset managers

    • When assets are actively in use, Asset Managers must also participate in the IMAC (Install-Move-Add-Change) process and ensure that any changes to asset characteristics or locations are updated and tracked in the asset management tool and that the value and usefulness of the asset is monitored.
    • The IMAC process should not only be reactive in response to requests, but proactive to plan for moves and relocations during any organizational change events.

    Recommendations:

    Automate. Wherever possible, use tools to automate the IMAC process.

    E-forms, help desk, ticketing, or change management software can automate the request workflow by allowing the requestor to submit a request ticket that can then be automatically assigned to a designated team member according to the established chain of command. As work is completed, the ticket can be updated, and the requestor will be able to check the status of the work at any time.

    Communicate the length of any downtime associated with execution of the IMAC request to lessen the frustration and impatience among users.

    Involve HR. When it comes to adding or removing user accounts, HR can be a valuable resource. As most new employees should be hired through HR, work with them to improve the onboarding process with enough advanced notice to set up accounts and equipment. Role changes with access rights and software modifications can benefit from improved communications. Review the termination process as well, to secure data and equipment.

    Build a MAC request policy and form for end users

    A consistent Move, Add, Change (MAC) request process is essential for lessening the burden on the IT department. MAC requests are used to address any number of tasks, including:

    • Relocation of PCs and/or peripherals.
    • New account setup.
    • Hardware or software upgrades.
    • Equipment swaps or replacements.
    • User account/access changes.
    • Document generation.
    • User acceptance testing.
    • Vendor coordination.

    Create a request form.

    If you are not using help desk or other ticketing software, create a request template that must be submitted for each MAC. The request should include:

    • The name and department of the requester.
    • The date of the request.
    • Severity of the request. For example, severity can be graded on a score of high, medium, or low where high represents a mission-critical change that could compromise business continuity if not addressed immediately, and low represents a more cosmetic change that will not negatively affect operations. The severity of the request can be determined by the service-level agreement (SLA) associated with the service.
    • Date the request must be completed by. Or at least, what would be the ideal date for completion. This will vary greatly depending on the severity of the request. For example, deleting the access of a terminated employee would be very time sensitive.
    • Item or service to be moved, added, or changed. Include location, serial number, or other designated identifier where possible.
    • If the item or service is to be moved, indicated where it is being moved.
    • It is a good idea to include a comments section where the requester can add any additional questions or details.

    Use Info-Tech’s templates to build your MAC policy and request form

    3.1.1 Build a MAC policy and request form

    Desktop Move/Add/Change Policy

    This desktop move/add/change policy should be put in place to mitigate the risk associated with unauthorized changes, minimize disruption to the business, IT department, and end users, and maintain consistent expectations.

    Move, Add, Change Request Form

    Help end users navigate the move/add/change process. Use the Move/Add/Change Request Form to increase efficiency and organization for MAC requests.

    Document the process for user equipment moves

    Include the following in your process documentation:

    • How and when will any changes to user or location information be made in the ITAM tool?
    • Will any changes in AD automatically update in the ITAM tool?
    • How should requests for equipment moves or changes be made?
    • How will resources be scheduled?

    The image shows a flowchart titled SErvice Request - User Moves. The chart of processes is split into three categories, listed on the left side of the chart: User Manager; IT Coordinator; and Tier 2 & Facilities.

    Build workflows to document user MAC processes

    3.1.2 Build MAC process workflows

    Participants

    • Asset Manager
    • Service Desk Manager
    • Operations (optional)

    Document

    Document in the Standard Operating Procedures, Section 10: Equipment Install, Adds, Moves, and Changes

    Document each step in the system deployment process using notecards or on a whiteboard. Identify the challenges faced by your organization and strategize potential solutions.

    1. Outline each step in the process of desktop deployment. Be as granular as possible. On each card, describe the step as well as the individual responsible for each step.
    2. When you are satisfied that each step is accurately captured, use a second color of notecard to document any challenges, inefficiencies, or pains associated with each step. Consider further documenting the time on each task.
    3. Examine each challenge or pain point. Discuss whether or not there is a clear solution to the problem. If so, document the solution and amend the workflow. If not, engage in a broader discussion of possible solutions, taking into account people, processes, and available technology.
    4. Document separately the process for large-scale deployment if required.

    Define a policy to ensure effective maintenance of hardware assets

    Effective maintenance and support of assets provides longer life, higher employee productivity, and increased user satisfaction.

    • Your asset management documentation and database should store equipment maintenance contract information so that it can be consulted whenever hardware service is required.
    • Record who to contact as well as how, warranty information, and any SLAs that are associated with the maintenance agreement.
    • Record all maintenance that hardware equipment receives, which will be valuable for evaluating asset and supplier performance.
    • In most cases, the Service Desk should be the central point of contact for maintenance calls to all suppliers.

    Sample equipment maintenance policy terms:

    • Maintenance and support arrangements are required for all standard and non-standard hardware.
    • All onsite hardware should be covered by onsite warranty agreements with appropriate response times to meet business continuity needs.
    • Defective items under warranty should be repaired in a timely fashion.
    • Service, maintenance, and support shall be managed through the help desk ticketing system.

    Design process and policies for hardware maintenance, warranty, and support documentation handling

    3.1.3 Design process for hardware maintenance

    Participants

    • Asset Manager
    • Purchasing
    • Service Desk Manager
    • Security
    • Operations (optional)

    Document

    Document in the Standard Operating Procedures, Section 10

    1. Discuss and document the policy for hardware maintenance, warranty, and support.
    2. Key outcomes should include:
    • Who signs off on policies?
    • What is the timeline for documentation review?
    • Where are warranty and maintenance documents stored?
    • How will equipment be assessed for condition during audits?
    • How often will deployed equipment be reimaged?
    • How will equipment repair needs be requested?
    • How will repairs for equipment outside warranty be handled?
  • Document in the Standard Operating Procedure.
  • Use your HAM program to improve security and meet regulatory requirements

    ITAM complements and strengthens security tools and processes, improving the company’s ability to protect its data and systems and reduce operational risk.

    It’s estimated that businesses worldwide lose more than $221 billion per year as a result of security breaches. HAM is one important factor in securing data, equipment investment, and meeting certain regulatory requirements.

    How does HAM help keep your organization secure?

    • Educating users on best practices for securing their devices, and providing physical security such as cable locks and tracking mechanisms.
    • Best practices for reporting lost or stolen equipment for quickly removing access and remotely wiping devices.
    • Accurate location and disposal records will enable accurate reporting for HIPAA and PCI DSS audits where movement of media or hardware containing data is a requirement. Best practices for disposal will include properly wiping drives, recording information, and ensuring equipment is disposed of according to environmental regulations.
    • Secure access to data through end-user mobile devices. Use accurate records and MDM tools to securely track, remove access, and wipe mobile devices if compromised.
    • Encrypt devices that may be difficult to track such as USB drives or secure ports to prevent data from being copied to external drives.
    • Managed hardware allows software to be managed and patched on a regular basis.

    Best Practices

    1. Educate end users about traveling with equipment. Phones and laptops are regularly stolen from cars; tablets and phones are left on planes. Encourage users to consider how they store equipment on the way home from work.
    2. Cable locks used at unsecured offsite or onsite work areas should be supplied to employees.
    3. Equipment stored in IT must be secured at all times.

    Implement mobile device management (MDM) solutions

    Organizations with a formal mobile management strategy have fewer problems with their mobile devices.

    Develop a secure MDM to:

    • Provide connection and device support when the device is fully subsidized by the organization to increase device control.
    • Have loaner devices for when traveling to limit device theft or data loss.
    • Personal devices not managed by MDM should be limited to internet access on a guest network.
    • Limit personal device access to only internet access or a limited zone for data access and a subset of applications.
    • Advanced MDM platforms provide additional capabilities including containerization.

    The benefits of a deployed MDM solution:

    • Central management of a variety of devices and platforms is the most important advantage of MDM. Administrators can gain visibility into device status and health, set policies to groups of users, and control who has access to what.
    • Security features such as enforcing passcodes and remote wipe are also essential, given the increased risk of mobile devices.
      • Remote wipe should be able to wipe either the whole device or just selected areas.
    • Separation of personal data is becoming increasingly important as BYOD becomes the norm. This is a feature that vendors are approaching radically differently.
    • Device lock: Be able to lock the device itself, its container, or its SIM. Even if the SIM is replaced, the device should still remain locked. Consider remote locking a device if retrieval is possible.

    Mobile device management is constantly evolving to incorporate new features and expand to new control areas. This is a high-growth area that warrants constant up-to-date knowledge on the latest developments.

    What can be packed into an MDM can vary and be customized in many forms for what your organization needs.

    Secure endpoint devices to protect the data you cannot control

    Endpoint Encryption

    Endpoints Average None
    Desktop 73% 4%
    Laptops 65% 9%
    Smartphones 27% 28%
    Netbooks 26% 48%
    Tablets 16% 59%
    Grand average 41%

    Benefits from endpoint encryption:

    • Reduced risk associated with mobile workers.
    • Enabled sharing of data in secured workspace.
    • Enhanced end-user accountability.
    • Reduced number of data breach incidents.
    • Reduced number of regulatory violations.

    Ways to reduce endpoint encryption costs:

    • Use multiple vendors (multiple platforms): 33%
    • Use a single vendor (one platform): 40%
    • Use a single management console: 22%
    • Outsource to managed service provider: 26%
    • Permit user self-recovery: 26%

    Remote Wiping

    • If all else fails, a device can always be erased of all its data, protecting sensitive data that may have been on it.
    • Selective wipe takes it a step further by erasing only sensitive data.

    Selective wipe is not perfect.

    It is nearly impossible to keep the types of data separate, even with a sandbox approach. Selective wipe will miss some corporate data, and even a full remote wipe can only catch some of users’ increasingly widely distributed data.

    Selective wipe can erase:

    • Corporate profiles, email, and network settings.
    • Data within a corporate container or other sandbox.
    • Apps deployed across the enterprise.

    Know when to perform a remote wipe.

    Not every violation of policy warrants a wipe. Playing Candy Crush during work hours probably does not warrant a wipe, but jail breaking or removing a master data management client can open up security holes that do warrant a wipe.

    Design an effective asset security policy to protect the business

    Data security is not simply restricted to compromised software. In fact, 70% of all data breaches in the healthcare industry since 2010 are due to device theft or loss, not hacking. (California Data Breach Report – October, 2014) ITAM is not just about tracking a device, it is also about tracking the data on the device.

    Organizations often struggle with the following with respect to IT asset security:

    • IT hardware asset removal control.
    • Personal IT hardware assets (BYOD).
    • Data removal from IT hardware assets.
    • Inventory control with respect to leased hardware and software.
    • Unused software.
    • Repetitive versions of software.
    • Unauthorized software.

    Your security policy should seek to protect IT hardware and software that:

    • Have value to the business.
    • Require ongoing maintenance and support.
    • Create potential risk in terms of financial loss, data loss, or exposure.

    These assets should be documented and controlled in order to meet security requirements.

    The asset security policy should encompass the following:

    • Involved parties.
    • Hardware removal policy/documentation procedure.
    • End-user asset security responsibilities.
    • Theft/loss reporting procedure.
    • BYOD standards, procedures, and documentation requirements.
    • Data removal.
    • Software usage.
    • Software installation.

    Info-Tech Insight

    Hardware can be pricey; data is priceless. The cost of losing a device is minimal compared to the cost of losing data contained on a device.

    Revise or create an asset security policy

    3.1.4 Develop IT asset security policy

    Participants

    • CIO or IT Director
    • Asset Manager
    • Service Desk Manager
    • Security
    • Operations (optional)

    Document

    Document in the Asset Security Policy.

    1. Identify asset security challenges within your organization. Record them in a table like the one below.
    Challenge Current Security Risk Target Policy
    Hardware removal Secure access and storage, data loss Designated and secure storage area
    BYOD No BYOD policy in place N/A → phasing out BYOD as an option
    Hardware data removal Secure data disposal Data disposal, disposal vendor
    Unused software Lack of support/patching makes software vulnerable Discovery and retirement of unused software
    Unauthorized software Harder to track, less secure Stricter stance on pirated software
    1. Brainstorm the reasons for why these challenges exist.
    2. Identify target policy details that pertain to each challenge. Record the outcomes in section(s) 5.1, 5.2, or 5.3 of the Asset Security Policy.

    Poor asset security and data protection had costly consequences for UK Ministry of Justice

    CASE STUDY

    Industry Legal

    Source ICO

    Challenge

    The Ministry of Justice (MoJ) in the UK had a security problem: hard drives that contained sensitive prisoner data were unencrypted and largely unprotected for theft.

    These hard drives contained information related to health, history of drug use, and past links to organized crime.

    After two separate incidents of hard drive theft that resulted in data breaches, the Information Commissioner’s Office (ICO), stepped in.

    Solution

    It was determined that after the first hard drive theft in October 2011, replacement hard drives with encryption software were provisioned to prisons managed by the MoJ.

    Unfortunately, the IT security personnel employed by the MoJ were unaware that the encryption software required manual activation.

    When the second hard drive theft occurred, the digital encryption could not act as a backup to poor physical security (the hard drive was not secured in a locker as per protocol).

    Results

    The perpetrators were never found and the stolen hard drives were never recovered.

    As a result of the two data breaches, the MoJ had to implement costly security upgrades to its data protection system.

    The ICO fined the MoJ £180,000 for its repeated security breaches. This costly fine could have been avoided if more diligence was present in the MoJ’s asset management program.

    Step 3.2: Dispose or Redeploy Assets

    3.1 Manage & Maintain

    3.2 Dispose or Redeploy

    This step will walk you through the following activities:

    3.2.1 Identify challenges with IT asset recovery and disposal

    3.2.2 Design hardware asset recovery and disposal workflows

    3.2.3 Build a hardware asset disposition policy

    This step involves the following participants:

    • Infrastructure Director/Manager
    • Asset Manager
    • Service Desk Manager
    • Operations (optional)

    Step Outcomes:

    • Defined process to determine when to redeploy vs. dispose of hardware assets
    • Process for recovering and redeploying hardware equipment
    • Process for safely disposing of assets that cannot be redeployed
    • Comprehensive asset disposition policy

    Balance the effort to roll out new equipment against the cost to maintain equipment when building your lifecycle strategy

    The image shows two line graphs. The graph on the left is titled: Desktop Refresh Rate by Company Size (based on Revenue). The graph on the right is titled: Laptop Refresh Rate by Company Size (based on Revenue). Each graph has four lines, defined by a legend in the centre of the image: yellow is small ($25mm); dark blue is Mid ($25-500MM); light blue is large ( data-verified=$500MM); and orange is Overall.">

    (Info-Tech Research Group; N=96)

    Determining the optimal length of time to continue to use equipment will depend on use case and equipment type

    Budget profiles Refresh methods

    Stretched

    Average equipment age: 7+ years

    To save money, some organizations will take a cascading approach, using the most powerful machines for engineers or scientists to ensure processing power, video requirements and drives will meet the needs of their applications and storage needs; then passing systems down to departments who will require standard-use machines. The oldest and least powerful machines are either used as terminals or disposed.

    Generous

    Average equipment age: 3 years

    Organizations that do not want to risk user dissatisfaction or potential compatibility or reliability issues will take a more aggressive replacement approach. These organizations often have less people assigned to end-user device maintenance and will not repair equipment outside of warranty. There is little variation in processing power among devices, with major differences determined by mobility and operating system.

    Cautious

    Average equipment age: 4 to 5 years

    Organizations that fit between the other two profiles will look to stretch the budget beyond warranty years, but will keep a close eye on maintenance requirements. Repairs needed outside of warranty will require an eye to costs, efforts, and subsequent administrative work of loaning equipment to keep the end user productive while waiting on service.

    Recommendations to keep users happy and equipment in prime form is to check condition at the 2-3 year mark, reimage at least once to improve performance, and have backup machines, if equipment starts to become problematic.

    Build a process to determine when and how to redeploy or dispose of hardware assets at end of use

    • When equipment is no longer needed for the function or individual to whom it was assigned, the Hardware Asset Manager needs to use data to ensure the right decision is made as to what to do with the asset.
    • End of use involves evaluating options for either continuing to use the equipment in another capacity or by another individual or determining that the asset has no remaining value to the organization in any capacity and it is time to retire it.
    • If the asset is retired, it may still have capacity for continued use outside of the organization or it may be disposed.

    Redeployment

    • Deliver the asset to a new user if it is no longer needed by the original user but still has value and usability.
    • Redeployment saves money and prevents unnecessary purchases.
    • Common when employees leave the company or a merge or acquisition changes the asset pool.

    VS.

    Disposal

    • When an asset is no longer of use to the organization, it may be disposed of.
    • Need to consider potential financial and public relations considerations if disposal is not done according to environmental legislation.
    • Need to ensure proper documentation and data removal is built into disposition policy.

    Use persistent documentation and communication to improve hardware disposal and recovery

    Warning! Poor hardware disposal and recovery practices can be caused by the following:

    1. Your IT team is too busy and stretched thin. Data disposal is one of many services your IT team is likely to have to deal with, but this service requires undivided attention. By standardizing hardware refreshes, you can instill more predictability with your hardware life cycles and better manage disposal.
    2. Poor inventory management. Outdated data and poor tracking practices can result in lost assets during the disposal phase. It only takes a single lost asset to cause a disastrous data breach in your supply chain.
    3. Obliviousness to disposal regulations. Electronic disposal and electronically stored data are governed by strict regulation.

    How do you improve your hardware disposal and recovery process?

    • A specific, controlled process needs to be in place to wipe all equipment and verify that it’s been wiped properly. Otherwise, companies will continue to spend money to protect data while equipment is in use, but overlook the dangerous implications of careless IT asset disposal. Create a detailed documentation process to track your assets every step of the way to ensure that data and applications are properly disposed of. Detailed documentation can also help bolster sustainability reporting for organizations wishing to track such data.
    • Better communication should be required. Most decommissioning or refresh processes use multiple partners for manufacturing, warehousing, data destruction, product resale, and logistics. Setting up and vetting these networks can take years, and even then, managing them can be like playing a game of telephone; transparency is key.

    Address three core challenges of asset disposal and recovery

    Asset Disposal

    Data Security

    Sixty-five percent of organizations cite data security as their top concern. Many data breaches are a result of hardware theft or poor data destruction practices.

    Choosing a reputable IT disposal company or data removal software is crucial to ensuring data security with asset disposal.

    Environmental

    Electronics contain harmful heavy metals such as mercury, arsenic, and cadmium.

    Disposal of e-waste is heavily regulated, and improper disposal can result in hefty fines and bad publicity for organizations.

    Residual value

    Many obsolete IT assets are simply confined to storage at their end of life.

    This often imposes additional costs with maintenance or storage fees and leaves a lot of value on the table through assets that could be sold or re-purposed within the organization.

    Identify challenges with IT asset recovery and disposal with a triple bottom line scorecard

    3.2.1 Identify challenges with IT asset recovery and disposal

    Participants

    • Infrastructure Director/Manager
    • Asset Manager
    • Service Desk Manager
    • Operations (optional)
    1. Divide the whiteboard into three boxes: Social, Economic, and Environmental.
    2. Divide each box into columns like the one shown below:
    Economic
    Challenge Objectives Targets Initiatives
    No data capture during disposal Develop reporting standards 80% disposed assets recorded Work with Finance to develop reporting procedure
    Idle assets Find resale market/dispose of idle assets 50% of idle assets disposed of within the year Locate resale vendor and disposal service
    1. Ask participants to list challenges associated with each area.
    2. Once challenges facing recovery and disposal have been exhausted from the group, assign a significance of 1-5 (1 being the lowest and 5 being the highest) to each challenge.
    3. Discuss the most significant challenges and how they might be addressed through the next steps of building recovery & disposal processes.

    Build a process for recovery and redeployment of hardware

    • Having hardware standards in place makes redeploying easier by creating a larger pool of possible users for a standardized asset.
    • Most redeployment activities will be carried out by the Help Desk as a service request ticket, so it is important to have clear communication and guidelines with the Help Desk as to which tasks need to be carried out as part of the request.

    Ensure the following are addressed:

    • Where will equipment be stored before being redeployed?
    • Will shipping be required and are shipping costs factored into analysis?
    • Ensure equipment is cleaned before it is redeployed.
    • Do repairs and reconfigurations need to be made?
    • How will software be removed and licenses harvested and reported to Software Asset Manager?
    • How will data be securely wiped and protected?

    The image shows a work process in flowchart format titled Equipment Recovery. The chart is divided into two sections, listed on the left: Business Manager/HR and Desktop Support Team.

    Define the process for safely disposing of assets that cannot be redeployed

    Asset Disposal Checklist

    1. Review the data stored on the device.
    2. Determine if there has been any sensitive or confidential information stored.
    3. Remove all sensitive/confidential information.
    4. Determine if software licenses are transferable.
    5. Remove any non- transferable software prior to reassignment.
    6. Update the department’s inventory record to indicate new individual assigned custody.
    7. In the event of a transfer to another department, remove data and licensed software.
    8. If sensitive data has been stored, physically destroy the storage device.
    • Define the process for retiring and disposing of equipment that has reached replacement age or no longer meets minimum conditions or standards.
    • Clearly define the steps that need to be taken both before and after the involvement of an ITAD partner.

    The image shows a flowchart titled Equipment Disposal. It is divided into two sections, labelled on the left as: Desktop Support Team and Asset Manager.

    Design hardware asset recovery and disposal workflows

    3.2.2 Design hardware asset recovery and disposal policies and workflows

    Participants

    • Infrastructure Director/Manager
    • Asset Manager
    • Service Desk Manager
    • Operations (optional)

    Document

    Document in the Standard Operating Procedures, Sections 11 and 12

    Document each step in the recovery and disposal process in two separate workflows using notecards or on a whiteboard. Identify the challenges faced by your organization and strategize potential solutions.

    1. Keeping in mind current challenges around hardware asset recovery and disposal, design the target state for both the asset recovery and disposal processes.
    2. Outline each step of the process and be as granular as possible.
    3. When you are satisfied that each step is accurately captured, use a second color of notecard to document any challenges, inefficiencies, or pains associated with each step. Consider further documenting the time on each task.
    4. Examine each challenge or pain point. Discuss whether or not there is a clear solution to the problem. If so, document the solution and amend the workflow. If not, engage in a broader discussion of possible solutions, taking into account people, processes, and available technology.
    5. Review the checklists on the previous slides to ensure all critical tasks are accounted for in your process workflows.

    Add equipment disposition to asset lifecycle decisions to meet environmental regulations and mitigate risk

    Although traditionally an afterthought in asset management, IT asset disposition (ITAD) needs to be front and center. Increase focus on data security and concern surrounding environmental sustainability and develop an awareness of the cost efficiencies possible through best-practices disposition.

    Optimized ITAD solutions:

    1. Protect sensitive or valuable data
    2. Support sustainability
    3. Focus on asset value recovery

    Info-Tech Insight

    A well-thought-out asset management program mitigates risk and is typically less costly than dealing with a large-scale data loss incident or an inappropriate disposal suit. Also, it protects your company’s reputation – which is difficult to put a price on.

    Partner with an ITAD vendor to support your disposition strategy

    Maximizing returns on assets requires knowledge and skills in asset valuation, upgrading to optimize market return, supply chain management, and packaging and shipping. It’s unlikely that the return will be adequate to justify that level of investment, so partnering with a full-service ITAD vendor is a no-brainer.

    • An ITAD vendor knows the repurpose and resale space better than your organization. They know the industry and have access to more potential buyers.
    • ITAD vendors can help your organization navigate costly environmental regulations for improper disposal of IT assets.

    Disposal doesn’t mean your equipment has to go to waste.

    Additionally, your ITAD vendor can assist with a large donation of hardware to a charitable organization or a school.

    Donating equipment to schools or non-profits may provide charitable receipts that can be used as taxable benefits.

    Before donating:

    • Ensure equipment is needed and useful to the organization.
    • Be prepared for an appraisal requirement. Receipts can only be issued for fair market value.
    • Prevent compromised data by thoroughly wiping or completely replacing drives.
    • Ensure official transfer of ownership to prevent liability if improper disposal practices follow.

    Info-Tech Insight

    Government assistance grants may be available to help keep your organization’s hardware up to date, thereby providing incentives to upgrade equipment while older equipment still has a useful life.

    Protect the organization by sufficiently researching potential ITAD partners

    Research ITAD vendors as diligently as you would primary hardware vendors.

    Failure to thoroughly investigate a vendor could result in a massive data breach, fines for disposal standards violations, or a poor resale price for your disposed assets. Evaluate vendors using questions such as the following:

    • Are you a full-service vendor or are you connected to a wholesaler?
    • Who are your collectors and processors?
    • How do you handle data wiping? If you erase the data, how many passes do you perform?
    • What do you do with the e-waste? How much is reused? How much is recycled?
    • Do you have errors and omissions insurance in case data is compromised?
    • How much will it cost to recycle or dispose of worthless equipment?
    • How much will I receive for assets that still have useful life?

    ITAD vendors that focus on recycling will bundle assets to ship to an e-waste plant – leaving money on the table.

    ITAD vendors with a focus on reuse will individually package salable assets for resale – which will yield top dollars.

    Info-Tech Insight

    To judge the success of a HAM overhaul, you need to establish a baseline with which to compare final results. Be sure to take HAM “snapshots” before ITAD partnering so it’s easy to illustrate the savings later.

    Work with ITAD partner or equipment supplier to determine most cost-effective method and appropriate time for disposal

    2-4 Two-to-four year hardware refresh cycle

    • Consider selling equipment to an ITAD partner who specializes in sales of refurbished equipment.
    • Consider donating equipment to schools or non-profits, possibly using an ITAD partner who specializes in refurbishing equipment and managing the donation process.

    5-7 Five-to-seven year hardware refresh cycle

    • At this stage equipment may still have a viable life, but would not be appropriate for school or non-profit donations, due to a potentially shorter lifespan. Consider selling equipment to an ITAD partner who has customers interested in older, refurbished equipment.

    7+ Seven or more years hardware refresh cycle

    • If keeping computers until they reach end of life, harvest parts for replacement on existing machines and budget for disposal fees.
    • Ask new computer supplier about disposal services or seek out ITAD partner who will disassemble and dispose of equipment in an environmentally responsible manner.

    Info-Tech Insight

    • In all cases, ensure hard drives are cleansed of data with no option for data recovery. Many ITAD partners will provide a drive erasure at DoD levels as part of their disposal service.
    • Many ITAD partners will provide analysts to help determine the most advantageous time to refresh.

    Ensure data security and compliance by engaging in reliable data wiping before disposition

    Failure to properly dispose of data can not only result in costly data breaches, but also fines and other regulatory repercussions. Choosing an ITAD vendor or a vendor that specializes in data erasure is crucial. Depending on your needs, there are a variety of data wiping methods available.

    Certified data erasure is the only method that leaves the asset’s hard drive intact for resale or donation. Three swipes is the bare minimum, but seven is recommended for more sensitive data (and required by the US Department of Defense). Data erasure applications may be destructive or non-destructive – both methods overwrite data to make it irretrievable.

    Physical destruction must be done thoroughly, and rigorous testing must be done to verify data irretrievability. Methods such as hand drilling are proven to be unreliable.

    Degaussing uses high-powered magnets to erase hard drives and makes them unusable. This is the most expensive option; degaussing devices can be purchased or rented.

    Info-Tech Best Practice

    Data wiping can be done onsite or can be contracted to an ITAD partner. Using an ITAD partner can ensure greater security at a more affordable price.

    Make data security a primary driver of asset disposition practices

    It is estimated that 10-15% of data loss cases result from insecure asset disposal. Protect yourself by following some simple disposition rules.

    1. Reconcile your data onsite
    • Verify that bills of landing and inventory records match before assets leave. Otherwise, you must take the receiver’s word on shipment contents.
  • Wipe data at least once onsite
    • Do at least one in-house data wipe before the assets leave the site for greater data security.
  • Transport promptly after data wiping
    • Prompt shipment will minimize involvement with the assets, and therefore, cost. Also, the chance of missing assets will drop dramatically.
  • Avoid third-party transport services
    • Reputable ITAD companies maintain strict chain of custody control over assets. Using a third party introduces unnecessary risk.
  • Keep detailed disposition records
    • Records will protect you in the event of an audit, a data loss incident, or an environmental degradation claim. They could save you millions.
  • Wipe all data-carrying items
    • Don’t forget cell phones, fax machines, USB drives, scanners, and printers – they can carry sensitive information that can put the organization at risk.
  • Only partner with insured ITAD vendors
    • You are never completely out of danger with regards to liability, but partnering with an insured vendor is potent risk mitigation.
  • Work these rules into your disposition policy to mitigate data loss risk.

    Support your HAM efforts with a comprehensive disposition policy

    3.2.3 Build a Hardware Asset Disposition Policy

    Implementation of a HAM program is a waste of time if you aren’t going to maintain it. Maintenance requires the implementation of detailed policies, training, and an ongoing commitment to proper management.

    Use Info-Tech’s Hardware Asset Disposition Policy to:

    1. Establish and define clear standards, procedures, and restrictions surrounding disposition.
    2. Ensure continual compliance with applicable data security and environmental legislation.
    3. Assign specific responsibilities to individuals or groups to ensure ongoing adherence to policy standards and that costs or benefits are in line with expectations.

    Phase 3 Guided Implementation

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3: Maintain & Dispose

    Proposed Time to Completion: 4 weeks

    Start with an analyst kick-off call:

    • Discuss inventory management best practices.
    • Build process for moves, adds, and changes.
    • Build process for hardware maintenance.
    • Define policies for maintaining asset security.

    Then complete these activities…

    • Build a MAC policy and request form.
    • Build workflows to document user MAC processes.
    • Design processes and policies for hardware maintenance, warranty, and support documentation handling.
    • Build an asset security policy.

    With these tools & templates:

    • Standard Operating Procedures
    • Asset Security Policy

    Step 3.2: Dispose or Redeploy Assets

    Review findings with analyst:

    • Discuss when to dispose vs. redeploy assets.
    • Build process for redeploying vs. disposing of assets.
    • Review ITAD vendors.

    Then complete these activities…

    • Identify challenges with IT asset recovery and disposal.
    • Design hardware asset recovery and disposal workflows.
    • Build a hardware asset disposition policy.

    With these tools & templates:

    • Standard Operating Procedures
    • Asset Recovery Workflow
    • Asset Disposal Workflow
    • Hardware Asset Disposition Policy

    Phase 3 Insight: Not all assets are created equal. Taking a blanket approach to asset maintenance and security is time consuming and costly. Focus on the high-cost, high-use, and data-sensitive assets first.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.1.4 Revise or create an asset security policy

    Discuss asset security challenges within the organization; brainstorm reasons the challenges exist and process changes to address them. Document a new asset security policy.

    3.2.2 Design hardware asset recovery and disposal workflows

    Document each step in the hardware asset recovery and disposal process, including all decision points. Examine challenges and amend the workflow to address them.

    Phase 4

    Plan Budget Process and Build Roadmap

    Implement Hardware Asset Management

    Cisco deployed an enterprise-wide re-education program to implement asset management

    CASE STUDY

    Industry Networking

    Source Cisco IT

    Challenge

    Even though Cisco Systems had designed a comprehensive asset management program, implementing it across the enterprise was another story.

    An effective solution, complete with a process that could be adopted by everyone within the organization, would require extensive internal promotion of cost savings, efficiencies, and other benefits to the enterprise and end users.

    Cisco’s asset management problem was as much a cultural challenge as it was a process challenge.

    Solution

    The ITAM team at Cisco began discussions with departments that had been tracking and managing their own assets.

    These sessions were used as an educational tool, but also as opportunities to gather internal best practices to deploy across the enterprise.

    Eventually, Cisco introduced weekly meetings with global representation to encourage company-wide communication and collaboration.

    Results

    By establishing a process for managing PC assets, we have cut our hardware costs in half.” – Mark Edmonson, Manager – IT Services Expenses

    Cisco reports that although change was difficult to adopt, end-user satisfaction has never been higher. The centralized asset management approach has resulted in better contract negotiations through better data access.

    A reduced number of hardware and software platforms has streamlined tracking and support, and will only drive down costs as time goes on.

    Step 4.1: Plan Hardware Asset Budget

    Phase 4: Plan Budget & Build Roadmap

    4.1 Plan Budget

    4.2 Communicate & Build Roadmap

    This step will walk you through the following activities:

    4.1 Use Info-Tech’s HAM Budgeting Tool to plan your hardware asset budget

    This step involves the following participants:

    • IT Director
    • Asset Manager
    • Finance Department

    Step Outcomes

    • Know where to find data to budget for hardware needs accurately
    • Learn how to manage a hardware budget
    • Plan hardware asset budget with a budgeting tool

    Gain control of the budget to increase the success of HAM

    A sophisticated hardware asset management program will be able to uncover hidden costs, identify targets for downsizing, save money through redistributing equipment, and improve forecasting of equipment to help control IT spending.

    While some asset managers may not have experience managing budgets, there are several advantages to ITAM owning the hardware budget:

    • Be more involved in negotiating pricing with suppliers.
    • Build better relationships with stakeholders across the business.
    • Forecast requirements more accurately.
    • Inform benchmarks for hardware performance.
    • Gain more responsibility and have a greater influence on purchasing decisions.
    • Directly impact the reduction in IT spend.
    • Manage the asset database more easily and have a greater understanding of hardware needs.
    • Build a continuous rolling refresh.

    Use ITAM data to forecast hardware needs accurately and realistically

    Your IT budget should be realistic, accounting for business needs, routine maintenance, hardware replacement costs, unexpected equipment failures, and associated support and warranty costs. Know where to find the data you need and who to work with to forecast hardware needs as accurately as possible.

    What type of data should I take into account?

    Plan for:

    • New hardware purchases required
      • Planned refreshes based on equipment lifecycle
      • Inventory for break and fix
      • Standard equipment for new hires
      • Non-standard equipment required
      • Hardware for planned projects
      • Implementation and setup costs
      • Routine hardware implementation
      • Large hardware implementation for projects
      • Support and warranty costs

    Take into account:

    • Standard refresh cycle for each hardware asset
    • Amount of inventory to keep on hand
    • Length of time from procurement to inventory
    • Current equipment costs and equipment price increases
    • Equipment depreciation rates and resale profits

    Where do I find the information I need to budget accurately?

    • Work with HR to forecast equipment needs for new hires.
    • Work with the Infrastructure Manager to forecast devices and equipment needed for approved and planned projects.
    • Use the asset management database to forecast hardware refresh and replacement needs based on age and lifecycle.
    • Work with business stakeholders to ensure all new equipment needs are accounted for in the budget.

    Use Info-Tech’s HAM Budgeting Tool to plan your hardware asset budget

    4.1.1 Build HAM budget

    This tool is designed to assist in developing and justifying the budget for hardware assets for the upcoming year. The tool will allow you to budget for projects requiring hardware asset purchases as well as equipment requiring refresh and to adjust the budget as needed to accommodate both projects and refreshes. Follow the instructions on each tab to complete the tool.

    The hardware budget should serve as a planning and communications tool for the organization

    The most successful relationships have a common vocabulary. Thus, it is important to translate “tech speak” into everyday language and business goals and initiatives as you plan your budget.

    One of the biggest barriers that infrastructure and operations team face with regards to equipment budgeting is the lack of understanding of IT infrastructure and how it impacts the rest of the organization. The biggest challenge is to help the rest of the organization overcome this barrier.

    There are several things you can do to overcome this barrier:

    • Avoid using technical terms or jargon. Terms many would consider common knowledge, such as “WLAN,” are foreign to many.
    • Don’t assume the business knows how the technology you’re referring to will impact their day-to-day work. You will need to demonstrate it to them.
    • Help the audience understand the business impact of not implementing each initiative. What does this mean for them?
    • Discuss the options on the table in terms of the business value that the hardware can enable. Review how deferring refresh projects can impact user-facing applications, systems, and business unit operations.
    • Present options. If you can’t implement everything on the project list, present what you can do at different levels of funding.

    Info-Tech Insight

    Err on the side of inviting more discussion. Your budgeting process relies on business decision makers and receiving actionable feedback requires an ongoing exchange of information.

    Help users understand the importance of regular infrastructure refreshes

    Getting business users to support regular investments in maintenance relies on understanding and trust. Present the facts in plain language. Provide options, and clearly state the impact of each option.

    Example: Your storage environment is nearing capacity.

    Don’t:

    Explain the project exclusively in technical terms or slang.

    We’re exploring deduping technology as well as cheap solid state, SATA, and tape storage to address capacity.”

    Do:

    • Explain impact in terms that the business can understand.

    Deduplication technology can reduce our storage needs by up to 50%, allowing us to defer a new storage purchase.”

    • Be ready to present project alternatives and impacts.

    Without implementing deduplication technology, we will need to purchase additional storage by the end of the year at an estimated cost of $25,000.”

    • Connect the project to business initiatives and strategic priorities.

    This is a cost-effective technique to increase storage capacity to manage annual average data growth at around 20% per year.

    Step 4.2: Build Communication Plan and Roadmap

    Phase 4: Plan Budget & Build Roadmap

    4.1 Plan Budget

    4.2 Communicate & Build Roadmap

    This step will walk you through the following activities:

    4.2 Develop a HAM implementation roadmap

    This step involves the following participants:

    • CIO
    • IT Director
    • Asset Manager
    • Service Desk Manager

    Step Outcomes

    • Documented end-user hardware asset management policies
    • Communications plan to achieve support from end users and other business units
    • HAM implementation roadmap

    Educate end users through ITAM training to increase program success

    As part of your communication plan and overall HAM implementation, training should be provided to end users within the organization.

    All facets of the business, from management to new hires, should be provided with ITAM training to help them understand their role in the project’s success.

    ITAM solutions are complex by nature with both business process and technical knowledge required to use them correctly. Keep the message appropriate to the audience – end users don’t need to know the complete process, but will need to know policy and how to request.

    Management may have priorities that appear to clash with new processes. Engage management by making them aware of the benefits and importance of ITAM. Include the benefits and consequences of not implementing ITAM in your education approach. Encourage them to support efforts by reinforcing your messages to end users.

    New hires should have ITAM training bundled into their onboarding process. Fresh minds are easier to train and the ITAM program will be seen as an organizational standard, not merely a change.

    Policy documents can help summarize end users’ obligations and clarify processes. Consider an IT Resources Acceptable UsePolicy.

    "The lowest user is the most important user in your asset management program. New employees are your most important resource. The life cycle of the assets will go much smoother if new employees are brought on board." – Tyrell Hall, ITAM Program Coordinator

    Info-Tech Insight

    During training, you should present the material through the lens of “what’s in it for me?” Otherwise, you risk alienating end users through implementing organizational change viewed as low value.

    Include policy design and enforcement in your communication plan

    • Hardware asset management policies should define the actions to be taken to protect and preserve technology assets from failure, loss, destruction, theft, or damage.
    • Implementing asset management policies enforces the notion that the organization takes its IT assets and the management of them seriously, and will help ensure the benefits of ITAM are achieved.
    • Designing, approving, documenting, and adopting one set of standard ITAM policies for each department to follow will ensure the processes are enforced equally across the organization.
    • Good ITAM policies answer the “what, how, and why” of IT asset management, provide the means for ITAM governance, and provide a basis for strategy and decision making.

    Info-Tech Insight

    Use policy templates to jumpstart your policy development and ensure policies are comprehensive, but be sure to modify and adapt policies to suit your corporate culture or they will not gain buy-in from employees. For a policy to be successful, it must be a living document and have participation and involvement from the committees and departments to whom it will pertain.

    Use Info-Tech’s policy templates to build HAM policies

    4.2.1 Build HAM policies

    Use these HAM policy templates to get started:

    Information Technology Standards Policy

    This policy establishes standards and guidelines for a company’s information technology environment to ensure the confidentiality, integrity, and availability of company computing resources.

    Desktop Move/Add/Change Policy

    This desktop move/add/change policy is put in place for users to request to change their desktop computing environments. This policy applies configuration changes within a company.

    Purchasing Policy

    The purchasing policy helps to establish company standards, guidelines, and procedures for the purchase of all information technology hardware, software, and computer-related components as well as the purchase of all technical services.

    Hardware Asset Disposition Policy

    This policy assists in creating guidelines around disposition in the last stage of the asset lifecycle.

    Additional policy templates

    Info-Tech Insight

    Use policy templates to jumpstart your policy development and ensure policies are comprehensive, but modify and adapt them to suit your corporate culture or they will not gain buy-in from employees. For a policy to be successful, it must be a living document and have participation from the committees and departments to whom it will pertain.

    Create a communication plan to achieve end-user support and adherence to policies

    Communication is crucial to the integration and overall implementation of your ITAM program. An effective communication plan will:

    • Gain support from management at the project proposal phase.
    • Create end-user buy-in once the program is set to launch.
    • Maintain the presence of the program throughout the business.
    • Instill ownership throughout the business from top-level management to new hires.

    Use the variety of components as part of your communication plan in order to reach the organization.

    1. Advertise successes.
    • Regularly demonstrate the value of the ITAM program with descriptive statistics focused on key financial benefits.
    • Share data with the appropriate personnel; promote success to obtain further support from senior management.
  • Report and share asset data.
    • Sharing detailed asset-related reports frequently gives decision makers useful data to aid in their strategy.
    • These reports can help your organization prepare for audits, adjust asset budgeting, and detect unauthorized assets.
  • Communicate the value of ITAM.
    • Educate management and end users about how they fit into the bigger picture.
    • Individuals need to know that their behaviors can adversely affect data quality and, ultimately, lead to better decision making.
  • Develop a communication plan to convey the right messages

    4.2.2 Develop a communication plan to convey the right messages

    Participants

    • CIO
    • IT Director
    • Asset Manager
    • Service Desk Manager

    Document

    Document in the HAM Communication Plan

    1. Identify the groups that will be affected by the HAM program as those who will require communication.
    2. For each group requiring a communication plan, identify the following:
    • Benefits of HAM for that group of individuals (e.g. better data, security).
    • The impact the change will have on them (e.g. change in the way a certain process will work).
    • Communication method (i.e. how you will communicate).
    • Timeframe (i.e. when and how often you will communicate the changes).
  • Complete this information in a table like the one below and document in the Communication Plan.
  • Group Benefits Impact Method Timeline
    Service Desk Improve end-user device support Follow new processes Email campaign 3 months
    Executives Mitigate risks, better security, more data for reporting Review and sign off on policies
    End Users Smoother request process Adhere to device security and use policies
    Infrastructure Faster access to data and one source of truth Modified processes for centralized procurement and inventory

    Implement ITAM in a phased, constructive approach

    • One of the most difficult decisions to make when implementing ITAM is: “where do we start?”
    • The pyramid to the right mirrors Maslow’s hierarchy of needs. The base is the absolute bare minimum that should be in place, and each level builds upon the previous one.
    • As you track up the pyramid, your ITAM program will become more and more mature.

    Now that your asset lifecycle environment has been constructed in full, it’s time to study it. Gather data about your assets and use the results to create reports and new solutions to continually improve the business.

    • Asset Data
    • Asset Protection: safely protect and dispose of assets once they are mass distributed throughout your organization.
    • Asset Distribution: determine standards for asset provisioning and asset inventory strategy.
    • Asset Gathering: define what assets you will procure, distribute, and track. Classifying your assets by tier will allow you to make decisions as you progress up the pyramid.

    ↑ ITAM Program Maturity

    Integrate your HAM program into the organization to assist its implementation

    The HAM program cannot perform on its own – it must be integrated with other functional areas of the organization in order to maintain its stability and support.

    • Effective IT asset management is supported by a comprehensive set of processes as part of its implementation.
    • For example, integration with the purchasing/procurement team is required to gather hardware and software purchase data to control asset costs and mitigate software license compliance risk.
    • Integration with Finance is required to support internal cost allocations and charge backs.

    To integrate your ITAM program into your organization effectively, a clear implementation roadmap needs to be designed. Prioritize “quick wins” in order to demonstrate success to the business early and gain buy-in from your team. Long-term goals should be designed that will be supported by the outcomes of the short-term gains of your ITAM program.

    Short-term goal Long-term goal
    Identify inventory classification and tool (hardware first) Hardware contract data integration (warranty, maintenance, lease)
    Create basic ITAM policies and processes Continual improvement through policy impact review and revision
    Implement ITAM auto-discovery tools Software compliance reports, internal audits

    Info-Tech Insight

    Installing an ITAM tool does not mean you have an effective asset management program. A complete solution needs to be built around your tool, but the strength of ITAM comes from processes embedded in the organization that are shaped and supported by your ITAM data.

    Develop an IT hardware asset management implementation roadmap

    4.2.3 Develop a HAM implementation roadmap

    Participants

    • CIO
    • IT Director
    • Asset Manager
    • Service Desk Manager

    Document

    Document in the IT Hardware Asset Management Implementation Roadmap

    1. Identify up to five streams to work on initiatives for the hardware asset management project.
    2. Fill out key tasks and objectives for each process. Assign responsibility for each task.
    3. Select a start date and end date for each task. See tab 1 of the tool for instructions on which letters to input for each stage of the process.
    4. Once your list is complete, open tab 3 of the tool to see your completed sunshine diagram.
    5. Keep this diagram visible for your team and use it as a guide to task completion as you work towards your future-state value stream.

    Focus on continual improvement to sustain your ITAM program

    Periodically review the ITAM program in order to achieve defined goals, objectives, and benefits.

    Act → Plan → Do → Check

    Once ITAM is in place in your organization, a focus on continual improvement creates the following benefits:

    • Remain in sync with the business: your asset management program reflects the current and desired future states of your organization at the time of its creation. But the needs of the business change. As mentioned previously, asset management is a dynamic process, so in order for your program to keep pace, a focus on continual improvement is needed.
      • For example, imagine if your organization had designed your ITAM program before cloud-based solutions were an option. What if your asset classification scheme did not include personal devices or tablets or your asset security policy lacked a section on BYOD?
    • Create funding for new projects through ITAM continual improvement: one of the goals is to save money through more efficient use of your assets by “sweating” out underused hardware and software.
      • It may be tempting to simply present the results to Finance as savings, but instead, describe the results as “available funds for other projects.” Otherwise, Finance may view the savings as a nod to restrict IT’s budget and allocate funds elsewhere. Make it clear that any saved funds are still required, albeit in a different capacity.

    Info-Tech Best Practice

    Look for new uses for ITAM data. Ask management what their goals are for the next 12-18 months. Analyze the data you are gathering and determine how your ITAM data can assist with achieving these goals.

    Phase 4 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Step 4.1: Plan Budget

    Start with an analyst kick-off call:

    • Know where to find data to budget for hardware needs accurately.
    • Learn how to manage a hardware budget.

    Then complete these activities…

    • Plan hardware asset budget.

    With these tools & templates:

    HAM Budgeting Tool

    Step 4.2: Communicate & Roadmap

    Review findings with analyst:

    • Develop policies for end users.
    • Build communications plan.
    • Build an implementation roadmap.

    Then complete these activities…

    • Build HAM policies.
    • Develop a communication plan.
    • Develop a HAM implementation roadmap.

    With these tools & templates:

    HAM policy templates

    HAM Communication Plan

    HAM Implementation Roadmap

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    4.1.1 Build a hardware asset budget

    Review upcoming hardware refresh needs and projects requiring hardware purchases. Use this data to forecast and budget equipment for the upcoming year.

    4.2.2 Develop a communication plan

    Identify groups that will be affected by the new HAM program and for each group, document a communications plan.

    Insight breakdown

    Overarching Insights

    HAM is more than just tracking inventory. A mature asset management program provides data for proactive planning and decision making to reduce operating costs and mitigate risk.

    ITAM is not just IT. IT leaders need to collaborate with Finance, Procurement, Security, and other business units to make informed decisions and create value across the enterprise.

    Treat HAM like a process, not a project. HAM is a dynamic process that must react and adapt to the needs of the business.

    Phase 1 Insight

    For asset management to succeed, it needs to support the business. Engage business leaders to determine needs and build your HAM program around these goals.

    Phase 2 Insight

    Bridge the gap between IT and Finance to build a smoother request and procurement process through communication and routine reporting. If you’re unable to affect procurement processes to reduce time to deliver, consider bringing inventory onsite or having your hardware vendor keep stock, ready to ship on demand.

    Phase 3 Insight

    Not all assets are created equal. Taking a blanket approach to asset maintenance and security is time consuming and costly. Focus on the high-cost, high-use, and data-sensitive assets first.

    Phase 4 Insight

    Deploying a fancy ITAM tool will not make hardware asset management implementation easier. Implementation is a project that requires you focus on people and process first – the technology comes after.

    Related Info-Tech research

    Implement Software Asset Management

    Build an End-User Computing Strategy

    Find the Value – and Remain Valuable – With Cloud Asset Management

    Consolidate IT Asset Management

    Harness Configuration Management Superpowers

    IT Asset Management Market Overview

    Bibliography

    Chalkley, Martin. “Should ITAM Own Budget?” The ITAM Review. 19 May 2011. Web.

    “CHAMP: Certified Hardware Asset Management Professional Manual.” International Association of Information Technology Asset Managers, Inc. 2008. Web.

    Foxen, David. “The Importance of Effective HAM (Hardware Asset Management).” The ITAM Review. 19 Feb. 2015. Web.

    Foxen, David. “Quick Guide to Hardware Asset Tagging.” The ITAM Review. 5 Sep. 2014. Web.

    Galecki, Daniel. “ITAM Lifecycle and Savings Opportunities – Mapping out the Journey.” International Association of IT Asset Managers, Inc. 16 Nov. 2014. Web.

    “How Cisco IT Reduced Costs Through PC Asset Management.” Cisco IT Case Study. 2007. Web.

    Irwin, Sherry. “ITAM Metrics.” The ITAM Review. 14 Dec. 2009. Web.

    “IT Asset and Software Management.” ECP Media LLC, 2006. Web.

    Rains, Jenny. “IT Hardware Asset Management.” HDI Research Brief. May 2015. Web.

    Riley, Nathan. “IT Asset Management and Tagging Hardware: Best Practices.” Samanage Blog. 5 March 2015. Web.

    “The IAITAM Practitioner Survey Results for 2016 – Lean Toward Ongoing Value.” International Association of IT Asset Managers, Inc. 24 May 2016. Web.

    Take Advantage of Big Tech Layoffs

    • Buy Link or Shortcode: {j2store}573|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Attract & Select
    • Parent Category Link: /attract-and-select

    Tech layoffs have been making the news over the past year, with thousands of Big Tech employees having been laid off. After years of record low unemployment in IT, many leaders are looking to take advantage of these layoffs to fill their talent gaps.

    However, IT leaders need to determine their response – wait and see the impact of the recession on budgets and candidate expectations, or dive in and secure great talent to execute today on strategic needs. This research is designed to help those IT leaders who are looking to take advantage employee effective talents to secure talent.

    • With the impact of the economic slowdown still unknown, the first question IT leaders need to ask is whether now is the time to act.
    • Even with these layoffs, IT unemployment rates are at record lows, with many organizations continuing to struggle to attract talent. While these layoffs have opened a window, IT leaders need to act quickly to secure great talent.

    Our Advice

    Critical Insight

    The “where has the talent gone?” puzzle has been solved. Many tech firms over-hired and were able to outcompete everyone, but it wasn’t sustainable. This correction won’t impact unemployment numbers in the short term – the job force is just in flux right now.

    Impact and Result

    This research is designed to help IT leaders understand the talent market and to provide winning tactics to those looking to take advantage of the layoffs to fill their hiring needs.

    Take Advantage of Big Tech Layoffs Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Take Advantage of Big Tech Layoffs Storyboard – A snapshot of the current talent market in IT and quick tactics IT leaders can employ to improve their hiring process to find and attract tech talent.

    Straightforward tactics you can execute to successfully recruit IT staff impacted by layoffs.

    • Take Advantage of Big Tech Layoffs Storyboard

    2. IT Talent Acquisition Optimization Tool – Use this tool to document the current and future talent acquisition process.

    To hire efficiently, create a clear, consistent talent acquisition process. The IT Talent Acquisition Process Optimization Tool will help to:

  • Map out the current talent acquisition workflow
  • Identify areas of opportunity and potential gaps in the current process
    • IT Talent Acquisition Optimization Tool
    [infographic]

    Further reading

    Take Advantage of Big Tech Layoffs

    Simple tactics to secure the right talent in times of economic uncertainty.

    Why are the layoffs making the news?

    After three years of record low unemployment rates in IT and organizations struggling to hire IT talent into their organization, the window appears to be opening with tens of thousands layoffs from Big Tech employers.

    Big brand organizations such as Microsoft, Alphabet, Amazon, Twitter, Netflix, and Meta have been hitting major newswires, but these layoffs aren't exclusive to the big names. We've also seen smaller high-growth tech organizations following suit. In fact, in 2022, it's estimated that there were more than 160,997 layoffs across over 1,045 tech organizations. This trend has continued into 2023. By mid-February 2023, there were already 108,754 employees laid off at 385 tech companies (Layoffs.fyi).(1)

    While some of these layoffs have been openly connected to economic slowdown, others are pointing to the layoffs being a correction for over-hiring during the pandemic. It is also important to note that many of these workers were not IT employees, as these organizations also saw cuts across other areas of the business such as sales, marketing, recruitment, and operations.

    (1)This global database is constantly being updated, and these numbers are changing on an ongoing basis. For up-to-date statistics, see https://layoffs.fyi

    While tech layoffs have been making the news, so far many of these layoffs have been a correction to over-hiring, with most employees laid off finding work, if they want it, within three months.

    IT leaders need to determine their response – wait and see the impact of the recession on budgets and candidate expectations or dive in and secure great talent to execute today on strategic needs.

    This research is designed to help IT leaders understand the talent market and provide winning strategies to those looking to take advantage of the layoffs to fill their hiring needs.

    Three key drivers for Big Tech layoffs

    Economic uncertainty

    Globally, economists are predicting an economic slowdown, though there is not a consistent prediction on the impact. We have seen an increase in interest rates and inflation, as well as reduced investment budgets.

    Over-hiring during the pandemic

    High growth and demand for digital technologies and services during the early pandemic led to over-hiring in the tech industry. Many organizations overestimated the future demand and had to rebalance staffing as a result.

    New automation investments

    Many tech organizations that have conducted layoffs are still in a growth mindset. This is demonstrated though new tech investments by these companies in products like chatbots and RPA to semi-automate processes to reduce the need for certain roles.

    Despite layoffs, the labor market remains competitive

    There were at least 160,997 layoffs from more than 1,045 tech companies last year (2022). (Layoffs.fyi reported as of Feb 21/2023)

    But just because Big Tech is laying people off doesn't mean the IT job market has cooled.

    Between January and October 2022 technology- focused job postings rose 25% compared to the same period in 2021, and there were more than 375,000 tech jobs posted in October of 2022.
    (Dice: Tech Jobs Report.)

    Info-Tech Insight

    The "where has the talent gone?" puzzle has been solved. Many tech firms over-hired and were able to outcompete everyone, but it wasn't sustainable. This correction won't impact unemployment numbers in the short term – the job force is just in flux right now.

    So far, many of the layoffs have been a market correction

    Tech Layoffs Since COVID-19

    This is an image of a combo line graph plotting the number of tech layoffs from Q1 2020 to Q4 2022.

    Source: Layoffs.fyi - Tech Layoff Tracker and Startup Layoff Lists

    Tech Companies Layoffs vs. Early Pandemic Hiring # of People

    This is an image of a bar graph plotting Tech Companies Layoffs vs. Early Pandemic Hiring # of People

    Source: Yahoo Finance. Q4 '19 to Q3 '22

    Tech Layoffs between 2020 Q3- 2022 Q1 remained very low across the sector. In fact, outside of the initial increase at the start of the pandemic, layoffs have remained at historic low levels of around 1% (HBR, 2023). While the layoffs look significant in isolation, when you compare these numbers to pandemic hiring and growth for these organizations, the figures are relatively small.

    The first question IT leaders need to ask is whether now is the time to act

    The big gamble many CIOs face is whether to strike now to secure talent or to wait to better understand the impact of the recession. While two-thirds of IT professionals are still expecting their budgets to increase in 2023, CIOs must account for the impact of inflation and the recession on their IT budgets and staffing decisions (see Info-Tech's CEO-CIO Alignment Program).

    Ultimately, while unemployment is low today, it's common to see unemployment numbers drop right before a recession. If that is the case, then we will see more talent entering the market, possibly at more competitive salaries. But organizations that wait to hire risk not having the staff they need to execute on their strategy and finding themselves in a hiring freeze. CIOs need to decide on how to approach the economic uncertainty and where to place their bets.

    Looking ahead to 2023, how do you anticipate your IT spending will change compared to spending in 2022?

    This is an image of anticipated changes to IT spending compared to 2022 for the following categories: Decrease of more than 30%; Decrease between 16-30%; Decrease between 6-15%; Decrease between 1-5%; No Change; Increase between 1-5%; Increase between 6-15%; Increase between 16-30%; Increase of more than 30%

    Info-Tech's CEO-CIO Alignment Program

    Organizations ready to take advantage will need to act fast when layoffs happen

    Organizations looking to fill hiring needs or grow their IT/digital organization will need to be strategic and efficient when it comes to recruitment. Regardless of the number of layoffs, it continues to be an employee market when it comes to IT roles.

    While it is likely that the recession will impact unemployment rates, so far, the market remains hot, and the number of open roles continues to grow. This means that organizations that want to take advantage need to act quickly when news hits.

    Leaders not only need to compete with other organizations for talent, but the other challenge hiring organizations will need to compete with is that many in tech received generous severance packages and will be considering taking time off. To take advantage, leaders need to establish a plan and a clear employee value proposition to entice these highly skilled workers to get off the bench.

    Why you need to act fast:

    • Unemployment rates remain low:
      • Tech unemployment's rates in the US dropped to 1.5% in January 2023 (CompTIA), compared to overall unemployment which is at 3.4% in the US as of January 2023 (Yahoo Finance). While the layoffs look significant, we can see that many workers have been rehired into the labor market.
    • Long time-to-hire results in lost candidates:
      • According to Info-Tech's IT Talent Trend Report, 58% of IT leaders report time-to-hire is longer than two months. This timing increases for tech roles which require unique skills or higher seniority. IT leaders who can increase the timeline for their requirement process are much more likely to be able to take advantage of tech layoffs.

    IT must take a leading role in IT recruitment to take advantage of layoffs

    A personal connection is the differentiator when it comes to talent acquisition

    There is a statistically significant relationship between IT leadership involvement in talent acquisition and the effectiveness of this process in the IT department. The more involved they are, the higher the effectiveness.(1)

    More IT leadership involvement

    An image of two upward facing arrows. The left arrow is faded purple, and the right arrow is dark purple.

    Higher recruitment effectiveness

    Involved leaders see shorter times to hire

    There is a statistically significant relationship between IT leadership involvement in the talent acquisition process and time to fill vacant positions. The more involved they are, the shorter the time to hire.(2)

    Involved leaders are an integral part of effective IT departments

    There is a statistically significant relationship between IT leadership involvement in talent acquisition and overall IT department effectiveness. Those that are more involved have higher levels of effectiveness.(3)

    Increased IT Leadership in Recruitment Is Directly Correlated to Recruitment Effectiveness.

    This is an image of a combo bar graph plotting Overall Effectiveness for IT leadership involvement in recruitment.

    Focus your layoff recruitment strategy on critical and strategic roles

    If you are ready to take advantage of tech layoffs, focus hiring on critical and strategic roles, rather than your operational backfills. Roles related to security, cloud migration, data and analytics, and digital transformation are more likely to be shielded from budget cuts and are logical areas to focus on when looking to recruit from Big Tech organizations.

    Additionally, within the IT talent market, scarcity is focused in areas with specialized skill sets, such as security and architecture, which are dynamic and evolving faster than other skill sets. When looking to recruit in these areas, it's critical that you have a targeted recruitment approach; this is why tech layoffs represent a strong opportunity to secure talent in these specialized areas.

    ROLES DIFFICULT TO FILL

    An image of a bar graph plotting roles by difficulty to fill.

    Info-Tech Talent Trends 2022 Survey

    Four quick tactics to take advantage of Big Tech layoffs

    TALENT ACQUISITION PROCESS TO TAKE ADVANTAGE OF LAYOFFS

    This is an image of the talent acquisition process to take advantage of layoffs. It involves the following four steps: 1 Prepare organization and job ads for recruitment.  2 Actively track and scan for layoff activity.  3 Prioritize and screen candidates using salary benchmarks and keywords.  4 Eliminate all unnecessary hiring process steps.

    Guided Implementation

    What does a typical GI on this topic look like?

    Step 1 Step 2 Step 3 Step 4

    Call #1: Scope requirements, objectives, and your specific challenges.

    Call #2: IT job ad review.

    Call #4: Identify screening and sourcing opportunities.

    Call #5: Review your IT talent acquisition process.

    Call #3: Employee value proposition review.

    Call #7: Refine your talent acquisition process.

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is 8 to 12 calls over the course of 4 to 6 months.

    Tactics to take advantage of tech layoffs

    Activities

    1.1 Spot check your employee value proposition
    1.2 Update job advertisements
    1.3 Document your talent acquisition process
    1.4 Refine your talent acquisition process

    This step involves the following participants:

    • IT executive leadership
    • IT hiring manager
    • Human resources
    • Marketing/public relations

    Outcomes of this step

    Streamlined talent acquisition process tailored to take advantage of tech layoffs.

    This is an image of the talent acquisition process to take advantage of layoffs. It involves the following fo steps: 1 Prepare organization and job ads for recrtment.  2 Actively track and scan for layoff aivity.  3 Prioritize and screen candidates using salary benchmarks and kwords.  4 Eliminate all unnecessary hiring process steps.

    Requisition: update job ads and secure approval to hire

    Critical steps:

    1. Ensure you have secured budget and hiring approval.
    2. Identify an IT recruitment partner within the IT organization who will be accountable for working with HR throughout the process and who will actively track and scan for recruitment opportunities.
    3. Update your IT job descriptions.
    4. Spot check your employee value proposition (EVP) to appeal to targeted candidates (Exercise 1.1).
    5. Write employee job ads for relevant skills and minimum viable experience (Exercise 1.2).
    6. Work with HR to develop your candidate outreach messages – ensure that your outreach is empathetic, aligns with your EVP, and focuses on welcoming them to apply to a role.

    The approval process to activate a requisition can be one of the longest stages in the talent acquisition process. Ensure all your roles are up to date and approved so you can trigger outreach as soon as news hits; otherwise, you'll be late before you've even begun.

    Your employee value proposition (EVP) is a key tool for attracting and retaining talent

    Any updates to your EVP need to be a genuine reflection of the employee experience at your organization – and should resonate internally and externally.

    Internal (retention) perspective: These characteristics help to retain new and existing talent by ensuring that new hires' expectations are met and that the EVP is experienced throughout the organization.

    External (attraction) perspective: These characteristics help to attract talent and are targeted so the right candidates are motivated to join, while those who aren't a good fit will self-select out.

    McLean & Company's Employee Value Proposition Framework

    This is an image of McLean & Company's Employee Value Proposition Framework.  It is divided into Retain and Attract.  under Retain, are the following three headings: Aligned; Accurate; Aspirational.  Under Attract are: Compelling; Clear; Comprehensive.

    Source: McLean & Company

    1.1 Spot check your EVP

    1-3 hours

    1. Review your existing IT employee value proposition. If you do not have an EVP, see Info-Tech's comprehensive research Improve the IT Recruitment Process to draft a new EVP.
    2. Invite a representative group of employees to participate in a working group to improve your employee value proposition. Ask each participant to brainstorm the top five things they value most about working at the organization.
    3. Consider the following categories: work environment, career advancement, benefits, and ESG and diversity impact. Brainstorm as a group if there is anything unique your organization offers with regard to these categories.
    4. Compare your notes to your existing EVP, identify up to four key statements to focus on for the EVP, ensuring that your EVP speaks to at least one of the categories above. Remove any statements that no longer speak to who you are as an organization or what you offer.

    Input

    • Existing employee value proposition
    • Employee Engagement Surveys (If Available)

    Output

    • Updated employee value proposition

    Materials

    • Whiteboard/flip charts
    • Job ad template

    Participants

    • Representative group of internal employees.
    • HR
    • Marketing/PR (if possible)

    Four critical factors considered by today's job seeker

    1. Be specific about remote work policies: Include verbiage about whether there is an option to work hybrid or remote. 81% of job seekers stated that whether a job is remote, hybrid, or in-person was a top factor in whether they'd accept an offer (Benefits Canada, 2022).
    2. Career advancement and stability: "37% of Gen Z employees and 25% of millennial employees are currently looking for a job that offers career progression transparency — or, in other words, a job with clear opportunities for growth. This is significantly higher than our findings for older generations Gen X (18%) and baby boomers (7%)," (Lattice, 2021).
    3. Unique benefits: Consider your unique benefits – it's not the Big Tech "fun perks" like slides and ping pong that drive interest. Employees are increasingly looking for roles with long-term benefits programs. 90% of job seekers consider higher pension contributions to be a key factor, and 85% are considering bonuses/profit sharing" (Benefits Canada, 2022). Candidates may accept lower total compensation in exchange for flexibility, culture, work/life balance that was lacking in the start-up scene or the mega-vendors' fast-paced world.
    4. ESG and diversity impact: Include details of how the candidate will make a societal impact through their role, and how the company is acting on climate and sustainability. "Nearly two in five [Gen Z's and millennials] say they have rejected a job or assignment because it did not align with their values," (Deloitte Global, 2022).

    Update or establish job ads for candidate outreach

    Take the time up front to update your IT job descriptions and to write effective job advertisements. A job advertisement is an external-facing document that advertises a position with the intent of attracting job applicants. It contains key elements from the job description as well as information on the organization and its EVP. A job description informs a job ad, it doesn't replace it.
    When updating job descriptions and job ads, it's critical that your requirements are an accurate representation of what you need in the position. For the job ads especially, focus on the minimum requirements for the role, highlight your employee value proposition, and ensure that they are using inclusive language.
    Don't be lulled into using a job description as a posting when there's a time crunch to fill a position – use your preparation time to complete this key step.

    Three tips to consider when building a job ad

    Include the minimum desired requirements

    Include the required skills, responsibilities, and certifications required. Instead of looking for a unicorn, look for what you need and a demonstrated ability to learn. 70% of business executives say they are getting creative about sourcing for skills rather than just considering job experience (Deloitte Insights, 2022).

    Strategically include certifications

    When including certifications, ensure you have validated the process to be certified – i.e. if you are hiring for a role with 3-5 years' experience, ensure that the certification does not take 5-10 years of experience be eligible.

    Use inclusive language

    Consider having a review group within your IT organization to ensure the language is inclusive, that the responsibilities don't read as overly complex, and that it is an accurate representation of the organization's culture.

    1.2 Update or build job ads

    1-3 hours

    1. Begin with a copy of the job ad you are looking to fill, if you haven't begun to draft the role, start with Info-Tech's Job Description Library and Info-Tech's Job Ad Template.
    2. Review the job accountabilities, rank each responsibility based on its importance and volume of work. Determine if there are any responsibilities that are uncommon to be executed by the role and remove unnecessary responsibilities.
    3. For each of the job accountabilities, identify if there is a level of experience, knowledge or competency that would be the minimum bar for a candidate. Remove technical skills, specific technologies, and competencies that aren't directly relevant to the role, responsibilities or values.
    4. Review the education and requirements, and ensure that any certification or educational background is truly needed or suggested.
    5. Use the checklist on the following tab to review and update your job ad.

    Input

    • Job description
    • Employee value proposition
    • Job ad template

    Output

    • Completed job ad

    Materials

    • Whiteboard/flip charts
    • Web share

    Participants

    • Representative group of internal employees.
    • HR
    • Marketing/PR (if possible)

    1.2 Job ad checklist:

    A job ad needs to be two things: effective and inclusive.

    Effective

    The job ad does include:

    The organization's logo.
    Description of the organization.
    Information about benefits.
    A link to the organization's website and social media platforms.
    Steps in the application process and what candidates can expect.

    The job ad:

    Paints an accurate picture of key aspects of the role.
    Tells a story to show potential candidates how the role and organization will fit into their career path (outlines potential career paths, growth opportunities, training, etc.).
    Does not contain too many details and tasks that would overwhelm applicants.
    Highlights the employer brand in a manner that conveys the EVP and markets the organization to attract potential applicants.
    Includes creative design or formatting to make the ad stand out.
    The job ad speaks to the audience by using targeted language (e.g. using creative language when recruiting for a creative role).
    The job ad has been reviewed by HR, Marketing, PR.

    Inclusive

    The job ad does NOT include:

    Industry jargon or abbreviations that are not spelled out.
    Personality characteristics and unnecessary adjectives that would deter qualified candidates (e.g. extroverted, aggressive, competitive).
    A list of specific academic disciplines or schools, GPA requirements, or inflated degree requirements.

    The job ad:

    Uses gender-neutral language and does not contain terms that indicate traits that are typically associated with a specific gender.
    Can be viewed and applications can be completed on mobile devices.
    Focuses on results, day-to-day requirements, competencies, and transferrable skills.
    Includes design that is accessible (e.g. alternative text is provided for images, clear posting structure with headings, color is not used to convey information).

    Sourcing: Set up news trackers and review layoff source lists

    • Set up news and social media trackers to track layoff updates, and ensure you have an IT staff member on standby to complete a more detailed opportunity analysis when layoffs happen.
    • Use layoff source lists such as Layoffs.fyi to actively track organizations that have laid people off, noting the industry, location, and numbers in order to identify potential candidates. Limit your future analysis to locations that would be geographically possible to hire from.
    • Review open-source lists of laid-off employees to quickly identify potential candidates for your organization.
    • Many organizations that have completed layoffs have established outplacement programs to help laid-off staff find new roles. Set a plan in motion with HR to reach out to organizations once a layoff has occurred to understand their layoff support program.

    The key to successful sourcing is for IT to take an active role in identifying which organizations impacted by layoffs would be a good fit, and to quickly respond by searching open-source lists and LinkedIn to reach out potential candidates.

    Consider leveraging open-source lists

    Layoffs.fyi has been tracking and reporting on layoffs since the start of COVID-19. While they are not an official source of information, the site has more than a million views per month and is a strong starting point for IT leaders looking to source candidates from tech layoffs beyond the big organizations that are making the news.

    The site offers a view of companies with layoffs by location, industry, and the source of the info. Additionally, it often lists the names and contact information of laid-off employees, which you can leverage to start your deeper LinkedIn outreach or candidate screening.

    This is an image of two screenshots of open source lists from Layoffs.fyi

    Screenshots from Layoffs.fyi.

    Screening: Prioritize by considering salary benchmarks and keywords

    • Determine a set of consistent pre-screening questions to leverage while screening candidates, which every candidate must answer, including knockout questions.
    • Prioritize by going for salary ranges you can afford: It is important to be aware of what companies are paying within the tech arena, so you know if your salary bands are within a competitive range.
    • Pre-screen resumes using appropriate keywords that are critical for the role, and widen the terms if you do not have enough candidates. Given the pool you are looking to recruit from, consider removing criteria specifically related to education or certifications; instead, prioritize skills and on-the-job experience.

    Screening is one of the most time-consuming stages of the TA process. For each open position, it can take 23 hours to screen resumes (Toolbox, 2021). In fact, 52% of TA leaders believe that screening candidates from a large pool of applicants is the hardest part of recruitment (Ideal, 2021).

    Compensation comparison reports

    Keep in mind that the market may be shifting rapidly as layoffs proliferate, so what the data shows, particularly on free-to-use sites with little data-checking, may not be current and may be overstated. Info-Tech does not provide salary analysis; however, there are publicly available reports and online websites with self-reported data.

    This list contains several market data sources for the tech industry, which may be a good starting point for comparison. Info-Tech is not affiliated with or endorsing any of these market data sources.

    Aon Global Cyber Security Compensation and Talent Survey
    Aon – Radford Surveys Radford Global Technology Survey
    Culpepper Comprehensive Compensation Survey Solution for Technology-Focused Companies
    Modis 2022 IT Compensation Guide
    Motion Recruitment 2023 Tech Salary Guide
    Mondo 2022 Salary Guide for roles & jobs across the technology, creative & digital marketing industries.
    Willis Towers Watson Willis Towers Watson Data Services - Artificial Intelligence and Digital Talent
    Willis Towers Watson 2022 Artificial Intelligence and Digital Talent Survey Report - Canada
    Willis Towers Watson 2022 Artificial Intelligence and Digital Talent Survey Report - U.S.
    Michael Page Salary Guide 2022 for the Greater Toronto Area Technology Industry
    Willis Towers Watson Willis Towers Watson Data Services - Tech, Media, and Gaming
    Willis Towers Watson 2022 Tech, Media and Gaming Executive Survey Report - Canada
    Willis Towers Watson 2022 Tech, Media and Gaming Middle Management, Professional and Support Survey Report - Canada
    Willis Towers Watson 2022 Tech, Media and Gaming Executive Survey Report - U.S.
    Willis Towers Watson 2022 Tech, Media and Gaming Middle Management, Professional and Support Survey Report - U.S.

    Work with your HR partner to streamline your talent acquisition process

    A slow talent acquisition process presents multiple risks to your ability to recruit. Candidates are likely having multiple hiring conversations, and you could lose a good candidate just by being slower than another organization. Additionally, long hiring processes are also an indicator of a high level of bureaucracy in an organization, which may turn off tech candidates who are used to faster-paced decision making.

    Reducing your time-to-hire needs to be a strategic priority, and companies that manage to do this are reaping the benefits: There is a statistically significant relationship between time to fill vacant positions and overall IT department effectiveness. The shorter the time to fill a position, the higher the effectiveness (Bika, 2019).

    Key Considerations for Optimizing your Talent Acquisition Process

    Key Considerations for Optimizing your Talent Acquisition Process

    Review the end-to-end experience

    50%

    of job seekers surveyed had "declined a job offer due to poor [candidate] experience," (Echevarria, 2020).

    Reduce the time to hire

    55%

    "of candidates believe that it should take one to two weeks from the first interview to being offered the job," (Duszyński, 2021).

    Be clear on Timelines

    83%

    "of candidates say it would greatly improve the overall experience if employers provided a clear timeline of the hiring process," (Miller, n.d.).

    Time to hire: Identify solutions to drive efficient hiring

    1. Document all steps between screening and hiring and remove any unnecessary steps.
    2. Create clearly defined interview guides to ensure consistent questioning by interviewers.
    3. Enable hiring managers to schedule their own interviews.
    4. Determine who needs to approve an offer. Streamline the number of approvals, if possible.
    5. Eliminate unnecessary background checks. Many companies have eliminated reference checks, for example, after determining that it was it was not adding value to their decision.
    6. Identify and track key metrics across your talent acquisition process.

    It is critical to partner with your HR department on optimizing this process, as they are typically the process owners and will have deep knowledge of the rationale for decisions. Together, you can identify some opportunities to streamline the process and improve the time to hire.

    4.1 Document your TA process

    1-3 hours

    1. If you have a documented talent acquisition process, begin with that; if not, open the IT Talent Acquisition Process Optimization Tool and map the stages of the talent acquisition process with your HR leader. Stages are the top level in the process (e.g. requisition, sourcing, screening).
    2. Identify all the stakeholders involved in IT talent acquisition and document these in the tool.
    3. Next, identify the steps required for each stage. These are more detailed actions that together will complete the stage (e.g. enter requisition into ATS, intake meeting). Ask subject matter experts to add steps to their portion of the process and document these in the cells.
    4. For each step in the stage, record the time required and the number of people who are involved.

    Input

    • Existing talent acquisition (TA) process document
    • Any TA process metrics
    • Info-Tech's Talent Acquisition Process Optimization Tool

    Output

    • Documented TA process

    Materials

    • Info-Tech's Talent Acquisition Process Optimization Tool
    • Whiteboard/flip charts
    • Sticky notes

    Participants

    • HR
    • IT leaders
    • Hiring manager

    Download the IT Talent Acquisition Process Optimization Tool

    Example of steps in each stage of the TA process

    Activities

    Requisition

    Source

    Screen

    Interview & Assess

    Offer

    Background Check

    Vacancy identified Posted on website Resumes screened in system Interviews scheduled Offer letter drafted Reference checks conducted
    Requisition submitted Posted on job boards Resume screened by recruited First round interviews Offer letter sent Medical checks conducted
    Requisition approved Identification of layoff sources Resumed reviewed by hiring manager Assessment Negotiations Other background checks conducted
    Job description updated Review layoff source lists Screening calls Second round interview First date confirmed
    Job ad updated Screening questions developed Candidates selected
    Intake meeting

    4.2 Refine your TA process

    1-3 hours

    1. Collectively identify any:
      1. Inconsistent applications: Activities that are done differently by different participants.
      2. Bottlenecks: A place in the process where activity is constrained and holds up next steps.
      3. Errors: When a mistake occurs requiring extra time, resources, or rework.
      4. Lack of value: An activity that adds little to no value (often a legacy activity).
    2. Work with HR to identify any proposed solutions to improve consistency, reduce bottlenecks, errors, or eliminate steps that lack value. Document your proposed solutions in tab 3 of the IT Talent Acquisition Optimization Tool.
    3. Identify any new steps needed that would drive greater efficiency, including the tactics suggested in this research. Document any proposed solutions in tab 3.
    4. For each proposed solution, evaluate the general level of effort and impact required to move forward with that solution and select the appropriate classification from the drop-down.
    5. Determine if you will move forward with the proposed solution at this time. Update the TA workflow with your decisions.

    Input

    • Existing talent acquisition (TA) process document
    • Any TA process metrics
    • Info-Tech's Talent Acquisition Process Optimization Tool

    Output

    • Documented TA process

    Materials

    • Info-Tech's Talent Acquisition Process Optimization Tool
    • Whiteboard/flip charts
    • Sticky notes

    Participants

    • HR
    • IT leaders
    • Hiring manager

    Use Info-Tech's IT Talent Acquisition Optimization Tool to document current challenges & target solutions.

    Map your process and identify opportunities to streamline

    This is an image of the talent aquisitions workflow page from Info-Tech's Map your process and identify opportunities to streamline

    Brainstorm and select solutions to improve your process

    This is an image of the Effort Analysis page from Info-Tech's Brainstorm and select solutions to improve your process

    Key considerations when optimizing your process

    • Put yourself in each stakeholder's shoes (candidate, HR, hiring manager). Think through what they need from the process.
    • Challenge assumptions and norms. It can be tempting to get caught up in "how we do it today." Think beyond how it is today.
    • Question timing of activities and events. Identify if they are occurring when they need to.
    • Rebalance work to align with priorities. Identify if work can be redistributed or condensed to use time more efficiently.
    • Distinguish when consistency will add value and when there should be process flexibility.
    • Question the value. For each activity, ask "What value does this activity add?"

    Select metrics to measure Talent Acquisition process improvement

    METRICS INFORMATION
    Metric Definition Calculation
    Average applicants per posting The average number of applicants received per post. Number of applications / Number of postings
    Average number of interviews for open job positions Average number of interviews for open job positions. Total number of interviews / Total number of open job positions
    Average external time to fill Average number of calendar days from when the requisition is issued to when a candidate accepts the position from outside the organization. External days to fill / External candidates
    Pipeline throughput Percentage of candidates advancing through to the next stage. (Number of candidates in chosen stage / Number of candidates in preceding stage) * 100
    External offer acceptance rate Percentage of job offers extended to external candidates that were accepted. (Number of job offers that are accepted / Number of job offers extended) * 100
    Percentage of target group hired The percentage of a target group that was hired. Number of FTE hired / Target number of FTE to be hired
    Average time to hire Average number of calendar days between first contact with the candidate and when they accept the offer. Sum of number of days between first contact and offer acceptance / External candidates
    Quality of hire Percentage of new hires achieving a satisfactory appraisal at their first assessment. New hires who achieve a satisfactory rating at their first appraisal / Total number of new hires
    Vacancy rate Percentage of positions being actively recruited for at the end of the reporting period. Count of vacant positions / (Headcount + Vacant positions)

    Bibliography

    "81% of Employees Factoring Hybrid Work Into Job Search: Survey." BenefitsCanada.com, 16 June 2022.
    Andre, Louie. "40 Notable Candidate Experience Statistics: 2023 Job Application Trends & Challenges." Financesonline.Com, 15 Mar. 2023.
    Bika, Nikoletta. "Key Hiring Metrics: Useful Benchmarks for Tech Roles." Recruiting Resources: How to Recruit and Hire Better, 10 Jan. 2019.
    "Bureau of Labor Statistics Labor Market Revisions Contribute to Conflicting Signals in Latest Tech Employment Data, CompTIA Analysis Finds." CompTIA, 3 Feb. 2023. Press release.
    Byrnes, Amy. "ICIMS Insights Workforce Report: Time to Press the Reset Button?" ICIMS | The Leading Cloud Recruiting Software, 1 Dec. 2022.
    Cantrell, Sue, et al. "The Skills-Based Organization: A New Operating Model for Work and the Workforce." Deloitte Insights, 8 Sept. 2022.
    deBara, Deanna. "Top Findings from Lattice's Career Progression Survey." Lattice, 13 Sept. 2021. Accessed 16 Feb. 2023.
    Duszyński, Maciej. "Candidate Experience Statistics (Survey of 1,000+ Americans)." Zety, 14 Oct. 2019.
    Duszyński, Maciej. "Candidate Experience Statistics." Zety, 2021.
    Echevarria, Desiree. "2020 Candidate Experience Report." Career Plug, 17 Mar. 2021.
    Ghosh, Prarthana. "Candidate Screening and Selection Process: The Complete Guide for 2021." Spiceworks, 26 Feb. 2021. Accessed 22 Jun. 2021
    "Introduction - Dice Tech Job Report: Tech Hiring Trends by Location, Industry, Role and Skill." Accessed 16 Feb. 2023.
    Lee, Roger. "Tech Layoff Tracker and Startup Layoff Lists." Layoffs.fyi. Accessed 16 Feb. 2023.
    Miller, Kandace. "Candidate Experience And Engagement Metrics You Should Be Tracking." ConveyIQ, n.d. Accessed 16 Feb. 2023.
    Min, Ji-A. "Resume Screening: A How-To Guide for Recruiters." Ideal, 15 Mar. 2021. Web.
    Palmeri, Shelby. "2023 Candidate Experience Research: Strategies for Recruiting." CareerPlug, 6 Feb. 2023.
    Semenova, Alexandra. "Jobs Report: U.S. Economy Adds 517,000 Jobs in January, Unemployment Rate Falls to 3.4% as Labor Market Stuns." Yahoo!Finance, 3 Feb. 2023.
    Sozzi, Brian. "Big Tech Layoffs: What Companies Such as Amazon and Meta Have in Common." Yahoo!News, 6 Feb. 2023.
    Tarki, Atta. "Despite Layoffs, It's Still a Workers' Labor Market." Harvard Business Review, 30 Jan. 2023.
    The Deloitte Global 2022 Gen Z and Millennial Survey. Deloitte Global, 2022. Accessed 16 Feb. 2023.
    "Uncover the Employee Value Proposition." McLean & Company, 21 Jun. 2022. Accessed 22 Feb. 2023.

    Develop an Availability and Capacity Management Plan

    • Buy Link or Shortcode: {j2store}500|cart{/j2store}
    • member rating overall impact: 8.0/10 Overall Impact
    • member rating average dollars saved: $2,840 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: Availability & Capacity Management
    • Parent Category Link: /availability-and-capacity-management
    • It is crucial for capacity managers to provide capacity in advance of need to maximize availability.
    • In an effort to ensure maximum uptime, organizations are overprovisioning (an average of 59% for compute, and 48% for storage). With budget pressure mounting (especially on the capital side), the cost of this approach can’t be ignored.
    • Half of organizations have experienced capacity-related downtime, and almost 60% wait more than three months for additional capacity.

    Our Advice

    Critical Insight

    • All too often capacity management is left as an afterthought. The best capacity managers bake capacity management into their organization’s business processes, becoming drivers of value.
    • Communication is key. Build bridges between your organization’s silos, and involve business stakeholders in a dialog about capacity requirements.

    Impact and Result

    • Map business metrics to infrastructure component usage, and use your organization’s own data to forecast demand.
    • Project future needs in line with your hardware lifecycle. Never suffer availability issues as a result of a lack of capacity again.
    • Establish infrastructure as a driver of business value, not a “black hole” cost center.

    Develop an Availability and Capacity Management Plan Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should build a capacity management plan, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    • Develop an Availability and Capacity Management Plan – Phases 1-4

    1. Conduct a business impact analysis

    Determine the most critical business services to ensure availability.

    • Develop an Availability and Capacity Management Plan – Phase 1: Conduct a Business Impact Analysis
    • Business Impact Analysis Tool

    2. Establish visibility into core systems

    Craft a monitoring strategy to gather usage data.

    • Develop an Availability and Capacity Management Plan – Phase 2: Establish Visibility into Core Systems
    • Capacity Snapshot Tool

    3. Solicit and incorporate business needs

    Integrate business stakeholders into the capacity management process.

    • Develop an Availability and Capacity Management Plan – Phase 3: Solicit and Incorporate Business Needs
    • Capacity Plan Template

    4. Identify and mitigate risks

    Identify and mitigate risks to your capacity and availability.

    • Develop an Availability and Capacity Management Plan – Phase 4: Identify and Mitigate Risks

    [infographic]

    Workshop: Develop an Availability and Capacity Management Plan

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Conduct a Business Impact Analysis

    The Purpose

    Determine the most important IT services for the business.

    Key Benefits Achieved

    Understand which services to prioritize for ensuring availability.

    Activities

    1.1 Create a scale to measure different levels of impact.

    1.2 Evaluate each service by its potential impact.

    1.3 Assign a criticality rating based on the costs of downtime.

    Outputs

    RTOs/RPOs

    List of gold systems

    Criticality matrix

    2 Establish Visibility Into Core Systems

    The Purpose

    Monitor and measure usage metrics of key systems.

    Key Benefits Achieved

    Capture and correlate data on business activity with infrastructure capacity usage.

    Activities

    2.1 Define your monitoring strategy.

    2.2 Implement your monitoring tool/aggregator.

    Outputs

    RACI chart

    Capacity/availability monitoring strategy

    3 Develop a Plan to Project Future Needs

    The Purpose

    Determine how to project future capacity usage needs for your organization.

    Key Benefits Achieved

    Data-based, systematic projection of future capacity usage needs.

    Activities

    3.1 Analyze historical usage trends.

    3.2 Interface with the business to determine needs.

    3.3 Develop a plan to combine these two sources of truth.

    Outputs

    Plan for soliciting future needs

    Future needs

    4 Identify and Mitigate Risks

    The Purpose

    Identify potential risks to capacity and availability.

    Develop strategies to ameliorate potential risks.

    Key Benefits Achieved

    Proactive approach to capacity that addresses potential risks before they impact availability.

    Activities

    4.1 Identify capacity and availability risks.

    4.2 Determine strategies to address risks.

    4.3 Populate and review completed capacity plan.

    Outputs

    List of risks

    List of strategies to address risks

    Completed capacity plan

    Further reading

    Develop an Availability and Capacity Management Plan

    Manage capacity to increase uptime and reduce costs.

    ANALYST PERSPECTIVE

    The cloud changes the capacity manager’s job, but it doesn’t eliminate it.

    "Nobody doubts the cloud’s transformative power. But will its ascent render “capacity manager” an archaic term to be carved into the walls of datacenters everywhere for future archaeologists to puzzle over? No. While it is true that the cloud has fundamentally changed how capacity managers do their jobs , the process is more important than ever. Managing capacity – and, by extent, availability – means minimizing costs while maximizing uptime. The cloud era is the era of unlimited capacity – and of infinite potential costs. If you put the infinity symbol on a purchase order… well, it’s probably not a good idea. Manage demand. Manage your capacity. Manage your availability. And, most importantly, keep your stakeholders happy. You won’t regret it."

    Jeremy Roberts,

    Consulting Analyst, Infrastructure Practice

    Info-Tech Research Group

    Availability and capacity management transcend IT

    This Research Is Designed For:

    ✓ CIOs who want to increase uptime and reduce costs

    ✓ Infrastructure managers who want to deliver increased value to the business

    ✓ Enterprise architects who want to ensure stability of core IT services

    ✓ Dedicated capacity managers

    This Research Will Help You:

    ✓ Develop a list of core services

    ✓ Establish visibility into your system

    ✓ Solicit business needs

    ✓ Project future demand

    ✓ Set SLAs

    ✓ Increase uptime

    ✓ Optimize spend

    This Research Will Also Assist:

    ✓ Project managers

    ✓ Service desk staff

    This Research Will Help Them:

    ✓ Plan IT projects

    ✓ Better manage availability incidents caused by lack of capacity

    Executive summary

    Situation

    • IT infrastructure leaders are responsible for ensuring that the business has access to the technology needed to keep the organization humming along. This requires managing capacity and availability.
    • Dependencies go undocumented. Services are provided on an ad hoc basis, and capacity/availability are managed reactively.

    Complication

    • Organizations are overprovisioning an average of 59% for compute, and 48% for storage. This is expensive. With budget pressure mounting, the cost of this approach can’t be ignored.
    • Lead time to respond to demand is long. Half of organizations have experienced capacity-related downtime, and almost 60% wait 3+ months for additional capacity. (451 Research, 3)

    Resolution

    • Conduct a business impact analysis to determine which of your services are most critical, and require active capacity management that will reap more in benefits than it produces in costs.
    • Establish visibility into your system. You can’t track what you can’t see, and you can’t see when you don’t have proper monitoring tools in place.
    • Develop an understanding of business needs. Use a combination of historical trend analyses and consultation with line of business and project managers to separate wants from needs. Overprovisioning used to be necessary, but is no longer required.
    • Project future needs in line with your hardware lifecycle. Never suffer availability issues as a result of a lack of capacity again.

    Info-Tech Insight

    1. Components are critical. The business doesn’t care about components. You, however, are not so lucky…
    2. Ask what the business is working on, not what they need. If you ask them what they need, they’ll tell you – and it won’t be cheap. Find out what they’re going to do, and use your expertise to service those needs.
    3. Cloud shmoud. The role of the capacity manager is changing with the cloud, but capacity management is as important as ever.

    Save money and drive efficiency with an effective availability and capacity management plan

    Overprovisioning happens because of the old style of infrastructure provisioning (hardware refresh cycles) and because capacity managers don’t know how much they need (either as a result of inaccurate or nonexistent information).

    According to 451 Research, 59% of enterprises have had to wait 3+ months for new capacity. It is little wonder, then, that so many opt to overprovision. Capacity management is about ensuring that IT services are available, and with lead times like that, overprovisioning can be more attractive than the alternative. Fortunately there is hope. An effective availability and capacity management plan can help you:

    • Identify your gold systems
    • Establish visibility into them
    • Project your future capacity needs

    Balancing overprovisioning and spending is the capacity manager’s struggle.

    Availability and capacity management go together like boots and feet

    Availability and capacity are not the same, but they are related and can be effectively managed together as part of a single process.

    If an IT department is unable to meet demand due to insufficient capacity, users will experience downtime or a degradation in service. To be clear, capacity is not the only factor in availability – reliability, serviceability, etc. are significant as well. But no organization can effectively manage availability without paying sufficient attention to capacity.

    "Availability Management is concerned with the design, implementation, measurement and management of IT services to ensure that the stated business requirements for availability are consistently met."

    – OGC, Best Practice for Service Delivery, 12

    "Capacity management aims to balance supply and demand [of IT storage and computing services] cost-effectively…"

    – OGC, Business Perspective, 90

    Integrate the three levels of capacity management

    Successful capacity management involves a holistic approach that incorporates all three levels.

    Business The highest level of capacity management, business capacity management, involves predicting changes in the business’ needs and developing requirements in order to make it possible for IT to adapt to those needs. Influx of new clients from a failed competitor.
    Service Service capacity management focuses on ensuring that IT services are monitored to determine if they are meeting pre-determined SLAs. The data gathered here can be used for incident and problem management. Increased website traffic.
    Component Component capacity management involves tracking the functionality of specific components (servers, hard drives, etc.), and effectively tracking their utilization and performance, and making predictions about future concerns. Insufficient web server compute.

    The C-suite cares about business capacity as part of the organization’s strategic planning. Service leads care about their assigned services. IT infrastructure is concerned with components, but not for their own sake. Components mean services that are ultimately designed to facilitate business.

    A healthcare organization practiced poor capacity management and suffered availability issues as a result

    CASE STUDY

    Industry: Healthcare

    Source: Interview

    New functionalities require new infrastructure

    There was a project to implement an elastic search feature. This had to correlate all the organization’s member data from an Oracle data source and their own data warehouse, and pool them all into an elastic search index so that it could be used by the provider portal search function. In estimating the amount of space needed, the infrastructure team assumed that all the data would be shared in a single place. They didn’t account for the architecture of elastic search in which indexes are shared across multiple nodes and shards are often split up separately.

    Beware underestimating demand and hardware sourcing lead times

    As a result, they vastly underestimated the amount of space that was needed and ended up short by a terabyte. The infrastructure team frantically sourced more hardware, but the rush hardware order arrived physically damaged and had to be returned to the vendor.

    Sufficient budget won’t ensure success without capacity planning

    The project’s budget had been more than sufficient to pay for the extra necessary capacity, but because a lack of understanding of the infrastructure impact resulted in improper forecasting, the project ended up stuck in a standstill.

    Manage availability and keep your stakeholders happy

    If you run out of capacity, you will inevitably encounter availability issues like downtime and performance degradation . End users do not like downtime, and neither do their managers.

    There are three variables that are monitored, measured, and analyzed as part of availability management more generally (Valentic).

      1. Uptime:

    The availability of a system is the percentage of time the system is “up,” (and not degraded) which can be calculated using the following formula: uptime/(uptime + downtime) x 100%. The more components there are in a system, the lower the availability, as a rule.

      1. Reliability:

    The length of time a component/service can go before there is an outage that brings it down, typically measured in hours.

      1. Maintainability:

    The amount of time it takes for a component/service to be restored in the event of an outage, also typically measured in hours.

    Enter the cloud: changes in the capacity manager role

    There can be no doubt – the rise of the public cloud has fundamentally changed the nature of capacity management.

    Features of the public cloudImplications for capacity management
    Instant, or near-instant, instantiation Lead times drop; capacity management is less about ensuring equipment arrives on time.
    Pay-as-you go services Capacity no longer needs to be purchased in bulk. Pay only for what you use and shut down instances that are no longer necessary.
    Essentially unlimited scalability Potential capacity is infinite, but so are potential costs.
    Offsite hosting Redundancy, but at the price of the increasing importance of your internet connection.

    Vendors will sell you the cloud as a solution to your capacity/availability problems

    The image contains two graphs. The first graph on the left is titled: Reactive Management, and shows the struggling relationship between capacity and demand. The second graph on the right is titled: Cloud future (ideal), which demonstrates a manageable relationship between capacity and demand over time.

    Traditionally, increases in capacity have come in bursts as a reaction to availability issues. This model inevitably results in overprovisioning, driving up costs. Access to the cloud changes the equation. On-demand capacity means that, ideally, nobody should pay for unused capacity.

    Reality check: even in the cloud era, capacity management is necessary

    You will likely find vendors to nurture the growth of a gap between your expectations and reality. That can be damaging.

    The cloud reality does not look like the cloud ideal. Even with the ostensibly elastic cloud, vendors like the consistency that longer-term contracts offer. Enter reserved instances: in exchange for lower hourly rates, vendors offer the option to pay a fee for a reserved instance. Usage beyond the reserved will be billed at a higher hourly rate. In order to determine where that line should be drawn, you should engage in detailed capacity planning. Unfortunately, even when done right, this process will result in some overprovisioning, though it does provide convenience from an accounting perspective. The key is to use spot instances where demand is exceptional and bounded. Example: A university registration server that experiences exceptional demand at the start of term but at no other time.

    The image contains an example of cloud reality not matching with the cloud ideal in the form of a graph. The graph is split horizontally, the top half is red, and there is a dotted line splitting it from the lower half. The line is labelled: Reserved instance ceiling. In the bottom half, it is the colour green and has a curving line.

    Use best practices to optimize your cloud resources

    The image contains two graphs. The graph on the left is labelled: Ineffective reserve capacity. At the top of the graph is a dotted line labelled: Reserved Instance ceiling. The graph is measuring capacity requirements over time. There is a curved line on the graph that suddenly spikes and comes back down. The spike is labelled unused capacity. The graph on the right is labelled: Effective reserve capacity. The reserved instance ceiling is about halfway down this graph, and it is comparing capacity requirements over time. This graph has a curved line on it, also has a spike and is labelled: spot instance.

    Even in the era of elasticity, capacity planning is crucial. Spot instances – the spikes in the graph above – are more expensive, but if your capacity needs vary substantially, reserving instances for all of the space you need can cost even more money. Efficiently planning capacity will help you draw this line.

    Evaluate business impact; not all systems are created equal

    Limited resources are a reality. Detailed visibility into every single system is often not feasible and could be too much information.

    Simple and effective. Sometimes a simple display can convey all of the information necessary to manage critical systems. In cars it is important to know your speed, how much fuel is in the tank, and whether or not you need to change your oil/check your engine.

    Where to begin?! Specialized information is sometimes necessary, but it can be difficult to navigate.

    Take advantage of a business impact analysis to define and understand your critical services

    Ideally, downtime would be minimal. In reality, though, downtime is a part of IT life. It is important to have realistic expectations about its nature and likelihood.

    STEP 1

    STEP 2

    STEP 3

    STEP 4

    STEP 5

    Record applications and dependencies

    Utilize your asset management records and document the applications and systems that IT is responsible for managing and recovering during a disaster.

    Define impact scoring scale

    Ensure an objective analysis of application criticality by establishing a business impact scale that applies to all applications.

    Estimate impact of downtime

    Leverage the scoring criteria from the previous step and establish an estimated impact of downtime for each application.

    Identify desired RTO and RPO

    Define what the RTOs/RPOs should be based on the impact of a business interruption and the tolerance for downtime and data loss.

    Determine current RTO/RPO

    Conduct tabletop planning and create a flowchart of your current capabilities. Compare your current state to the desired state from the previous step.

    Info-Tech Insight

    According to end users, every system is critical and downtime is intolerable. Of course, once they see how much totally eliminating downtime can cost, they might change their tune. It is important to have this discussion to separate the critical from the less critical – but still important – services.

    Establish visibility into critical systems

    You may have seen “If you can’t measure it, you can’t manage it” or a variation thereof floating around the internet. This adage is consumable and makes sense…doesn’t it?

    "It is wrong to suppose that if you can’t measure it, you can’t manage it – a costly myth."

    – W. Edwards Deming, statistician and management consultant, author of The New Economics

    While it is true that total monitoring is not absolutely necessary for management, when it comes to availability and capacity – objectively quantifiable service characteristics – a monitoring strategy is unavoidable. Capturing fluctuations in demand, and adjusting for those fluctuations, is among the most important functions of a capacity manager, even if hovering over employees with a stopwatch is poor management.

    Solicit needs from line of business managers

    Unless you head the world’s most involved IT department (kudos if you do) you’re going to have to determine your needs from the business.

    Do

    Do not

    ✓ Develop a positive relationship with business leaders responsible for making decisions.

    ✓ Make yourself aware of ongoing and upcoming projects.

    ✓ Develop expertise in organization-specific technology.

    ✓ Make the business aware of your expenses through chargebacks or showbacks.

    ✓ Use your understanding of business projects to predict business needs; do not rely on business leaders’ technical requests alone.

    X Be reactive.

    X Accept capacity/availability demands uncritically.

    X Ask line of business managers for specific computing requirements unless they have the technical expertise to make informed judgments.

    X Treat IT as an opaque entity where requests go in and services come out (this can lead to irresponsible requests).

    Demand: manage or be managed

    You might think you can get away with uncritically accepting your users’ demands, but this is not best practice. If you provide it, they will use it.

    The company meeting

    “I don’t need this much RAM,” the application developer said, implausibly. Titters wafted above the assembled crowd as her IT colleagues muttered their surprise. Heads shook, eyes widened. In fact, as she sat pondering her utterance, the developer wasn’t so sure she believed it herself. Noticing her consternation, the infrastructure manager cut in and offered the RAM anyway, forestalling the inevitable crisis that occurs when seismic internal shifts rock fragile self-conceptions. Until next time, he thought.

    "Work expands as to fill the resources available for its completion…"

    – C. Northcote Parkinson, quoted in Klimek et al.

    Combine historical data with the needs you’ve solicited to holistically project your future needs

    Predicting the future is difficult, but when it comes to capacity management, foresight is necessary.

    Critical inputs

    In order to project your future needs, the following inputs are necessary.

    1. Usage trends: While it is true that past performance is no indication of future demand, trends are still a good way to validate requests from the business.
    2. Line of business requests: An understanding of the projects the business has in the pipes is important for projecting future demand.
    3. Institutional knowledge: Read between the lines. As experts on information technology, the IT department is well-equipped to translate needs into requirements.
    The image contains a graph that is labelled: Projected demand, and graphs demand over time. There is a curved line that passes through a vertical line labelled present. There is a box on top of the graph that contains the text: Note: confidence in demand estimates will very by service and by stakeholder.

    Follow best practice guidelines to maximize the efficiency of your availability and capacity management process

    The image contains Info-Tech's IT Management & Governance Framework. The framework displays many of Info-Tech's research to help optimize and improve core IT processes. The name of this blueprint is under the Infrastructure & Operations section, and has been circled to point out where it is in the framework.

    Understand how the key frameworks relate and interact

    The image contains a picture of the COBIT 5 logo.

    BA104: Manage availability and capacity

    • Current state assessment
    • Forecasting based on business requirements
    • Risk assessment of planning and implementation of requirements
    The image contains a picture of the ITIL logo

    Availability management

    • Determine business requirements
    • Match requirements to capabilities
    • Address any mismatch between requirements and capabilities in a cost-effective manner

    Capacity management

    • Monitoring services and components
    • Tuning for efficiency
    • Forecasting future requirements
    • Influencing demand
    • Producing a capacity plan
    The image contains a picture of Info-Tech Research Group logo.

    Availability and capacity management

    • Conduct a business impact analysis
    • Establish visibility into critical systems
    • Solicit and incorporate business needs
    • Identify and mitigate risks

    Disaster recovery and business continuity planning are forms of availability management

    The scope of this project is managing day-to-day availability, largely but not exclusively, in the context of capacity. For additional important information on availability, see the following Info-Tech projects.

      • Develop a Business Continuity Plan

    If your focus is on ensuring process continuity in the event of a disaster.

      • Establish a Program to Enable Effective Performance Monitoring

    If your focus is on flow mapping and transaction monitoring as part of a plan to engage APM vendors.

      • Create a Right-Sized Disaster Recovery Plan

    If your focus is on hardening your IT systems against major events.

    Info-Tech’s approach to availability and capacity management is stakeholder-centered and cloud ready

    Phase 1:

    Conduct a business impact analysis

    Phase 2:

    Establish visibility into core systems

    Phase 3:

    Solicit and incorporate business needs

    Phase 4:

    Identify and mitigate risks

    1.1 Conduct a business impact analysis

    1.2 Assign criticality ratings to services

    2.1 Define your monitoring strategy

    2.2 Implement monitoring tool/aggregator

    3.1 Solicit business needs

    3.2 Analyze data and project future needs

    4.1 Identify and mitigate risks

    Deliverables

    • Business impact analysis
    • Gold systems
    • Monitoring strategy
    • List of stakeholders
    • Business needs
    • Projected capacity needs
    • Risks and mitigations
    • Capacity management summary cards

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Availability & capacity management – project overview

     

    Conduct a business impact analysis

    Establish visibility into core systems

    Solicit and incorporate business needs

    Identify and
    mitigate risks

    Best-Practice Toolkit

    1.1 Create a scale to measure different levels of impact

    1.2 Assign criticality ratings to services

    2.1 Define your monitoring strategy

    2.2 Implement your monitoring tool/aggregator

    3.1 Solicit business needs and gather data

    3.2 Analyze data and project future needs

    4.1 Identify and mitigate risks

    Guided Implementations

    Call 1: Conduct a business impact analysis Call 1: Discuss your monitoring strategy

    Call 1: Develop a plan to gather historical data; set up plan to solicit business needs

    Call 2: Evaluate data sources

    Call 1: Discuss possible risks and strategies for risk mitigation

    Call 2: Review your capacity management plan

    Onsite Workshop

    Module 1:

    Conduct a business impact analysis

    Module 2:

    Establish visibility into core systems

    Module 3:

    Develop a plan to project future needs

    Module 4:

    Identify and mitigate risks

     

    Phase 1 Results:

    • RTOs/RPOs
    • List of gold systems
    • Criticality matrix

    Phase 2 Results:

    • Capacity/availability monitoring strategy

    Phase 3 Results:

    • Plan for soliciting future needs
    • Future needs

    Phase 4 Results:

    • Strategies for reducing risks
    • Capacity management plan

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

     

    Workshop Day 1

    Workshop Day 2

    Workshop Day 3

    Workshop Day 4

     

    Conduct a business
    impact analysis

    Establish visibility into
    core systems

    Solicit and incorporate business needs

    Identify and mitigate risks

    Activities

    1.1 Conduct a business impact analysis

    1.2 Create a list of critical dependencies

    1.3 Identify critical sub-components

    1.4 Develop best practices to negotiate SLAs

    2.1 Determine indicators for sub-components

    2.2 Establish visibility into components

    2.3 Develop strategies to ameliorate visibility issues

    3.1 Gather relevant business-level data

    3.2 Gather relevant service-level data

    3.3 Analyze historical trends

    3.4 Build a list of business stakeholders

    3.5 Directly solicit requirements from the business

    3.6 Map business needs to technical requirements

    3.7 Identify inefficiencies and compare historical data

    • 4.1 Brainstorm potential causes of availability and capacity risk
    • 4.2 Identify and mitigate capacity risks
    • 4.3 Identify and mitigate availability risks

    Deliverables

    1. Business impact analysis
    2. List of gold systems
    3. SLA best practices
    1. Sub-component metrics
    2. Strategy to establish visibility into critical sub-components
    1. List of stakeholders
    2. Business requirements
    3. Technical requirements
    4. Inefficiencies
    1. Strategies for mitigating risks
    2. Completed capacity management plan template

    PHASE 1

    Conduct a Business Impact Analysis

    Step 1.1: Conduct a business impact analysis

    This step will walk you through the following activities:

    • Record applications and dependencies in the Business Impact Analysis Tool.
    • Define a scale to estimate the impact of various applications’ downtime.
    • Estimate the impact of applications’ downtime.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team

    Outcomes of this step

    • Estimated impact of downtime for various applications

    Execute a business impact analysis (BIA) as part of a broader availability plan

    1.1a Business Impact Analysis Tool

    Business impact analyses are an invaluable part of a broader IT strategy. Conducting a BIA benefits a variety of processes, including disaster recovery, business continuity, and availability and capacity management

    STEP 1

    STEP 2

    STEP 3

    STEP 4

    STEP 5

    Record applications and dependencies

    Utilize your asset management records and document the applications and systems that IT is responsible for managing and recovering during a disaster.

    Define impact scoring scale

    Ensure an objective analysis of application criticality by establishing a business impact scale that applies to all applications.

    Estimate impact of downtime

    Leverage the scoring criteria from the previous step and establish an estimated impact of downtime for each application.

    Identify desired RTO and RPO

    Define what the RTOs/RPOs should be based on the impact of a business interruption and the tolerance for downtime and data loss.

    Determine current RTO/RPO

    Conduct tabletop planning and create a flowchart of your current capabilities. Compare your current state to the desired state from the previous step.

    Info-Tech Insight

    Engaging in detailed capacity planning for an insignificant service draws time and resources away from more critical capacity planning exercises. Time spent tracking and planning use of the ancient fax machine in the basement is time you’ll never get back.

    Control the scope of your availability and capacity management planning project with a business impact analysis

    Don’t avoid conducting a BIA because of a perception that it’s too onerous or not necessary. If properly managed, as described in this blueprint, the BIA does not need to be onerous and the benefits are tangible.

    A BIA enables you to identify appropriate spend levels, continue to drive executive support, and prioritize disaster recovery planning for a more successful outcome. For example, an Info-Tech survey found that a BIA has a significant impact on setting appropriate recovery time objectives (RTOs) and appropriate spending.

    The image contains a graph that is labelled: BIA Impact on Appropriate RTOS. With no BIA, there is 59% RTOs are appropriate. With BIA, there is 93% RTOS being appropriate. The image contains a graph that is labelled: BIA Impact on Appropriate Spending. No BIA has 59% indication that BCP is cost effective. With a BIA there is 86% indication that BCP is cost effective.

    Terms

    No BIA: lack of a BIA, or a BIA bases solely on the perceived importance of IT services.

    BIA: based on a detailed evaluation or estimated dollar impact of downtime.

    Source: Info-Tech Research Group; N=70

    Select the services you wish to evaluate with the Business Impact Analysis Tool

    1.1b 1 hour

    In large organizations especially, collating an exhaustive list of applications and services is going to be onerous. For the purposes of this project, a subset should suffice.

    Instructions

    1. Gather a diverse group of IT staff and end users in a room with a whiteboard.
    2. Solicit feedback from the group. Questions to ask:
    • What services do you regularly use? What do you see others using? (End users)
    • Which service inspires the greatest number of service calls? (IT)
    • What services are you most excited about? (Management)
    • What services are the most critical for business operations? (Everybody)
  • Record these applications in the Business Impact Analysis Tool.
  • Input

    • Applications/services

    Output

    • Candidate applications for the business impact analysis

    Materials

    • Whiteboard
    • Markers

    Participants

    • Infrastructure manager
    • Enterprise architect
    • Application owners
    • End users

    Info-Tech Insight

    Include a variety of services in your analysis. While it might be tempting to jump ahead and preselect important applications, don’t. The process is inherently valuable, and besides, it might surprise you.

    Record the applications and dependencies in the BIA tool

    1.1c Use tab 1 of the Business Impact Analysis Tool

    1. In the Application/System column, list the applications identified for this pilot as well as the Core Infrastructure category. Also indicate the Impact on the Business and Business Owner.
    2. List the dependencies for each application in the appropriate columns:
    • Hosted On-Premises (In-House) – If the physical equipment is in a facility you own, record it here, even if it is managed by a vendor.
    • Hosted by a Co-Lo/MSP – List any dependencies hosted by a co-lo/MSP vendor.
    • Cloud (includes "as a Service”) – List any dependencies hosted by a cloud vendor.

    Note: If there are no dependencies for a particular category, leave it blank.

  • If you wish to highlight specific dependencies, put an asterisk in front of them (e.g. *SAN). This will cause the dependency to be highlighted in the remaining tabs in this tool.
  • Add comments as needed in the Notes columns. For example, for equipment that you host in-house but is remotely managed by an MSP, specify this in the notes. Similarly, note any DR support services.
  • Example

    The image contains a screenshot of Info-Tech's Business Impact Analysis Tool specifically tab 1.

    ID is optional. It is a sequential number by default.

    In-House, Co-Lo/MSP, and Cloud dependencies; leave blank if not applicable.

    Add notes as applicable – e.g. critical support services.

    Define a scoring scale to estimate different levels of impact

    1.1d Use tab 2 of the Business Impact Analysis Tool

    Modify the Business Impact Scales headings and Overall Criticality Rating terminology to suit your organization. For example, if you don’t have business partners, use that column to measure a different goodwill impact or just ignore that column in this tool (i.e. leave it blank). Estimate the different levels of potential impact (where four is the highest impact and zero is no impact) and record these in the Business Impact Scales columns.

    The image contains a screenshot of Info-Tech's Business Impact Analysis Tool, specifically tab 2.

    Estimate the impact of downtime for each application

    1.1e Use tab 3 of the Business Impact Analysis Tool

    In the BIA tab columns for Direct Costs of Downtime, Impact on Goodwill, and Additional Criticality Factors, use the drop-down menu to assign a score of zero to four based on levels of impact defined in the Scoring Criteria tab. For example, if an organization’s ERP is down, and that affects call center sales operations (e.g. ability to access customer records and process orders), the impact might be as described below:

      • Loss of Revenue might score a two or three depending on the proportion of overall sales lost due to the downtime.
      • The Impact on Customers might be a one or two depending on the extent that existing customers might be using the call center to purchase new products or services, and are frustrated by the inability to process orders.
      • The Legal/Regulatory Compliance and Health or Safety Risk might be a zero.

    On the other hand, if payroll processing is down, this may not impact revenue, but it certainly impacts internal goodwill and productivity.

    Rank service criticality: gold, silver, and bronze

    Gold

    Mission critical services. An outage is catastrophic in terms of cost or public image/goodwill. Example: trading software at a financial institution.

    Silver

    Important to daily operations, but not mission critical. Example: email services at any large organization.

    Bronze

    Loss of these services is an inconvenience more than anything, though they do serve a purpose and will be missed if they are never brought back online. Example: ancient fax machines.

    Info-Tech Best Practice

    Info-Tech recommends gold, silver, and bronze because of this typology’s near universal recognition. If you would prefer a particular designation (it might help with internal comprehension), don’t hesitate to use that one instead.

    Use the results of the business impact analysis to sort systems based on their criticality

    1.1f 1 hour

    Every organization has its own rules about how to categorize service importance. For some (consumer-facing businesses, perhaps) reputational damage may trump immediate costs.

    Instructions

    1. Gather a group of key stakeholders and project the completed Business Impact Analysis Tool onto a screen for them.
    2. Share the definitions of gold, silver, and bronze services with them (if they are not familiar), and begin sorting the services by category,
    • How long would it take to notice if a particular service went out?
    • How important are the non-quantifiable damages that could come with an outage?
  • Sort the services into gold, silver, and bronze on a whiteboard, with sticky notes, or with chart paper.
  • Verify your findings and record them in section 2.1 of the Capacity Plan Template.
  • Input

    • Results of the business impact analysis exercise

    Output

    • List of gold, silver, and bronze systems

    Materials

    • Projector
    • Business Impact Analysis Tool
    • Capacity Plan Template

    Participants

    • Infrastructure manager
    • Enterprise architect

    Leverage the rest of the BIA tool as part of your disaster recovery planning

    Disaster recovery planning is a critical activity, and while it is a sort of availability management, it is beyond this project’s scope. You can complete the business impact analysis (including RTOs and RPOs) for the complete disaster recovery package.

    See Info-Tech’s Create a Right-Sized Disaster Recovery Plan blueprint for instructions on how to complete your business impact analysis.

    Step 1.2: Assign criticality ratings to services

    This step will walk you through the following activities:

    • Create a list of dependencies for your most important applications.
    • Identify important sub-components.
    • Use best practices to develop and negotiate SLAs.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team

    Outcomes of this step

    • List of dependencies of most important applications
    • List of important sub-components
    • SLAs based on best practices

    Determine the base unit of the capacity you’re looking to purchase

    Not every IT organization should approach capacity the same way. Needs scale, and larger organizations will inevitably deal in larger quantities.

    Large cloud provider

    Local traditional business

    • Thousands of servers housed in a number of datacenters around the world.
    • Dedicated capacity manager.
    • Purchases components from OEMs in bulk as part of bespoke contracts that are worth many millions of dollars over time.
    • May deal with components at a massive scale (dozens of servers at once, for example).
    • A small server room that runs non-specialized services (email, for example).
    • Barely even a dedicated IT person, let alone an IT capacity manager.
    • Purchases new components from resellers or even retail stores.
    • Deals with components at a small scale (a single switch here, a server upgrade there).

    "Cloud capacity management is not exactly the same as the ITIL version because ITIL has a focus on the component level. I actually don’t do that, because if I did I’d go crazy. There’s too many components in a cloud environment."

    – Richie Mendoza, IT Consultant, SMITS Inc.

    Consider the relationship between component capacity and service capacity

    End users’ thoughts about IT are based on what they see. They are, in other words, concerned with service availability: does the organization have the ability to provide access to needed services?

    Service

    • Email
    • CRM
    • ERP

    Component

    • Switch
    • SMTP server
    • Archive database
    • Storage

    "You don’t ask the CEO or the guy in charge ‘What kind of response time is your requirement?’ He doesn’t really care. He just wants to make sure that all his customers are happy."

    – Todd Evans, Capacity and Performance Management SME, IBM.

    One telco solved its availability issues by addressing component capacity issues

    CASE STUDY

    Industry: Telecommunications

    Source: Interview

    Coffee and Wi-Fi – a match made in heaven

    In tens of thousands of coffee shops around the world, patrons make ample use of complimentary Wi-Fi. Wi-Fi is an important part of customers’ coffee shop experience, whether they’re online to check their email, do a YouTube, or update their Googles. So when one telco that provided Wi-Fi access for thousands of coffee shops started encountering availability issues, the situation was serious.

    Wi-Fi, whack-a-mole, and web woes

    The team responsible for resolving the issue took an ad hoc approach to resolving complaints, fixing issues as they came up instead of taking a systematic approach.

    Resolution

    Looking at the network as a whole, the capacity manager took a proactive approach by using data to identify and rank the worst service areas, and then directing the team responsible to fix those areas in order of the worst first, then the next worst, and so on. Soon the availability of Wi-Fi service was restored across the network.

    Create a list of dependencies for your most important applications

    1.2a 1.5 hours

    Instructions

    1. Work your way down the list of services outlined in step 1, starting with your gold systems. During the first iteration of this exercise select only 3-5 of your most important systems.
    2. Write the name of each application on a sticky note or at the top of a whiteboard (leaving ample space below for dependency mapping).
    3. In the first tier below the application, include the specific services that the general service provides.
    • This will vary based on the service in question, but an example for email is sending, retrieving, retrieving online, etc.
  • For each of the categories identified in step 3, identify the infrastructure components that are relevant to that system. Be broad and sweeping; if the component is involved in the service, include it here. The goal is to be exhaustive.
  • Leave the final version of the map intact. Photographing or making a digital copy for posterity. It will be useful in later activities.
  • Input

    • List of important applications

    Output

    • List of critical dependencies

    Materials

    • Whiteboard
    • Markers
    • Sticky notes

    Participants

    • Infrastructure manager
    • Enterprise architect

    Info-Tech Insight

    Dependency mapping can be difficult. Make sure you don’t waste effort creating detailed dependency maps for relatively unimportant services.

    Dependency mapping can be difficult. Make sure you don’t waste effort creating detailed dependency maps for relatively unimportant services.

    The image contains a sample dependency map on ride sharing. Ride Sharing has been split between two categories: Application and Drivers. Under drivers it branches out to: Availability, Car, and Pay. Under Application, it branches out to: Compute, Network, Edge devices, Q/A maintenance, and Storage. Compute branches out to Cloud Services. Network branches out to Cellular network and Local. Edge Devices branch out to Drivers and Users. Q/A maintenance does not have a following branch. Storage branches out to Storage (Enterprise) and Storage (local).

    Ride sharing cannot work, at least not at maximum effectiveness, without these constituent components. When one or more of these components are absent or degraded, the service will become unavailable. This example illustrates some challenges of capacity management; some of these components are necessary, but beyond the ride-sharing company’s control.

    Leverage a sample dependency tree for a common service

    The image contains a sample dependency tree for the Email service. Email branches out to: Filtering, Archiving, Retrieval, and Send/receive. Filtering branches out to security appliance which then branches out to CPU, Storage, and Network. Archiving branches to Archive server, which branches out to CPU, Storage, and Network. Retrieval branches out to IMAP/PoP which branches out to CPU, Storage, and Network. Send/receive branches out to IMAP/PoP and SMTP. SMTP branches out to CPU, Storage and Network.

    Info-Tech Best Practice

    Email is an example here not because it is necessarily a “gold system,” but because it is common across industries. This is a useful exercise for any service, but it can be quite onerous, so it should be conducted on the most important systems first.

    Separate the wheat from the chaff; identify important sub-components and separate them from unimportant ones

    1.2b 1.5 hours

    Use the bottom layer of the pyramid drawn in step 1.2a for a list of important sub-components.

    Instructions

    1. Record a list of the gold services identified in the previous activity. Leave space next to each service for sub-components.
    2. Go through each relevant sub-component. Highlight those that are critical and could reasonably be expected to cause problems.
    • Has this sub-component caused a problem in the past?
    • Is this sub-component a bottleneck?
    • What could cause this component to fail? Is it such an occurrence feasible?
  • Record the results of the exercise (and the service each sub-component is tied to) in tab 2 (columns B &C) of the Capacity Snapshot Tool.
  • Input

    • List of important applications

    Output

    • List of critical dependencies

    Materials

    • Whiteboard
    • Markers

    Participants

    • Infrastructure manager
    • Enterprise architect

    Understand availability commitments with SLAs

    With the rise of SaaS, cloud computing, and managed services, critical services and their components are increasingly external to IT.

    • IT’s lack of access to the internal working of services does not let them off the hook for performance issues (as much as that might be the dream).
    • Vendor management is availability management. Use the dependency map drawn earlier in this phase to highlight the components of critical services that rely on capacity that cannot be managed internally.
    • For each of these services ensure that an appropriate SLA is in place. When acquiring new services, ensure that the vendor SLA meets business requirements.

    The image contains a large blue circle labelled: Availability. Also in the blue circle is a small red circle labelled: Capacity.

    In terms of service provision, capacity management is a form of availability management. Not all availability issues are capacity issues, but the inverse is true.

    Info-Tech Insight

    Capacity issues will always cause availability issues, but availability issues are not inherently capacity issues. Availability problems can stem from outages unrelated to capacity (e.g. power or vendor outages).

    Use best practices to develop and negotiate SLAs

    1.2c 20 minutes per service

    When signing contracts with vendors, you will be presented with an SLA. Ensure that it meets your requirements.

    1. Use the business impact analysis conducted in this project’s first step to determine your requirements. How much downtime can you tolerate for your critical services?
    2. Once you have been presented with an SLA, be sure to scour it for tricks. Remember, just because a vendor offers “five nines” of availability doesn’t mean that you’ll actually get that much uptime. It could be that the vendor is comfortable eating the cost of downtime or that the contract includes provisions for planned maintenance. Whether or not the vendor anticipated your outage does little to mitigate the damage an outage can cause to your business, so be careful of these provisions.
    3. Ensure that the person ultimately responsible for the SLA (the approver) understands the limitations of the agreement and the implications for availability.

    Input

    • List of external component dependencies

    Output

    • SLA requirements

    Materials

    • Whiteboard
    • Markers

    Participants

    • Infrastructure manager
    • Enterprise architect

    Info-Tech Insight

    Vendors are sometimes willing to eat the cost of violating SLAs if they think it will get them a contract. Be careful with negotiation. Just because the vendor says they can do something doesn’t make it true.

    Negotiate internal SLAs using Info-Tech’s rigorous process

    Talking past each other can drive misalignment between IT and the business, inconveniencing all involved. Quantify your needs through an internal SLA as part of a comprehensive availability management plan.

    See Info-Tech’s Improve IT-Business Alignment Through an Internal SLA blueprint for instructions on why you should develop internal SLAs and the potential benefits they bring.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop.

    The image contains a picture of an Info-Tech analyst.

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    1.2

    The image contains a screenshot of activity 1.2 as previously described above.

    Create a list of dependencies for your most important applications

    Using the results of the business impact analysis, the analyst will guide workshop participants through a dependency mapping exercise that will eventually populate the Capacity Plan Template.

    Phase 1 Guided Implementation

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Conduct a business impact analysis

    Proposed Time to Completion: 1 week

    Step 1.1: Create a scale to measure different levels of impact

    Review your findings with an analyst

    Discuss how you arrived at the rating of your critical systems and their dependencies. Consider whether your external SLAs are appropriate.

    Then complete these activities…

    • Use the results of the business impact analysis to sort systems based on their criticality

    With these tools & templates:

    Business Impact Analysis Tool

    Step 1.2: Assign criticality ratings to services

    Review your findings with an analyst

    Discuss how you arrived at the rating of your critical systems and their dependencies. Consider whether your external SLAs are appropriate.

    Then complete these activities…

    • Create a list of dependencies for your most important applications
    • Identify important sub-components
    • Use best practices to develop and negotiate SLAs

    With these tools & templates:

    Capacity Snapshot Tool

    Phase 1 Results & Insights:

    • Engaging in detailed capacity planning for an insignificant service is a waste of resources. Focus on ensuring availability for your most critical systems.
    • Carefully evaluate vendors’ service offerings. Make sure the SLA works for you, and approach pie-in-the-sky promises with skepticism.

    PHASE 2

    Establish Visibility Into Core Systems

    Step 2.1: Define your monitoring strategy

    This step will walk you through the following activities:

    • Determine the indicators you should be tracking for each sub-component.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team

    Outcomes of this step

    • List of indicators to track for each sub-component

    Data has its significance—but also its limitations

    The rise of big data can be a boon for capacity managers, but be warned: not all data is created equal. Bad data can lead to bad decisions – and unemployed capacity managers.

    Your findings are only as good as your data. Remember: garbage in, garbage out. There are three characteristics of good data:*

    1. Accuracy: is the data exact and correct? More detail and confidence is better.
    2. Reliability: is the data consistent? In other words, if you run the same test twice will you get the same results?
    3. Validity: is the information gleaned believable and relevant?

    *National College of Teaching & Leadership, “Reliability and Validity”

    "Data is king. Good data is absolutely essential to [the capacity manager] role."

    – Adrian Blant, Independent Capacity Consultant, IT Capability Solutions

    Info-Tech Best Practice

    Every organization’s data needs are different; your data needs are going to be dictated by your services, delivery model, and business requirements. Make sure you don’t confuse volume with quality, even if others in your organization make that mistake.

    Take advantage of technology to establish visibility into your systems

    Managing your availability and capacity involves important decisions about what to monitor and how thresholds should be set.

    • Use the list of critical applications developed through the business impact analysis and the list of components identified in the dependency mapping exercise to produce a plan for effectively monitoring component availability and capacity.
    • The nature of IT service provision – the multitude of vendors providing hardware and services necessary for even simple IT services to work effectively – means that it is unlikely that capacity management will be visible through a single pane of glass. In other words, “email” and “CRM” don’t have a defined capacity. It always depends.
    • Establishing visibility into systems involves identifying what needs to be tracked for each component.

    Too much monitoring can be as bad as the inverse

    In 2013, a security breach at US retailer Target compromised more than 70 million customers’ data. The company received an alert, but it was thought to be a false positive because the monitoring system produced so many false and redundant alerts. As a result of the daily deluge, staff did not respond to the breach in time.

    Info-Tech Insight

    Don’t confuse monitoring with management. While establishing visibility is a crucial step, it is only part of the battle. Move on to this project’s next phase to explore opportunities to improve your capacity/availability management process.

    Determine the indicators you should be tracking for each sub-component

    2.1a Tab 3 of the Capacity Snapshot Tool

    It is nearly impossible to overstate the importance of data to the process of availability and capacity management. But the wrong data will do you no good.

    Instructions

    1. Open the Capacity Snapshot Tool to tab 2. The tool should have been populated in step 1.2 as part of the component mapping exercise.
    2. For each service, determine which metric(s) would most accurately tell the component’s story. Consider the following questions when completing this activity (you may end up with more than one metric):
    • How would the component’s capacity be measured (storage space, RAM, bandwidth, vCPUs)?
    • Is the metric in question actionable?
  • Record each metric in the Metric column (D) of the Capacity Snapshot Tool. Use the adjacent column for any additional information on metrics.
  • Info-Tech Insight

    Bottlenecks are bad. Use the Capacity Snapshot Tool (or another tool like it) to ensure that when the capacity manager leaves (on vacation, to another role, for good) the knowledge that they have accumulated does not leave as well.

    Understand the limitations of this approach

    Although we’ve striven to make it as easy as possible, this process will inevitably be cumbersome for organizations with a complicated set of software, hardware, and cloud services.

    Tracking every single component in significant detail will produce a lot of noise for each bit of signal. The approach outlined here addresses that concern in two ways:

    • A focus on gold services
    • A focus on sub-components that have a reasonable likelihood of being problematic in the future.

    Despite this effort, however, managing capacity at the component level is a daunting task. Ultimately, tools provided by vendors like SolarWinds and AppDynamics will fill in some of the gaps. Nevertheless, an understanding of the conceptual framework underlying availability and capacity management is valuable.

    Step 2.2: Implement your monitoring tool/aggregator

    This step will walk you through the following activities:

    • Clarify visibility.
    • Determine whether or not you have sufficiently granular visibility.
    • Develop strategies to .any visibility issues.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team
    • Applications personnel

    Outcomes of this step

    • Method for measuring and monitoring critical sub-components

    Companies struggle with performance monitoring because 95% of IT shops don’t have full visibility into their environments

    CASE STUDY

    Industry: Financial Services

    Source: AppDynamics

    Challenge

    • Users are quick to provide feedback when there is downtime or application performance degradation.
    • The challenge for IT teams is that while they can feel the pain, they don’t have visibility into the production environment and thus cannot identify where the pain is coming from.
    • The most common solution that organizations rely on is leveraging the log files for issue diagnosis. However, this method is slow and often unable to pinpoint the problem areas, leading to delays in problem resolution.

    Solution

    • Application and infrastructure teams need to work together to develop infrastructure flow maps and transaction profiles.
    • These diagrams will highlight the path that each transaction travels across your infrastructure.
    • Ideally at this point, teams will also capture latency breakdowns across every tier that the business transaction flows through.
      • This will ultimately kick start the baselining process.

    Results

    • Ninety-five percent of IT departments don’t have full visibility into their production environment. As a result, a slow business transaction will often require a war-room approach where SMEs from across the organization gather to troubleshoot.
    • Having visibility into the production environment through infrastructure flow mapping and transaction profiling will help IT teams pinpoint problems.
      • At the very least, teams will be able to identify common problem areas and expedite the root-cause analysis process.

    Source: “Just how complex can a Login Transaction be? Answer: Very!,” AppDynamics

    Monitor your critical sub-components

    Establishing a monitoring plan for your capacity involves answering two questions: can I see what I need to see, and can I see it with sufficient granularity?

    • Having the right tool for the job is an important step towards effective capacity and availability management.
    • Application performance management tools (APMs) are essential to the process, but they tend to be highly specific and vertically oriented, like using a microscope.
    • Some product families can cover a wider range of capacity monitoring functions (SolarWinds, for example). It is still important, however, to codify your monitoring needs.

    "You don’t use a microscope to monitor an entire ant farm, but you might use many microscopes to monitor specific ants."

    – Fred Chagnon, Research Director, Infrastructure Practice, Info-Tech Research Group

    Monitor your sub-components: clarify visibility

    2.2a Tab 2 of the Capacity Snapshot Tool

    The next step in capacity management is establishing whether or not visibility (in the broad sense) is available into critical sub-components.

    Instructions

    1. Open the Capacity Snapshot Tool and record the list of sub-components identified in the previous step.
    2. For each sub-component answer the following question:
    • Do I have easy access to the information I need to monitor to ensure this component remains available?
  • Select “Yes” or “No” from the drop-down menus as appropriate. In the adjacent column record details about visibility into the component.
    • What tool provides the information? Where can it be found?

    The image contains a screenshot of Info-Tech's Capacity Snapshot Tool, Tab 2.

    Monitor your sub-components; determine whether or not you have sufficient granular visibility

    2.2b Tab 2 of the Capacity Snapshot Tool

    Like ideas and watches, not all types of visibility are created equal. Ensure that you have access to the right information to make capacity decisions.

    Instructions

    1. For each of the sub-components clarify the appropriate level of granularity for the visibility gained to be useful. In the case of storage, for example, is raw usage (in gigabytes) sufficient, or do you need a breakdown of what exactly is taking up the space? The network might be more complicated.
    2. Record the details of this ideation in the adjacent column.
    3. Select “Yes” or “No” from the drop-down menu to track the status of each sub-component.

    The image contains a picture of an iPhone storage screen where it breaks down the storage into the following categories: apps, media, photos, and other.

    For most mobile phone users, this breakdown is sufficient. For some, more granularity might be necessary.

    Info-Tech Insight

    Make note of monitoring tools and strategies. If anything changes, be sure to re-evaluate the visibility status. An outdated spreadsheet can lead to availability issues if management is unaware of looming problems.

    Develop strategies to ameliorate any visibility issues

    2.2c 1 hour

    The Capacity Snapshot Tool color-codes your components by status. Green – visibility and granularity are both sufficient; yellow – visibility exists, though not at sufficient granularity; and red – visibility does not exist at all.

    Instructions

    1. Write each of the yellow and red sub-components on a whiteboard or piece of chart paper.
    2. Brainstorm amelioration strategies for each of the problematic sub-components.
    • Does the current monitoring tool have sufficient functionality?
    • Does it need to be further configured/customized?
    • Do we need a whole new tool?
  • Record these strategies in the Amelioration Strategy column on tab 4 of the tool.
  • Input

    • Sub-components
    • Capacity Snapshot Tool

    Output

    • Amelioration strategies

    Materials

    • Whiteboard
    • Markers
    • Capacity Snapshot Tool

    Participants

    • Infrastructure manager

    Info-Tech Best Practice

    It might be that there is no amelioration strategy. Make note of this difficulty and highlight it as part of the risk section of the Capacity Plan Template.

    See Info-Tech’s projects on storage and network modernization for additional details

    Leverage other products for additional details on how to modernize your network and storage services.

    The process of modernizing the network is fraught with vestigial limitations. Develop a program to gather requirements and plan.

    As part of the blueprint, Modernize Enterprise Storage, the Modernize Enterprise Storage Workbook includes a section on storage capacity planning.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop.

    The image contains a picture of an Info-Tech analyst.

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    2.2

    The image contains a screenshot of activity 2.2.

    Develop strategies to ameliorate visibility issues

    The analyst will guide workshop participants in brainstorming potential solutions to visibility issues and record them in the Capacity Snapshot Tool.

    Phase 2 Guided Implementation

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Establish visibility into core systems

    Proposed Time to Completion: 3 weeks

    Step 2.1: Define your monitoring strategy

    Review your findings with an analyst

    Discuss your monitoring strategy and ensure you have sufficient visibility for the needs of your organization.

    Then complete these activities…

    • Determine the indicators you should be tracking for each sub-component

    With these tools & templates:

    • Capacity Snapshot Tool

    Step 2.2: Implement your monitoring tool/aggregator

    Review your findings with an analyst

    Discuss your monitoring strategy and ensure you have sufficient visibility for the needs of your organization.

    Then complete these activities…

    • Clarify visibility
    • Determine whether or not you have sufficiently granular visibility
    • Develop strategies to ameliorate any visibility issues

    With these tools & templates:

    • Capacity Snapshot Tool

    Phase 2 Results & Insights:

    • Every organization’s data needs are different. Adapt data gathering, reporting, and analysis according to your services, delivery model, and business requirements.
    • Don’t confuse monitoring with management. Build a system to turn reported data into useful information that feeds into the capacity management process.

    PHASE 3

    Solicit and Incorporate Business Needs

    Step 3.1: Solicit business needs and gather data

    This step will walk you through the following activities:

    • Build relationships with business stakeholders.
    • Analyze usage data and identify trends.
    • Correlate usage trends with business needs.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team members
    • Business stakeholders

    Outcomes of this step

    • System for involving business stakeholders in the capacity planning process
    • Correlated data on business level, service level, and infrastructure level capacity usage

    Summarize your capacity planning activities in the Capacity Plan Template

    The availability and capacity management summary card pictured here is a handy way to capture the results of the activities undertaken in the following phases. Note its contents carefully, and be sure to record specific outputs where appropriate. One such card should be completed for each of the gold services identified in the project’s first phase. Make note of the results of the activities in the coming phase, and populate the Capacity Snapshot Tool. These will help you populate the tool.

    The image contains a screenshot of Info-Tech's Capacity Plan Template.

    Info-Tech Best Practice

    The Capacity Plan Template is designed to be a part of a broader mapping strategy. It is not a replacement for a dedicated monitoring tool.

    Analyze historical trends as a crucial source of data

    The first place to look for information about your organization is not industry benchmarks or your gut (though those might both prove useful).

    • Where better to look than internally? Use the data you’ve gathered from your APM tool or other sources to understand your historical capacity needs and to highlight any periods of unavailability.
    • Consider monitoring the status of the capacity of each of your crucial components. The nature of this monitoring will vary based on the component in question. It can range from a rough Excel sheet all the way to a dedicated application performance monitoring tool.

    "In all cases the very first thing to do is to look at trending…The old adage is ‘you don’t steer a boat by its wake,’ however it’s also true that if something is growing at, say, three percent a month and it has been growing at three percent a month for the last twelve months, there’s a fairly good possibility that it’s going to carry on going in that direction."

    – Mike Lynch, Consultant, CapacityIQ

    Gather relevant data at the business level

    3.1a 2 hours per service

    A holistic approach to capacity management involves peering beyond the beaded curtain partitioning IT from the rest of the organization and tracking business metrics.

    Instructions

    1. Your service/application owners know how changes in business activities impact their systems. Business level capacity management involves responding to those changes. Ask service/application owners what changes will impact their capacity. Examples include:
    • Business volume (net new customers, number of transactions)
    • Staff changes (new hires, exits, etc.)
  • For each gold service, brainstorm relevant metrics. How can you capture that change in business volume?
  • Record these metrics in the summary card of the Capacity Plan Template.
  • In the notes section of the summary card record whether or not you have access to the required business metric.
  • Input

    • Brainstorming
    • List of gold services

    Output

    • Business level data

    Materials

    • In-house solution or commercial tool

    Participants

    • Capacity manager
    • Application/service owners

    Gather relevant data at the service level

    3.1b 2 hours per service

    One level of abstraction down is the service level. Service level capacity management, recall that service level capacity management is about ensuring that IT is meeting SLAs in its service provision.

    Instructions

    1. There should be internal SLAs for each service IT offers. (If not, that’s a good place to start. See Info-Tech’s research on the subject.) Prod each of your service owners for information on the metrics that are relevant for their SLAs. Consider the following:
    • Peak hours, requests per second, etc.
    • This will usually include some APM data.
  • Record these metrics in the summary card of the Capacity Plan Template.
  • Include any visibility issues in the notes in a similar section of the Capacity Plan Template.
  • Input

    • Brainstorming
    • List of gold services

    Output

    • Service level data

    Materials

    • In-house solution or commercial tool

    Participants

    • Capacity manager
    • Application/service owners

    Leverage the visibility into your infrastructure components and compare all of your data over time

    You established visibility into your components in the second phase of this project. Use this data, and that gathered at the business and service levels, to begin analyzing your demand over time.

    • Different organizations will approach this issue differently. Those with a complicated service catalog and a dedicated capacity manager might employ a tool like TeamQuest. If your operation is small, or you need to get your availability and capacity management activities underway as quickly as possible, you might consider using a simple spreadsheet software like Excel.
    • If you choose the latter option, select a level of granularity (monthly, weekly, etc.) and produce a line graph in Excel.
    • Example: Employee count (business metric)

    Jan

    Feb

    Mar

    Apr

    May

    June

    July

    74

    80

    79

    83

    84

    100

    102

    The image contains a graph using the example of employee count described above.

    Note: the strength of this approach is that it is easy to visualize. Use the same timescale to facilitate simple comparison.

    Manage, don’t just monitor; mountains of data need to be turned into information

    Information lets you make a decision. Understand the questions you don’t need to ask, and ask the right ones.

    "Often what is really being offered by many analytics solutions is just more data or information – not insights."

    – Brent Dykes, Director of Data Strategy, Domo

    Info-Tech Best Practice

    You can have all the data in the world and absolutely nothing valuable to add. Don’t fall for this trap. Use the activities in this phase to structure your data collection operation and ensure that your organization’s availability and capacity management plan is data driven.

    Analyze historical trends and track your services’ status

    3.1c Tab 3 of the Capacity Snapshot Tool

    At-a-glance – it’s how most executives consume all but the most important information. Create a dashboard that tracks the status of your most important systems.

    Instructions

    1. Consult infrastructure leaders for information about lead times for new capacity for relevant sub-components and include that information in the tool.
    • Look to historical lead times. (How long does it traditionally take to get more storage?)
    • If you’re not sure, contact an in-house expert, or speak to your vendor
  • Use tab 3 of the tool to record whether your existing capacity will be exceeded before you can stand more hardware up (red), you have a plan to ameliorate capacity issues but new capacity is not yet in place (yellow), or if you are not slated to run out of capacity any time soon (green).
  • Repeat the activity regularly. Include notes about spikes that might present capacity challenges, and information about when capacity may run out.
  • This tool collates and presents information gathered from other sources. It is not a substitute for a performance monitoring tool.

    Build a list of key business stakeholders

    3.1d 10 minutes

    Stakeholder analysis is crucial. Lines of authority can be diffuse. Understand who needs to be involved in the capacity management process early on.

    Instructions

    1. With the infrastructure team, brainstorm a group of departments, roles, and people who may impact demand on capacity.
    2. Go through the list with your team and identify stakeholders from two groups:
    • Line of business: who in the business makes use of the service?
    • Application owner: who in IT is responsible for ensuring the service is up?
  • Insert the list into section 3 of the Capacity Plan Template, and update as needed.
  • Input

    • Gold systems
    • Personnel Information

    Output

    • List of key business stakeholders

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Best Practice

    Consider which departments are most closely aligned with the business processes that fuel demand. Prioritize those that have the greatest impact. Consider the stakeholders who will make purchasing decisions for increasing infrastructure capacity.

    Organize stakeholder meetings

    3.1e 10 hours

    Establishing a relationship with your stakeholders is a necessary step in managing your capacity and availability.

    Instructions

    1. Gather as many of the stakeholders identified in the previous activity as you can and present information on availability and capacity management
    • If you can’t get everyone in the same room, a virtual meeting or even an email blast could get the job done.
  • Explain the importance of capacity and availability management
    • Consider highlighting the trade-offs between cost and availability.
  • Field any questions the stakeholders might have about the process. Be honest. The goal of this meeting is to build trust. This will come in handy when you’re gathering business requirements.
  • Propose a schedule and seek approval from all present. Include the results in section 3 of the Capacity Plan Template.
  • Input

    • List of business stakeholders
    • Hard work

    Output

    • Working relationship, trust
    • Regular meetings

    Materials

    • Work ethic
    • Executive brief

    Participants

    • Capacity manager
    • Business stakeholders

    Info-Tech Insight

    The best capacity managers develop new business processes that more closely align their role with business stakeholders. Building these relationships takes hard work, and you must first earn the trust of the business.

    Bake stakeholders into the planning process

    3.1f Ongoing

    Convince, don’t coerce. Stakeholders want the same thing you do. Bake them into the planning process as a step towards this goal.

    1. Develop a system to involve stakeholders regularly in the capacity planning process.
    • Your system will vary depending on the structure and culture of your organization.
    • See the case study on the following slide for ideas.
    • It may be as simple as setting a recurring reminder in your own calendar to touch base with stakeholders.
  • Liaise with stakeholders regularly to keep abreast of new developments.
    • Ensure stakeholders have reasonable expectations about IT’s available resources, the costs of providing capacity, and the lead times required to source additional needed capacity.
  • Draw on these stakeholders for the step “Gather information on business requirements” later in this phase.
  • Input

    • List of business stakeholders
    • Ideas

    Output

    • Capacity planning process that involves stakeholders

    Materials

    • Meeting rooms

    Participants

    • Capacity manager
    • Business stakeholders
    • Infrastructure team

    A capacity manager in financial services wrangled stakeholders and produced results

    CASE STUDY

    Industry: Financial Services

    Source: Interview

    In financial services, availability is king

    In the world of financial services, availability is absolutely crucial. High-value trades occur at all hours, and any institution that suffers outages runs the risk of losing tens of thousands of dollars, not to mention reputational damage.

    People know what they want, but sometimes they have to be herded

    While line of business managers and application owners understand the value of capacity management, it can be difficult to establish the working relationship necessary for a fruitful partnership.

    Proactively building relationships keeps services available

    He built relationships with all the department heads on the business side, and all the application owners.

    • He met with department heads quarterly.
    • He met with application owners and business liaisons monthly.

    He established a steering committee for capacity.

    He invited stakeholders to regular capacity planning meetings.

    • The first half of each meeting was high-level outlook, such as business volume and IT capacity utilization, and included stakeholders from other departments.
    • The second half of the meeting was more technical, serving the purpose for the infrastructure team.

    He scheduled lunch and learn sessions with business analysts and project managers.

    • These are the gatekeepers of information, and should know that IT needs to be involved when things come down the pipeline.

    Step 3.2: Analyze data and project future needs

    This step will walk you through the following activities:

    • Solicit needs from the business.
    • Map business needs to technical requirements, and technical requirements to infrastructure requirements.
    • Identify inefficiencies in order to remedy them.
    • Compare the data across business, component, and service levels, and project your capacity needs.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team members
    • Business stakeholders

    Outcomes of this step

    • Model of how business processes relate to technical requirements and their demand on infrastructure
    • Method for projecting future demand for your organization’s infrastructure
    • Comparison of current capacity usage to projected demand

    “Nobody tells me anything!” – the capacity manager’s lament

    Sometimes “need to know” doesn’t register with sales or marketing. Nearly every infrastructure manager can share a story about a time when someone has made a decision that has critically impacted IT infrastructure without letting anyone in IT in on the “secret.”

    In brief

    The image contains a picture of a man appearing to be overwhelmed.

    Imagine working for a media company as an infrastructure capacity manager. Now imagine that the powers that be have decided to launch a content-focused web service. Seems like something they would do, right? Now imagine you find out about it the same way the company’s subscribers do. This actually happened – and it shouldn’t have. But a similar lack of alignment makes this a real possibility for any organization. If you don’t establish a systematic plan for soliciting and incorporating business requirements, prepare to lose a chunk of your free time. The business should never be able to say, in response to “nobody tells me anything,” “nobody asked.”

    Pictured: an artist’s rendering of the capacity manager in question.

    Directly solicit requirements from the business

    3.2a 30 minutes per stakeholder

    Once you’ve established, firmly, that everyone’s on the same team, meet individually with the stakeholders to assess capacity.

    Instructions

    1. Schedule a one-on-one meeting with each line of business manager (stakeholders identified in 3.1). Ideally this will be recurring.
    • Experienced capacity managers suggest doing this monthly.
  • In the meeting address the following questions:
    • What are some upcoming major initiatives?
    • Is the department going to expand or contract in a noticeable way?
    • Have customers taken to a particular product more than others?
  • Include the schedule in the Capacity Plan Template, and consider including details of the discussion in the notes section in tab 3 of the Capacity Snapshot Tool.
  • Input

    • Stakeholder opinions

    Output

    • Business requirements

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Insight

    Sometimes line of business managers will evade or ignore you when you come knocking. They do this because they don’t know and they don’t want to give you the wrong information. Explain that a best guess is all you can ask for and allay their fears.

    Below, you will find more details about what to look for when soliciting information from the line of business manager you’ve roped into your scheme.

    1. Consider the following:
    • Projected sales pipeline
    • Business growth
    • Seasonal cycles
    • Marketing campaigns
    • New applications and features
    • New products and services
  • Encourage business stakeholders to give you their best guess for elements such as projected sales or business growth.
  • Estimate variance and provide a range. What can you expect at the low end? The high end? Record your historical projections for an idea of how accurate you are.
  • Consider carefully the infrastructure impact of new features (and record this in the notes section of the Capacity Snapshot Tool).
  • Directly solicit requirements from the business (optional)

    3.2a 1 hour

    IT staff and line of business staff come with different skillsets. This can lead to confusion, but it doesn’t have to. Develop effective information solicitation techniques.

    Instructions

    1. Gather your IT staff in a room with a whiteboard. As a group, select a gold service/line of business manager you would like to use as a “practice dummy.”
    2. Have everyone write down a question they would ask of the line of business representative in a hypothetical business/service capacity discussion.
    3. As a group discuss the merits of the questions posed:
    • Are they likely to yield productive information?
    • Are they too vague or specific?
    • Is the person in question likely to know the answer?
    • Is the information requested a guarded trade secret?
  • Discuss the findings and include any notes in section 3 of the Capacity Plan Template.
  • Input

    • Workshop participants’ ideas

    Output

    • Interview skills

    Materials

    • Whiteboard
    • Markers
    • Sticky notes

    Participants

    • Capacity manager
    • Infrastructure staff

    Map business needs to technical requirements, and technical requirements to infrastructure requirements

    3.2b 5 hours

    When it comes to mapping technical requirements, IT alone has the ability to effectively translate business needs.

    Instructions

    1. Use your notes from stakeholder meetings to assess the impact of any changes on gold systems.
    2. For each system brainstorm with infrastructure staff (and any technical experts as necessary) about what the information gleaned from stakeholder discussions. Consider the following discussion points:
    • How has demand for the service been trending? Does it match what the business is telling us?
    • Have we had availability issues in the past?
    • Has the business been right with their estimates in the past?
  • Estimate what a change in business/service metrics means for capacity.
    • E.g. how much RAM does a new email user require?
  • Record the output in the summary card of the Capacity Plan Template.
  • Input

    • Business needs

    Output

    • Technical and infrastructure requirements

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Insight

    Adapt the analysis to the needs of your organization. One capacity manager called the one-to-one mapping of business process to infrastructure demand the Holy Grail of capacity management. If this level of precision isn’t attainable, develop your own working estimates using the higher-level data

    Avoid putting too much faith in the cloud as a solution to your problem

    Has the rise of on-demand, functionally unlimited services eliminated the need for capacity and availability management?

    Capacity management

    The role of the capacity manager is changing, but it still has a purpose. Consider this:

    • Not everything can move to the cloud. For security/functionality reasons, on-premises infrastructure will continue to exist.
    • Cost management is more relevant than ever in the cloud age. Manage your instances.
    • While a cloud migration might render some component capacity management functions irrelevant, it could increase the relevance of others (the network, perhaps).

    Availability management

    Ensuring services are available is still IT’s wheelhouse, even if that means a shift to a brokerage model:

    • Business availability requirements (as part of the business impact analysis, potentially) are important; internal SLAs and contracts with vendors need to be managed.
    • Even in the cloud environment, availability is not guaranteed. Cloud providers have outages (unplanned, maintenance related, etc.) and someone will have to understand the limitations of cloud services and the impact on availability.

    Info-Tech Insight

    The cloud comes at the cost of detailed performance data. Sourcing a service through an SLA with a third party increases the need to perform your own performance testing of gold level applications. See performance monitoring.

    Beware Parkinson’s law

    A consequence of our infinite capacity for creativity, people have the enviable skill of making work. In 1955, C. Northcote Parkinson pointed out this fact in The Economist . What are the implications for capacity management?

    "It is a commonplace observation that work expands so as to fill the time available for its completion. Thus, an elderly lady of leisure can spend the entire day in writing and despatching a postcard to her niece at Bognor Regis. An hour will be spent in finding the postcard, another in hunting for spectacles, half-an-hour in a search for the address, an hour and a quarter in composition, and twenty minutes in deciding whether or not to take an umbrella when going to the pillar-box in the next street."

    C. Northcote Parkinson, The Economist, 1955

    Info-Tech Insight

    If you give people lots of capacity, they will use it. Most shops are overprovisioned, and in some cases that’s throwing perfectly good money away. Don’t be afraid to prod if someone requests something that doesn’t seem right.

    Optimally align demand and capacity

    When it comes to managing your capacity, look for any additional efficiencies.

    Questions to ask:

    • Are there any infrastructure services that are not being used to their full potential, sitting idle, or allocated to non-critical or zombie functions?
      • Are you managing your virtual servers? If, for example, you experience a seasonal spike in demand, are you leaving virtual machines running after the fact?
    • Do your organization’s policies and your infrastructure setup allow for the use of development resources for production during periods of peak demand?
    • Can you make organizational or process changes in order to satisfy demand more efficiently?

    In brief

    Who isn’t a sports fan? Big games mean big stakes for pool participants and armchair quarterbacks—along with pressure on the network as fans stream games from their work computers. One organization suffered from this problem, and, instead of taking a hardline and banning all streams, opted to stream the game on a large screen in a conference room where those interested could work for its duration. This alleviated strain on the network and kept staff happy.

    Shutting off an idle cloud to cut costs

    CASE STUDY

    Industry:Professional Services

    Source:Interview

    24/7 AWS = round-the-clock costs

    A senior developer realized that his development team had been leaving AWS instances running without any specific reason.

    Why?

    The development team appreciated the convenience of an always-on instance and, because the people spinning them up did not handle costs, the problem wasn’t immediately apparent.

    Resolution

    In his spare time over the course of a month, the senior developer wrote a program to manage the servers, including shutting them down during times when they were not in use and providing remote-access start-up when required. His team alone saved $30,000 in costs over the next six months, and his team lead reported that it would have been more than worth paying the team to implement such a project on company time.

    Identify inefficiencies in order to remediate them

    3.2c 20 minutes per service

    Instructions

    1. Gather the infrastructure team together and discuss existing capacity and demand. Use the inputs from your data analysis and stakeholder meetings to set the stage for your discussion.
    2. Solicit ideas about potential inefficiencies from your participants:
    • Are VMs effectively allocated? If you need 7 VMs to address a spike, are those VMs being reallocated post-spike?
    • Are developers leaving instances running in the cloud?
    • Are particular services massively overprovisioned?
    • What are the biggest infrastructure line items? Are there obvious opportunities for cost reduction there?
  • Record any potential opportunities in the summary of the Capacity Plan Template.
  • Input

    • Gold systems
    • Data inputs

    Output

    • Inefficiencies

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Insight

    The most effective capacity management takes a holistic approach and looks at the big picture in order to find ways to eliminate unnecessary infrastructure usage, or to find alternate or more efficient sources of required capacity.

    Dodging the toll troll by rerouting traffic

    CASE STUDY

    Industry:Telecommunications

    Source: Interview

    High-cost lines

    The capacity manager at a telecommunications provider mapped out his firm’s network traffic and discovered they were using a number of VP circuits (inter building cross connects) that were very expensive on the scale of their network.

    Paying the toll troll

    These VP circuits were supplying needed network services to the telecom provider’s clients, so there was no way to reduce this demand.

    Resolution

    The capacity manager analyzed where the traffic was going and compared this to the cost of the lines they were using. After performing the analysis, he found he could re-route much of the traffic away from the VP circuits and save on costs while delivering the same level of service to their users.

    Compare the data across business, component, and service levels, and project your capacity needs

    3.2d 2 hour session/meeting

    Make informed decisions about capacity. Remember: retain all documentation. It might come in handy for the justification of purchases.

    Instructions

    1. Using either a dedicated tool or generic spreadsheet software like Excel or Sheets, evaluate capacity trends. Ask the following questions:
    • Are there times when application performance degraded, and the service level was disrupted?
    • Are there times when certain components or systems neared, reached, or exceeded available capacity?
    • Are there seasonal variations in demand?
    • Are there clear trends, such as ongoing growth of business activity or the usage of certain applications?
    • What are the ramifications of trends or patterns in relation to infrastructure capacity?
  • Use the insight gathered from stakeholders during the stakeholder meetings, project required capacity for the critical components of each gold service.
  • Record the results of this activity in the summary card of the Capacity Plan Template.
  • Compare current capacity to your projections

    3.2e Section 5 of the Capacity Plan Template

    Capacity management (and, by extension, availability management) is a combination of two balancing acts: cost against capacity and supply and demand.*

    Instructions

    1. Compare your projections with your reality. You already know whether or not you have enough capacity given your lead times. But do you have too much? Compare your sub-component capacity projections to your current state.
    2. Highlight any outliers. Is there a particular service that is massively overprovisioned?
    3. Evaluate the reasons for the overprovisioning.
    • Is the component critically important?
    • Did you get a great deal on hardware?
    • Is it an oversight?
  • Record the results in the notes section of the summary card of the Capacity Plan Template.
  • *Office of Government Commerce 2001, 119.

    In brief

    The fractured nature of the capacity management space means that every organization is going to have a slightly different tooling strategy. No vendor has dominated, and every solution requires some level of customization. One capacity manager (a cloud provider, no less!) relayed a tale about a capacity management Excel sheet programmed with 5,000+ lines of code. As much work as that is, a bespoke solution is probably unavoidable.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop.

    The image contains a picture of an Info-Tech analyst.

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.2

    The image contains a screenshot of activity 3.2.

    Map business needs to technical requirements and technical requirements to infrastructure requirements

    The analyst will guide workshop participants in using their organization’s data to map out the relationships between applications, technical requirements, and the underlying infrastructure usage.

    Phase 3 Guided Implementation

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3: Solicit and incorporate business needs

    Proposed Time to Completion: 2 weeks

    Step 3.1: Solicit business needs and gather data

    Review your findings with an analyst

    Discuss the effectiveness of your strategies to involve business stakeholders in the planning process and your methods of data collection and analysis.

    Then complete these activities…

    • Analyze historical trends and track your services’ status
    • Build a list of key business stakeholders
    • Bake stakeholders into the planning process

    With these tools & templates:

    Capacity Plan Template

    Step 3.2: Analyze data and project future needs

    Review your findings with an analyst

    Discuss the effectiveness of your strategies to involve business stakeholders in the planning process and your methods of data collection and analysis.

    Then complete these activities…

    • Map business needs to technical requirements and technical requirements to infrastructure requirements
    • Compare the data across business, component, and service levels, and project your capacity needs
    • Compare current capacity to your projections

    With these tools & templates:

    Capacity Snapshot Tool

    Capacity Plan Template

    Phase 3 Results & Insights:

    • Develop new business processes that more closely align your role with business stakeholders. Building these relationships takes hard work, and won’t happen overnight.
    • Take a holistic approach to eliminate unnecessary infrastructure usage or source capacity more efficiently.

    PHASE 4

    Identify and Mitigate Risks

    Step 4.1: Identify and mitigate risks

    This step will walk you through the following activities:

    • Identify potential risks.
    • Determine strategies to mitigate risks.
    • Complete your capacity management plan.

    This involves the following participants:

    • Capacity manager
    • Infrastructure team members
    • Business stakeholders

    Outcomes of this step

    • Strategies for reducing risks
    • Capacity management plan

    Understand what happens when capacity/availability management fails

    1. Services become unavailable. If availability and capacity management are not constantly practiced, an inevitable consequence is downtime or a reduction in the quality of that service. Critical sub-component failures can knock out important systems on their own.
    2. Money is wasted. In response to fears about availability, it’s entirely possible to massively overprovision or switch entirely to a pay-as-you-go model. This, unfortunately, brings with it a whole host of other problems, including overspending. Remember: infinite capacity means infinite potential cost.
    3. IT remains reactive and is unable to contribute more meaningfully to the organization. If IT is constantly putting out capacity/availability-related fires, there is no room for optimization and activities to increase organizational maturity. Effective availability and capacity management will allow IT to focus on other work.

    Mitigate availability and capacity risks

    Availability: how often a service is usable (that is to say up and not too degraded to be effective). Consequences of reduced availability can include financial losses, impacted customer goodwill, and reduced faith in IT more generally.

    Causes of availability issues:

    • Poor capacity management – a service becomes unavailable when there is insufficient supply to meet demand. This is the result of poor capacity management.
    • Scheduled maintenance – services go down for maintenance with some regularity. This needs to be baked into service-level negotiations with vendors.
    • Vendor outages – sometimes vendors experience unplanned outages. There is typically a contract provision that covers unplanned outages, but that doesn’t change the fact that your service will be interrupted.

    Capacity: a particular component’s/service’s/business’ wiggle room. In other words, its usage ceiling.

    Causes of capacity issues:

    • Poor demand management – allowing users to run amok without any regard for how capacity is sourced and paid for.
    • Massive changes in legitimate demand – more usage means more demand.
    • Poor capacity planning – predictable changes in demand that go unaddressed can lead to capacity issues.

    Add additional potential causes of availability and capacity risks as needed

    4.1a 30 minutes

    Availability and capacity issues can stem from a number of different causes. Include a list in your availability and capacity management plan.

    Instructions

    1. Gather the group together. Go around the room and have participants provide examples of incidents and problems that have been the result of availability and capacity issues.
    2. Pose questions to the group about the source of those availability and capacity issues.
    • What could have been done differently to avoid these issues?
    • Was the availability/capacity issue a result of a faulty internal/external SLA?
  • Record the results of the exercise in sections 4.1 and 4.2 of the Capacity Plan Template.
  • Input

    • Capacity Snapshot Tool results

    Output

    • Additional sources of availability and capacity risks

    Materials

    • Capacity Plan Template

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Insight

    Availability and capacity problems result in incidents, critical incidents, and problems. These are addressed in a separate project (incident and problem management), but information about common causes can streamline that process.

    Identify capacity risks and mitigate them

    4.1b 30 minutes

    Based on your understanding of your capacity needs (through written SLAs and informal but regular meetings with the business) highlight major risks you foresee.

    Instructions

    1. Make a chart with two columns on a whiteboard. They should be labelled “risk” and “mitigation” respectively.
    2. Record risks to capacity you have identified in earlier activities.
    • Refer to the Capacity Snapshot Tool for components that are highlighted in red and yellow. These are specific components that present special challenges. Identify the risk(s) in as much detail as possible. Include service and business risks as well.
    • Examples: a marketing push will put pressure on the web server; a hiring push will require more Office 365 licenses; a downturn in registration will mean that fewer VMs will be required to run the service.

    Input

    • Capacity Snapshot Tool results

    Output

    • Inefficiencies

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Insight

    It’s an old adage, but it checks out: don’t come to the table armed only with problems. Be a problem solver and prove IT’s value to the organization.

    Identify capacity risks and mitigate them (cont.)

    4.1b 1.5 hours

    Instructions (cont.)

    1. Begin developing mitigation strategies. Options for responding to known capacity risks fall into one of two camps:
    • Acceptance: responding to the risk is costlier than acknowledging its existence without taking any action. For gold systems, acceptance is typically not acceptable.
    • Mitigation: limiting/reducing, eliminating, or transferring risk (Herrera) comprise the sort of mitigation discussed here.
      • Limiting/reducing: taking steps to improve the capacity situation, but accepting some level of risk (spinning up a new VM, pushing back on demands from the business, promoting efficiency).
      • Eliminating: the most comprehensive (and most expensive) mitigation strategy, elimination could involve purchasing a new server or, at the extreme end, building a new datacenter.
      • Transfer: “robbing Peter to pay Paul,” in the words of capacity manager Todd Evans, is one potential way to limit your exposure. Is there a less critical service that can be sacrificed to keep your gold service online?
  • Record the results of this exercise in section 5 of the Capacity Plan Template.
  • Input

    • Capacity Snapshot Tool results

    Output

    • Capacity risk mitigations

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Insight

    It’s an old adage, but it checks out: don’t come to the table armed only with problems. Be a problem solver and prove IT’s value to the organization.

    Identify availability risks and mitigate them

    4.1c 30 minutes

    While capacity management is a form of availability management, it is not the only form. In this activity, outline the specific nature of threats to availability.

    Instructions

    1. Make a chart with two columns on a whiteboard. They should be labelled “risk” and “mitigation” respectively.
    2. Begin brainstorming general availability risks based on the following sources of information/categories:
    • Vendor outages
    • Disaster recovery
    • Historical availability issues

    The image contains a large blue circle labelled: Availability. Also in the blue circle is a small red circle labelled: Capacity.

    Input

    • Capacity Snapshot Tool results

    Output

    • Availability risks and mitigations

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Info-Tech Best Practice

    A dynamic central repository is a good way to ensure that availability issues stemming from a variety of causes are captured and mitigated.

    Identify availability risks and mitigate them (cont.)

    4.1c 1.5 hours

    Although it is easier said than done, identifying potential mitigations is a crucial part of availability management as an activity.

    Instructions (cont.)

    1. Begin developing mitigation strategies. Options for responding to known capacity risks fall into one of two camps:
    • Acceptance – responding to the risk is costlier than taking it on. Some unavailability is inevitable, between maintenance and unscheduled downtime. Record this, though it may not require immediate action.
    • Mitigation strategies:
      • Limiting/reducing – taking steps to increase availability of critical systems. This could include hot spares for unreliable systems or engaging a new vendor.
      • Eliminating – the most comprehensive (and most expensive) mitigation strategy. It could include selling.
      • Transfer – “robbing Peter to pay Paul,” in the words of capacity manager Todd Evans, is one potential way to limit your exposure. Is there a less critical service that can be sacrificed to keep your gold service online?
  • Record the results of this exercise in section 5 of Capacity Plan Template.
  • Input

    • Capacity Snapshot Tool results

    Output

    • Availability risks and mitigations

    Materials

    • Whiteboard
    • Markers

    Participants

    • Capacity manager
    • Infrastructure staff

    Iterate on the process and present your completed availability and capacity management plan

    The stakeholders consulted as part of the process will be interested in its results. Share them, either in person or through a collaboration tool.

    The current status of your availability and capacity management plan should be on the agenda for every stakeholder meeting. Direct the stakeholders’ attention to the parts of the document that are relevant to them, and solicit their thoughts on the document’s accuracy. Over time you should get a pretty good idea of who among your stakeholder group is skilled at projecting demand, and who over- or underestimates, and by how much. This information will improve your projections and, therefore, your management over time.

    Info-Tech Insight

    Use the experience gained and the artifacts generated to build trust with the business. The meetings should be regular, and demonstrating that you’re actually using the information for good is likely to make hesitant participants in the process more likely to open up.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop.

    The image contains a picture of an Info-Tech analyst.

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    4.1

    The image contains a screenshot of activity 4.1.

    Identify capacity risks and mitigate them

    The analyst will guide workshop participants in identifying potential risks to capacity and determining strategies for mitigating them.

    Phase 4 Guided Implementation

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 4: Identify and mitigate risks

    Proposed Time to Completion: 1 week

    Step 4.1: Identify and mitigate risks

    Review your findings with an analyst

    • Discuss your potential risks and your strategies for mitigating those risks.

    Then complete these activities…

    • Identify capacity risks and mitigate them
    • Identify availability risks and mitigate them
    • Complete your capacity management plan

    With these tools & templates:

    Capacity Snapshot Tool

    Capacity Plan Template

    Phase 4 Results & Insights:

    • Be a problem solver and prove IT’s value to the organization. Capacity management allows infrastructure to drive business value.
    • Iterate and share results. Reinforce your relationships with stakeholders and continue to refine how capacity management transforms your organization’s business processes.

    Insight breakdown

    Insight 1

    Components are critical to availability and capacity management.

    The CEO doesn’t care about the SMTP server. She cares about meeting customer needs and producing profit. For IT capacity and availability managers, though, the devil is in the details. It only takes one faulty component to knock out a service. Keep track and keep the lights on.

    Insight 2

    Ask what the business is working on, not what they need.

    If you ask them what they need, they’ll tell you – and it won’t be cheap. Find out what they’re going to do, and use your expertise to service those needs. Use your IT experience to estimate the impact of business and service level changes on the components that secure the availability you need.

    Insight 3

    Cloud shmoud.

    The role of the capacity manager might be changing with the advent of the public cloud, but it has not disappeared. Capacity managers in the age of the cloud are responsible for managing vendor relationships, negotiating external SLAs, projecting costs and securing budgets, reining in prodigal divisions, and so on.

    Summary of accomplishment

    Knowledge Gained

    • Impact of downtime on the organization
    • Gold systems
    • Key dependencies and sub-components
    • Strategy for monitoring components
    • Strategy for soliciting business needs
    • Projected capacity needs
    • Availability and capacity risks and mitigations

    Processes Optimized

    • Availability management
    • Capacity management

    Deliverables Completed

    • Business Impact Analysis
    • Capacity Plan Template

    Project step summary

    Client Project: Develop an Availability and Capacity Management Plan

    1. Conduct a business impact analysis
    2. Assign criticality ratings to services
    3. Define your monitoring strategy
    4. Implement your monitoring tool/aggregator
    5. Solicit business needs and gather data
    6. Analyze data and project future needs
    7. Identify and mitigate risks

    Info-Tech Insight

    This project has the ability to fit the following formats:

    • Onsite workshop by Info-Tech Research Group consulting analysts.
    • Do-it-yourself with your team.
    • Remote delivery via Info-Tech Guided Implementation.

    Research contributors and experts

    The image contains a picture of Adrian Blant.

    Adrian Blant, Independent Capacity Consultant, IT Capability Solutions

    Adrian has over 15 years' experience in IT infrastructure. He has built capacity management business processes from the ground up, and focused on ensuring a productive dialogue between IT and the business.

    The image contains a picture of James Zhang.

    James Zhang, Senior Manager Disaster Recovery, AIG Technology

    James has over 20 years' experience in IT and 10 years' experience in capacity management. Throughout his career, he has focused on creating new business processes to deliver value and increase efficiency over the long term.

    The image contains a picture of Mayank Banerjee.

    Mayank Banerjee, CTO, Global Supply Chain Management, HelloFresh

    Mayank has over 15 years' experience across a wide range of technologies and industries. He has implemented highly automated capacity management processes as part of his role of owning and solving end-to-end business problems.

    The image contains a picture of Mike Lynch

    Mike Lynch, Consultant, CapacityIQ

    Mike has over 20 years' experience in IT infrastructure. He takes a holistic approach to capacity management to identify and solve key problems, and has developed automated processes for mapping performance data to information that can inform business decisions.

    The image contains a picture of Paul Waguespack.

    Paul Waguespack, Manager of Application Systems Engineering, Tufts Health Plan

    Paul has over 10 years' experience in IT. He has specialized in implementing new applications and functionalities throughout their entire lifecycle, and integrating with all aspects of IT operations.

    The image contains a picture of Richie Mendoza.

    Richie Mendoza, IT Consultant, SMITS Inc.

    Richie has over 10 years' experience in IT infrastructure. He has specialized in using demand forecasting to guide infrastructure capacity purchasing decisions, to provide availability while avoiding costly overprovisioning.

    The image contains a picture of Rob Thompson.

    Rob Thompson, President, IT Tools & Process

    Rob has over 30 years’ IT experience. Throughout his career he has focused on making IT a generator of business value. He now runs a boutique consulting firm.

    Todd Evans, Capacity and Performance Management SME, IBM

    Todd has over 20 years' experience in capacity and performance management. At Kaiser Permanente, he established a well-defined mapping of the businesses workflow processes to technical requirements for applications and infrastructure.

    Bibliography

    451 Research. “Best of both worlds: Can enterprises achieve both scalability and control when it comes to cloud?” 451 Research, November 2016. Web.

    Allen, Katie. “Work Also Shrinks to Fit the Time Available: And We Can Prove It.” The Guardian. 25 Oct. 2017.

    Amazon. “Amazon Elastic Compute Cloud.” Amazon Web Services. N.d. Web.

    Armandpour, Tim. “Lies Vendors Tell about Service Level Agreements and How to Negotiate for Something Better.” Network World. 12 Jan 2016.

    “Availability Management.” ITIL and ITSM World. 2001. Web.

    Availability Management Plan Template. Purple Griffon. 30 Nov. 2012. Web.

    Bairi, Jayachandra, B., Murali Manohar, and Goutam Kumar Kundu. “Capacity and Availability Management by Quantitative Project Management in the IT Service Industry.” Asian Journal on Quality 13.2 (2012): 163-76. Web.

    BMC Capacity Optimization. BMC. 24 Oct 2017. Web.

    Brooks, Peter, and Christa Landsberg. Capacity Management in Today’s IT Environment. MentPro. 16 Aug 2017. Web.

    "Capacity and Availability Management." CMMI Institute. April 2017. Web.

    Capacity and Availability Management. IT Quality Group Switzerland. 24 Oct. 2017. Web.

    Capacity and Performance Management: Best Practices White Paper. Cisco. 4 Oct. 2005. Web.

    "Capacity Management." Techopedia.

    “Capacity Management Forecasting Best Practices and Recommendations.” STG. 26 Jan 2015. Web.

    Capacity Management from the Ground up. Metron. 24 Oct. 2017. Web.

    Capacity Management in the Modern Datacenter. Turbonomic. 25 Oct. 2017. Web.

    Capacity Management Maturity Assessing and Improving the Effectiveness. Metron. 24 Oct. 2017. Web.

    “Capacity Management Software.” TeamQuest. 24 Oct 2017. Web,

    Capacity Plan Template. Purainfo. 11 Oct 2012. Web.

    “Capacity Planner—Job Description.” Automotive Industrial Partnership. 24 Oct. 2017. Web.

    Capacity Planning. CDC. Web. Aug. 2017.

    "Capacity Planning." TechTarget. 24 Oct 2017. Web.

    “Capacity Planning and Management.” BMC. 24 Oct 2017. Web.

    "Checklist Capacity Plan." IT Process Wiki. 24 Oct. 2017. Web.

    Dykes, Brent. “Actionable Insights: The Missing Link Between Data and Business Value.” Forbes. April 26, 2016. Web.

    Evolved Capacity Management. CA Technologies. Oct. 2013. Web.

    Francis, Ryan. “False positives still cause threat alert fatigue.” CSO. May 3, 2017. Web.

    Frymire, Scott. "Capacity Planning vs. Capacity Analytics." ScienceLogic. 24 Oct. 2017. Web.

    Glossary. Exin. Aug. 2017. Web.

    Herrera, Michael. “Four Types of Risk Mitigation and BCM Governance, Risk and Compliance.” MHA Consulting. May 17, 2013.

    Hill, Jon. How to Do Capacity Planning. TeamQuest. 24 Oct. 2017. Web.

    “How to Create an SLA in 7 Easy Steps.” ITSM Perfection. 25 Oct. 2017. Web.

    Hunter, John. “Myth: If You Can’t Measure It: You Can’t Manage It.” W. Edwards Deming Institute Blog. 13 Aug 2015. Web.

    IT Service Criticality. U of Bristol. 24 Oct. 2017. Web.

    "ITIL Capacity Management." BMC's Complete Guide to ITIL. BMC Software. 22 Dec. 2016. Web.

    “Just-in-time.” The Economist. 6 Jul 2009. Web.

    Kalm, Denise P., and Marv Waschke. Capacity Management: A CA Service Management Process Map. CA. 24 Oct. 2017. Web.

    Klimek, Peter, Rudolf Hanel, and Stefan Thurner. “Parkinson’s Law Quantified: Three Investigations in Bureaucratic Inefficiency.” Journal of Statistical Mechanics: Theory and Experiment 3 (2009): 1-13. Aug. 2017. Web.

    Landgrave, Tim. "Plan for Effective Capacity and Availability Management in New Systems." TechRepublic. 10 Oct. 2002. Web.

    Longoria, Gina. “Hewlett Packard Enterprise Goes After Amazon Public Cloud in Enterprise Storage.” Forbes. 2 Dec. 2016. Web.

    Maheshwari, Umesh. “Understanding Storage Capacity.” NimbleStorage. 7 Jan. 2016. Web.

    Mappic, Sandy. “Just how complex can a Login Transaction be? Answer: Very!” Appdynamics. Dec. 11 2011. Web.

    Miller, Ron. “AWS Fires Back at Larry Ellison’s Claims, Saying It’s Just Larry Being Larry.” Tech Crunch. 2 Oct. 2017. Web.

    National College for Teaching & Leadership. “The role of data in measuring school performance.” National College for Teaching & Leadership. N.d. Web,

    Newland, Chris, et al. Enterprise Capacity Management. CETI, Ohio State U. 24 Oct. 2017. Web.

    Office of Government Commerce . Best Practice for Service Delivery. London: Her Majesty’s Stationery Office, 2001.

    Office of Government Commerce. Best Practice for Business Perspective: The IS View on Delivering Services to the Business. London: Her Majesty’s Stationery Office, 2004.

    Parkinson, C. Northcote. “Parkinson’s Law.” The Economist. 19 Nov. 1955. Web.

    “Parkinson’s Law Is Proven Again.” Financial Times. 25 Oct. 2017. Web.

    Paul, John, and Chris Hayes. Performance Monitoring and Capacity Planning. VM Ware. 2006. Web.

    “Reliability and Validity.” UC Davis. N.d. Web.

    "Role: Capacity Manager." IBM. 2008. Web.

    Ryan, Liz. “‘If You Can’t Measure It, You Can’t Manage It’: Not True.” Forbes. 10 Feb. 2014. Web.

    S, Lalit. “Using Flexible Capacity to Lower and Manage On-Premises TCO.” HPE. 23 Nov. 2016. Web.

    Snedeker, Ben. “The Pros and Cons of Public and Private Clouds for Small Business.” Infusionsoft. September 6, 2017. Web.

    Statement of Work: IBM Enterprise Availability Management Service. IBM. Jan 2016. Web.

    “The Road to Perfect AWS Reserved Instance Planning & Management in a Nutshell.” Botmetric. 25 Oct. 2017. Web.

    Transforming the Information Infrastructure: Build, Manage, Optimize. Asigra. Aug. 2017. Web.

    Valentic, Branimir. "Three Faces of Capacity Management." ITIL/ISO 20000 Knowledge Base. Advisera. 24 Oct. 2017. Web.

    "Unify IT Performance Monitoring and Optimization." IDERA. 24 Oct. 2017. Web.

    "What is IT Capacity Management?" Villanova U. Aug. 2017. Web.

    Wolstenholme, Andrew. Final internal Audit Report: IT Availability and Capacity (IA 13 519/F). Transport For London. 23 Feb. 2015. Web.

    Implement Crisis Management Best Practices

    • Buy Link or Shortcode: {j2store}415|cart{/j2store}
    • member rating overall impact: 9.7/10 Overall Impact
    • member rating average dollars saved: $50,532 Average $ Saved
    • member rating average days saved: 42 Average Days Saved
    • Parent Category Name: DR and Business Continuity
    • Parent Category Link: /business-continuity
    • There’s a belief that you can’t know what crisis will hit you next, so you can’t prepare for it. As a result, resilience planning stops at more-specific planning such as business continuity planning or IT disaster recovery planning.
    • Business contingency and IT disaster recovery plans focus on how to resume normal operations following an incident. The missing piece is the crisis management plan – the overarching plan that guides the organization’s initial response, assessment, and action.
    • Organizations without a crisis management plan are far less able to minimize the impact of other crises such as a security breach, health & safety incident, or attacks on their reputation.

    Our Advice

    Critical Insight

    • Effective crisis management has a long-term demonstrable impact on your organization, long after the crisis is resolved. While all organizations can expect a short-term negative impact when a crisis hits, if the crisis is managed well, the research shows that your market capitalization can actually increase long term.
    • Crisis communication is more science than art and should follow a structured approach. Crisis communication is about more than being a good writer or having a social media presence. There are specific messages that must be included, and specific audiences to target, to get the results you need.
    • IT has a critical role in non-IT crises (as well as IT crises). Many crises are IT events (e.g. security breach). For non-IT events, IT is critical in supporting crisis communication and the operational response (e.g. COVID-19 and quickly ramping up working-from-home).

    Impact and Result

    • You can anticipate the types of crisis your organization may face in the future and build flexible plans that can be adapted in a crisis to meet the needs of the moment.
    • Identify potential crises that present a high risk to your organization.
    • Document emergency response and crisis response plans that provide a framework for addressing a range of crises.
    • Establish crisis communication guidelines to avoid embarrassing and damaging communications missteps.

    Implement Crisis Management Best Practices Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should implement crisis management best practices, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Identify potential crises and your crisis management team

    Identify, analyze, and prioritized potential crises based on risk to the organization. Set crisis management team roles and responsibilities. Adopt a crisis management framework.

    • Example Crisis Management Process Flowcharts (Visio)
    • Example Crisis Management Process Flowcharts (PDF)
    • Business Continuity Teams and Roles Tool

    2. Document your emergency and crisis response plans

    Document workflows for notification, situational assessment, emergency response, and crisis response.

    • Emergency Response Plan Checklist
    • Emergency Response Plan Summary
    • Emergency Response Plan Staff Instructions
    • Pandemic Response Plan Example
    • Pandemic Policy

    3. Document crisis communication guidelines

    Develop and document guidelines that support the creation and distribution of crisis communications.

    • Crisis Communication Guidelines and Templates

    4. Complete and maintain your crisis management plan

    Summarize your crisis management and response plans, create a roadmap to implement potential improvement projects, develop training and awareness initiatives, and schedule maintenance to keep the plan evergreen.

    • Crisis Management Plan Summary Example
    • BCP Project Roadmap Tool
    • Organizational Learning Guide
    [infographic]

    Workshop: Implement Crisis Management Best Practices

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Potential Crises and Your Crisis Management Team

    The Purpose

    Identify and prioritize relevant potential crises.

    Key Benefits Achieved

    Enable crisis management pre-planning and identify gaps in current crisis management plans.

    Activities

    1.1 Identify high-risk crises.

    1.2 Assign roles and responsibilities on the crisis management team.

    1.3 Review Info-Tech’s crisis management framework.

    Outputs

    List of high-risk crises.

    CMT membership and responsibilities.

    Adopt the crisis management framework and identify current strengths and gaps.

    2 Document Emergency Response and Crisis Management Plans

    The Purpose

    Outline emergency response and crisis response plans.

    Key Benefits Achieved

    Develop and document procedures that enable rapid, effective, and reliable crisis and emergency response.

    Activities

    2.1 Develop crisis notification and assessment procedures.

    2.2 Document your emergency response plans.

    2.3 Document crisis response plans for potential high-risk crises.

    Outputs

    Documented notification and assessment workflows.

    Emergency response plans and checklists.

    Documented crisis response workflows.

    3 Document Crisis Communication Guidelines

    The Purpose

    Define crisis communication guidelines aligned with an actionable crisis communications framework.

    Key Benefits Achieved

    Document workflows and guidelines support crisis communications.

    Activities

    3.1 Establish the elements of baseline crisis communications.

    3.2 Identify audiences for the crisis message.

    3.3 Modify baseline communication guidelines based on audience and organizational responsibility.

    3.4 Create a vetting process.

    3.5 Identify communications channels.

    Outputs

    Baseline communications guidelines.

    Situational modifications to crisis communications guidelines.

    Documented vetting process.

    Documented communications channels

    4 Complete and Maintain Your Crisis Management Plan

    The Purpose

    Summarize the crisis management plan, establish an organizational learning process, and identify potential training and awareness activities.

    Key Benefits Achieved

    Plan ahead to keep your crisis management practice evergreen.

    Activities

    4.1 Review the CMP Summary Template.

    4.2 Create a project roadmap to close gaps in the crisis management plan.

    4.3 Outline an organizational learning process.

    4.4 Schedule plan reviews, testing, and updates.

    Outputs

    Long-term roadmap to improve crisis management capabilities.

    Crisis management plan maintenance process and awareness program.

    Security Priorities 2022

    • Buy Link or Shortcode: {j2store}244|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Security Strategy & Budgeting
    • Parent Category Link: /security-strategy-and-budgeting
    • Ransomware activities and the cost of breaches are on the rise.
    • Cybersecurity talent is hard to find, and an increasing number of cybersecurity professionals are considering leaving their jobs.
    • Moving to the digital world increases the risk of a breach.

    Our Advice

    Critical Insight

    • The pandemic has fundamentally changed the technology landscape. Security programs must understand how their threat surface is now different and adapt their controls to meet the challenge.
    • The upside to the upheaval in 2021 is new opportunities to modernize your security program.

    Impact and Result

    • Use the report to ensure your plan in 2022 addresses what’s important in cybersecurity.
    • Understand the current situation in the cybersecurity space.

    Security Priorities 2022 Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Security Priorities 2022 – A report that describes priorities and recommendations for CISOs in 2022.

    Use this report to understand the current situation in the cybersecurity space and inform your plan for 2022. This report includes sections on protecting against and responding to ransomware, acquiring and retaining talent, securing a remote workforce, securing digital transformation, and adopting zero trust.

    • Security Priorities for 2022 Report

    Infographic

    Further reading

    Security Priorities 2022

    The pandemic has changed how we work

    disruptions to the way we work caused by the pandemic are here to stay.

    The pandemic has introduced a lot of changes to our lives over the past two years, and this is also true for various aspects of how we work. In particular, a large workforce moved online overnight, which shifted the work environment rapidly.

    People changed how they communicate, how they access company information, and how they connect to the company network. These changes make cybersecurity a more important focus than ever.

    Although changes like the shift to remote work occurred in response to the pandemic, they are largely expected to remain, regardless of the progression of the pandemic itself. This report will look into important security trends and the priorities that stemmed from these trends.

    30% more professionals expect transformative permanent change compared to one year ago.

    47% of professionals expect a lot of permanent change; this remains the same as last year. (Source: Info-Tech Tech Trends 2022 Survey; N=475)

    The cost of a security breach is rising steeply

    The shift to remote work exposes organizations to more costly cyber incidents than ever before.

    $4.24 million

    Average cost of a data breach in 2021
    The cost of a data breach rose by nearly 10% in the past year, the highest rate in over seven years.

    $1.07 million

    More costly when remote work involved in the breach

    The average cost of breaches where remote work is involved is $1.07 million higher than breaches where remote work is not involved.

    The ubiquitous remote work that we saw in 2021 and continue to see in 2022 can lead to more costly security events. (Source: IBM, 2021)

    Remote work is here to stay, and the cost of a breach is higher when remote work is involved.

    The cost comes not only directly from payments but also indirectly from reputational loss. (Source: IBM, 2021)

    Security teams can participate in the solution

    The numbers are clear: in 2022, when we face a threat environment like WE’VE never EXPERIENCED before, good security is worth the investment

    $1.76 million

    Saved when zero trust is deployed facing a breach

    Zero trust controls are realistic and effective controls.

    Organizations that implement zero trust dramatically reduce the cost of an adverse security event.

    35%

    More costly if it takes more than 200 days to identify and contain a breach

    With increased BYOD and remote work, detection and response is more challenging than ever before – but it is also highly effective.

    Organizations that detect and respond to incidents quickly will significantly reduce the impact. (Source: IBM, 2021)

    Breaches are 34% less costly when mature zero trust is implemented.

    A fully staffed and well-prepared security team could save the cost through quick responses. (Source: IBM, 2021)

    Top security priorities and constraints in 2022

    Survey results

    As part of its research process for the 2022 Security Priorities Report, Info-Tech Research Group surveyed security and IT leaders (N=97) to ask their top security priorities as well as their main obstacles to security success in 2022:

    Top Priorities
    A list of the top three priorities identified in the survey with their respective percentages, 'Acquiring and retaining talent, 30%', 'Protecting against and responding to ransomware, 23%', and 'Securing a remote workforce, 23%'.

    Survey respondents were asked to force-rank their security priorities.

    Among the priorities chosen most frequently as #1 were talent management, addressing ransomware threats, and securing hybrid/remote work.

    Top Obstacles
    A list of the top three obstacles identified in the survey with their respective percentages, 'Staffing constraints, 31%', 'Demand of ever-changing business environment, 23%', and 'Budget constraints, 15%'.

    Talent management is both the #1 priority and the top obstacle facing security leaders in 2022.

    Unsurprisingly, the ever-changing environment in a world emerging from a pandemic and budget constraints are also top obstacles.

    We know the priorities…

    But what are security leaders actually working on?

    This report details what we see the world demanding of security leaders in the coming year.

    Setting aside the demands – what are security leaders actually working on?

    A list of 'Top security topics among Info-Tech members' with accompanying bars, 'Security Strategy', 'Security Policies', 'Security Operations', 'Security Governance', and 'Security Incident Response'.

    Many organizations are still mastering the foundations of a mature cybersecurity program.

    This is a good idea!

    Most breaches are still due to gaps in foundational security, not lack of advanced controls.

    We know the priorities…

    But what are security leaders actually working on?

    A list of industries with accompanying bars representing their demand for security. The only industry with a significant positive percentage is 'Government'. Security projects included in annual plan relative to industry.

    One industry plainly stands out from the rest. Government organizations are proportionally much more active in security than other industries, and for good reason: they are common targets.

    Manufacturing and professional services are proportionally less interested in security. This is concerning, given the recent targeting of supply chain and personal data holders by ransomware gangs.

    5 Security Priorities for 2022 Logo for Info-Tech. Logo for ITRG.

    People

    1. Acquiring and Retaining Talent
      Create a good working environment for existing and potential employees. Invest time and effort into talent issues to avoid being understaffed.
    2. Securing a Remote Workforce
      Create a secure environment for users and help your people build safe habits while working remotely.

    Process

    1. Securing Digital Transformation
      Build in security from the start and check in frequently to create agile and secure user experiences.

    Technology

    1. Adopting Zero Trust
      Manage access of sensitive information based on the principle of least privilege.
    2. Protecting Against and Responding to Ransomware
      Put in your best effort to build defenses but also prepare for a breach and know how to recover.

    Main Influencing Factors

    COVID-19 Pandemic
    The pandemic has changed the way we interact with technology. Organizations are universally adapting their business and technology processes to fit the post-pandemic paradigm.
    Rampant Cybercrime Activity
    By nearly every conceivable metric, cybercrime is way up in the past two years. Cybercriminals smell blood and pose a more salient threat than before. Higher standards of cybersecurity capability are required to respond to this higher level of threat.
    Remote Work and Workforce Reallocation
    Talented IT staff across the globe enabled an extraordinarily fast shift to remote and distance work. We must now reckon with the security and human resourcing implications of this huge shift.

    Acquire and Retain Talent

    Priority 01

    Security talent was in short supply before the pandemic, and it's even worse now.

    Executive summary

    Background

    Cybersecurity talent has been in short supply for years, but this shortage has inflected upward since the pandemic.

    The Great Resignation contributed to the existing talent gap. The pandemic has changed how people work as well as how and where they choose work. More and more senior workers are retiring early or opting for remote working opportunities.

    The cost to acquire cybersecurity talent is huge, and the challenge doesn’t end there. Retaining top talent can be equally difficult.

    Current situation

    • A 2021 survey by ESG shows that 76% of security professional agree it’s difficult to recruit talent, and 57% said their organization is affected by this talent shortage.
    • (ISC)2 reports there are 2.72 million unfilled job openings and an increasing workforce gap (2021).

    2.72 million unfilled cybersecurity openings (Source: (ISC)2, 2021)

    IT leaders must do more to attract and retain talent in 2022

    • Over 70% of IT professionals are considering quitting their jobs (TalentLMS, 2021). Meanwhile, 51% of surveyed cybersecurity professionals report extreme burnout during the last 12 months and many of them have considered quitting because of it (VMWare, 2021).
    • Working remotely makes it easier for people to look elsewhere, lowering the barrier to leaving.
    • This is a big problem for security leaders, as cybersecurity talent is in very short supply. The cost of acquiring and retaining quality cybersecurity staff in 2022 is significant, and many organizations are unwilling or unable to pay the premium.
    • Top talent will demand flexible working conditions – even though remote work comes with security risk.
    • Most smart, talented new hires in 2022 are demanding to work remotely most of the time.
    Top reasons for resignations in 2021
    Burnout 30%
    Other remote opportunities 20%
    Lack of growth opportunities 20%
    Poor culture 20%
    Acquisition concerns 10%
    (Source: Survey of West Coast US cybersecurity professionals; TechBeacon, 2021)

    Talent will be 2022’s #1 strength and #1 weakness

    Staffing obstacles in 2022:

    “Attracting and retaining talent is always challenging. We don’t pay as well and my org wants staff in the office at least half of the time. Most young, smart, talented new hires want to work remotely 100 percent of the time.“

    “Trying to grow internal resources into security roles.”

    “Remote work expectations by employees and refusal by business to accommodate.”

    “Biggest obstacle: payscales that are out of touch with cybersecurity market.”

    “Request additional staff. Obtaining funding for additional position is most significant obstacle.”

    (Info-Tech Tech Security Priorities Survey 2022)
    Top obstacles in 2022:

    As you can see, respondents to our security priorities survey have strong feelings on the challenges of staffing a cybersecurity team.

    The growth of remote work means local talent can now be hired by anybody, vastly increasing your competition as an employer.

    Hiring local will get tougher – but so will hiring abroad. People who don’t want to relocate for a new job now have plenty of alternatives. Without a compelling remote work option, you will find non-local prospects unwilling to move for a new job.

    Lastly, many organizations are still reeling at the cost of experienced cybersecurity talent. Focused internal training and development will be the answer for many organizations.

    Recommended Actions

    Provide career development opportunities

    Many security professionals are dissatisfied with their unclear career development paths. To improve retention, organizations should provide their staff with opportunities and clear paths for career and skills advancement.

    Be open-minded when hiring

    To broaden the candidate pool, organizations should be open-minded when considering who to hire.

    • Enable remote work.
    • Do not fixate on certificates and years of experience; rather, be open to developing those who have the right interest and ability.
    • Consider using freelance workers.
    Facilitate work-life balance

    Many security professionals say they experience burnout. Promoting work-life balance in your organization can help retain critical skills.

    Create inclusive environment

    Hire a diverse team and create an inclusive environment where they can thrive.

    Talent acquisition and retention plan

    Use this template to explain the priorities you need your stakeholders to know about.

    Provide a brief value statement for the initiative.

    Address a top priority and a top obstacle with a plan to attract and retain top organizational and cybersecurity talent.

    Initiative Description:

    • Provide secure remote work capabilities for staff.
    • Work with HR to refine a hiring plan that addresses geographical and compensation gaps with cybersecurity and general staff.
    • Survey staff engagement to identify points of friction and remediate where needed.
    • Define a career path and growth plan for staff.
    Description must include what IT will undertake to complete the initiative.

    Primary Business Benefits:

    Arrow pointing down.
    Reduction in costs due to turnover and talent loss

    Other Expected Business Benefits:

    Arrow pointing up.
    Productivity due to good morale/ engagement
    Arrow pointing up.
    Improved corporate culture
    Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

    Risks:

    • Big organizational and cultural changes
    • Increased attack surface of remote/hybrid workforce

    Related Info-Tech Research:

    Secure a Remote Workforce

    Priority 02

    Trends suggest remote work is here to stay. Addressing the risk of insecure endpoints can no longer be deferred.

    Executive summary

    Remote work poses unique challenges to cybersecurity teams. The personal home environment may introduce unauthorized people and unknown network vulnerabilities, and the organization loses nearly all power and influence over the daily cyber hygiene of its users.

    In addition, the software used for enabling remote work itself can be a target of cybersecurity criminals.

    Current situation

    • 70% of workers in technical services work from home.
    • Employees of larger firms and highly paid individuals are more likely to be working outside the office.
    • 80% of security and business leaders find that remote work has increased the risk of a breach.
    • (Source: StatCan, 2021)

    70% of tech workers work from home (Source: Statcan, 2021)

    Remote work demands new security solutions

    The security perimeter is finally gone

    The data is outside the datacenter.
    The users are outside the office.
    The endpoints are … anywhere and everywhere.

    Organizations that did not implement digital transformation changes following COVID-19 experience higher costs following a breach, likely because it is taking nearly two months longer, on average, to detect and contain a breach when more than 50% of staff are working remotely (IBM, 2021).

    In 2022 the cumulative risk of so many remote connections means we need to rethink how we secure the remote/hybrid workforce.

    Security
    • Distributed denial of service
    • DNS hijacking
    • Weak VPN protocols
    Identity
    • One-time verification allowing lateral movement
    Colorful tiles representing the surrounding security solutions. Network
    • Risk perimeter stops at corporate network edge
    • Split tunneling
    Authentication
    • Weak authentication
    • Weak password
    Access
    • Man-in-the-middle attack
    • Cross-site scripting
    • Session hijacking

    Recommended Actions

    Mature your identity management

    Compromised identity is the main vector to breaches in recent years. Stale accounts, contractor accounts, misalignment between HR and IT – the lack of foundational practices leads to headline-making breaches every week.
    Tighten up identity control to keep your organization out of the newspaper.

    Get a handle on your endpoints

    Work-from-home (WFH) often means unknown endpoints on unknown networks full of other unknown devices…and others in the home potentially using the workstation for non-work purposes. Gaining visibility into your endpoints can help to keep detection and resolution times short.

    Educate users

    Educate everyone on security best practices when working remotely:

    • Apply secure settings (not just defaults) to the home network.
    • Use strong passwords.
    • Identify suspicious email.
    Ease of use

    Many workers complain that the corporate technology solution makes it difficult to get their work done.

    Employees will take productivity over security if we force them to choose, so IT needs to listen to end users’ needs and provide a solution that is nimble and secure.

    Roadmap to securing remote/hybrid workforce

    Use this template to explain the priorities you need your stakeholders to know about.

    Provide a brief value statement for the initiative.

    The corporate network now extends to the internet – ensure your security plan has you covered.

    Initiative Description:

    • Reassess enterprise security strategy to include the WFH attack surface (especially endpoint visibility).
    • Ensure authentication requirements for remote workers are sufficient (e.g. MFA, strong passwords, hardware tokens for high-risk users/connections).
    • Assess the value of zero trust networking to minimize the blast radius in the case of a breach.
    • Perform penetration testing annually.
    Description must include what IT will undertake to complete the initiative.

    Primary Business Benefits:

    Arrow pointing down.


    Reduced cost of security incidents/reputational damage

    Other Expected Business Benefits:

    Arrow pointing up.
    Improved ability to attract and retain talent
    Arrow pointing up.
    Increased business adaptability
    Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

    Risks:

    • Potential disruption to traditional working patterns
    • Cost of investing in WFH versus risk of BYOD

    Related Info-Tech Research:

    Secure Digital Transformation

    Priority 03

    Digital transformation could be a competitive advantage…or the cause of your next data breach.

    Executive summary

    Background

    Digital transformation is occurring at an ever-increasing rate these days. As Microsoft CEO Satya Nadella said early in the pandemic, “We’ve seen two years’ worth of digital transformation in two months.”

    We have heard similar stories from Info-Tech members who deployed rollouts that were scheduled to take months over a weekend instead.

    Microsoft’s own shift to rapidly expand its Teams product is a prime example of how quickly the digital landscape has changed. The global adaption to a digital world has largely been a success story, but rapid change comes with risk, and there is a parallel story of rampant cyberattacks like we have never seen before.

    Insight

    There is an adage that “slow is smooth, and smooth is fast” – the implication being that fast is sloppy. In 2022 we’ll see a pattern of organizations working to catch up their cybersecurity with the transformations we all made in 2020.

    $1.78 trillion expected in digital transformation investments (Source: World Economic Forum, 2021)

    An ounce of security prevention versus a pound of cure

    The journey of digital transformation is a risky one.

    Digital transformations often rely heavily on third-party cloud service providers, which increases exposure of corporate data.

    Further, adoption of new technology creates a new threat surface that must be assessed, mitigations implemented, and visibility established to measure performance.

    However, digital transformations are often run on slim budgets and without expert guidance.

    Survey respondents report as much: rushed deployments, increased cloud migration, and shadow IT are the top vulnerabilities reported by security leaders and executives.

    In a 2020 Ponemon survey, 82% of IT security and C-level executives reported experiencing at least one data breach directly resulting from a digital transformation they had undergone.

    Scope creep is inevitable on any large project like a digital transformation. A small security shortcut early in the project can have dire consequences when it grows to affect personal data and critical systems down the road.

    Recommended Actions

    Engage the business early and often

    Despite the risks, organizations engage in digital transformations because they also have huge business value.

    Security leaders should not be seeking to slow or stop digital transformations; rather, we should be engaging with the business early to get ahead of risks and enable successful transformation.

    Establish a vendor security program

    Data is moving out of datacenters and onto third-party environments. Without security requirements built into agreements, and clear visibility into vendor security capabilities, that data is a major source of risk.

    A robust vendor security program will create assurance early in the process and help to reinforce the responsibility of securing data with other parts of the organization.

    Build/revisit your security strategy

    The threat surface has changed since before your transformation. This is the right time to revisit or rebuild your security strategy to ensure that your control set is present throughout the new environment – and also a great opportunity to show how your current security investments are helping secure your new digital lines of business!

    Educate your key players

    Only 16% of security leaders and executives report alignment between security and business processes during digital transformation.

    If security is too low a priority, then key players in your transformation efforts are likely unaware of how security risks impact their own success. It will be incumbent upon the CISO to start that conversation.

    Securing digital transformation

    Use this template to explain the priorities you need your stakeholders to know about.

    Provide a brief value statement for the initiative.

    Ensure your investment in digital transformation is appropriately secured.

    Initiative Description:

    • Engage security with digital transformation and relevant governance structures (steering committees) to ensure security considerations are built into digital transformation planning.
    • Incorporate security stage gates in project management procedures.
    • Establish a vendor security assessment program.
    Description must include what IT will undertake to complete the initiative.

    Primary Business Benefits:

    Arrow pointing up.


    Increased likelihood of digital transformation success

    Other Expected Business Benefits:

    Arrow pointing up.
    Ability to make informed decisions for the field rep strategy
    Arrow pointing down.
    Reduced long-term cost of digital transformation
    Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

    Risks:

    • Potential increased up front cost (reduced long-term cost)
    • Potential slowed implementation with security stage gates in project management

    Related Info-Tech Research:

    Adopt Zero Trust

    Priority 04

    Governments are recognizing the importance of zero trust strategies. So should your organization.

    Why now for zero trust?

    John Kindervag modernized the concept of zero trust back in 2010, and in the intervening years there has been enormous interest in cybersecurity circles, yet in 2022 only 30% of organizations report even beginning to roll out zero trust capabilities (Statista, 2022).

    Why such little action on a revolutionary and compelling model?

    Zero trust is not a technology; it is a principle. Zero trust adoption takes concerted planning, effort, and expense, for which the business value has been unclear throughout most of the last 10 years. However, several recent developments are changing that:

    • Securing technology has become very hard! The size, complexity, and attack surface of IT environments has grown significantly – especially since the pandemic.
    • Cyberattacks have become rampant as the cost to deploy harmful ransomware has become lower and the impact has become higher.
    • The shift away from on-premises datacenters and offices created an opening for zero trust investment, and zero trust technology is more mature than ever before.

    The time has come for zero trust adoption to begin in earnest.

    97% will maintain or increase zero trust budget (Source: Statista, 2022)

    Traditional perimeter security is not working

    Zero trust directly addresses the most prevalent attack vectors today

    A hybrid workforce using traditional VPN creates an environment where we are exposed to all the risks in the wild (unknown devices at any location on any network), but at a stripped-down security level that still provides the trust afforded to on-premises workers using known devices.

    What’s more, threats such as ransomware are known to exploit identity and remote access vulnerabilities before moving laterally within a network – vectors that are addressed directly by zero trust identity and networking. Ninety-three percent of surveyed zero trust adopters state that the benefits have matched or exceeded their expectations (iSMG, 2022).

    Top reasons for building a zero trust program in 2022

    (Source: iSMG, 2022)

    44%

    Enforce least privilege access to critical resources

    44%

    Reduce attacker ability to move laterally

    41%

    Reduce enterprise attack surface

    The business case for zero trust is clearer than ever

    Prior obstacles to Zero Trust are disappearing

    A major obstacle to zero trust adoption has been the sheer cost, along with the lack of business case for that investment. Two factors are changing that paradigm in 2022:

    The May 2021 US White House Executive Order for federal agencies to adopt zero trust architecture finally placed zero trust on the radar of many CEOs and board members, creating the business interest and willingness to consider investing in zero trust.

    In addition, the cost of adopting zero trust is quickly being surpassed by the cost of not adopting zero trust, as cyberattacks become rampant and successful zero trust deployments create a case study to support investment.

    Bar chart titled 'Cost to remediate a Ransomware attack' with bars representing the years '2021' and '2020'. 2021's cost sits around $1.8M while 2020's was only $750K The cost to remediate a ransomware attack more than doubled from 2020 to 2021. Widespread adoption of zero trust capabilities could keep that number from doubling again in 2022. (Source: Sophos, 2021)

    The cost of a data breach is on average $1.76 million less for organizations with mature zero trust deployments.

    That is, the cost of a data breach is 35% reduced compared to organizations without zero trust controls. (Source: IBM, 2021)

    Recommended Actions

    Start small

    Don’t put all your eggs in one basket by deploying zero trust in a wide swath. Rather, start as small as possible to allow for growing pains without creating business friction (or sinking your project altogether).

    Build a sensible roadmap

    Zero trust principles can be applied in a myriad of ways, so where should you start? Between identities, devices, networking, and data, decide on a use case to do pilot testing and then refine your approach.

    Beware too-good-to-be-true products

    Zero trust is a powerful buzzword, and vendors know it.

    Be skeptical and do your due diligence to ensure your new security partners in zero trust are delivering what you need.

    Zero trust roadmap

    Use this template to explain the priorities you need your stakeholders to know about.

    Provide a brief value statement for the initiative.

    Develop a practical roadmap that shows the business value of security investment.

    Initiative Description:

    • Define desired business and security outcomes from zero trust adoption.
    • Assess zero trust readiness.
    • Build roadmaps for zero trust:
      1. Identity
      2. Networking
      3. Devices
      4. Data
    Description must include what IT will undertake to complete the initiative.

    Primary Business Benefits:

    Arrow pointing up.


    Increased security posture and business agility

    Other Expected Business Benefits:

    Arrow pointing down.
    Reduced impact of security events
    Arrow pointing down.
    Reduced cost of managing complex control set
    Arrow pointing up.
    More secure business transformation (i.e. cloud/digital)
    Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

    Risks:

    • Learning curve of implementation (start small and slow)
    • Transition from current control set to zero trust model

    Related Info-Tech Research:

    Protect Against and Respond to Ransomware

    Priority 05

    Ransomware is still the #1 threat to the safety of your data.

    Executive summary

    Background

    • Ransomware attacks have transformed in 2021 and show no sign of slowing in 2022. There is a new major security breach every week, despite organizations spending over $150 billion in a year on cybersecurity (Nasdaq, 2021).
    • Ransomware as a service (RaaS) is commonplace, and attackers are doubling down by holding encrypted data ransom and also demanding payment under threat to disclose exfiltrated data – and they are making good on their threats.
    • The global cost of ransomware is expected to rise to $265 billion by 2031 (Cybersecurity Ventures, 2021).
    • We expect to see an increase in ransomware incidents in 2022, both in severity and volume – multiple attacks and double extortion are now the norm.
    • High staff turnover increases risk because new employees are unfamiliar with security protocols.

    150% increase ransomware attacks in 2020 (Source: ENISA)

    This is a new golden age of ransomware

    What is the same in 2022

    Unbridled ransomware attacks make it seem like attackers must be using complex new techniques, but prevalent ransomware attack vectors are actually well understood.

    Nearly all modern variants are breaching victim systems in one of three ways:

    • Email phishing
    • Software vulnerabilities
    • RDP/Remote access compromise
    What is new in 2022
    The sophistication of victim targeting

    Victims often find themselves asking, “How did the attackers know to phish the most security-oblivious person in my staff?” Bad actors have refined their social engineering and phishing to exploit high-risk individuals, meaning your chain is only as strong as the weakest link.

    Ability of malware to evade detection

    Modern ransomware is getting better at bypassing anti-malware technology, for example, through creative techniques such as those seen in the MedusaLocker variant and in Ghost Control attacks.

    Effective anti-malware is still a must-have control, but a single layer of defense is no longer enough. Any organization that hopes to avoid paying a ransom must prepare to detect, respond, and recover from an attack.

    Many leaders still don’t know what a ransomware recovery would look like

    Do you know what it would take to recover from a ransomware incident?

    …and does your executive leadership know what it would take to recover?

    The organizations that are most likely to pay a ransom are unprepared for the reality of recovering their systems.

    If you have not done a tabletop or live exercise to simulate a true recovery effort, you may be exposed to more risk than you realize.

    Are your defenses sufficiently hardened against ransomware?

    Organizations with effective security prevention are often breached by ransomware – but they are prepared to contain, detect, and eradicate the infection.

    Ask yourself whether you have identified potential points of entry for ransomware. Assume that your security controls will fail.

    How well are your security controls layered, and how difficult would it be for an attacker to move east/west within your systems?

    Recommended Actions

    Be prepared for a breach

    There is no guarantee that an organization will not fall victim to ransomware, so instead of putting all their effort into prevention, organizations should also put effort into planning to respond to a breach.

    Security awareness training/phishing detection

    Phishing continues to be the main point of entry for ransomware. Investing in phishing awareness and detection among your end users may be the most impactful countermeasure you can implement.

    Zero trust adoption

    Always verify at every step of interaction, even when access is requested by internal users. Manage access of sensitive information based on the principle of least privilege access.

    Encrypt and back up your data

    Encrypt your data so that even if there is a breach, the attackers don’t have a copy of your data. Also, keep regular backups of data at a separate location so that you still have data to work with after a breach occurs.

    You never want to pay a ransom. Being prepared to deal with an incident is your best chance to avoid paying!

    Prevent and respond to ransomware

    Use this template to explain the priorities you need your stakeholders to know about.

    Provide a brief value statement for the initiative.

    Determine your current readiness, response plan, and projects to close gaps.

    Initiative Description:

    • Execute a systematic assessment of your current security and ransomware recovery capabilities.
    • Perform tabletop activities and live recoveries to test data recovery capabilities.
    • Train staff to detect suspicious communications and protect their identities.
    Description must include what IT will undertake to complete the initiative.

    Primary Business Benefits:

    Arrow pointing up.


    Improved productivity and brand protection

    Other Expected Business Benefits:

    Arrow pointing down.
    Reduced downtime and disruption
    Arrow pointing down.
    Reduced cost due to incidents (ransom payments, remediation)
    Align initiative benefits back to business benefits or benefits for the stakeholder groups that it impacts.

    Risks:

    • Friction with existing staff

    Related Info-Tech Research:

    Deepfakes: Dark-horse threat for 2022

    Deepfake video

    How long has it been since you’ve gone a full workday without having a videoconference with someone?

    We have become inherently trustful that the face we see on the screen is real, but the technology required to falsify that video is widely available and runs on commercially available hardware, ushering in a genuinely post-truth online era.

    Criminals can use deepfakes to enhance social engineering, to spread misinformation, and to commit fraud and blackmail.

    Deepfake audio

    Many financial institutions have recently deployed voiceprint authentication. TD describes its VoicePrint as “voice recognition technology that allows us to use your voiceprint – as unique to you as your fingerprint – to validate your identity” over the phone.

    However, hackers have been defeating voice recognition for years already. There is ripe potential for voice fakes to fool both modern voice recognition technology and the accounts payable staff.

    Bibliography

    “2021 Ransomware Statistics, Data, & Trends.” PurpleSec, 2021. Web.

    Bayern, Macy. “Why 60% of IT security pros want to quit their jobs right now.” TechRepublic, 10 Oct. 2018. Web.

    Bresnahan, Ethan. “How Digital Transformation Impacts IT And Cyber Risk Programs.” CyberSaint Security, 25 Feb. 2021. Web.

    Clancy, Molly. “The True Cost of Ransomware.” Backblaze, 9 Sept. 2021.Web.

    “Cost of a Data Breach Report 2021.” IBM, 2021. Web.

    Cybersecurity Ventures. “Global Ransomware Damage Costs To Exceed $265 Billion By 2031.” Newswires, 4 June 2021. Web.

    “Digital Transformation & Cyber Risk: What You Need to Know to Stay Safe.” Ponemon Institute, June 2020. Web.

    “Global Incident Response Threat Report: Manipulating Reality.” VMware, 2021.

    Granger, Diana. “Karmen Ransomware Variant Introduced by Russian Hacker.” Recorded Future, 18 April 2017. Web.

    “Is adopting a zero trust model a priority for your organization?” Statista, 2022. Web.

    “(ISC)2 Cybersecurity Workforce Study, 2021: A Resilient Cybersecurity Profession Charts the Path Forward.” (ISC)2, 2021. Web.

    Kobialka, Dan. “What Are the Top Zero Trust Strategies for 2022?” MSSP Alert, 10 Feb. 2022. Web.

    Kost, Edward. “What is Ransomware as a Service (RaaS)? The Dangerous Threat to World Security.” UpGuard, 1 Nov. 2021. Web.

    Lella, Ifigeneia, et al., editors. “ENISA Threat Landscape 2021.” ENISA, Oct. 2021. Web.

    Mello, John P., Jr. “700K more cybersecurity workers, but still a talent shortage.” TechBeacon, 7 Dec. 2021. Web.

    Naraine, Ryan. “Is the ‘Great Resignation’ Impacting Cybersecurity?” SecurityWeek, 11 Jan. 2022. Web.

    Oltsik, Jon. “ESG Research Report: The Life and Times of Cybersecurity Professionals 2021 Volume V.” Enterprise Security Group, 28 July 2021. Web.

    Osborne, Charlie. “Ransomware as a service: Negotiators are now in high demand.” ZDNet, 8 July 2021. Web.

    Osborne, Charlie. “Ransomware in 2022: We’re all screwed.” ZDNet, 22 Dec. 2021. Web.

    “Retaining Tech Employees in the Era of The Great Resignation.” TalentLMS, 19 Oct. 2021. Web.

    Rubin, Andrew. “Ransomware Is the Greatest Business Threat in 2022.” Nasdaq, 7 Dec. 2021. Web.

    Samartsev, Dmitry, and Daniel Dobrygowski. “5 ways Digital Transformation Officers can make cybersecurity a top priority.“ World Economic Forum, 15 Sept. 2021. Web.

    Seymour, John, and Azeem Aqil. “Your Voice is My Passport.” Presented at black hat USA 2018.

    Solomon, Howard. “Ransomware attacks will be more targeted in 2022: Trend Micro.” IT World Canada, 6 Jan. 2022. Web.

    “The State of Ransomware 2021.” Sophos, April 2021. Web.

    Tarun, Renee. “How The Great Resignation Could Benefit Cybersecurity.” Forbes Technology Council, Forbes, 21 Dec. 2021. Web.

    “TD VoicePrint.” TD Bank, n.d. Web.

    “Working from home during the COVID-19 pandemic, April 202 to June 2021.” Statistics Canada, 4 Aug. 2021. Web.

    “Zero Trust Strategies for 2022.” iSMG, Palo Alto Networks, and Optiv, 28 Jan. 2022. Web.

    Configuration management

    • Buy Link or Shortcode: {j2store}4|cart{/j2store}
    • Related Products: {j2store}4|crosssells{/j2store}
    • Up-Sell: {j2store}4|upsells{/j2store}
    • Download01-Title: Harness the power of Configuration Management Executive Brief
    • Download-01: Visit Link
    • member rating overall impact: 8.0/10
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Infra and Operations
    • Parent Category Link: /infra-and-operations
    Configuration management is all about being able to manage your assets within the support processes. That means to record what you need. Not less than that, and not more either.

    Asset Management, Configuration Management, Lifecycle Management

    Create and Manage Enterprise Data Models

    • Buy Link or Shortcode: {j2store}340|cart{/j2store}
    • member rating overall impact: 9.2/10 Overall Impact
    • member rating average dollars saved: $7,263 Average $ Saved
    • member rating average days saved: 16 Average Days Saved
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • Business executives don’t understand the value of Conceptual and Logical Data Models and how they define their data assets.
    • Data, like mercury, is difficult to manage and contain.
    • IT needs to justify the time and cost of developing and maintaining Data Models.
    • Data as an asset is only perceived from a physical point of view, and the metadata that provides context and definition is often ignored.

    Our Advice

    Critical Insight

    • Data Models tell the story of the organization and its data in pictures to be used by a business as a tool to evolve the business capabilities and processes.
    • Data Architecture and Data Modeling have different purposes and should be represented as two distinct processes within the software development lifecycle (SDLC).
    • The Conceptual Model provides a quick win for both business and IT because it can convey abstract business concepts and thereby compartmentalize the problem space.

    Impact and Result

    • A Conceptual Model can be used to define the semantics and relationships for your analytical layer.
      • It provides a visual representation of your data in the semantics of business.
      • It acts as the anchor point for all data lineages.
      • It can be used by business users and IT for data warehouse and analytical planning.
      • It provides the taxonomies for data access profiles.
      • It acts as the basis for your Enterprise Logical and Message Models.

    Create and Manage Enterprise Data Models Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should create enterprise data models, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Setting the stage

    Prepare your environment for data architecture.

    • Enterprise Data Models

    2. Revisit your SDLC

    Revisit your SDLC to embed data architecture.

    • Enterprise Architecture Tool Selection

    3. Develop a Conceptual Model

    Create and maintain your Conceptual Data Model via an iterative process.

    4. Data Modeling Playbook

    View the main deliverable with sample models.

    • Data Modeling Playbook
    [infographic]

    Workshop: Create and Manage Enterprise Data Models

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Establish the Data Architecture Practice

    The Purpose

    Understand the context and goals of data architecture in your organization.

    Key Benefits Achieved

    A foundation for your data architecture practice.

    Activities

    1.1 Review the business context.

    1.2 Obtain business commitment and expectations for data architecture.

    1.3 Define data architecture as a discipline, its role, and the deliverables.

    1.4 Revisit your SDLC to embed data architecture.

    1.5 Modeling tool acquisition if required.

    Outputs

    Data Architecture vision and mission and governance.

    Revised SDLC to include data architecture.

    Staffing strategy.

    Data Architecture engagement protocol.

    Installed modeling tool.

    2 Business Architecture and Domain Modeling

    The Purpose

    Identify the concepts and domains that will inform your data models.

    Key Benefits Achieved

    Defined concepts for your data models.

    Activities

    2.1 Revisit business architecture output.

    2.2 Business domain selection.

    2.3 Identify business concepts.

    2.4 Organize and group of business concepts.

    2.5 Build the Business Data Glossary.

    Outputs

    List of defined and documented entities for the selected.

    Practice in the use of capability and business process models to identify key data concepts.

    Practice the domain modeling process of grouping and defining your bounded contexts.

    3 Harvesting Reference Models

    The Purpose

    Harvest reference models for your data architecture.

    Key Benefits Achieved

    Reference models selected.

    Activities

    3.1 Reference model selection.

    3.2 Exploring and searching the reference model.

    3.3 Harvesting strategies and maintaining linkage.

    3.4 Extending the conceptual and logical models.

    Outputs

    Established and practiced steps to extend the conceptual or logical model from the reference model while maintaining lineage.

    4 Harvesting Existing Data Artifacts

    The Purpose

    Gather more information to create your data models.

    Key Benefits Achieved

    Remaining steps and materials to build your data models.

    Activities

    4.1 Use your data inventory to select source models.

    4.2 Match semantics.

    4.3 Maintain lineage between BDG and existing sources.

    4.4 Select and harvest attributes.

    4.5 Define modeling standards.

    Outputs

    List of different methods to reverse engineer existing models.

    Practiced steps to extend the logical model from existing models.

    Report examples.

    5 Next Steps and Wrap-Up (offsite)

    The Purpose

    Wrap up the workshop and set your data models up for future success.

    Key Benefits Achieved

    Understanding of functions and processes that will use the data models.

    Activities

    5.1 Institutionalize data architecture practices, standards, and procedures.

    5.2 Exploit and extend the use of the Conceptual model in the organization.

    Outputs

    Data governance policies, standards, and procedures for data architecture.

    List of business function and processes that will utilize the Conceptual model.

    Define Service Desk Metrics That Matter

    • Buy Link or Shortcode: {j2store}491|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Service Desk
    • Parent Category Link: /service-desk
    • Consolidate your metrics and assign context and actions to ones currently tracked.
    • Establish tension metrics to see and tell the whole story.
    • Split your metrics for each stakeholder group. Assign proper cadences for measurements as a first step to building an effective dashboard.

    Our Advice

    Critical Insight

    • Identify the metrics that serve a real purpose and eliminate the rest. Establish a formal review process to ensure metrics are still valid, continue to provide the answers needed, and are at a manageable and usable level.

    Impact and Result

    • Tracking goal- and action-based metrics allows you to make meaningful, data-driven decisions for your service desk. You can establish internal benchmarks to set your own baselines.
    • Predefining the audience and cadence of each metric allows you to construct targeted dashboards to aid your metrics analysis.

    Define Service Desk Metrics That Matter Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Define Service Desk Metrics That Matter Storyboard – A deck that shows you how to look beyond benchmarks and rely on internal metrics to drive success.

    Deciding which service desk metrics to track and how to analyze them can be daunting. Use this deck to narrow down your goal-oriented metrics as a starting point and set your own benchmarks.

    • Define Service Desk Metrics That Matter Storyboard

    2. Service Desk Metrics Workbook – A tool to organize your service desk metrics.

    For each metric, consider adding the relevant overall goal, audience, cadence, and action. Use the audience and cadence of the metric to split your tracked metrics into various dashboards. Your final list of metrics and reports can be added to your service desk SOP.

    • Service Desk Metrics Workbook
    [infographic]

    Further reading

    Define Service Desk Metrics That Matter

    Look beyond benchmarks and rely on internal metrics to drive success.

    Analyst Perspective

    Don’t get paralyzed by benchmarks when establishing metrics

    When establishing a suite of metrics to track, it’s tempting to start with the metrics measured by other organizations. Naturally, benchmarking will enter the conversation. While benchmarking is useful, measuring you organization against others with a lack of context will only highlight your failures. Furthermore, benchmarks will highlight the norm or common practice. It does not necessarily highlight best practice.

    Keeping the limitations of benchmarking in mind, establish your own metrics suite with action-based metrics. Define the audience, cadence, and actions for each metric you track and pair them with business goals. Measure only what you need to.

    Slowly improve your metrics process over time and analyze your environment using your own data as your benchmark.

    Benedict Chang

    Research Analyst, Infrastructure & Operations

    Info-Tech Research Group

    Executive Summary

    Your Challenge

    • Measure the business value provided by the service desk.
    • Consolidate your metrics and assign context and actions to ones currently tracked.
    • Establish tension metrics to see and tell the whole story.
    • Split your metrics for each stakeholder group. Assign proper cadences for measurements as a first step to building an effective dashboard or effective dashboards.

    Common Obstacles

    • Becoming too focused on benchmarks or unidimensional metrics (e.g. cost, first-contact resolution, time to resolve) can lead to misinterpretation of the data and poorly informed actions.
    • Sifting through the many sources of data post hoc can lead to stalling in data analysis or slow reaction times to poor metrics.
    • Dashboards can quickly become cluttered with uninformative metrics, thus reducing the signal-to-noise ratio of meaningful data.

    Info-Tech's Approach

    • Use metrics that drive productive change and improvement. Track only what you need to report on.
    • Ensure each metric aligns with the desired business goal, is action-based, and includes the answers to what, why, how, and who.
    • Establish internal benchmarks by analyzing the trends from your own data to set baselines.
    • Act on the results of your metrics by adjusting targets and measuring success.

    Info-Tech Insight

    Identify the metrics that serve a real purpose and eliminate the rest. Establish a formal review process to ensure metrics are still valid, continue to provide the answers needed, and are at a manageable and usable level.

    Improve your metrics to align IT with strategic business goals

    The right metrics can tell the business how hard IT works and how well they perform.

    • Only 19% of CXOs feel that their organization is effective at measuring the success of IT projects with their current metrics.
    • Implementing the proper metrics can facilitate communication between the business division and IT practice.
    • The proper metrics can help IT know what issues the business has and how the CEO and CIO should tackle them.
    • If the goals above resonate with your organization, our blueprint Take Control of Infrastructure and Operations Metrics will take you through the right steps.

    Current Metrics Suite

    19% Effective

    36% Some Improvement Necessary

    45% Significant Improvement Necessary

    Source: Info-Tech Research Group’s CEO/CIO Alignment Diagnostic, 2019; N=622

    CXOs stress that value is the most critical area for IT to improve in reporting

    • You most likely have to improve your metrics suite by addressing business value.
    • Over 80% of organizations say they need improvement to their business value metrics, with 32% of organizations reporting that significant improvement is needed.
    • Of course, measuring metrics for service desk operations is important, but don’t forget business-oriented metrics such as measuring knowledgebase articles written for shift-left enablement, cost (time and money) of service desk tickets, and overall end-user satisfaction.

    The image shows a bar graph with percentages on the Y-Acis, and the following categories on the X-Axis: Business value metrics; Stakeholder satisfaction reporting; Risk metrics; Technology performance & operating metrics; Cost & Salary metrics; and Ad hoc feedback from executives and staff. Each bar is split into two sections, with the blue section marked a Significant Improvement Necessary, and the purple section labelled Some Improvement necessary. Two sections are highlighted with red circles: Business Value metrics--32% blue; 52% purple; and Technology performance & operating metrics--23% blue and 51% purple.

    Source: Info-Tech Research Group’s CEO/CIO Alignment Diagnostic, 2019; N=622

    Benchmarking used in isolation will not tell the whole story

    Benchmarks can be used as a step in the metrics process

    They can be the first step to reach an end goal, but if benchmarks are observed in isolation, it will only highlight your failures.

    Benchmarking relies on standardized models

    This does not account for all the unique variables that make up an IT organization.

    For example, benchmarks that include cost and revenue may include organizations that prioritize first-call resolution (FCR), but the variables that make up this benchmark model will be quite different within your own organization.

    Info-Tech Insight

    Benchmarks reflect the norm and common practice, not best practice.

    Benchmarks are open to interpretation

    Taking the time to establish proper metrics is often more valuable time spent than going down the benchmark rabbit hole.

    Being above or below the norm is neither a good nor a bad thing.

    Determining what the results mean for you depends on what’s being measured and the unique factors, characteristics, and priorities in your organization.

    If benchmark data is a priority within your IT organization, you may look up organizations like MetricNet, but keep the following in mind:

    Review the collected benchmark data

    See where IT organizations in your industry typically stand in relation to the overall benchmark.

    Assess the gaps

    Large gaps between yourself and the overall benchmark could indicate areas for improvement or celebration. Use the data to focus your analysis, develop deeper self-awareness, and prioritize areas for potential concern.

    Benchmarks are only guidelines

    The benchmark source data may not come from true peers in every sense. Each organization is different, so always explore your unique context when interpreting any findings.

    Rely on internal metrics to measure and improve performance

    Measure internal metrics over time to define goals and drive real improvement

    • Internally measured metrics are more reliable because they provide information about your actual performance over time. This allows for targeted improvements and objective measurements of your milestones.
    • Whether a given metric is the right one for your service desk will depend on several different factors, including:
      • The maturity and capability of your service desk processes
      • The volume of service requests and incidents
      • The complexity of your environment when resolving tickets
      • The degree to which your end users are comfortable with self-service

    Take Info-Tech’s approach to metrics management

    Use metrics that drive productive change and improvement. Track only what you need to report on.

    Ensure each metric aligns with the desired business goal, is action-based, and includes the answers to what, why, how, and who.

    Establish internal benchmarks by analyzing the trends from your own data to set baselines.

    Act on the results of your metrics by adjusting targets and measuring success.

    Define action-based metrics to cut down on analysis paralysis

    Every metric needs to be backed with the following criteria:

    • Defining audience, cadence, goal, and action for each metric allows you to keep your tracked metrics to a minimum while maximizing the value.
    • The audience and cadence of each metric may allow you to define targeted dashboards.

    Audience - Who is this metric tracked for?

    Goal - Why are you tracking this metric? This can be defined along with the CSFs and KPIs.

    Cadence - How often are you going to view, analyze, and action this metric?

    Action - What will you do if this metric spikes, dips, trends up, or trends down?

    Activity 1. Define your critical success factors and key performance indicators

    Critical success factors (CSFs) are high-level goals that help you define the direction of your service desk. Key performance indicators (KPIs) can be treated as the trend of metrics that will indicate that you are moving in the direction of your CSFs. These will help narrow the data you have to track and action (metrics).

    CSFs, or your overall goals, typically revolve around three aspects of the service desk: time spent on tickets, resources spent on tickets, and the quality of service provided.

    1. As a group, brainstorm the CSFs and the KPIs that will help narrow your metrics. Use the Service Desk Metrics Workbook to record the results.
    2. Look at the example to the right as a starting point.

    Example metrics:

    Critical success factor Key performance indicator
    High End-User Satisfaction Increasing CSAT score on transactional surveys
    High end-user satisfaction score
    Proper resolution of tickets
    Low time to resolve
    Low Cost per Ticket Decreasing cost per ticket (due to efficient resolution, FCR, automation, self-service, etc.)
    Improve Access to Self-Service (tangential to improve customer service) High utilization of knowledgebase
    High utilization of portal

    Download the Service Desk Metrics Workbook

    Activity 2. Define action-based metrics that align with your KPIs and CSFs

    1. Now that you have defined your goals, continue to fill the workbook by choosing metrics that align with those goals.
    2. Use the chart below as a guide. For every metric, define the cadence of measurement, audience of the metric, and action associated with the metric. There may be multiple metrics for each KPI.
    3. If you find you are unable to define the cadence, audience, or action associated with a metric, you may not need to track the metric in the first place. Alternatively, if you find that you may action a metric in the future, you can decide to start gathering data now.

    Example metrics:

    Critical success factor Key performance indicator Metric Cadence Audience Action
    High End-User Satisfaction Increasing CSAT score on transactional surveys Monthly average of ticket satisfaction scores Monthly Management Action low scores immediately, view long-term trends
    High end-user satisfaction score Average end-user satisfaction score from annual survey Annually IT Leadership View IT satisfaction trends to align IT with business direction
    Proper resolution of tickets Number of tickets reopened Weekly Service Desk Technicians Action reopened tickets, look for training opportunities
    SLA breach rate Daily Service Desk Technicians Action reopened tickets, look for training opportunities
    Low time to resolve Average TTR (incidents) Weekly Management Look for trends to monitor resources
    Average TTR by priority Weekly Management Look for TTR solve rates to align with SLA
    Average TTR by tier Weekly Management Look for improperly escalated tickets or shift-left opportunities

    Download the Service Desk Metrics Workbook

    Activity 3. Define the data ownership, metric viability, and dashboards

    1. For each metric, define where the data is housed. Ideally, the data is directly in the ticketing tool or ITSM tool. This will make it easy to pull and analyze.
    2. Determine how difficult the metric will be to pull or track. If the effort is high, decide if the value of tracking the metric is worth the hassle of gathering it.
    3. Lastly, for each metric, use the cadence and audience to place the metric in a reporting dashboard. This will help divide your metrics and make them easier to report and action.
    4. You may use the output of this exercise to add your tracked metrics to your service desk SOP.
    5. A full suite of metrics can be found in our Infrastructure & Operations Metrics Library in the Take Control of Infrastructure Metrics Storyboard. The metrics have been categorized by low, medium, and advanced capabilities for you.

    Example metrics:

    Metric Who Owns the Data? Efforts to Track? Dashboards
    Monthly average of ticket satisfaction scores Service Desk Low Monthly Management Meeting
    Average end-user satisfaction score Service Desk Low Leadership Meeting
    Number of tickets reopened Service Desk Low Weekly Technician Standup
    SLA breach rate Service Desk Low Daily Technician Standup
    Average TTR (incidents) Service Desk Low Weekly Technician Standup
    Average TTR by priority Service Desk Low Weekly Technician Standup
    Average TTR by tier Service Desk Low Weekly Technician Standup
    Average TTR (SRs) Service Desk Low Weekly Technician Standup
    Number of tickets reopened Service Desk Low Daily Technician Standup

    Download the Service Desk Metrics Workbook

    Keep the following considerations in mind when defining which metrics matter

    Keep the customer in mind

    Metrics are typically focused on transactional efficiency and process effectiveness and not what was achieved against the customers’ need and satisfaction.

    Understand the relationships between performance and metrics management to provide the end-to-end service delivery picture you are aiming to achieve.

    Don’t settle for tool defaults

    ITSM solutions offer an abundance of metrics to choose from. The most common ones are typically built into the reporting modules of the tool suite.

    Do not start tracking everything. Choose metrics that are specifically aligned to your organization’s desired business outcomes.

    Establish tension metrics to achieve balance

    Don’t ignore the correlation and context between the suites of metrics chosen and how one interacts and affects the other.

    Measuring metrics in isolation may lead to an incomplete picture or undesired technician behavior. Tension metrics help complete the picture and lead to proper actions.

    Adjust those targets

    An arbitrary target on a metric that is consistently met month over month is useless. Each metric should inform the overall performance by combining capable service level management and customer experience programs to prove the value IT is providing to the organization.

    Related Info-Tech Research

    Standardize the Service Desk

    This project will help you build and improve essential service desk processes, including incident management, request fulfillment, and knowledge management, to create a sustainable service desk.

    Take Control of Infrastructure and Operations Metrics

    Make faster decisions and improve service delivery by using the right metrics for the job.

    Analyze Your Service Desk Ticket Data

    Take a data-driven approach to service desk optimization.

    IT Diagnostics: Build a Data-Driven IT Strategy

    Our data-driven programs ask business and IT stakeholders the right questions to ensure you have the inputs necessary to build an effective IT strategy.

    Optimize the IT Operations Center

    • Buy Link or Shortcode: {j2store}449|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Operations Management
    • Parent Category Link: /i-and-o-process-management
    • Your team’s time is burned up by incident response.
    • Manual repetitive work uses up expensive resources.
    • You don’t have the visibility to ensure the availability the business demands.

    Our Advice

    Critical Insight

    • Sell the project to the business.
    • Leverage the Operations Center to improve IT Operations.

    Impact and Result

    • Clarify lines of accountability and metrics for success.
    • Implement targeted initiatives and track key metrics for continual improvement.

    Optimize the IT Operations Center Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should Optimize the IT Operations Center, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Lightning Phase: Pluck Low-Hanging Fruit for Quick Wins

    Get quick wins to demonstrate early value for investments in IT Operations.

    • Optimize the IT Operations Center – Lightning Phase: Pluck Low-Hanging Fruit for Quick Wins

    2. Get buy-in

    Get buy-in from business stakeholders by speaking their language.

    • Optimize the IT Operations Center – Phase 1: Get Buy-In
    • IT Operations Center Prerequisites Assessment Tool
    • IT Operations Center Stakeholder Buy-In Presentation
    • IT Operations Center Continual Improvement Tracker

    3. Define accountability and metrics

    Formalize process and task accountability and develop targeted metrics.

    • Optimize the IT Operations Center – Phase 2: Define Accountability and Metrics
    • IT Operations Center RACI Charts Template

    4. Assess gaps and prioritize initiatives

    Identify pain points and determine the top solutions.

    • Optimize the IT Operations Center – Phase 3: Assess Gaps and Prioritize Initiatives
    • IT Operations Center Gap and Initiative Tracker
    • IT Operations Center Initiative Prioritization Tool

    5. Launch initiatives and track metrics

    Lay the foundation for implementation and continual improvement.

    • Optimize the IT Operations Center – Phase 4: Launch Initiatives and Track Metrics
    [infographic]

    Workshop: Optimize the IT Operations Center

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Check Foundation

    The Purpose

    Ensure base maturity in IT Operations processes.

    Key Benefits Achieved

    Verify that foundation is in place to proceed with Operations Center project.

    Activities

    1.1 Evaluate base maturity.

    Outputs

    IT Operations Center Prerequisites Assessment Tool

    2 Define Accountabilities

    The Purpose

    Define accountabilities for Operations processes and tasks.

    Key Benefits Achieved

    Documented accountabilities.

    Activities

    2.1 Pluck low-hanging fruit for quick wins.

    2.2 Complete process RACI.

    2.3 Complete task RACI.

    Outputs

    Project plan

    Process RACI

    Task RACI

    3 Map the Challenge

    The Purpose

    Define metrics and identify accountabilities and gaps.

    Key Benefits Achieved

    List of initiatives to address pain points.

    Activities

    3.1 Define metrics.

    3.2 Define accountabilities.

    3.3 Identify gaps.

    Outputs

    IT Operations Center Gap and Initiative Tracker

    4 Build Action Plan

    The Purpose

    Develop an action plan to boost KPIs.

    Key Benefits Achieved

    Action plan and success criteria.

    Activities

    4.1 Prioritize initiatives.

    Outputs

    IT Operations Center Initiative Prioritization Tool

    5 Map Out Implementation

    The Purpose

    Build an implementation plan for continual improvement.

    Key Benefits Achieved

    Continual improvement against identified metrics and KPIs.

    Activities

    5.1 Build implementation plan.

    Outputs

    IT Operations Center Continual Improvement Tracker

    Further reading

    Optimize the IT Operations Center

    Stop burning budget on non-value-adding activities.

    ANALYST PERSPECTIVE

    The Network Operations Center is not in Kansas anymore.

    "The old-school Network Operations Center of the telecom world was heavily peopled and reactionary. Now, the IT Operations Center is about more than network monitoring. An effective Operations Center provides visibility across the entire stack, generates actionable alerts, resolves a host of different incidents, and drives continual improvement in the delivery of high-quality services.
    IT’s traditional siloed approach cannot provide the value the business demands. The modern Operations Center breaks down these silos for the end-to-end view required for a service-focused approach."

    Derek Shank,
    Research Analyst, Infrastructure & Operations
    Info-Tech Research Group

    Our understanding of the problem

    This Research Is Designed For:

    • IT Operations Managers
    • IT Infrastructure Managers
    • CIOs

    This Research Will Help You:

    • Improve reliability of services.
    • Reduce the cost of incident response.
    • Reduce the cost of manual repetitive work (MRW).

    This Research Will Also Assist

    • Business Analysts
    • Project Managers
    • Business Relationship Managers

    This Research Will Help Them

    • Develop appropriate non-functional requirements.
    • Integrate non-functional requirements into solution design and project implementation.

    Executive Summary

    Situation

    • Your team’s time is burned up by incident response.
    • MRW burns up expensive resources.
    • You don’t have the visibility to ensure the availability the business demands.

    Complication

    • The increasing complexity of technology has resulted in siloed teams of specialists.
    • The business views IT Operations as a cost center and doesn’t want to provide resources to support improvement initiatives.

    Resolution

    • Pluck low-hanging fruit for quick wins.
    • Obtain buy-in from business stakeholders by speaking their language.
    • Clarify lines of accountability and metrics for success.
    • Implement targeted initiatives and track key metrics for continual improvement.

    Info-Tech Insight

    1. Sell the project to the business. Your first job is a sales job because executive sponsorship is key to project success.
    2. Worship the holy trinity of metrics: impact of downtime, cost of incident response, and time spent on manual repetitive work (MRW).
    3. Invest in order to profit. Improving the Operations Center takes time and money. Expect short-term pain to realize long-term gain.

    The role of the Network Operations Center has changed

    • The old approach was technology siloed and the Network Operations Center (NOC) only cared about the network.
    • The modern Operations Center is about ensuring high availability of end-user services, and requires cross-functional expertise and visibility across all the layers of the technology stack.
    A pie chart is depicted. The data displayed on the chart, in decreasing order of size, include: Applications; Servers; LAN; WAN; Security; Storage. Source: Metzler, n.d.

    Most organizations lack adequate visibility

    • The rise of hybrid cloud has made environments more complex, not less.
    • The increasing complexity makes monitoring and incident response more difficult than ever.
    • Only 31% of organizations use advanced monitoring beyond what is offered by cloud providers.
    • 69% perform no monitoring, basic monitoring, or rely entirely on the cloud provider’s monitoring tools.
    A Pie chart is depicted. Two data are represented on the chart. The first, representing 69% of the chart, is: Using no monitoring, basic monitoring, or relying only on the cloud vendor's monitoring. the second, representing 31% of the chart, is Using advanced monitoring beyond what cloud vendors provide. Source: InterOp ITX, 2018

    Siloed service level agreements cannot ensure availability

    You can meet high service level agreements (SLAs) for functional silos, but still miss the mark for service availability. The business just wants things to work!

    this image contains Info-Tech's SLA-compliance rating chart, which displays the categories: Available, behaving as expected; Slow/degraded; and Unavailable, for each of: Webserver; Database; Storage; Network; Application; and, Business Service

    The cost of downtime is massive

    Increasing reliance on IT makes downtime hurt more than ever.
    98% of enterprises lose $100,000+.
    81% of enterprises lose $300,000+ per hour of downtime.

    This is a bar graph, showing the cost per hour of downtime, against the percentage of enterprises.

    Source: ITIC, 2016

    IT is asked to do more with less

    Most IT budgets are staying flat or shrinking.

    57% of IT departments expect their budget to stay flat or to shrink from 2018 to 2019.

    This image contains a pie chart with two data, one is labeled: Increase; representing 43% of the chart. The other datum is labeled: Shrink or stay flat, and represents 57% of the chart.

    Unify and streamline IT Operations

    A well-run Operations Center ensures high availability at reasonable cost. Improving your Operations Center results in:

    • Higher availability
    • Increased reliability
    • Improved project capacity
    • Higher business satisfaction

    Measure success with the holy trinity of metrics

    Focus on reducing downtime, cost of incident response, and MRW.

    This image contains a Funnel Chart showing the inputs: Downtime; Cost of Incident Response; MRW; and the output: Reduce for continual improvement

    Start from the top and employ a targeted approach

    Analyze data to get buy-in from stakeholders, and use our tools and templates to follow the process for continual improvement in IT Operations.

    This image depicts a cycle, which includes: Data analysis; Executive Sponsorship; Success Criteria; Gap Assessment; Initiatives; Tracking & Measurement

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

    Workshop

    "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

    Consulting

    "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Optimize the IT Operations Center – project overview

    Launch the Project

    Identify Enterprise Services

    Identify Line of Business Services

    Complete Service Definitions

    Best-Practice Toolkit

    🗲 Pluck Low-Hanging Fruit for Quick Wins

    1.1 Ensure Base Maturity Is in Place

    1.2 Make the Case

    2.1 Define Accountabilities

    2.2 Define Metrics

    3.1 Assess Gaps

    3.2 Plan Initiatives

    4.1 Lay Foundation

    4.2 Launch and Measure

    Guided Implementations

    Discuss current state.

    Review stakeholder presentation.

    Review RACIs.

    Review metrics.

    Discuss gaps.

    Discuss initiatives.

    Review plan and metric schedule.

    Onsite Workshop Module 1:

    Clear understanding of project objectives and support obtained from the business.

    Module 2:

    Enterprise services defined and categorized.

    Module 3:

    LOB services defined based on user perspective.

    Module 4:

    Service record designed according to how IT wishes to communicate to the business.

    Phase 1 Results:

    Stakeholder presentation

    Phase 2 Results:
    • RACIs
    • Metrics
    Phase 3 Results:
    • Gaps list
    • Prioritized list of initiatives
    Phase 4 Results:
    • Implementation plan
    • Continual improvement tracker

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Pre-Workshop Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
    Activities

    Check Foundation

    Define Accountabilities

    Map the Challenge

    Build Action Plan

    Map Out Implementation

    1.1 Ensure base maturity.

    🗲 Pluck low-hanging fruit for quick wins.

    2.1 Complete process RACI.

    2.2 Complete task RACI.

    3.1 Define metrics.

    3.2 Define accountabilities.

    3.2 Identify gaps.

    4.1 Prioritize initiatives.

    5.1 Build implementation plan.

    Deliverables
    1. IT Operations Center Prerequisites Assessment Tool
    1. IT Operations Center RACI Charts Template
    1. IT Operations Center Gap and Initiative Tracker
    1. IT Operations Center Initiative Prioritization Tool
    1. IT Operations Center Continual Improvement Tracker

    PHASE 🗲

    Pluck Low-Hanging Fruit for Quick Wins

    Optimize the IT Operations Center

    Conduct a ticket-trend analysis

    Generate reports on tickets from your IT service management (ITSM) tool. Look for areas that consume the most resources, such as:

    • Recurring tickets.
    • Tickets that have taken a long time to resolve.
    • Tickets that could have been resolved at a lower tier.
    • Tickets that were unnecessarily or improperly escalated.

    Identify issues

    Analyze the tickets:

    • Look for recurring tickets that may indicate underlying problems.
    • Ask tier 2 and 3 technicians to flag tickets that could have been resolved at a lower tier.
    • Identify painful and/or time consuming service requests.
    • Flag any manual repetitive work.

    Write the issues on a whiteboard.

    Oil & Gas IT reduces manual repetitive maintenance work

    CASE STUDY
    Industry Oil & Gas
    Source Interview

    Challenge

    The company used a webserver to collect data from field stations for analytics. The server’s version did not clear its cache – it filled up its own memory and would not overwrite, so it would just lock up and have to be rebooted manually.

    Solution

    The team found out that the volumes and units of data would cause the memory to fill at a certain time of the month. They wrote a script to reboot the machine and set up a planned outage during the appropriate weekend each month.

    Results

    The team never had to do manual reboots again – though they did have to tweak their reboot script not to rely on their calendar, after a shift in production broke the pattern between memory consumption and the calendar.

    Rank the issues

    🗲.1.1 10 minutes

    1. Assign each participant five sticky dots to use for voting.
    2. Have each participant place any number of dots beside the issue(s) of their choice.
    3. Count the dots and rank the top three most important issues.

    INPUT

    • List of issues

    OUTPUT

    • Top three issues

    Materials

    • Whiteboard
    • Markers
    • Sticky dots

    Participants

    • Operations Manager
    • Infrastructure Manager
    • I&O team members

    Brainstorm solutions

    🗲.1.2 10 minutes

    1. Write the three issues at the top of a whiteboard, each at the head of its own column.
    2. Focusing on one issue at a time, brainstorm potential solutions for each issue. Have one person write all the proposed solutions on the board beneath the issue.

    Info-Tech Best Practice

    Do not censor or evaluate the proposed solutions at this time. During brainstorming, focus on coming up with as many potential solutions as possible, no matter how infeasible or outlandish.

    INPUT

    • Top three issues

    OUTPUT

    • Potential solutions

    Materials

    • Whiteboard
    • Markers

    Participants

    • Operations Manager
    • Infrastructure Manager
    • I&O team members

    Evaluate and rank potential solutions

    🗲.1.3 30 minutes

    1. Score the solutions from 1-5 on each of the two dimensions:
    • Attainability
    • Probable efficacy
  • Identify the top scoring solution for each issue. In the event of a tie, vote to determine the winner.
  • Info-Tech Insight

    Quick wins are the best of both worlds. To get a quick win, pick a solution that is both readily attainable and likely to have high impact.

    INPUT

    • Potential solutions

    OUTPUT

    • Ranked list of solutions

    Materials

    • Whiteboard
    • Markers

    Participants

    • Operations Manager
    • Infrastructure Manager
    • I&O team members

    Develop metrics to measure the effectiveness of solutions

    You should now have a top potential solution for each pain point.

    For each pain point and proposed solution, identify the metric that would indicate whether the solution had been effective or not. For example:

    • Pain point: Too many unnecessary escalations for SharePoint issues.
    • Solution: Train tier 1 staff to resolve SharePoint tickets.
    • Metric: % of SharePoint tickets resolved at tier 1.

    Design solutions

    • Some solutions explain themselves. E.g., hire an extra service desk person.
    • Others require more planning and design, as they involve a bespoke solution. E.g., improve asset management process or automate onboarding of new users.
    • For the solutions that require planning, take the time to design each solution fully before rushing to implement it.

    Build solutions

    • Build any of the solutions that require building. For example, any scripting for automations requires the writing of those scripts, and any automated ticket routing requires configuration of your ITSM tool.
    • Part of the build phase for many solutions should also involve designing the tests of those solutions.

    Test solutions – refine and iterate

    • Think about the expected outcome and results of the solutions that require testing.
    • Test each solution under production-like circumstances to see if the results and behavior are as expected.
    • Refine and iterate upon the solutions as necessary, and test again.

    Implement solutions and measure results

    • Before implementing each solution, take a baseline measurement of the metric that will measure success.
    • Implement the solutions using your change management process.
    • After implementation, measure the success of the solution using the appropriate metric.
    • Document the results and judge whether the solution has been effective.

    Use the top result as a case study to obtain buy-in

    Your most effective solution will make a great case study.

    Write up the results and input the case study into the IT Operations Center Stakeholder Buy-In Presentation.

    This image contains a screenshot of info-tech's default format for presenting case studies.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts

    this is a picture of an Info-Tech Analyst
    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
    The following are sample activities that will be conducted by Info-Tech analysts with your team:
    🗲.1.2 This image contains a screenshot from section 🗲.1.2 of this blueprint.

    Identify issues

    Look for areas that aren’t working optimally.

    🗲.1.3 this image contains a screenshot from section 🗲.1.3 of this blueprint.

    Evaluate and rank potential solutions

    Sort the wheat from the chaff and plan for quick wins.

    PHASE 1

    Get Buy-In

    Optimize the IT Operations Center

    Step 1.1: Ensure Base Maturity Is in Place

    This step will walk you through the following activities:

    • Assess maturity of base IT Operations processes.

    Outcomes of this step

    • Completed IT Operations Center Prerequisites Assessment Tool

    Base processes underpin the Operations Center

    • Before you optimize your Operations Center, you should have foundational ITSM processes in place: service desk, and incident, problem, and change management.
    • Attempting to optimize Operations before it rests on a solid foundation can only lead to frustration.

    IT Operations Center

    • Service Desk
    • Incident Management
    • Problem Management
    • Change Management

    Info-Tech Insight

    ITIL isn’t dead. New technology such as cloud solutions and advanced monitoring tools have transformed how ITSM processes are implemented, but have not obviated them.

    Assess maturity of prerequisite processes

    1.1.1 IT Operations Center Prerequisites Assessment Tool

    • Don’t try to prematurely optimize your Operations Center.
    • Before undertaking this project, you should already have a base level of maturity in the four foundational IT Operations processes.
    • Complete the IT Operations Center Prerequisites Assessment Tool to assess your current level in service desk, incident management, problem management, and change management.
    this image contains a screenshot from Info-Tech's IT Operations Center Prerequisite Assessment

    Make targeted improvements on prerequisite processes if necessary

    If there are deficiencies in any of your foundational processes, take the time to remedy those first before proceeding with Optimize the IT Operations Center. See Info-Tech’s other blueprints:

    Standardize the Service Desk

    Strengthen your service desk to build a strong ITSM foundation.

    Incident and Problem Management

    Don’t let persistent problems govern your department.

    Optimize Change Management

    Turn and face the change with a right-sized change management process.

    Step 1.2: Make the Case

    This step will walk you through the following activities:

    • Estimate the impact of downtime for top five applications.
    • Estimate the cost of incident response.
    • Estimate the cost of MRW.
    • Set success metrics and estimate the ROI of the Operations Center project.
    • IT Operations Center Stakeholder Buy-In Presentation

    Obtaining buy-in is critical

    Buy-in from top-level stakeholders is critical to the success of the project.

    Before jumping into your initiatives, take the time to make the case and bring the business on board.

    Factors that “prevent us from improving the NOC”

    This image contains a graph of factors that prevent us from improving the NOC. In decreasing order, they include: Lack of strategic guidance from our vendors; The unwillingness of our management to accept new risk; Lack of adequate software tools; Our internal processes; Lack of management vision; Lack of funding; and Lack of personnel resources. There is a red circle drawn around the last three entries, with the words: Getting Buy-in Removes the Top Three Roadblocks to Improvement!. Source: Metzier, n.d

    List your top five applications

    List your top five applications for business criticality.

    Don’t agonize over decisions at this point.

    Generally, the top applications will be customer facing, end-user facing for the most critical business units, or critical for health and safety.

    Estimate impact of downtime

    • Come up with a rough, back-of-the-napkin estimate of the hourly cost of downtime for each application.
    • Complete page two of the IT Operations Center Stakeholder Buy-In Presentation.
    • Estimate loss of revenue per hour, loss of productivity per hour, and IT cost per incident resolution hour.
    • Pull a report on incident hours/outages in the past year from your ITSM tool. Multiply the total cost per incident hour by the incident hours per year to determine the current cost per year of service disruptions for each service.
    • Add up the cost for each of the top five services.
    • Now you can show the business a hard value number that quantifies your availability issues.

    Estimate salary cost of non-value-adding work

    Complete page three of the IT Operations Center Stakeholder Buy-In Presentation.

    • Estimate annual wage cost of incident response: multiply incident response hours per year (take from your ITSM tool) by the average hourly wage of incident responders.
    • Estimate annual cost of MRW: multiply MRW hours per year (take from ITSM tool or from time-keeping tool, or use best guess based on talking to staff members) by the average hourly wage of IT staff performing MRW.
    • Add the two numbers together to calculate the non-value-adding IT salary cost per year.
    • Express the previous number as a percentage of total IT salary. Everything that is not incident response or MRW is value-adding work.

    Now you have the holy trinity of metrics: set some targets

    The holy trinity of metrics:

    • Cost of downtime
    • % of salary on incident response
    • % of salary on MRW

    You want to reduce the above numbers. Set some back-of-the-napkin targets for percentage reductions for each of these areas. These are high-level metrics that business stakeholders will care about.

    Take your best guess at targets. Higher maturity organizations will have less potential for reduction from a percentage point of view (eventually you hit diminishing returns), while organizations just beginning to optimize their Operations Center have the potential for huge gains.

    Calculate the potential gains of targets

    Complete page five of the IT Operations Center Stakeholder Buy-In Presentation.

    • Multiply the targeted/estimated % reductions of the costs by your current costs to determine the potential savings/benefits.
    • Do a back-of-the napkin estimate of the cost of the Operations Center improvement project. Use reasonable numbers for cost of personnel time and cost of tools, and be sure to include ongoing personnel time costs – your time isn’t free and continual improvement takes work and effort.
    • Calculate the ROI.

    Fill out the case study

    • Complete page six of the IT Operations Center Stakeholder Buy-In Presentation. If you completed the lightning phase, use the results of your own quick win project(s) as an example of feasibility.
    • If you did not complete the lightning phase, delete this slide, or use an example of what other organizations have achieved to demonstrate feasibility.
    This image contains a screenshot of info-tech's default format for presenting case studies.

    Present to stakeholders

    • Deliver the presentation to key stakeholders.
    • Focus on the high-level story that the current state is costing real dollars and wages, and that these losses can be minimized through process improvements.
    • Be up front that many of the numbers are based on estimates, but be prepared to defend the reasonableness of the estimates.

    Gain buy-in and identify project sponsor

    • If the business is on board with the project, determine one person to be the executive sponsor for the project. This person should have a strong desire to see the project succeed, and should have some skin in the game.

    Formalize communication with the project sponsor

    • Establish how you will communicate with the sponsor throughout the project (e.g. weekly or monthly e-mail updates, bi-weekly meetings).
    • Set up a regular/recurring cadence and stick to it, so it can be put on auto-pilot. Be clear about who is responsible for initiating communication and sticking to the reporting schedule.

    Info-Tech Insight

    Tailor communication to the sponsor. The project sponsor is not the project manager. The sponsor’s role is to drive the project forward by allocating appropriate resources and demonstrating highly visible support to the broader organization. The sponsor should be kept in the loop, but not bothered with minutiae.

    Note the starting numbers for the holy trinity

    Use the IT Operations Center Continual Improvement Tracker:

    • Enter your starting numbers for the holy trinity of metrics.
    • After planning and implementing initiatives, this tracker will be used to update against the holy trinity to assess the success of the project on an ongoing basis and to drive continual improvement.

    PHASE 2

    Define Accountability and Metrics

    Optimize the IT Operations Center

    Step 2.1: Define Accountabilities

    This step will walk you through the following activities:

    • Formalize RACI for key processes.
    • Formalize RACI for key tasks.

    Outcomes of this step

    • Completed RACIs

    List key Operations Center processes

    Compile a list of processes that are key for the Operations Center.

    These processes should include the four foundational processes:

    • Service Desk
    • Incident Management
    • Problem Management
    • Change Management

    You may also want to include processes such as the following:

    • Event Management
    • Configuration Management

    Avoid listing processes you have yet to develop – stick with those already playing a role in your current state.

    Formalize RACI for key processes

    Use the IT Operations Center RACI Charts Template. Complete a RACI for each of the key processes involved in the IT Operations Center.

    RACI:

    • Responsible (does the work on a day-to-day basis)
    • Accountable (reviews, signs off, and is held accountable for outcomes)
    • Consulted (input is sought to feed into decision making)
    • Informed (is given notification of outcomes)

    As a best practice, no more than one person should be responsible or accountable for any given process. The same person can be both responsible and accountable for a given process, or it could be two different people.

    Avoid making someone accountable for a process if they do not have full visibility into the process for appropriate oversight, or do not have time to give the process sufficient attention.

    Formalize RACI for IT tasks

    Now think about the actual tasks or work that goes on in IT. Which roles and individuals are accountable for which tasks or pieces of work?

    In this case, more than one role/person can be listed as responsible or accountable in the RACI because we’re talking about types or categories of work. No conflict will occur because these individuals will be responsible or accountable for different pieces of work or individual tasks of the same type. (e.g. all service desk staff are responsible for answering phones and inputting tickets into the ITSM tool, but no more than one staff member is responsible for the input of any given ticket from a specific phone call).

    Step 2.2: Define Metrics

    This step will walk you through the following activities:

    • Cascade operational metrics from the holy trinity.
    • Evaluate metrics and identify key performance indicators (KPIs).
    • Cascade performance assessment (PA) metrics to support KPIs.
    • Build feedback loop for PA metrics.

    Outcomes of this step

    • KPIs
    • PA metrics

    Metrics must span across silos for shared accountability

    To adequately support the business goals of the organization, IT metrics should span across functional silos.

    Metrics that span across silos foster shared accountability across the IT organization.

    Metrics supported by all groups

    three grain silos are depicted. below, are the words IT Groups, with arrows pointing from the words to each of the three silos.

    Cascade operational metrics from the holy trinity

    Focus on the holy trinity of metrics.

    From these, cascade down to operational metrics that contribute to the holy trinity. It is possible that an operational metric may support more than one trinity metric. For example:

    a flow chart is depicted. two input circles point toward a central circle, and two output circles point away. the input circles include: Cost of Downtime; Cost of Incident Response. The central circle reads: Mean time to restore service. the output circles include the words: Tier 1 Resolution Rate; %% of Known Errors Captured in ITSM Tool.

    Evaluate metrics and identify KPIs

      • Evaluate your operational metrics and determine which ones are likely to have the largest impact on the holy trinity of metrics.
      • Identify the ten metrics likely to have the most impact: these will be your KPIs moving forward.
      • Enter these KPIs into the IT Operations Center Continual Improvement Tracker.
      this image depicts a cycle around the term KPI. The cycle includes: Objective; Measurement; optimization; strategy; performance; evaluation

    Beware how changing variables/context can affect metrics

    • Changes in context can affect metrics drastically. It’s important to keep the overall context in mind to avoid being led astray by certain numbers taken in isolation.
    • For example, a huge hiring spree might exhaust the stock of end-user devices, requiring time to procure hardware before the onboarding tickets can be completely fulfilled. You may have improved your onboarding process through automation, but see a large increase in average time to onboard a new user. Keep an eye out for such anomalies or fluctuations, and avoid putting too much stock in any single operational KPI.
    • Remember, operational KPIs are just a heuristic tool to support the holy trinity of metrics.

    Determine accountability for KPIs

    • For each operational KPI, assign one person to be accountable for that KPI.
    • Be sure the person in charge has the necessary authority and oversight over the processes and personnel that most affect that KPI – otherwise it makes little sense to hold the individual accountable.
    • Consulting your process RACIs is a good place to start.
    • Record the accountable person for each KPI in the IT Operations Center Continual Improvement Tracker.

    Info-Tech Best Practice

    Match accountability with authority. The person accountable for each KPI should be the one who has the closet and most direct control over the work and processes that most heavily impact that KPI.

    Cascade PA metrics to support KPIs

    KPIs are ultimately driven by how IT does its work, and how individuals work is driven by how their performance is assessed and evaluated.

    For the top KPIs, be sure there are individual PA metrics in place that support the KPI, and if not, develop the appropriate PA metrics.

    For example:

    • KPI: Mean time to resolve incidents
    • PA metric: % of escalations that followed SOP (e.g. not holding onto a ticket longer than supposed to)
    • KPI: Number of knowledge base articles written
    • PA metric: Number of knowledge base articles written/contributed to

    Communicate key changes in PA metrics

    Any changes from the previous step will take time and effort to implement and make stick.

    Changing people’s way of working is extremely difficult.

    Build a communication and implementation plan about rolling out these changes, emphasize the benefits for everyone involved, and get buy-in from the affected staff members.

    Build feedback loops for PA metrics

    Now that PA metrics support your Operations Center’s KPIs, you should create frequent feedback loops to drive and boost those PA metrics.

    Once per year or once per quarter is not frequent enough. Managers should meet with their direct reports at least monthly and review their reports’ performance against PA metrics.

    Use a “set it and forget it” implementation, such as a recurring task or meeting in your calendar.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts

    this is a picture of an Info-Tech Analyst

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
    The following are sample activities that will be conducted by Info-Tech analysts with your team:
    2.2.1 This image contains a screenshot from section 2.2.1 of this blueprint.

    Cascade operational metrics from the holy trinity

    Rank goals based on business impact and stakeholder pecking order.

    2.2.2 this image contains a screenshot from section 2.2.2 of this blueprint.

    Determine accountability for KPIs

    Craft a concise and compelling elevator pitch that will drive the project forward.

    PHASE 3

    Assess Gaps and Prioritize Initiatives

    Optimize the IT Operations Center

    Step 3.1: Assess Gaps

    This step will walk you through the following activities:

    • Assess visibility provided by monitoring.
    • Assess process workflows and identify areas for automation.
    • Assess requests and identify potential for automation.
    • Assess Operations Center staff capabilities.
    • Conduct a root cause analysis on the gaps/pain points.

    Outcomes of this step

    • List of gaps
    • List of root causes

    Measure current state of KPIs and identify lagging ones

    Take a baseline measurement of each operational KPI.

    If historical data is available, compare the present state measurement to data points collected over the last year or so.

    Review the measured KPIs.

    Identify any KPIs that seem lagging or low, or that may be particularly important to influence.

    Record lagging KPIs in the IT Operations Center Gap and Initiative Tracker tool.

    Assess visibility provided by monitoring

    List the top five most critical business services supported by IT.
    Assess the current state of your monitoring tools.

    For each business service, rate the level of visibility your monitoring tools allow from the following options:

    1. We have no visibility into the service, or lack visibility into crucial elements.
    2. We have basic visibility (up/down) into all the IT components that support the service.
    3. We have basic visibility (up/down) into the end service itself, in addition to all the IT components that make it up.
    4. We have some advanced visibility into some aspects of the service and/or its IT components.
    5. We have a full, end-to-end view of performance across all the layers of the stack, as well as the end business service itself.

    Identify where more visibility may be necessary

    For most organizations it isn’t practical to have complete visibility into everything. For the areas in which visibility is lacking into key services, think about whether more visibility is actually required or not. Consider some of the following questions:

    • How great is the impact of this service being unavailable?
    • Would greater visibility into the service significantly reduce the mean time to restore the service in the event of incidents?

    Record any deficiencies in the IT Operations CenterGap and Initiative Tracker tool.

    Assess alerting

    Assess alerting for your most critical services.

    Consider whether any of the following problems occur:

    • Often receive no alert(s) in the event of critical outages of key services (we find out about critical outages from the service desk).
    • We are regularly overwhelmed with too many alerts to investigate properly.
    • Our alerts are rarely actionable.
    • We often receive many false alerts.

    Identify areas for potential improvement in the managing of alerts. Record any deficiencies in the IT Operations Center Gap and Initiative Tracker tool.

    Assess process workflows and identify areas for automation

    Review your process flows for base processes such as Service Desk, Incident Management, Problem Management, and Change Management.

    Identify areas in the workflows where there may be defects, inefficiencies, or potential for improvement or automation.

    Record any deficiencies in the IT Operations Center Gap and Initiative Tracker tool.

    See the blueprint Prepare for Cognitive Service Management for process workflows and areas to look for automation possibilities.

    Prepare for Cognitive Service Management

    Make ready for AI-assisted IT operations.

    Assess requests and identify potential for automation

    • Assess the most common work orders or requests handled by the Operations Center group (i.e. this does not include requests fulfilled by the help desk).
    • Which work orders are the most painful? That is, what common work orders involve the greatest effort or the most manual work to fulfill?
    • Fulfillment of common, recurring work orders is MRW, and should be reduced or removed if possible.
    • Consider automation of certain work orders, or self-service delivery.
    • Record any deficiencies in the IT Operations Center Gap and Initiative Tracker tool.

    Assess Operations Center staff capabilities

    • Assess the skills and expertise of your team members.
    • Consider some of the following:
      • Are there team members who could perform their job more effectively by picking up certain skills or proficiencies?
      • Are there team members who have the potential to shift into more valuable or useful roles, given the appropriate training?
      • Are there individual team members whose knowledge is crucial for operations, and whose function cannot be taken up by others?

    Record any deficiencies in the IT Operations Center Gap and Initiative Tracker tool.

    Info-Tech Insight

    Train to avoid pain. All too often organizations expose themselves to significant key person risk by relying on the specialized skills and knowledge of one team member. Use cross training to remedy such single points of failure before the risk materializes.

    Brainstorm pain points

    Brainstorm any pain points not discussed in the previous areas.

    Pain points can be specific operational issues that have not yet been considered. For example:

    • Tom is overwhelmed with tickets.
    • Our MSP often breaches SLA.
    • We don’t have a training budget.

    Record any deficiencies in the IT Operations CenterGap and Initiative Tracker tool.

    Conduct a root cause analysis on the gaps/pain points

    • Pain points can often be symptoms of other deficiencies, or somewhat removed from the actual problem.
    • Using the 5 Whys, conduct a root cause analysis on the pain points for which the causes are not obvious.
    • For each pain point, ask “why” for a sequence of five times, attempting to proceed to the root cause of the issue. This root cause is the true gap that needs to be remedied to resolve the pain point.
    • For example:
      • The Wi-Fi network often goes down in the afternoon.
        • Why?: Its bandwidth gets overloaded.
        • Why?: Many people are streaming video.
        • Why?: There’s a live broadcast of a football game at that time.
      • Possible solutions:
        • Block access to the streaming services.
        • Project the game on a screen in a large conference room and encourage everyone to watch it there.

    Step 3.2: Plan Initiatives

    This step will walk you through the following activities:

    • Brainstorm initiatives to boost KPIs and address gaps.
    • Prioritize potential initiatives.
    • Decide which initiatives to include on the roadmap.

    Outcomes of this step

    • Targeted improvement roadmap

    Brainstorm initiatives to boost KPIs and address gaps

    Prioritize potential initiatives

    3.2.1 IT Operations Center Initiative Prioritization Tool

    • Use the IT Operations Center Initiative Prioritization Tool.
    • Enter the initiatives into the tool.
    • For each initiative, input the following ranking criteria:
      • The metric/KPI’s estimated degree of impact on the holy trinity.
      • The gap or pain point’s estimated degree of impact on the metric/KPI.
      • The initiative’s estimated degree of positive impact on the gap or pain point
      • The initiative’s attainability.
    • Estimate the resourcing capacity required for each initiative.
    • For accurate capacity assessment, input as “force include” all current in-flight projects handled by the Operations Center group (including those unrelated to the Operations Center project).

    Decide which initiatives to include on the roadmap

    • Not all initiatives will be worth pursuing – and especially not all at once.
    • Consider the results displayed on the final tab of the IT Operations CenterInitiative Prioritization Tool.
    • Based on the prioritization and taking capacity into account, decide which initiatives to include on your roadmap.
    • Sometimes, for operational or logistical reasons, it may make sense to schedule an initiative at a time other than its priority might dictate. Make such exceptions on a case-by-case basis.

    Assign an owner to each initiative, and provide resourcing

    • For each initiative, assign one person to be the owner of that initiative.
    • Be sure that person has the authority and the bandwidth necessary to drive the initiative forward.
    • Secure additional resourcing for any initiatives you want to include on your roadmap that are lacking capacity.

    Info-Tech Insight

    You must invest resources in order to reduce the time spent on non-value-adding work.

    "The SRE model of working – and all of the benefits that come with it – depends on teams having ample capacity for engineering work. If toil eats up that capacity, the SRE model can’t be launched or sustained. An SRE perpetually buried under toil isn’t an SRE, they are just a traditional long-suffering SysAdmin with a new title."– David N. Blank-Edelman

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts

    this is a picture of an Info-Tech Analyst

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
    The following are sample activities that will be conducted by Info-Tech analysts with your team:
    3.1.1 This image contains a screenshot from section 3.1.1 of this blueprint.

    Conduct a root cause analysis on the gaps/pain points

    Find out the cause, so you can come up with solutions.

    3.2.1 this image contains a screenshot from section 3.2.1 of this blueprint.

    Prioritize potential initiatives

    Don’t try to boil the ocean. Target what’s manageable and what will have the most impact.

    PHASE 4

    Launch Initiatives and Track Metrics

    Optimize the IT Operations Center

    Step 4.1: Lay Foundation

    This step will walk you through the following activities:

    • Build initiative communication plan.
    • Develop a testing plan for each technical initiative.

    Outcomes of this step

    • Communication plan
    • Testing plan(s)

    Expect resistance to change

    • It’s not as simple as rolling out what you’ve designed.
    • Anything that affects people’s way of working will inevitably be met with suspicion and pushback.
    • Be prepared to fight the battle.
    • "The hardest part is culture. You must get people to see the value of automation. Their first response is ‘We've been doing it this way for 10 years, why do we need to do it another way?’ It's hard to get someone out of their comfort zone to learn something new, especially when they've been at an organization for 20 years. You need to give them incentives."– Cyrus Kalatbari, Senior IT Architect, Infrastructure/Cloud

    Communicate changes in advance, along with their benefits!

    • Communicate changes well in advance of the date(s) of implementation.
    • Emphasize the benefits of the changes – not just for the organization, but for employees and staff members.
    • Advance communication of changes helps make them more palatable, and builds trust in employees by making them feel informed of what’s going on.

    Involve IT staff in design and implementation of changes

    • As you communicate the coming changes, take the opportunity to involve any affected staff members who have not yet participated in the project.
    • Solicit their feedback and get them to help design and implement the initiatives that involve significant changes to their roles.

    Develop a testing plan for each technical initiative

    • Some initiatives, such as appointing a new change manager or hiring a new staff member, do not make sense to test.
    • On the other hand, technical initiatives such as automation scripts, new monitoring tools or dashboards, and changed alert thresholds should be tested thoroughly before implementation.
    • For each technical initiative, think about the expected results and performance if it were to run in production, and build a test plan to ensure it behaves as expected and there are no corner cases.

    Test technology initiatives and iterate if necessary

    • Test each technical initiative under a variety of circumstances, with as close an environment to production as possible.
    • Try to develop corner cases or unusual or unexpected situations, and see if any of these will break the functionality or produce unintended or unexpected results.
    • Document the results of the testing, and iterate on the initiative and test again if necessary.

    "The most important things – and the things that people miss – are prerequisites and expected results. People jump out and build scripts, then the scripts go into the ditch, and they end up debugging in production." – Darin Stahl, Research Director, Infrastructure & Operations

    Step 4.2: Launch and Measure

    This step will walk you through the following activities:

    • Launch initiatives and track adoption and effectiveness.
    • Investigate initiatives that appear ineffective.
    • Measure success with the holy trinity.

    Outcomes of this step

    • Continual improvement roadmap

    Establish a review cycle for each metric

    Info-Tech Best Practice

    Don’t measure what doesn’t matter. If a metric is not going to be reviewed or reported on for informational or decision-making purposes, it should not be tracked.

    Launch initiatives and track adoption and effectiveness

    • Launch the initiatives.
    • Some initiatives will need to proceed through your change management process in order to roll out, but others will not.
    • Track the adoption of initiatives that require it.
      • Some initiatives will require tracking of adoption, whereas others will not.
      • For example, hiring a new service desk staff member does not require tracking of adoption, but implementing a new process for ticket handling does.
      • The implementation plan should include a way to measure the adoption of such initiatives, and regularly review the numbers to see if the implementation has been successful.
    • For all initiatives, measure their effectiveness by continuing to track the KPI/metric that the initiative is intended to influence.

    Assess metrics according to review cycle for continual improvement

    • Assess metrics according to the review cycle.
    • Note whether metrics are improving in the right direction or not.
    • Correlate changes in the metrics with measures of the adoption of the initiatives – see whether initiatives that have been adopted are moving the needle on the KPIs they are intended to.

    Investigate initiatives that appear ineffective

    • If the adoption of an initiative has succeeded, but the expected impact of that initiative on the KPI has not taken place, investigate further and conduct a root causes analysis to determine why this is the case.
    • Sometimes, anomalies or fluctuations will occur that cause the KPI not to move in accordance with the success of the initiative. In this case, it’s just a fluke and the initiative can still be successful in influencing the KPI over the long term.
    • Other times, the initiative may prove mostly or entirely ineffective, either due to misdesign of the initiative itself, a change of circumstances, or other compounding factors or complexities. If the initiative proves ineffective, consider iterating modifications of the initiative and continuing to measure the effect on KPIs – or perhaps killing the initiative altogether.
    • Remember that experimentation is not a bad thing – it’s okay that not every initiative will always prove worthwhile.

    Measure success with the holy trinity

    • Report to business stakeholders on the effect on the holy trinity of metrics at least annually.
    • Calculate the ROI of the project after two years and compare the results to the targeted ROI you initially presented in the IT Operations Center Stakeholder Buy-In Presentation.
    This image contains a Funnel Chart showing the inputs: Downtime; Cost of Incident Response; MRW; and the output: Reduce for continual improvement

    Iterate on the Operations Center process for continual improvement

    This image depicts a cycle, which includes: Data analysis; Executive Sponsorship; Success Criteria; Gap Assessment; Initiatives; Tracking & Measurement

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts

    this is a picture of an Info-Tech Analyst

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
    The following are sample activities that will be conducted by Info-Tech analysts with your team:
    4.1.1This image contains a screenshot from section 3.1.1 of this blueprint.

    Communicate changes in advance, along with their benefits!

    Rank goals based on business impact and stakeholder pecking order.

    4.1.2 this image contains a screenshot from section 3.2.1 of this blueprint.

    Develop a testing plan for each technical initiative

    Craft a concise and compelling elevator pitch that will drive the project forward.

    Research contributors and experts
    This is a picture of Cyrus Kalatbari, IT infrastructure/cloud architect

    Cyrus Kalatbari, IT Infrastructure/Cloud Architect

    Cyrus’ in-depth knowledge cutting across I&O and service delivery has enhanced the IT operations of multiple enterprise-class clients.

    This is a picture of Derek Cullen, Chief Technology Officer

    Derek Cullen, Chief Technology Officer

    Derek is a proven leader in managing enterprise-scale development, deployment, and integration of applications, platforms, and systems, with a sharp focus on organizational transformation and corporate change.

    This is a picture of Phil Webb, Senior Manager

    Phil Webb, Senior Manager – Unified Messaging and Mobility

    Phil specializes in service delivery for cloud-based and hybrid technology solutions, spanning requirements gathering, solution design, new technology introduction, development, integration, deployment, production support, change/release delivery, maintenance, and continuous improvement.

    This is a picture of Richie Mendoza, IT Services Delivery Consultant

    Richie Mendoza, IT Services Delivery Consultant

    Ritchie’s accomplishments include pioneering a cloud capacity management process and presenting to the Operations team and to higher management, while providing a high level of technical leadership in all phases of capacity management activities.

    This is a picture of Rob Thompson, Solutions Architect

    Rob Thomson, Solutions Architect

    Rob is an IT leader with a track record of creating and executing digital transformation initiatives to achieve the desired outcomes by integrating people, process, and technology into an efficient and effective operating model.

    Related Info-Tech research

    Create a Configuration Management Roadmap

    Right-size your CMDB to improve IT operations.

    Harness Configuration Management Superpowers

    Build a CMDB around the IT services that are most important to the organization.

    Develop an IT Infrastructure Services Playbook

    Automation, SDI, and DevOps – build a cheat sheet to manage a changing Infrastructure & Operations environment.

    Develop an Availability and Capacity Management Plan

    Manage capacity to increase uptime and reduce costs.

    Establish a Program to Enable Effective Performance Monitoring

    Maximize the benefits of infrastructure monitoring investments by diagnosing and assessing transaction performance, from network to server to end-user interface.

    Bibliography

    Baker, Dan, and Hal Baylor. “How Benchmarking & Streamlining NOC Operations Can Lower Costs & Boost Effectiveness.” Top Operator, Mar. 2017. Web.

    Blank-Edelman, David. Seeking SRE: Conversations About Running Production Systems at Scale. O'Reilly, 2018. Web.

    CA Technologies. “IT Transformation to Next-Generation Operations Centers: Assure Business Service Reliability by Optimizing IT Operations.” CA Technologies, 2014. Web.

    Ditmore, Jim. “Improving Availability: Where to Start.” Recipes for IT, n.d. Web.

    Ennis, Shawn. “A Phased Approach for Building a Next-Generation Network Operations Center.” Monolith Software, 2009. Web.

    Faraclas, Matt. “Why Does Infrastructure Operations Still Suck?” Ideni, 25 Feb. 2016. Web.

    InterOp ITX. “2018 State of the Cloud.” InterOp ITX, Feb. 2018. Web.

    ITIC. “Cost of Hourly Downtime Soars: 81% of Enterprises Say it Exceeds $300K On Average.” ITIC, 2 Aug. 2016. Web.

    Joe the IT Guy. “Availability Management Is Harder Than it Looks.” Joe the IT Guy, 10 Feb. 2016. Web.

    ---. “Do Quick Wins Exist for Availability Management?” Joe the IT Guy, 15 May 2014. Web.

    Lawless, Steve. “11 Top Tips for Availability Management.” Purple Griffon, 4 Jan. 2019. Web.

    Metzler, Jim. “The Next Generation Network Operations Center: How the Focus on Application Delivery is Redefining the NOC.” Ashton, Metzler & Associates, n.d. Web.

    Nilekar, Shirish. “Beyond Redundancy: Improving IT Availability.” Network Computing, 28 Aug. 2015. Web.

    Slocum, Mac. “Site Reliability Engineering (SRE): A Simple Overview.” O’Reilly, 16 Aug. 2018. Web.

    Spiceworks. “The 2019 State of IT.” Spiceworks, 2019. Web

    Capture and Market the ROI of Your VMO

    • Buy Link or Shortcode: {j2store}212|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $108,234 Average $ Saved
    • member rating average days saved: 9 Average Days Saved
    • Parent Category Name: Vendor Management
    • Parent Category Link: /vendor-management
    • All IT organizations are dependent on their vendors for technology products, services, and solutions to support critical business functions.
    • Measuring the impact of and establishing goals for the vendor management office (VMO) to maximize its effectiveness requires an objective and quantitative approach whenever possible.
    • Sharing the VMO’s impact internally is a balancing act between demonstrating value and self-promotion.

    Our Advice

    Critical Insight

    • The return on investment (ROI) calculation for your VMO must be customized. The ROI components selected must match your VMO ROI maturity, resources, and roadmap. There is no one-size-fits-all approach to calculating VMO ROI.
    • ROI contributions come from many areas and sources. To maximize the VMO’s ROI, look outside the traditional framework of savings and cost avoidance to vendor-facing interactions and the impact the VMO has on internal departments.

    Impact and Result

    • Quantifying the contributions of the VMO takes the guess work out of whether the VMO is performing adequately.
    • Taking a comprehensive approach to measuring the value created by the VMO and the ROI associated with it will help the organization appreciate the importance of the VMO.
    • Establishing goals for the VMO with the help of the executives and key stakeholders ensures that the VMO is supporting the needs of the entire organization.

    Capture and Market the ROI of Your VMO Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should calculate and market internally your VMO’s ROI, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Get organized

    Begin the process by identifying your VMO’s ROI maturity level and which calculation components are most appropriate for your situation.

    • Capture and Market the ROI of the VMO – Phase 1: Get Organized
    • VMO ROI Maturity Assessment Tool
    • VMO ROI Calculator and Tracker
    • VMO ROI Data Source Inventory and Evaluation Tool
    • VMO ROI Summary Template

    2. Establish baseline

    Set measurement baselines and goals for the next measurement cycle.

    • Capture and Market the ROI of the VMO – Phase 2: Establish Baseline
    • VMO ROI Baseline and Goals Tool

    3. Measure and monitor results

    Measure the VMO's ROI and value created by the VMO’s efforts and the overall internal satisfaction with the VMO.

    • Capture and Market the ROI of the VMO – Phase 3: Measure and Monitor Results
    • RFP Cost Estimator
    • Improvements in Working Capital Estimator
    • Risk Estimator
    • General Process Cost Estimator and Delta Estimator
    • VMO Internal Client Satisfaction Survey
    • Vendor Security Questionnaire
    • Value Creation Worksheet
    • Deal Summary Report Template

    4. Report results

    Report the results to key stakeholders and executives in a way that demonstrates the value added by the VMO to the entire organization.

    • Capture and Market the ROI of the VMO – Phase 4: Report Results
    • Internal Business Review Agenda Template
    • IT Spend Analytics
    • VMO ROI Reporting Worksheet
    • VMO ROI Stakeholder Report Template
    [infographic]

    Workshop: Capture and Market the ROI of Your VMO

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Get Organized

    The Purpose

    Determine how you will measure the VMO’s ROI.

    Key Benefits Achieved

    Focus your measurement on the appropriate activities.

    Activities

    1.1 Determine your VMO’s maturity level and identify applicable ROI measurement categories.

    1.2 Review and select the appropriate ROI formula components for each applicable measurement category.

    1.3 Compile a list of potential data sources, evaluate the viability of each data source selected, and assign data collection and analysis responsibilities.

    1.4 Communicate progress and proposed ROI formula components to executives and key stakeholders for feedback and/or approval/alignment.

    Outputs

    VMO ROI maturity level and first step of customizing the ROI formula components.

    Second and final step of customizing the ROI formula components…what will actually be measured.

    Viable data sources and assignments for team members.

    A progress report for key stakeholders and executives.

    2 Establish Baseline

    The Purpose

    Set baselines to measure created value against.

    Key Benefits Achieved

    ROI contributions cannot be objectively measured without baselines.

    Activities

    2.1 Gather baseline data.

    2.2 Calculate/set baselines.

    2.3 Set SMART goals.

    2.4 Communicate progress and proposed ROI formula components to executives and key stakeholders for feedback and/or approval/alignment.

    Outputs

    Data to use for calculating baselines.

    Baselines for measuring ROI contributions.

    Value creation goals for the next measurement cycle.

    An updated progress report for key stakeholders and executives.

    3 Measure and Monitor Results

    The Purpose

    Calculate the VMO’s ROI.

    Key Benefits Achieved

    An understanding of whether the VMO is paying for itself.

    Activities

    3.1 Assemble the data and calculate the VMO’s ROI.

    3.2 Organize the data for the reporting step.

    Outputs

    The VMO’s ROI expressed in terms of how many times it pays for itself (e.g. 1X, 3X, 5X).

    Determine which supporting data will be reported.

    4 Report Results

    The Purpose

    Report results to stakeholders.

    Key Benefits Achieved

    Stakeholders understand the value of the VMO.

    Activities

    4.1 Create a reporting template.

    4.2 Determine reporting frequency.

    4.3 Decide how the reports will be distributed or presented.

    4.4 Send out a draft report and update based on feedback.

    Outputs

    A template for reporting ROI and supporting data.

    A decision about quarterly or annual reports.

    A decision regarding email, video, and in-person presentation of the ROI reports.

    Final ROI reports.

    Tell Your Story With Data Visualization

    • Buy Link or Shortcode: {j2store}364|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Business Intelligence Strategy
    • Parent Category Link: /business-intelligence-strategy

    Analysts do not feel empowered to challenge requirements to deliver a better outcome. This alongside underlying data quality issues prevents the creation of accurate and helpful information. Graphic representations do not provide meaningful and actionable insights.

    Our Advice

    Critical Insight

    As organizations strive to become more data-driven, good storytelling with data visualization supports growing corporate data literacy and helps analysts in providing insights that improves organization's decision-making and value-driving processes, which ultimately boosts business performance.

    Impact and Result

    Follow a step-by-step guide to address the business bias of tacet experience over data facts and increase audience's understanding and acceptance toward data solutions.

    Save the lost hours and remove the challenges of reports and dashboards being disregarded due to ineffective usage.

    Gain insights from data-driven recommendations and have decision support to make informed decisions.

    Tell Your Story With Data Visualization Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Tell Your Story With Data Visualization Deck – Solve challenging business problems more effectively and improve communication with audiences by demonstrating significant insights through data storytelling with impactful visuals.

    Here is our step-by-step process of getting value out of effective storytelling with data visualization:

  • Step 1: Frame the business problem and the outcomes required.
  • Step 2: Explore the potential drivers and formulate hypotheses to test.
  • Step 3: Construct a meaningful narrative which the data supports.
    • Tell Your Story With Data Visualization Storyboard

    2. Storytelling Whiteboard Canvas Template – Plan out storytelling using Info-Tech’s whiteboard canvas template.

    This storytelling whiteboard canvas is a template that will help you create your visualization story narrative by:

  • Identifying the problem space.
  • Finding logical relationships and data identification.
  • Reviewing analysis and initial insights.
  • Building the story and logical conclusion.
    • Storytelling Whiteboard Canvas Template
    [infographic]

    Further reading

    Tell Your Story With Data Visualization

    Build trust with your stakeholders.

    Analyst Perspective

    Build trust with your stakeholders.

    Data visualization refers to graphical representations of data which help an audience understand. Without good storytelling, however, these representations can distract an audience with enormous amounts of data or even lead them to incorrect conclusions.

    Good storytelling with data visualization involves identifying the business problem, exploring potential drivers, formulating a hypothesis, and creating meaningful narratives and powerful visuals that resonate with all audiences and ultimately lead to clear actionable insights.

    Follow Info-Tech's step-by-step approach to address the business bias of tacit experience over data facts, improve analysts' effectiveness and support better decision making.

    Ibrahim Abdel-Kader, Research Analyst

    Ibrahim Abdel-Kader
    Research Analyst,
    Data, Analytics, and Enterprise Architecture

    Nikitha Patel, Research Specialist

    Nikitha Patel
    Research Specialist,
    Data, Analytics, and Enterprise Architecture

    Ruyi Sun, Research Specialist

    Ruyi Sun
    Research Specialist,
    Data, Analytics, and Enterprise Architecture

    Our understanding of the problem

    This research is designed for

    • Business analysts, data analysts, or their equivalent who (in either a centralized or federated operating model) look to solve challenging business problems more effectively and improve communication with audiences by demonstrating significant insights through visual data storytelling.

    This research will also assist

    • A CIO or business unit (BU) leader looking to improve reporting and analytics, reduce time to information, and embrace decision making.

    This research will help you

    • Identify the business problem and root causes that you are looking to address for key stakeholders.
    • Improve business decision making through effective data storytelling.
    • Focus on insight generation rather than report production.
    • Apply design thinking principles to support the collection of different perspectives.

    This research will help them

    • Understand the report quickly and efficiently, regardless of their data literacy level.
    • Grasp the current situation of data within the organization.

    Executive Summary

    Your Challenge Common Obstacles Info-Tech's Approach
    As analysts, you may experience some critical challenges when presenting a data story.
    • The graphical representation does not provide meaningful or actionable insights.
    • Difficulty selecting the right visual tools or technologies to create visual impact.
    • Lack of empowerment, where analysts don't feel like they can challenge requirements.
    • Data quality issues that prevent the creation of accurate and helpful information.
    Some common roadblocks may prevent you from addressing these challenges.
    • Lack of skills and context to identify the root cause or the insight that adds the most value.
    • Lack of proper design or over-visualization of data will mislead/confuse the audience.
    • Business audience bias, leading them to ignore reliable insights presented.
    • Lack of the right access to obtain data could hinder the process.
    • Understand and dissect the business problem through Info-Tech's guidance on root cause analysis and design thinking process.
    • Explore each potential hypothesis and construct your story's narratives.
    • Manage data visualization using evolving tools and create visual impact.
    • Inform business owners how to proceed and collect feedback to achieve continuous improvement.

    Info-Tech Insight
    As organizations strive to become more data-driven, good storytelling with data visualization supports growing corporate data literacy and helps analysts provide insights that improve organizational decision-making and value-driving processes, which ultimately boosts business performance.

    Glossary

    • Data: Facts or figures, especially those stored in a computer, that can be used for calculating, reasoning, or planning. When data is processed, organized, structured, or presented in a given context to make it useful, it is called information. Data leaders are accountable for certain data domains and sets.
    • Data storytelling: The ability to create a narrative powered by data and analytics that supports the hypothesis and intent of the story. Narrators of the story should deliver a significant view of the message in a way easily understood by the target audience. Data visualization can be used as a tactic to enhance storytelling.
    • Data visualization: The ability to visually represent a complete story to the target audience powered by data & analytics, using data storytelling as an enabling mechanism to convey narratives. Typically, there are two types of visuals used as part of data visualization: explanatory/informative visuals (the entire story or specific aspects delivered to the audience) and exploratory visuals (the collected data used to clarify what questions must be answered).
    • Data literacy: The ability to read, work with, analyze, and argue with data. Easy access to data is essential to exercising these skills. All organizational employees involved with data-driven decisions should learn to think critically about the data they use for analytics and how they assess and interpret the results of their work.
    • Data quality: A measure of the condition of data based on factors such as accuracy, completeness, consistency, reliability, and being up-to-date. This is about how well-suited a data set is to serve its intended purpose, therefore business users and stakeholders set the standards for what is good enough. The governance function along with IT ensures that data quality measures are applied, and corrective actions taken.
    • Analytics/Business intelligence (BI): A technology-driven process for analyzing data and delivering actionable information that helps executives, managers, and workers make informed business decisions. As part of the BI process, organizations collect data from internal IT systems and external sources, prepare it for analysis, run queries against the data, and create data visualizations.
      Note: In some frameworks, analytics and BI refer to different types of analyses (i.e. analytics predict future outcomes, BI describes what is or has been).

    Getting value out of effective storytelling with data visualization

    Data storytelling is gaining wide recognition as a tool for supporting businesses in driving data insights and making better strategic decisions.

    92% of respondents agreed that data storytelling is an effective way of communicating or delivering data and analytics results.

    87% of respondents agreed that if insights were presented in a simpler/clearer manner, their organization's leadership team would make more data-driven decisions.

    93% of respondents agreed that decisions made based on successful data storytelling could potentially help increase revenue.

    Source: Exasol, 2021

    Despite organizations recognizing the value of data storytelling, issues remain which cannot be remedied solely with better technology.

    61% Top challenges of conveying important insights through dashboards are lack of context (61%), over-communication (54%), and inability to customize contents for intended audiences (46%).

    49% of respondents feel their organizations lack storytelling skills, regardless of whether employees are data literate.

    Source: Exasol, 2021

    Info-Tech Insight
    Storytelling is a key component of data literacy. Although enterprises are increasingly investing in data analytics software, only 21% of employees are confident with their data literacy skills. (Accenture, 2020)

    Prerequisite Checklist

    Before applying Info-Tech's storytelling methodology, you should have addressed the following criteria:

    • Select the right data visualization tools.
    • Have the necessary training in statistical analysis and data visualization technology.
    • Have competent levels of data literacy.
    • Good quality data founded on data governance and data architecture best practices.

    To get a complete view of the field you want to explore, please refer to the following Info-Tech resources:

    Select and Implement a Reporting and Analytics Solution

    Build a Data Architecture Roadmap

    Establish Data Governance

    Build Your Data Quality Program

    Foster Data-Driven Culture With Data Literacy

    Info-Tech's Storytelling With Data Visualization Framework

    Data Visualization Framework

    Info-Tech Insight
    As organizations strive to become more data-driven, good storytelling with data visualization supports growing corporate data literacy and helps analysts provide insights that improve organizational decision-making and value-driving processes, which ultimately boosts business performance.

    Research Benefits

    Member Benefits Business Benefits
    • Reduce time spent on getting your audience in the room and promote business involvement with the project.
    • Eliminate ineffectively used reports and dashboards being disregarded for lack of storytelling skills, resulting in real-time savings and monetary impact.
    • Example: A $50k reporting project has a 49% risk of the company being unable to communicate effective data stories (Exasol, 2021). Therefore, a $50k project has an approx. 50% chance of being wasted. Using Info-Tech's methodology, members can remove the risk, saving $25k and the time required to produce each report.
    • Address the common business bias of tacit experience over data-supported facts and increase audience understanding and acceptance of data-driven solutions.
    • Clear articulation of business context and problem.
    • High-level improvement objectives and return on investment (ROI).
    • Gain insights from data-driven recommendations to assist with making informed decisions.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit Guided Implementation Workshop Consulting
    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks are used throughout all four options.

    Tactics to Retain IT Talent

    • Buy Link or Shortcode: {j2store}549|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.
    • Many organizations focus on increasing engagement to improve retention, but this approach doesn’t address the entire problem.

    Our Advice

    Critical Insight

    • Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Impact and Result

    • Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.
    • Target employee segments and work with management to develop solutions to retain top talent.

    Tactics to Retain IT Talent Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Tactics to Retain IT Talent Storyboard – Use this storyboard to develop a targeted talent retention plan to retain top and core talent in the organization.

    Integrate data from exit surveys and interviews, engagement surveys, and stay interviews to understand the most commonly cited reasons for employee departure in order to select and prioritize tactics that improve retention. This blueprint will help you identify reasons for regrettable turnover, select solutions, and create an action plan.

    • Tactics to Retain IT Talent Storyboard

    2. Retention Plan Workbook – Capture key information in one place as you work through the process to assess and prioritize solutions.

    Use this tool to document and analyze turnover data to find suitable retention solutions.

    • Retention Plan Workbook

    3. Stay Interview Guide – Managers will use this guide to conduct regular stay interviews with employees to anticipate and address turnover triggers.

    The Stay Interview Guide helps managers conduct interviews with current employees, enabling the manager to understand the employee's current engagement level, satisfaction with current role and responsibilities, suggestions for potential improvements, and intent to stay with the organization.

    • Stay Interview Guide

    4. IT Retention Solutions Catalog – Use this catalog to select and prioritize retention solutions across the employee lifecycle.

    Review best-practice solutions to identify those that are most suitable to your organizational culture and employee needs. Use the IT Retention Solutions Catalog to explore a variety of methods to improve retention, understand their use cases, and determine stakeholder responsibilities.

    • IT Retention Solutions Catalog
    [infographic]

    Workshop: Tactics to Retain IT Talent

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Reasons for Regrettable Turnover

    The Purpose

    Identify the main drivers of turnover at the organization.

    Key Benefits Achieved

    Find out what to explore during focus groups.

    Activities

    1.1 Review data to determine why employees join, stay, and leave.

    1.2 Identify common themes.

    1.3 Prepare for focus groups.

    Outputs

    List of common themes/pain points recorded in the Retention Plan Workbook.

    2 Conduct Focus Groups

    The Purpose

    Conduct focus groups to explore retention drivers.

    Key Benefits Achieved

    Explore identified themes.

    Activities

    2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.

    2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

    Outputs

    Focus group feedback.

    Focus group feedback analyzed and organized by themes.

    3 Identify Needs and Retention Initiatives

    The Purpose

    Home in on employee needs that are a priority.

    Key Benefits Achieved

    A list of initiatives to address the identified needs

    Activities

    3.1 Create an empathy map to identify needs.

    3.2 Shortlist retention initiatives.

    Outputs

    Employee needs and shortlist of initiatives to address them.

    4 Prepare to Communicate and Launch

    The Purpose

    Prepare to launch your retention initiatives.

    Key Benefits Achieved

    A clear action plan for implementing your retention initiatives.

    Activities

    4.1 Select retention initiatives.

    4.2 Determine goals and metrics.

    4.3 Plan stakeholder communication.

    4.4 Build a high-level action plan.

    Outputs

    Finalized list of retention initiatives.

    Goals and associated metrics recorded in the Retention Plan Workbook.

    Further reading

    Tactics to Retain IT Talent

    Keep talent from walking out the door by discovering and addressing moments that matter and turnover triggers.

    Executive Summary

    Your Challenge

    Many organizations are facing an increase in voluntary turnover as low unemployment, a lack of skilled labor, and a rise in the number of vacant roles have given employees more employment choices.

    Common Obstacles

    Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.

    Many organizations tackle retention from an engagement perspective: Increase engagement to improve retention. This approach doesn't consider the whole problem.

    Info-Tech's Approach

    Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.

    Target employee segments and work with management to develop solutions to retain top talent.

    Info-Tech Insight

    Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    This research addresses regrettable turnover

    This is an image of a flow chart with three levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable: The loss of employees that the organization did not wish to keep, e.g. low performers, and Regrettable:  The loss of employees that the organization wishes it could have kept.

    Low unemployment and rising voluntary turnover makes it critical to focus on retention

    As the economy continues to recover from the pandemic, unemployment continues to trend downward even with a looming recession. This leaves more job openings vacant, making it easier for employees to job hop.

    This image contains a graph of the US Employment rate between 2020 - 2022 from the US Bureau of Economic Analysis and Bureau of Labor Statistics (BLS), 2022, the percentage of individuals who change jobs every one to five years from 2022 Job Seeker Nation Study, Jobvite, 2022, and voluntary turnover rates from BLS, 2022

    With more employees voluntarily choosing to leave jobs, it is more important than ever for organizations to identify key employees they want to retain and put plans in place to keep them.

    Retention is a challenge for many organizations

    The number of HR professionals citing retention/turnover as a top workforce management challenge is increasing, and it is now the second highest recruiting priority ("2020 Recruiter Nation Survey," Jobvite, 2020).

    65% of employees believe they can find a better position elsewhere (Legaljobs, 2021). This is a challenge for organizations in that they need to find ways to ensure employees want to stay at the organization or they will lose them, which results in high turnover costs.

    Executives and IT are making retention and turnover – two sides of the same coin – a priority because they cost organizations money.

    • 87% of HR professionals cited retention/turnover as a critical and high priority for the next few years (TINYpulse, 2020).
    • $630B The cost of voluntary turnover in the US (Work Institute, 2020).
    • 66% of organizations consider employee retention to be important or very important to an organization (PayScale, 2019).

    Improving retention leads to broad-reaching organizational benefits

    Cost savings: the price of turnover as a percentage of salary

    • 33% Improving retention can result in significant cost savings. A recent study found turnover costs, on average, to be around a third of an employee's annual salary (SHRM, 2019).
    • 37.9% of employees leave their organization within the first year. Employees who leave within the first 90 days of being hired offer very little or no return on the investment made to hire them (Work Institute, 2020).

    Improved performance

    Employees with longer tenure have an increased understanding of an organization's policies and processes, which leads to increased productivity (Indeed, 2021).

    Prevents a ripple effect

    Turnover often ripples across a team or department, with employees following each other out of the organization (Mereo). Retaining even one individual can often have an impact across the organization.

    Transfer of knowledge

    Retaining key individuals allows them to pass it on to other employees through communities of practice, mentoring, or other knowledge-sharing activities.

    Info-Tech Insight

    Improving retention goes beyond cost savings: Employees who agree with the statement "I expect to be at this organization a year from now" are 71% more likely to put in extra hours and 32% more likely to accomplish more than what is expected of their role (McLean & Company Engagement Survey, 2021; N=77,170 and 97,326 respectively).

    However, the traditional engagement-focused approach to retention is not enough

    Employee engagement is a strong driver of retention, with only 25% of disengaged employees expecting to be at their organization a year from now compared to 92% of engaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Average employee Net Promoter Score (eNPS)

    This image contains a graph of the Average employee Net Promoter Score (eNPS)

    Individual employee Net Promoter Scores (eNPS)

    This image contains a graph of the Individual employee Net Promoter Scores (eNPS)

    However, engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave.

    This analysis of McLean & Company's engagement survey results shows that while an organization's average employee net promoter score (eNPS) stays relatively static, at an individual level there is a huge amount of volatility.

    This demonstrates the need for an approach that is more capable of responding to or identifying employees' in-the-moment needs, which an annual engagement survey doesn't support.

    Turnover triggers and moments that matter also have an impact on retention

    Retention needs to be monitored throughout the employee lifecycle. To address the variety of issues that can appear, consider three main paths to turnover:

    1. Employee engagement – areas of low engagement.
    2. Turnover triggers that can quickly lead to departures.
    3. Moments that matter in the employee experience (EX).

    Employee engagement

    Engagement drivers are strong predictors of turnover.

    Employees who are highly engaged are 3.6x more likely to believe they will be with the organization 12 months from now than disengaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Turnover triggers

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers are a cause for voluntary turnover more often than accumulated issues (Lee et al.).

    Moments that matter

    Employee experience is the employee's perception of the accumulation of moments that matter within their employee lifecycle.

    Retention rates increase from 21% to 44% when employees have positive experiences in the following categories: belonging, purpose, achievement, happiness, and vigor at work. (Workhuman, 2020).

    While managers do not directly impact turnover, they do influence the three main paths to turnover

    Research shows managers do not appear as one of the common reasons for employee turnover.

    Top five most common reasons employees leave an organization (McLean & Company, Exit Survey, 2018-2021; N=107 to 141 companies,14,870 to 19,431 responses).

    Turnover factorsRank
    Opportunities for career advancement1
    Satisfaction with my role and responsibilities2
    Base pay3
    Opportunities for career-related skill development4
    The degree to which my skills were used in my job5

    However, managers can still have a huge impact on the turnover of their team through each of the three main paths to turnover:

    Employee engagement

    Employees who believe their managers care about them as a person are 3.3x more likely to be engaged than those who do not (McLean & Company, 2021; N=105,186).

    Turnover triggers

    Managers who are involved with and aware of their staff can serve as an early warning system for triggers that lead to turnover too quickly to detect with data.

    Moments that matter

    Managers have a direct connection with each individual and can tailor the employee experience to meet the needs of the individuals who report to them.

    Gallup has found that 52% of exiting employees say their manager could have done something to prevent them from leaving (Gallup, 2019). Do not discount the power of managers in anticipating and preventing regrettable turnover.

    Addressing engagement, turnover triggers, and moments that matter is the key to retention

    This is an image of a flow chart with four levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable, and Regrettable.  The fourth level has three boxes under Regrettable, labeled Employee Engagement, Turnover triggers, and Moments that matter

    Info-Tech Insight

    HR traditionally seeks to examine engagement levels when faced with retention challenges, but engagement is only a part of the full picture. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Follow Info-Tech's two-step process to create a retention plan

    1. Identify Reasons for Regrettable Turnover

    2. Select Solutions and Create an Action Plan

    Step 1

    Identify Reasons for Regrettable Turnover

    After completing this step you will have:

    • Analyzed and documented why employees join, stay, and leave your organization.
    • Identified common themes and employee needs.
    • Conducted employee focus groups and prioritized employee needs.

    Step 1 focuses on analyzing existing data and validating it through focus groups

    Employee engagement

    Employee engagement and moments that matter are easily tracked by data. Validating employee feedback data by speaking and empathizing with employees helps to uncover moments that matter. This step focuses on analyzing existing data and validating it through focus groups.

    Engagement drivers such as compensation or working environment are strong predictors of turnover.
    Moments that matter
    Employee experience (EX) is the employee's perception of the accumulation of moments that matter with the organization.
    Turnover triggers
    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers

    This step will not touch on turnover triggers. Instead, they will be discussed in step 2 in the context of the role of the manager in improving retention.

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Info-Tech Insight

    IT managers often have insights into where and why retention is an issue through their day-to-day work. Gathering detailed quantitative and qualitative data provides credibility to these insights and is key to building a business case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

    Gather data to better understand why employees join, stay, and leave

    Start to gather and examine additional data to accurately identify the reason(s) for high turnover. Begin to uncover the story behind why these employees join, stay, and leave your organization through themes and trends that emerge.

    Look for these icons throughout step 2.

    Join

    Why do candidates join your organization?

    Stay

    Why do employees stay with your organization?

    Leave

    Why do employees leave your organization?

    For more information on analysis, visualization, and storytelling with data, see Info-Tech's Start Making Data-Driven People Decisions blueprint.

    Employee feedback data to look at includes:

    Gather insights through:

    • Focus groups
    • Verbatim comments
    • Exit interviews
    • Using the employee value proposition (EVP) as a filter (does it resonate with the lived experience of employees?)

    Prepare to draw themes and trends from employee data throughout step 1.

    Uncover employee needs and reasons for turnover by analyzing employee feedback data.

    • Look for trends (e.g. new hires join for career opportunities and leave for the same reason, or most departments have strong work-life balance scores in engagement data).
    • Review if there are recurring issues being raised that may impact turnover.
    • Group feedback to highlight themes (e.g. lack of understanding of EVP).
    • Identify which key employee needs merit further investigation or information.

    This is an image showing how you can draw out themes and trends using employee data throughout step 1.

    Classify where key employee needs fall within the employee lifecycle diagram in tab 2 of the Retention Plan Workbook. This will be used in step 2 to pinpoint and prioritize solutions.

    Info-Tech Insight

    The employee lifecycle is a valuable way to analyze and organize engagement pain points, moments that matter, and turnover triggers. It ensures that you consider the entirety of an employee's tenure and the different factors that lead to turnover.

    Examine new hire data and begin to document emerging themes

    Join

    While conducting a high-level analysis of new hire data, look for these three key themes impacting retention:

    Issues or pain points that occurred during the hiring process.

    Reasons why employees joined your organization.

    The experience of their first 90 days. This can include their satisfaction with the onboarding process and their overall experience with the organization.

    Themes will help to identify areas of strength and weakness organization-wide and within key segments. Document in tab 3 of the Retention Plan Workbook.

    1. Start by isolating the top reasons employees joined your organization. Ask:
      • Do the reasons align with the benefits you associate with working at your organization?
      • How might this impact your EVP?
      • If you use a new hire survey, look at the results for the following questions:
      • For which of the following reasons did you apply to this organization?
      • For what reasons did you accept the job offer with this organization?
    2. then, examine other potential problem areas that may not be covered by your new hire survey, such as onboarding or the candidate experience during the hiring process.
      • If you conduct a new hire survey, look at the results in the following sections:
        • Candidate Experience
        • Acclimatization
        • Training and Development
        • Defining Performance Expectations

      Analyze engagement data to identify areas of strength that drive retention

      Employees who are engaged are 3.6x more likely to believe they will be with the organization 12 months from now (McLean & Company Engagement Survey, 2018-2021; N=117,307). Given the strength of this relationship, it is essential to identify areas of strength to maintain and leverage.

      1. Look at the highest-performing drivers in your organization's employee engagement survey and drivers that fall into the "leverage" and "maintain" quadrants of the priority matrix.
        • These drivers provide insight into what prompts broader groups of employees to stay.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      1. Look into what efforts have been made to maintain programs, policies, and practices related to these drivers and ensure they are consistent across the entire organization.
      2. Document trends and themes related to engagement strengths in tab 2 of the Retention Plan Workbook.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Identify areas of weakness that drive turnover in your engagement data

      1. Look at the lowest-performing drivers in your organization's employee engagement survey and drivers that fall into the "improve" and "evaluate" quadrants of the priority matrix.
        • These drivers provide insight into what pushes employees to leave the organization.
      2. Delve into organizational efforts that have been made to address issues with the programs, policies, and practices related to these drivers. Are there any projects underway to improve them? What are the barriers preventing improvements?
      3. Document trends and themes related to engagement weaknesses in tab 2 of the Retention Plan Workbook.

      If you use a product other than Info-Tech's Engagement Survey, your results will look different. The key is to look at areas of weakness that emerge from the data.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Mine exit surveys to develop an integrated, holistic understanding of why employees leave

      Conduct a high-level analysis of the data from your employee exit diagnostic. While analyzing this data, consider the following:

      • What are the trends and quantitative data about why employees leave your organization that may illuminate employee needs or issues at specific points throughout the employee lifecycle?
      • What are insights around your key segments? Data on key segments is easily sliced from exit survey results and can be used as a starting point for digging deeper into retention issues for specific groups.
      • Exit surveys are an excellent starting point. However, it is valuable to validate the data gathered from an exit survey using exit interviews.
      1. Isolate results for key segments of employees to target with retention initiatives (e.g. by age group or by department).
      2. Identify data trends or patterns over time; for example, that compensation factors have been increasing in importance.
      3. Document trends and themes taken from the exit survey results in tab 2 of the Retention Plan Workbook.

      If your organization conducts exit interviews, analyze the results alongside or in lieu of exit survey data.

      Compare new hire data with exit data to identify patterns and insights

      Determine if new hire expectations weren't met, prompting employees to leave your organization, to help identify where in the employee lifecycle issues driving turnover may be occurring.

      1. Look at your new hire data for the top reasons employees joined your organization.
        • McLean & Company's New Hire Survey database shows that the top three reasons candidates accept job offers on average are:
          1. Career opportunities
          2. Nature of the job
          3. Development opportunities
      2. Next, look at your exit data and the top reasons employees left your organization.
        1. McLean & Company's Exit Survey database shows that the top three reasons employees leave on average are:
          1. Opportunities for career advancement
          2. Base pay
          3. Satisfaction with my role and responsibilities
      3. Examine the results and ask:
        • Is there a link between why employees join and leave the organization?
        • Did they cite the same reasons for joining and for leaving?
        • What do the results say about what your employees do and do not value about working at your organization?
      4. Document the resulting insights in tab 2 of the Retention Plan Workbook.

      Example:

      A result where employees are leaving for the same reason they're joining the organization could signal a disconnect between your organization's employee value proposition and the lived experience.

      Revisit your employee value proposition to uncover misalignment

      Your employee value proposition (EVP), formal or informal, communicates the value your organization can offer to prospective employees.

      If your EVP is mismatched with the lived experience of your employees, new hires will be in for a surprise when they start their new job and find out it isn't what they were expecting.

      Forty-six percent of respondents who left a job within 90 days of starting cited a mismatch of expectations about their role ("Job Seeker Nation Study 2020," Jobvite, 2020).

      1. Use the EVP as a filter through which you look at all your employee feedback data. It will help identify misalignment between the promised and the lived experience.
      2. If you have EVP documentation, start there. If not, go to your careers page and put yourself in the shoes of a candidate. Ask what the four elements of an EVP look like for candidates:
        • Compensation and benefits
        • Day-to-day job elements
        • Working conditions
        • Organizational elements
      3. Next, compare this to your own day-to-day experiences. Does it differ drastically? Are there any contradictions with the lived experience at your organization? Are there misleading statements or promises?
      4. Document any insights or patterns you uncover in tab 2 of the Retention Plan Workbook.

      Conduct focus groups to examine themes

      Through focus groups, explore the themes you have uncovered with employees to discover employee needs that are not being met. Addressing these employee needs will be a key aspect of your retention plan.

      Identify employee groups who will participate in focus groups:

      • Incorporate diverse perspectives (e.g. employees, managers, supervisors).
      • Include employees from departments and demographics with strong and weak engagement for a full picture of how engagement impacts your employees.
      • Invite boomerang employees to learn why an individual might return to your organization after leaving.

      image contains two screenshots Mclean & Company's Standard Focus Group Guide.

      Customize Info-Tech's Standard Focus Group Guide based on the themes you have identified in tab 3 of the Retention Plan Workbook.

      The goal of the focus group is to learn from employees and use this information to design or modify a process, system, or other solution that impacts retention.

      Focus questions on the employees' personal experience from their perspective.

      Key things to remember:

      • It is vital for facilitators to be objective.
      • Keep an open mind; no feelings are wrong.
      • Beware of your own biases.
      • Be open and share the reason for conducting the focus groups.

      Info-Tech Insight

      Maintaining an open dialogue with employees will help flesh out the context behind the data you've gathered and allow you to keep in mind that retention is about people first and foremost.

      Empathize with employees to identify moments that matter

      Look for discrepancies between what employees are saying and doing.

      1. Say

      "What words or quotes did the employee use?"

      3.Think

      "What might the employee be thinking?"

      Record feelings and thoughts discussed, body language observed, tone of voice, and words used.

      Look for areas of negative emotion to determine the moments that matter that drive retention.

      2. Do

      "What actions or behavior did the employee demonstrate?"

      4. Feel

      "What might the employee be feeling?"

      Record them in tab 3 of the Retention Plan Workbook.

      5. Identify Needs

      "Needs are verbs (activities or desires), not nouns (solutions)"

      Synthesize focus group findings using Info-Tech's Empathy Map Template.

      6. Identify Insights

      "Ask yourself, why?"

      (Based on Stanford d.school Empathy Map Method)

      Distill employee needs into priority issues to address first

      Take employee needs revealed by your data and focus groups and prioritize three to five needs.

      Select a limited number of employee needs to develop solutions to ensure that the scope of the project is feasible and that the resources dedicated to this project are not stretched too thin. The remaining needs should not be ignored – act on them later.

      Share the needs you identify with stakeholders so they can support prioritization and so you can confirm their buy-in and approval where necessary.

      Ask yourself the following questions to determine your priority employee needs:

      • Which needs will have the greatest impact on turnover?
      • Which needs have the potential to be an easy fix or quick win?
      • Which themes or trends came up repeatedly in different data sources?
      • Which needs evoked particularly strong or negative emotions in the focus groups?

      This image contains screenshots of two table templates found in tab 5 of the Retention Plan Workbook

      In the Retention Plan Workbook, distill employee needs on tab 2 into three to five priorities on tab 5.

      Step 2

      Select Solutions and Create an Action Plan

      After completing this step, you will have:

      • Selected and prioritized solutions to address employee needs.
      • Created a plan to launch stay interviews.
      • Built an action plan to implement solutions.

      Select IT-owned solutions and implement people leader–driven initiatives

      Solutions

      First, select and prioritize solutions to address employee needs identified in the previous step. These solutions will address reasons for turnover that influence employee engagement and moments that matter.

      • Brainstorm solutions using the Retention Solutions Catalog as a starting point. Select a longlist of solutions to address your priority needs.
      • Prioritize the longlist of solutions into a manageable number to act on.

      People leaders

      Next, create a plan to launch stay interviews to increase managers' accountability in improving retention. Managers will be critical to solving issues stemming from turnover triggers.

      • Clarify the importance of harnessing the influence of people leaders in improving retention.
      • Discover what might cause individual employees to leave through stay interviews.
      • Increase trust in managers through training.

      Action plan

      Finally, create an action plan and present to senior leadership for approval.

      Look for these icons in the top right of slides in this step.

      Select solutions to employee needs, starting with the Retention Solutions Catalog

      Based on the priority needs you have identified, use the Retention Solutions Catalog to review best-practice solutions for pain points associated with each stage of the lifecycle.

      Use this tool as a starting point, adding to it and iterating based on your own experience and organizational culture and goals.

      This image contains three screenshots from Info-Tech's Retention Solutions Catalog.

      Use Info-Tech's Retention Solutions Catalog to start the brainstorming process and produce a shortlist of potential solutions that will be prioritized on the next slide.

      Info-Tech Insight

      Unless you have the good fortune of having only a few pain points, no single initiative will completely solve your retention issues. Combine one or two of these broad solutions with people-leader initiatives to ensure employee needs are addressed on an individual and an aggregate level.

      Prioritize solutions to be implemented

      Target efforts accordingly

      Quick wins are high-impact, low-effort initiatives that will build traction and credibility within the organization.

      Long-term initiatives require more time and need to be planned for accordingly but will still deliver a large impact. Review the planning horizon to determine how early these need to begin.

      Re-evaluate low-impact and low-effort initiatives and identify ones that either support other higher impact initiatives or have the highest impact to gain traction and credibility. Look for low-hanging fruit.

      Deprioritize initiatives that will take a high degree of effort to deliver lower-value results.

      When assessing the impact of potential solutions, consider:

      • How many critical segments or employees will this solution affect?
      • Is the employee need it addresses critical, or did the solution encompass several themes in the data you analyzed?
      • Will the success of this solution help build a case for further action?
      • Will the solution address multiple employee needs?

      Info-Tech Insight

      It's better to master a few initiatives than under-deliver on many. Start with a few solutions that will have a measurable impact to build the case for further action in the future.

      Solutions

      Low ImpactMedium ImpactLarge Impact
      Large EffortThis is an image of the used to help you prioritize solutions to be implemented.
      Medium Effort
      Low Effort

      Use tab 3 of the Retention Plan Workbook to prioritize your shortlist of solutions.

      Harness the influence of people leaders to improve employee retention

      Leaders at all levels have a huge impact on employees.

      Effective people leaders:

      • Manage work distribution.
      • Create a motivating work environment.
      • Provide development opportunities.
      • Ensure work is stimulating and challenging, but not overwhelming.
      • Provide clear, actionable feedback.
      • Recognize team member contributions.
      • Develop positive relationships with their teams.
      • Create a line of sight between what the employee is doing and what the organization's objectives are.

      Support leaders in recommitting to their role as people managers through Learning & Development initiatives with particular emphasis on coaching and building trust.

      For coaching training, see Info-Tech's Build a Better Manager: Team Essentials – Feedback and Coaching training deck.

      For more information on supporting managers to become better people leaders, see Info-Tech's Build a Better Manager: Manage Your People blueprint.

      "HR can't fix turnover. But leaders on the front line can."
      – Richard P. Finnegan, CEO, C-Suite Analytics

      Equip managers to conduct regular stay interviews to address turnover triggers

      Managers often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews are an effective way of uncovering potential retention issues and allowing managers to act as an early warning system for turnover triggers.

      Examples of common turnover triggers and potential manager responses:

      • Moving, creating a long commute to the office.
        • Through stay interviews, a manager can learn that a long commute is an issue and can help find workarounds such as flexible/remote work options.
      • Not receiving an expected promotion.
        • A trusted manager can anticipate issues stemming from this, discuss why the decision was made, and plan development opportunities for future openings.

      Stay interview best practices

      1. Conducted by an employee's direct manager.
      2. Happen regularly as a part of an ongoing process.
      3. Based on the stay interview, managers produce a turnover forecast for each direct report.
        1. The method used by stay interview expert Richard P. Finnegan is simple: red for high risk, yellow for medium, and green for low.
      4. Provide managers with training and a rough script or list of questions to follow.
        1. Use and customize Info-Tech's Stay Interview Guide to provide a guide for managers on how to conduct a stay interview.
      5. Managers use the results to create an individualized retention action plan made up of concrete actions the manager and employee will take.

      Sources: Richard P. Finnegan, CEO, C-Suite Analytics; SHRM

      Build an action plan to implement the retention plan

      For each initiative identified, map out timelines and actions that need to be taken.

      When building actions and timelines:

      • Refer to the priority needs you identified in tab 4 of the Retention Plan Workbook and ensure they are addressed first.
      • Engage internal stakeholders who will be key to the development of the initiatives to ensure they have sufficient time to complete their deliverables.
        • For example, if you conduct manager training, Learning & Development needs to be involved in the development and launch of the program.
      • Include a date to revisit your baseline retention and engagement data in your project milestones.
      • Designate process owners for new processes such as stay interviews.

      Plan for stay interviews by determining:

      • Whether stay interviews will be a requirement for all employees.
      • How much flexibility managers will have with the process.
      • How you will communicate the stay interview approach to managers.
      • If manager training is required.
      • How managers should record stay interview data and how you will collect this data from them as a way to monitor retention issues.
        • For example, managers can share their turnover forecasts and action plans for each employee.

      Be clear about manager accountabilities for initiatives they will own, such as stay interviews. Plan to communicate the goals and timelines managers will be asked to meet, such as when they must conduct interviews or their responsibility to follow up on action items that come from interviews.

      Track project success to iterate and improve your solutions

      Analyze measurements

      • Regularly remeasure your engagement and retention levels to identify themes and trends that provide insights into program improvements.
      • For example, look at the difference in manager relationship score to see if training has had an impact, or look at changes in critical segment turnover to calculate cost savings.

      Revisit employee and manager feedback

      • After three to six months, conduct additional surveys or focus groups to determine the success of your initiatives and opportunities for improvement. Tweak the program, including stay interviews, based on manager and employee feedback.

      Iterate frequently

      • Revisit your initiatives every two or three years to determine if a refresh is necessary to meet changing organizational and employee needs and to update your goals and targets.

      Key insights

      Insight 1Insight 2Insight 3

      Retention and turnover are two sides of the same coin. You can't fix retention without first understanding turnover.

      Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

      Improving retention isn't just about lowering turnover, it's about discovering what healthy retention looks like for your organization.

      Insight 4Insight 5Insight 6

      HR professionals often have insights into where and why retention is an issue. Gathering detailed employee feedback data through surveys and focus groups provides credibility to these insights and is key to building a case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

      Successful retention plans must be owned by both IT leaders and HR.

      IT leaders often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews help managers anticipate potential retention issues on their teams.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Info-Tech AnalystsPre-workPost-work
      Client Data Gathering and PlanningImplementation Supported Through Analyst Calls

      1.1 Discuss participants, logistics, overview of workshop activities

      1.2 Provide support to client for below activities through calls.

      2.1 Schedule follow-up calls to work through implementation of retention solutions based on identified needs.
      Client

      1.Gather results of engagement survey, new hire survey, exit survey, and any exit and stay interview feedback.

      2.Gather and analyze turnover data.

      3.Identify key employee segment(s) and identify and organize participants for focus groups.

      4.Complete cost of turnover analysis.

      5.Review turnover data and prioritize list of employee segments.

      1.Obtain senior leader approval to proceed with retention plan.

      2.Finalize and implement retention solutions.

      3.Prepare managers to conduct stay interviews.

      4.Communicate next steps to stakeholders.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      ActivitiesDay 1Day 2Day 3Day 4
      Assess Current StateConduct Focus GroupsIdentify Needs and Retention InitiativesPrepare to Communicate and Launch

      1.1 Review data to determine why employees join, stay, and leave.

      1.2 Identify common themes.

      1.3 Prepare for focus groups.

      2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities..

      2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

      3.1 Create an empathy map to identify needs

      3.2 Shortlist retention initiatives

      4.1 Select retention initiatives

      4.2 Determine goals and metrics

      4.3 Plan stakeholder communication4.4 Build a high-level action plan

      Deliverables

      1.List of common themes/pain points recorded in the Retention Plan Workbook

      2.Plan for focus groups documented in the Focus Group Guide

      1.Focus group feedback

      2.Focus group feedback analyzed and organized by themes

      1.Employee needs and shortlist of initiatives to address them1.Finalized list of retention initiatives

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Research Contributors and Experts

      Jeff Bonnell
      VP HR
      Info-Tech Research Group

      Phillip Kotanidis
      CHRO
      Michael Garron Hospital

      Michael McGuire
      Director, Organizational Development
      William Osler Health System

      Dr. Iris Ware
      Chief Learning Officer
      City of Detroit

      Richard P. Finnegan
      CEO
      C-Suite Analytics

      Dr. Thomas Lee
      Professor of Management
      University of Washington

      Jane Moughon
      Specialist in increasing profits, reducing turnover, and maximizing human potential in manufacturing companies

      Lisa Kaste
      Former HR Director
      Citco

      Piyush Mathur
      Head of Workforce Analytics
      Johnson & Johnson

      Gregory P. Smith
      CEO
      Chart Your Course

      Works Cited

      "17 Surprising Statistics about Employee Retention." TINYpulse, 8 Sept. 2020. Web.
      "2020 Job Seeker Nation Study." Jobvite, April 2020. Web.
      "2020 Recruiter Nation Survey." Jobvite, 2020. Web.
      "2020 Retention Report: Insights on 2019 Turnover Trends, Reasons, Costs, & Recommendations." Work Institute, 2020. Web.
      "25 Essential Productivity Statistics for 2021." TeamStage, 2021. Accessed 22 Jun. 2021.
      Agovino, Theresa. "To Have and to Hold." SHRM, 23 Feb. 2019. Web.
      "Civilian Unemployment Rate." Bureau of Labor Statistics, June 2020. Web.
      Foreman, Paul. "The domino effect of chief sales officer turnover on salespeople." Mereo, 19 July 2018. Web.
      "Gross Domestic Product." U.S. Bureau of Economic Analysis, 27 May 2021. Accessed 22 Jun. 2020.
      Kinne, Aaron. "Back to Basics: What is Employee Experience?" Workhuman, 27August 2020. Accessed 21 Jun. 2021.
      Lee, Thomas W, et al. "Managing employee retention and turnover with 21st century ideas." Organizational Dynamics, vol 47, no. 2, 2017, pp. 88-98. Web.
      Lee, Thomas W. and Terence R. Mitchell. "Control Turnover by Understanding its Causes." The Blackwell Handbook of Principles of Organizational Behaviour. 2017. Print.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup. 13 March 2019. Web.
      "Table 18. Annual Quit rates by Industry and Region Not Seasonally Adjusted." Bureau of Labor Statistics. June 2021. Web.
      "The 2019 Compensation Best Practices Report: Will They Stay or Will They Go? Employee Retention and Acquisition in an Uncertain Economy." PayScale. 2019. Web.
      Vuleta, Branka. "30 Troubling Employee Retention Statistics." Legaljobs. 1 Feb. 2021. Web.
      "What is a Tenured Employee? Top Benefits of Tenure and How to Stay Engaged as One." Indeed. 22 Feb. 2021. Accessed 22 Jun. 2021.

      Enterprise Network Design Considerations

      • Buy Link or Shortcode: {j2store}502|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Network Management
      • Parent Category Link: /network-management

      Security, risk, and trust models play into how networks are designed and deployed. If these models are not considered during network design, band-aids and workarounds will be deployed to achieve the needed goals, potentially bypassing network controls.

      Our Advice

      Critical Insight

      The cloud “gold rush” has made it attractive for many enterprises to migrate services off the traditional network and into the cloud. These services are now outside of the traditional network and associated controls. This shifts the split of east-west vs. north-south traffic patterns, as well as extending the network to encompass services outside of enterprise IT’s locus of control.

      Impact and Result

      Where users access enterprise data or services and from which devices dictate the connectivity needed. With the increasing shift of work that the business is completing remotely, not all devices and data paths will be under the control of IT. This shift does not allow IT to abdicate from the responsibility to provide a secure network.

      Enterprise Network Design Considerations Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Enterprise Network Design Considerations Deck – A brief deck that outlines key trusts and archetypes when considering enterprise network designs.

      This blueprint will help you:

      • Enterprise Network Design Considerations Storyboard

      2. Enterprise Network Roadmap Technology Assessment Tool – Build an infrastructure assessment in an hour.

      Dispense with detailed analysis and customizations to present a quick snapshot of the road ahead.

      • Enterprise Network Roadmap Technology Assessment Tool
      [infographic]

      Further reading

      Enterprise Network Design Considerations

      It is not just about connectivity.

      Executive Summary

      Info-Tech Insight

      Connectivity and security are tightly coupled

      Security, risk, and trust models play into how networks are designed and deployed. If these models are not considered during network design, band-aids and workarounds will be deployed to achieve the needed goals, potentially bypassing network controls.

      Many services are no longer within the network

      The cloud “gold rush” has made it attractive for many enterprises to migrate services off the traditional network and into the cloud. These services are now outside of the traditional network and associated controls. This shifts the split of east-west vs. north-south traffic patterns, as well as extending the network to encompass services outside of enterprise IT’s locus of control.

      Users are demanding an anywhere, any device access model

      Where users access enterprise data or services and from which devices dictate the connectivity needed. With the increasing shift of work that the business is completing remotely, not all devices and data paths will be under the control of IT. This shift does not allow IT to abdicate from the responsibility to provide a secure network.

      Enterprise networks are changing

      The new network reality

      The enterprise network of 2020 and beyond is changing:

      • Services are becoming more distributed.
      • The number of services provided “off network” is growing.
      • Users are more often remote.
      • Security threats are rapidly escalating.

      The above statements are all accurate for enterprise networks, though each potentially to differing levels depending on the business being supported by the network. Depending on how affected the network in question currently is and will be in the near future, there are different common network archetypes that are best able to address these concerns while delivering business value at an appropriate price point.

      High-Level Design Considerations

      1. Understand Business Needs
      2. Understand what the business needs are and where users and resources are located.

      3. Define Your Trust Model
      4. Trust is a spectrum and tied tightly to security.

      5. Align With an Archetype
      6. How will the network be deployed?

      7. Understand Available Tooling
      8. What tools are in the market to help achieve design principles?

      Understand business needs

      Mission

      Never ignore the basics. Start with revisiting the mission and vision of the business to address relevant needs.

      Users

      Identify where users will be accessing services from. Remote vs. “on net” is a design consideration now more than ever.

      Resources

      Identify required resources and their locations, on net vs. cloud.

      Controls

      Identify required controls in order to define control points and solutions.

      Define a trust model

      Trust is a spectrum

      • There is a spectrum of trust, from fully trusted to not trusted at all. Each organization must decide for their network (or each area thereof) the appropriate level of trust to assign.
      • The ease of network design and deployment is directly proportional to the trust spectrum.
      • When resources and users are outside of direct IT control, the level of appropriate trust should be examined closely.

      Implicit

      Trust everything within the network. Security is perimeter based and designed to stop external actors from entering the large trusted zone.

      Controlled

      Multiple zones of trust within the network. Segmentation is a standard practice to separate areas of higher and lower trust.

      Zero

      Verify trust. The network is set up to recognize and support the principle of least privilege where only required access is supported.

      Align with an archetype

      Archetypes are a good guide

      • Using a defined archetype as a guiding principle in network design can help clarify appropriate tools or network structures.
      • Different aspects of a network can have different archetypes where appropriate (e.g. IT vs. OT [operational technology] networks).

      Traditional

      Services are provided from within the traditional network boundaries and security is provided at the network edge.

      Hybrid

      Services are provided both externally and from within the traditional network boundaries, and security is primarily at the network edge.

      Inverted

      Services are provided primarily externally, and security is cloud centric.

      Traditional networks

      Resources within network boundaries

      Moat and castle security perimeter

      Abstract

      A traditional network is one in which there are clear boundaries defined by a security perimeter. Trust can be applied within the network boundaries as appropriate, and traffic is generally routed through internally deployed control points that may be centralized. Traditional networks commonly include large firewalls and other “big iron” security and control devices.

      Network Design Tenets

      • The full network path from resource to user is designed, deployed, and controlled by IT.
      • Users external to the network must first connect to the network to gain access to resources.
      • Security, risk, and trust controls will be implemented by internal enterprise hardware/software devices.

      Control

      In the traditional network, it is assumed that all required control points can be adequately deployed across hardware/software that is “on prem” and under the control of central IT.

      Info-Tech Insight

      With increased cloud services provided to end users, this network is now more commonly used in data centers or OT networks.

      Traditional networks

      The image contains an example of what traditional networks look like, as described in the text below.

      Defining Characteristics

      • Traffic flows in a defined path under the control of IT to and from central IT resources.
      • Due to visibility into, and the control of, the traffic between the end user and resources, IT can relatively simply implement the required security controls on owned hardware.

      Common Components

      • Traditional offices
      • Remote users/road warriors
      • Private data center/colocation space

      Hybrid networks

      Resources internal and external to network

      Network security perimeter combined with cloud protection

      Abstract

      A hybrid network is one that combines elements of a traditional network with cloud resources. As some of these resources are not fully under the control of IT and may be completely “offnet” or loosely coupled to the on-premises network, the security boundaries and control points are less likely to be centralized. Hybrid networks allow the flexibility and speed of cloud deployment without leaving behind traditional network constructs. This generally makes them expensive to secure and maintain.

      Network Design Tenets

      • The network path from resource to user may not be in IT’s locus of control.
      • Users external to the network must first connect to the network to gain access to internal resources but may directly access publicly hosted ones.
      • Security, risk, and trust controls may potentially be implemented by a mixture of internal enterprise hardware/software devices and external control points.

      Control

      The hallmark of a hybrid network is the blending of public and private resources. This blending tends to necessitate both public and private points of control that may not be homogenous.

      Info-Tech Insight

      With multiple control points to address, take care in simplifying designs while addressing all concerns to ease operational load.

      Hybrid networks

      The image contains an example of what hybrid networks look like, as described in the text below.

      Defining Characteristics

      • Traffic flows to central resources across a defined path under the control of IT.
      • Traffic to cloud assets may be partially under the control of IT.
      • For central resources, the traffic to and from the end user can have the required security controls relatively simply implemented on owned hardware.
      • For public cloud assets, IT may or may not have some control over part of the path.

      Common Components

      • Traditional offices
      • Remote users/road warriors
      • Private data center/colocation space
      • Public cloud assets (IaaS/PaaS/SaaS)

      Inverted perimeter

      Resources primarily external to the network

      Security control points are cloud centric

      Abstract

      An inverted perimeter network is one in which security and control points cover the entire workflow, on or off net, from the consumer of services through to the services themselves with zero trust. Since the control plane is designed to encompass the workflow in a secure manner, much of the underlying connectivity can be abstracted. In an extreme version of this deployment, IT would abstract end-user access, and any cloud-based or on-premises resources would be securely published through the control plane with context-aware precision access.

      Network Design Tenets

      • The network path from resource to user is abstracted and controlled by IT through services like secure access service edge (SASE).
      • Users only need internet access and appropriate credentials to gain access to resources.
      • Security, risk, and trust controls will be implemented through external cloud based services.

      Control

      An inverted network abstracts the lower-layer connectivity away and focuses on implementing a cloud-based zero trust control plane.

      Info-Tech Insight

      This model is extremely attractive for organizations that consume primarily cloud services and have a large remote work force.

      Inverted networks

      The image contains an example of what inverted networks look like, as described in the text below.

      Defining Characteristics

      • The end user does not have to be in a defined location.
      • All central resources that are to be accessed are hosted on cloud resources.
      • IT has little to no control of the path between the end user and central resources.

      Common Components

      • Traditional offices
      • Regent offices/shared workspaces
      • Remote users/road warriors
      • Public cloud assets (IaaS/PaaS/SaaS)

      Understand available tooling

      Don’t buy a hammer and go looking for nails

      • A network archetype must be defined in order to understand what tools (hardware or software) are appropriate for consideration in a network build or refresh.
      • Tools are purpose built and generally designed to solve specific problems if implemented and operated correctly. Choose the tools to align with the challenges that you are solving as opposed to choosing tools and then trying to use those purchases to overcome challenges.
      • The purchase of a tool does not allow for abdication of proper design. Tools must be chosen appropriately and integrated properly to orchestrate the best solutions. Purchasing a tool and expecting the tool to solve all your issues rarely succeeds.

      “It is essential to have good tools, but it is also essential that the tools should be used in the right way.” — Wallace D. Wattles

      Software-defined WAN (SD-WAN)

      Simplified branch office connectivity

      Archetype Value: Traditional Networks

      What It Is Not

      SD-WAN is generally not a way to slash spending by lowering WAN circuit costs. Though it is traditionally deployed across lower cost access, to minimize risk and realize the most benefits from the platform many organizations install multiple circuits with greater bandwidths at each endpoint when replacing the more costly traditional circuits. Though this maximizes the value of the technology investment, it will result in the end cost being similar to the traditional cost plus or minus a small percentage.

      What It Is

      SD-WAN is a subset of software-defined networking (SDN) designed specifically to deploy a secure, centrally managed, connectivity agnostic, overlay network connecting multiple office locations. This technology can be used to replace, work in concert with, or augment more traditional costly connectivity such as MPLS or private point to point (PtP) circuits. In addition to the secure overlay, SD-WAN usually also enables policy-based, intelligent controls, based on traffic and circuit intelligence.

      Why Use It

      You have multiple endpoint locations connected by expensive lower bandwidth traditional circuits. Your target is to increase visibility and control while controlling costs if and where possible. Ease of centralized management and the ability to more rapidly turn up new locations are attractive.

      Cloud access security broker (CASB)

      Inline policy enforcement placed between users and cloud services

      Archetype Value: Hybrid Networks

      What It Is Not

      CASBs do not provide network protection; they are designed to provide compliance and enforcement of rules. Though CASBs are designed to give visibility and control into cloud traffic, they have limits to the data that they generally ingest and utilize. A CASB does not gather or report on cloud usage details, licencing information, financial costing, or whether the cloud resource usage is aligned with the deployment purpose.

      What It Is

      A CASB is designed to establish security controls beyond a company’s environment. It is commonly deployed to augment traditional solutions to extend visibility and control into the cloud. To protect assets in the cloud, CASBs are designed to provide central policy control and apply services primarily in the areas of visibility, data security, threat protection, and compliance.

      Why Use It

      You a mixture of on-premises and cloud assets. In moving assets out to the cloud, you have lost the traditional controls that were implemented in the data center. You now need to have visibility and apply controls to the usage of these cloud assets.

      Secure access service edge (SASE)

      Convergence of security and service access in the cloud

      Archetype Value: Inverted Networks

      What It Is Not

      Though the service will consist of many service offerings, SASE is not multiple services strung together. To present the value proposed by this platform, all functionality proposed must be provided by a single platform under a “single pane of glass.” SASE is not a mature and well-established service. The market is still solidifying, and the full-service definition remains somewhat fluid.

      What It Is

      SASE exists at the intersection of network-as-a-service and network-security-as-a-service. It is a superset of many network and security cloud offerings such as CASB, secure web gateway, SD-WAN, and WAN optimization. Any services offered by a SASE provider will be cloud hosted, presented in a single stack, and controlled through a single pane of glass.

      Why Use It

      Your network is inverting, and services are provided primarily as cloud assets. In a full realization of this deployment’s value, you would abstract how and where users gain initial network access yet remain in control of the communications and data flow.

      Activity

      Understand your enterprise network options

      Activity: Network assessment in an hour

      • Learn about the Enterprise Network Roadmap Technology Assessment Tool
      • Complete the Enterprise Network Roadmap Technology Assessment Tool

      This activity involves the following participants:

      • IT strategic direction decision makers.
      • IT managers responsible for network.
      • Organizations evaluating platforms for mission critical applications.

      Outcomes of this step:

      • Completed Enterprise Network Roadmap Technology Assessment Tool

      Info-Tech Insight

      Review your design options with security and compliance in mind. Infrastructure is no longer a standalone entity and now tightly integrates with software-defined networks and security solutions.

      Build an assessment in an hour

      Learn about the Enterprise Network Roadmap Technology Assessment Tool.

      This workbook provides a high-level analysis of a technology’s readiness for adoption based on your organization’s needs.

      • The workbook then places the technology on a graph that measures both the readiness and fit for your organization. In addition, it provides warnings for specific issues and lets you know if you have considerable uncertainty in your answers.
      • At a glance you can now communicate what you are doing to help the company:
        • Grow
        • Save money
        • Reduce risk
      • Regardless of your specific audience, these are important stories to be able to tell.
      The image contains three screenshots from the Enterprise Network Roadmap Technology Assessment Tool.

      Build an assessment in an hour

      Complete the Enterprise Network Roadmap Technology Assessment Tool.

      Dispense with detailed analysis and customizations to present a quick snapshot of the road ahead.

      1. Weightings: Adjust the Weighting tab to meet organizational needs. The provided weightings for the overall solution areas are based on a generic firm; individual firms will have different needs.
      2. Data Entry: For each category, answer the questions for the technology you are considering. When you have completed the questionnaire, go to the next tab for the results.
      3. Results: The Enterprise Network Roadmap Technology Assessment Tool provides a value versus readiness assessment of your chosen technology customized to your organization.

      The image contains three screenshots from the Enterprise Network Roadmap Technology Assessment Tool. It has a screenshot for each step as described in the text above.

      Related Info-Tech Research

      Effectively Acquire Infrastructure Services

      Acquiring a service is like buying an experience. Don’t confuse the simplicity of buying hardware with buying an experience.

      Outsource IT Infrastructure to Improve System Availability, Reliability, and Recovery

      There are very few IT infrastructure components you should be housing internally – outsource everything else.

      Build Your Infrastructure Roadmap

      Move beyond alignment: Put yourself in the driver’s seat for true business value.

      Drive Successful Sourcing Outcomes With a Robust RFP Process

      Leverage your vendor sourcing process to get better results.

      Research Authors

      The image contains a photo of Scott Young.

      Scott Young, Principal Research Advisor, Info-Tech Research Group

      Scott Young is a Director of Infrastructure Research at Info-Tech Research Group. Scott has worked in the technology field for over 17 years, with a strong focus on telecommunications and enterprise infrastructure architecture. He brings extensive practical experience in these areas of specialization, including IP networks, server hardware and OS, storage, and virtualization.

      The image contains a photo of Troy Cheeseman.

      Troy Cheeseman, Practice Lead, Info-Tech Research Group

      Troy has over 24 years of experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) startups.

      Bibliography

      Ahlgren, Bengt. “Design considerations for a network of information.” ACM Digital Library, 21 Dec. 2008.

      Cox Business. “Digital transformation is here. Is your business ready to upgrade your mobile work equation?” BizJournals, 1 April 2022. Accessed April 2022.

      Elmore, Ed. “Benefits of integrating security and networking with SASE.” Tech Radar, 1 April 2022. Web.

      Greenfield, Dave. “From SD-WAN to SASE: How the WAN Evolution is Progressing.” Cato Networks, 19 May 2020. Web

      Korolov, Maria. “What is SASE? A cloud service that marries SD-WAN with security.” Network World, 7 Sept. 2020. Web.

      Korzeniowski, Paul, “CASB tools evolve to meet broader set of cloud security needs.” TechTarget, 26 July 2019. Accessed March 2022.

      Identify and Manage Operational Risk Impacts on Your Organization

      • Buy Link or Shortcode: {j2store}230|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      More than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.

      A new threat will impact your organization's operations at some point. Make sure your plans are flexible enough to manage the inevitable consequences and that you understand where those threats may originate.

      Our Advice

      Critical Insight

      • Identifying and managing a vendor’s potential operational impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes may affect operations.
      • Organizational leadership is often taken unaware during crises, and their plans lack the flexibility to adjust to significant market upheavals.

      Impact and Result

      Vendor management practices educate organizations on the different potential risks from vendors in your market and suggest creative and alternative ways to avoid and help manage them.

      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts with our Operational Risk Impact Tool.

      Identify and Manage Operational Risk Impacts on Your Organization Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and Manage Operational Risk Impacts to Your Organization Storyboard – Use this research to better understand the negative impacts of vendor actions to your brand reputation.

      Use this research to identify and quantify the potential operational impacts caused by vendors. Utilize Info-Tech's approach to look at the operational impact from various perspectives to better prepare for issues that may arise.

      • Identify and Manage Operational Risk Impacts to Your Organization Storyboard

      2. Operational Risk Impact Tool – Use this tool to help identify and quantify the operational impacts of negative vendor actions.

      By playing the “what if” game and asking probing questions to draw out – or eliminate - possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      • Operational Risk Impact Tool
      [infographic]

      Further reading

      Identify and Manage Operational Risk Impacts on Your Organization

      Understand internal and external vendor risks to avoid potential disaster.

      Analyst perspective

      Organizations need to be aware of the operational damage vendors may cause to plan around those impacts effectively.

      Frank Sewell

      Organizations must be mindful that operational risks come from internal and external vendor sources. Missing either component in the overall risk assessment can significantly impact day-to-day business processes that cost revenue, delay projects, and lead to customer dissatisfaction.

      Frank Sewell,

      Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      More than any other time, our world is changing rapidly. As a result, organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.

      A new threat will impact your organization's operations at some point. Make sure your plans are flexible enough to manage the inevitable consequences and that you understand where those threats may originate.

      Common Obstacles

      Identifying and managing a vendor’s potential operational impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes may affect operations.

      Organizational leadership is often taken unaware during crises, and their plans lack the flexibility to adjust to significant market upheavals.

      Info-Tech's Approach

      Vendor management practices educate organizations on the different potential risks from vendors in your market and suggest creative and alternative ways to avoid and help manage them.

      Prioritize and classify your vendors with quantifiable, standardized rankings.

      Prioritize focus on your high-risk vendors.

      Standardize your processes for identifying and monitoring vendor risks to manage potential impacts with our Operational Risk Impact Tool.

      Info-Tech Insight

      Organizations must evolve their risk assessments to be more adaptive to respond to threats in the market. Ongoing monitoring of the vendors tied to company operations, and understanding where those vendors impact your operations, is imperative to avoiding disasters.

      Info-Tech’s multi-blueprint series on vendor risk assessment

      There are many individual components of vendor risk beyond cybersecurity.

      There are many components to vendor risk, including: Financial, Reputational, Operational, Strategic, Security, Regulatory & Compliance.

      This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

      Out of Scope:
      This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

      Operational risk impacts

      Potential losses to the organization due to incidents that affect operations.

      • In this blueprint we’ll explore operational risks, particularly from third-party vendors, and their impacts.
      • Identify potentially disruptive events to assess the overall impact on organizations and implement adaptive measures to identify, manage, and monitor vendor performance.
      Operational

      The world is constantly changing

      The IT market is constantly reacting to global influences. By anticipating changes, leaders can set expectations and work with their vendors to accommodate them.

      When the unexpected happens, being able to adapt quickly to new priorities ensures continued long-term business success.

      Below are some things no one expected to happen in the last few years:

      27%

      Businesses are changing their internal processes around TPRM in response to the Pandemic.

      70%

      Of organizations attribute a third-party breach to too much privileged access.

      85%

      Of breaches involved human factors (phishing, poor passwords, etc.).

      Assess internal and external operational risk impacts

      Due diligence and consistent monitoring are the keys to safeguarding your organization.

      Two sides of the Same Coin

      Internal

      • Poorly vetted supplemental staff
      • Bad system configurations
      • Lack of relevant skills
      • Poor vendor performance
      • Failure to follow established processes
      • Weak contractual accountability
      • Unsupportable or end-of-life system components

      External

      • Cyberattacks
      • Supply Chain Issues
      • Geopolitical Disruptions
      • Vendor Acquisitions
      • N-Party Non-Compliance
      • Vendor Fraud

      Operational risk is the risk of losses caused by flawed or failed processes, policies, systems, or events that disrupt business operations.

      - Wikipedia

      Internal operational risk

      Vendors operating within your secure perimeter can open your organization to substantial risk.

      Frequently monitor your internal process around vendor management to ensure safe operations.

      • Poorly vetted supplemental staff
      • Bad system configurations
      • Lack of relevant skills
      • Poor vendor performance
      • Failure to follow established processes
      • Weak contractual accountability
      • Unsupportable or end-of-life system components

      Info-Tech Insight

      You may have solid policies, but if your employees and vendors are not following them, they will not protect the organization.

      External operational risks

      • Cyberattacks
      • Supplier issues and geopolitical instability
      • Vendor acquisitions
      • N-party vendor non-compliance

      Identify and manage operational risks

      Poorly configured systems

      Failing to ensure that your vendor-supported systems are properly configured and that your vendors are meeting your IT change control and configuration standards is more commonplace than expected. Proper oversight and management of your support vendors are crucial to ensure they are meeting expectations in this regard.

      Failure to follow processes

      Most companies have policies and procedures around IT change and configuration control, security standards, risk management, vendor performance standards, etc. While having these processes is a good start, failure to perform continuous monitoring and management of these leads to increased risks of incidents.

      Supply chain disruptions

      Awareness of the supply chain's complications, and each organization's dependencies, are increasing for everyone. However, most organizations still do not understand the chain of n-party vendors that support their specific vendors or how interruptions in their supply chains could affect them. The 2022 Toyota shutdown due to Kojima is a perfect example of how one essential parts vendor could shut down your operations.

      What to look for

      Identify operational risk impacts

      • Does the vendor have a business continuity plan they will share for your review?
      • Is the vendor operating on old hardware that may be out of warranty or at end of life?
      • Is the vendor operating on older software or shareware that may lack the necessary patches?
      • Does the vendor self-audit, or do they use a vetted third-party audit firm to issue a SOC report annually?
      • Does the vendor have sufficient personnel in acceptable regions to support your operations?
      • Is the vendor willing to make concessions on contractual protections, or are they only offering “one-sided” agreements with “as-is” warranties?

      Operational risks

      Not knowing where your risks come from creates additional risks to operations.

      • Supply chain disruptions and global shortages.
        • Geopolitical disruptions and natural disasters have caused unprecedented interruptions to business. Do you know where your critical vendors are getting their supplies? Are you aware of their business continuity plans to accommodate for those interruptions?
      • Poor vendor performance.
        • Organizations need to understand where vendors are acting in their operations and manage the impact of replacing that vendor and cutting their losses rather than continuing to throw good money away after a bad performance.
      • Vendor acquisitions.
        • A lot of acquisition is going on in the market today. Large companies are buying competitors, imposing new terms on customers, or removing competing products from the market. Understand your options if a vendor is acquired by a company with which you do not wish to be in a relationship.

      It is important to identify where potential risks to your operations may come from to manage and potentially eliminate them from impacting your organization.

      Info-Tech Insight

      Most organizations realize that their vendors could operationally affect them if an incident occurs. Still, they fail to follow the chain of events that might arise from those incidents to understand the impact fully.

      Prepare your vendor risk management for success

      Due diligence will enable successful outcomes.

      1. Obtain top-level buy-in; it is critical to success.
      2. Build enterprise risk management (ERM) through incremental improvement.
      3. Focus initial efforts on the “big wins” to prove the process works.
      4. Use existing resources.
      5. Build on any risk management activities that already exist in the organization.
      6. Socialize ERM throughout the organization to gain additional buy‑in.
      7. Normalize the process long term with ongoing updates and continuing education for the organization.

      How to assess third-party operational risk

      1. Review Organizational Operations

        Understand the organization’s operational risks to prepare for the “what if” game exercise.
      2. Identify and Understand Potential Operational Risks

        Play the “what if” game with the right people at the table.
      3. Create a Risk Profile Packet for Leadership

        Pull all the information together in a presentation document.
      4. Validate the Risks

        Work with leadership to ensure that the proposed risks are in line with their thoughts.
      5. Plan to Manage the Risks

        Lower the overall risk potential by putting mitigations in place.
      6. Communicate the Plan

        It is important not only to have a plan but also to socialize it in the organization for awareness.
      7. Enact the Plan

        Once the plan is finalized and socialized, put it in place with continued monitoring for success.

      Insight summary

      Operational risk impacts often come from unexpected places and have unforeseen impacts. Knowing where your vendors place in critical business processes and those vendors' business continuity plans concerning your organization should be a priority for those who manage the vendors.

      Insight 1

      Organizations fail to plan for vendor acquisitions appropriately.

      Vendors routinely get acquired in the IT space. Does your organization have appropriate safeguards from inadvertently entering a negative relationship? Do you have plans around replacing critical vendors purchased in such a manner?

      Insight 2

      Organizations often fail to understand how they factor into a vendor’s business continuity plan.

      If one of your critical vendors goes down, do you know how they intend to re-establish business? Do you know how you factor into their priorities?

      Insight 3

      Organizations need to have a comprehensive understanding of how their vendor-managed systems integrate with Operations.

      Do you understand where in the business processes vendor-supported systems lie? Do you have contingencies around disruptions that account for those pieces missing from the process?

      Identifying operational vendor risk

      Who should be included in the discussion

      • While it is true that executive-level leadership defines the strategy for an organization, it is vital for those making decisions to make informed decisions.
      • Getting input from operational experts at your organization will enhance your organization's long-term potential for success.
      • Involving those who not only directly manage vendors but also understand your business processes will aid in determining the forward path for relationships with your current vendors and identifying new emerging potential partners.

      See the blueprint Build an IT Risk Management Program

      Review your operational plans for new risks on a regular basis.

      Keep in mind Risk = Likelihood x Impact (R=L*I).

      Impact (I) tends to remain the same, while Likelihood (L) is becoming closer to 100% as threat actors become more prevalent

      Managing vendor operational risk impacts

      What can we realistically do about the risks?

      • Review vendors’ business continuity plans and disaster recovery testing.
        • Understand your priority in their plans.
      • Institute proper contract lifecycle management.
        • Make sure to follow corporate due diligence and risk assessment policies and procedures.
        • Failure to do so consistently can be a recipe for disaster.
      • Develop IT governance and change control.
      • Introduce continual risk assessment to monitor the relevant vendor markets.
        • Regularly review your operational plans for new risks and evolving likelihoods.
        • Risk = Likelihood x Impact (R=L*I).
          • Impact (I) tends to remain the same and be well understood, while Likelihood (L) may often be considered 100%.
      • Be adaptable and allow for innovations that arise from the current needs.
        • Capture lessons learned from prior incidents to improve over time and adjust your plans accordingly.

      Organizations need to review their organizational risk plans, considering the placement of vendors in their operations.

      Pandemics, extreme weather, and wars that affect global supply chains are current realities, not unlikely scenarios.

      Ongoing improvement

      Incorporating lessons learned

      • Over time, despite everyone’s best observations and plans, incidents will catch us off guard.
      • When it happens, follow your incident response plans and act accordingly.
      • An essential step is to document what worked and what did not – collectively known as the “lessons learned.”
      • Use the lessons learned document to devise, incorporate, and enact a better risk management process.

      Sometimes disasters occur despite our best plans to manage them.

      When this happens, it is important to document the lessons learned and improve our plans going forward.

      The "what if" game

      1-3 hours

      Vendor management professionals are in an excellent position to help senior leadership identify and pull together resources across the organization to determine potential risks. By playing the "what if" game and asking probing questions to draw out – or eliminate – possible adverse outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      • Break into smaller groups (or if too small, continue as a single group).
      • Use the Operational Risk Impact Tool to prompt discussion on potential risks. Keep this discussion flowing organically to explore all potentials but manage the overall process to keep the discussion pertinent and on track.
      • Collect the outputs and ask the subject matter experts (SMEs) for management options for each one in order to present a comprehensive risk strategy. You will use this to educate senior leadership so that they can make an informed decision to accept or reject the solution.

      Download the Operational Risk Impact Tool

      Input

      • List of identified potential risk scenarios scored by likelihood and operational impact
      • List of potential management of the scenarios to reduce the risk

      Output

      • Comprehensive operational risk profile on the specific vendor solution

      Materials

      • Whiteboard/flip charts
      • Operational Risk Impact Tool to help drive discussion

      Participants

      • Vendor Management – Coordinator
      • Organizational Leadership
      • Operations Experts (SMEs)
      • Legal/Compliance/Risk Manager

      High risk example from tool

      Sample Questions to Ask to Identify Impacts. Lists questions impact score, weight, question and comments or notes.

      Being overly reliant on a single talented individual can impose risk to your operations. Make sure you include resiliency in your skill sets for critical business practices.

      Impact score and level. Each score for impacts are unique to the organization.

      Low risk example from tool

      Sample Questions to Ask to Identify Impacts. Lists questions impact score, weight, question and comments or notes. Impact score and level. Each score for impacts are unique to the organization.

      Summary

      Seek to understand all aspects of your operations.

      • Organizations need to understand and map out where vendors are critical to their operations.
      • Those organizations that consistently follow their established risk assessment and due diligence processes will be better positioned to avoid disasters.
      • Bring the right people to the table to outline potential risks in the market and your organization.
      • Understand how your vendors prioritize your organization in their business continuity processes.
      • Incorporate “lessons learned” from prior incidents into your risk management process to build better plans for future issues.

      Organizations must evolve their operational risk assessments considering their vendor portfolio.

      Ongoing monitoring of the market and the vendors tied to company operations is imperative to avoiding disaster.

      Related Info-Tech Research

      Identify and Manage Financial Risk Impacts on Your Organization

      • Vendor management practices educate organizations on the different potential financial impacts that vendors may incur and suggest systems to help manage them.
      • Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool.

      Identify and Manage Reputational Risk Impacts on Your Organization

      • Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your reputation and brand with our Reputational Risk Impact Tool.

      Identify and Manage Strategic Risk Impacts on Your Organization

      • Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Risk Impact Tool.

      Bibliography

      “Weak Cybersecurity is taking a toll on Small Businesses.” Tripwire. August 7, 2022.

      SecureLink 2022 White Paper SL_Page_EA+PAM (rocketcdn.me)

      Member Poll March 2021 "Guide: Evolving Work Environments Impact of Covid-19 on Profile and Management of Third Parties.“ Shared Assessments. March 2021.

      “Operational Risk.” Wikipedia.

      Tonello, Matteo. “Strategic Risk Management: A Primer for Directors.” Harvard Law School Forum on Corporate Governance, August 23, 2012.

      Frigo, Mark L., and Richard J. Anderson. “Embracing Enterprise Risk Management: Practical Approaches for Getting Started.” COSO, 2011.

      Risk management company

      Expert risk management consultancy firm

      Based on experience
      Implementable advice
      human-based and people-oriented

      Engage Tymans Group, expert risk management and consultancy company, to advise you on mitigating, preventing, and monitoring IT and information security risks within your business. We offer our extensive experience as a risk consulting company to provide your business with a custom roadmap and practical solutions to any risk management problems you may encounter.

      Security and risk management

      Our security and risk services

      Security strategy

      Security Strategy

      Embed security thinking through aligning your security strategy to business goals and values

      Read more

      Disaster Recovery Planning

      Disaster Recovery Planning

      Create a disaster recovey plan that is right for your company

      Read more

      Risk Management

      Risk Management

      Build your right-sized IT Risk Management Program

      Read more

      Check out all our services

      Setting up risk management within your company with our expert help

      Risk is unavoidable when doing business, but that does not mean you should just accept it and move on. Every company should try to manage and mitigate risk as much as possible, be it risks regarding data security or general corporate security. As such, it would be wise to engage an expert risk management and consultancy company, like Tymans Group. Our risk management consulting firm offers business practical solutions for setting up risk management programs and IT risk monitoring protocols as well as solutions for handling IT incidents. Thanks to our experience as a risk management consulting firm, you enjoy practical and proven solutions based on a people-oriented approach.

      Benefit from our expert advice on risk management

      If you engage our risk management consultancy company you get access to various guides and documents to help you set up risk management protocols within you company. Additionally, you can book a one-hour online talk with our risk management consulting firm’s CEO Gert Taeymans to discuss any problems you may be facing or request an on-site appointment in which our experts analyze your problems. The talk can discuss any topic, from IT risk control to external audits and even corporate security consultancy. If you have any questions about our risk management and consulting services for your company, we are happy to answer them. Just contact our risk management consulting firm through the online form and we will get in touch with as soon as possible.

      Register to read more …

      Disaster Recovery Planning

      • Buy Link or Shortcode: {j2store}38|cart{/j2store}
      • Related Products: {j2store}38|crosssells{/j2store}
      • Teaser Video: Visit Website
      • Teaser Video Title: Disaster Recovery Planning
      • member rating overall impact: 9.6/10
      • member rating average dollars saved: $92,268
      • member rating average days saved: 36
      • Parent Category Name: Security and Risk
      • Parent Category Link: /security-and-risk
      The show must go on. Make sure your IT has right-sized DR capabilities.

      IT Service Management Selection Guide

      • Buy Link or Shortcode: {j2store}488|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $29,187 Average $ Saved
      • member rating average days saved: 6 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Your ITSM solution that was once good enough is no longer adequate for a rapidly evolving services culture.
      • Processes and data are disconnected with multiple workarounds and don’t allow the operations team to mature processes.
      • The workarounds, disparate systems, and integrations you’ve implemented to solve IT operations issues are no longer adequate.

      Our Advice

      Critical Insight

      • Accessing funding for IT solutions can be challenging when the solution isn’t obviously aligned to the business need.
      • To maximize value and stakeholder satisfaction, determine use cases early, engage the right stakeholders, and define success.
      • Choosing a solution for a single purpose and then expanding it to cover other use cases can be a very effective use of technology dollars. However, spending the time up front to determine which use cases should be included and which will need a separate best-of-breed solution will make the best use of your investment.

      Impact and Result

      • Create a business case that defines use cases and requirements.
      • Shorten the list of viable vendors by matching vendors to use cases.
      • Determine which features are most important to reach your goals and select the best-matched vendor.

      IT Service Management Selection Guide Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how Info-Tech’s methodology will provide a quick solution to selecting ITSM vendors and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a business case

      Create a light business case to gain buy-in and define goals, milestones, and use cases.

      • IT Service Management Business Case Template

      2. Define requirements

      Create your list of requirements and shortlist vendors.

      • The ITSM Vendor Evaluation Workbook
      [infographic]

      Improve Email Security

      • Buy Link or Shortcode: {j2store}272|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Secure Cloud & Network Architecture
      • Parent Category Link: /secure-cloud-network-architecture

      As the sophistication of malicious attacks increases, it has become more difficult to ensure applications such as email software are properly protected and secured. The increase in usage and traffic of email exacerbates the security risks to the organization.

      Our Advice

      Critical Insight

      Email has changed. Your email security needs to evolve as well to ensure you are protecting your organization’s communication.

      Impact and Result

      • Gain an understanding of the importance of email security and steps to secure your corporate email.
      • Develop holistic guidelines on implementing best practices to modernize your organization’s email security.

      Improve Email Security Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Improve Email Security Storyboard – A guide to best practices for improving an organization’s email security.

      This research provides guidelines to assist organizations in identifying controls to secure their emails along with recommendations on the most common and effective controls to secure and protect corporate emails.

      • Improve Email Security Storyboard

      2. Email Security Checklist – A checklist tool that enables organizations to monitor their progress in implementing controls to improve their email security.

      This checklist of common email security categories and their associated controls helps ensure organizations are following best practices.

      • Email Security Checklist
      [infographic]

      Further reading

      Improve Email Security

      Follow the latest best practices for email security to mitigate evolving threats.

      Analyst Perspective

      Protecting your organization’s digital assets begins with securing your email communication.

      As organizations increasingly rely on email communication for day-to-day business operations, threat actors are exploiting the increased traction to develop and implement more sophisticated email-based attacks. Furthermore, the lack of investment in measures, tools, and technologies for an organization’s email security exacerbates the vulnerabilities at hand.

      Effective use of security procedures and techniques can mitigate and minimize email-based threats have been shown to reduce the ability of these attacks to infiltrate the email inbox. These guidelines and best practices will help your organization conduct due diligence to protect the contents of the email, its transit, and its arrival to the authorized recipient.

      Ahmad Jowhar, Research Specialist, Security & Privacy

      Ahmad Jowhar
      Research Specialist, Security & Privacy
      Info-Tech Research Group

      Executive Summary

      Your Challenge Common Obstacles Info-Tech’s Approach
      • As malicious attacks get increasingly sophisticated, it has become more difficult to ensure applications such as email software are properly protected and secured.
      • The increased usage and traffic of emails, as well as their contents, exacerbates security risks to the organization.
      • Given the variety of email security controls, it can be complicated to identify the most important techniques for improving your organization’s email security.
      • Understand the importance of implementing email security for your organization.
      • Develop a holistic guideline for implementing best practices to secure your organization’s emails.

      Info-Tech Insight
      Email has changed. Your email security must evolve to ensure the safety of your organization’s communication.

      Your Challenge

      As a security leader, you need to modernize your email security services so you can protect business communications and prevent security incidents.

      • Various factors must be considered when deciding how best to safeguard your organization’s communication chain. This includes the frequency of email traffic and the contents of emails.
      • The increased number of email-based cyberattacks reveals the sophistication of threat actors in leveraging an organization’s lack of email security to infiltrate their business.
      • As organizations continue to rely heavily on email communication, email-based threats will become increasingly prevalent.

      75% of organizations have experienced an increase in email-based threats.

      97% of security breaches are due to phishing attacks.

      82% of companies reported a higher volume of email in 2022.

      Source: Mimecast, 2023.

      Modern email security controls framework for security leaders

      Email has changed. Your email security must evolve to ensure the safety of your organization’s communication.

      Modern email security controls framework for security leaders

      Understand the best practices in securing your organization’s emails

      Enhance your security posture by modernizing your email security
      Email has changed. Your email security must evolve to ensure the safety of your organization’s communication.

      Deploy an added layer of defense by preventing the contents of your email from being intercepted.

      Encrypting your email communication will provide an additional layer of protection which only allows authorized users to read the email.

      Leverage triple-threat authentication controls to strengthen your email security.

      Leveraging SPF, DKIM, and DMARC enables you to have the proper authentication controls in place, ensuring that only legitimate users are part of the email communication.

      Protect the contents of your email through data classification and data loss prevention.

      Having tools and technologies in place to ensure that data is classified and backed up will enable better storage, analysis, and processing of the email.

      Implement email policies for a holistic email security protection.

      Policies ensure acceptable standards are in place to protect the organization’s assets, including the creation, attachment, sending, and receiving of emails.

      User awareness and training
      Training employees on protecting their corporate emails adds an extra layer of defense by ensuring end users are aware of various email-based threats and can confidently safeguard their organizations from attacks.

      Email encryption

      Deploy an added layer of defense by preventing the contents of your email from being intercepted.

      • Protecting your organization’s emails begins by ensuring only the appropriate recipients can receive and read the email’s contents.
      • This process includes encrypting the email’s contents to protect sensitive information from being read by unauthorized recipients.
      • This protects the contents even if the email is intercepted by anyone besides the intended recipient.
      • Other benefits of email encryption include:
        • Reducing any risks associated with regulatory violations.
        • Enabling business to confidently communicate sensitive information via email.
        • Ensuring protective measures taken to prevent data loss and corporate policy violations.

      Along with the increased use of emails, organizations are seeing an increase in the number of attacks orchestrating from emails. This has resulted in 74% of organizations seeing an increase in email-based threats.

      Source: Mimecast, 2023.

      Info-Tech Insight
      Encrypting your email communication will provide an additional layer of protection which only allows authorized users to read the email.

      Implementing email encryption

      Leverage these protocols and tools to help encrypt your email.

      • The most common email encryption protocols and tools include:
        • Transport Layer Security (TLS): A cryptographic protocol designed to securely deliver data via the internet, which prevents third parties from intercepting and accessing the data.
        • Secure/Multipurpose Internet Mail Extension (S/MIME): A protocol for sending digitally signed and encrypted messages by leveraging public key encryption to provide at-rest and in-transit data protection.
        • Secure Email Gateway: An email security solution that inspects emails for malicious content prior to it reaching the corporate system. The solution is positioned between the public internet and corporate email servers. An email gateway solution would be provided by a third-party vendor and can be implemented on-premises, through the cloud, or hybrid.
      • Email encryption policies can also be implemented to ensure processes are in place when sending sensitive information through emails.
      • Email encryption ensures end-to-end privacy for your email and is especially important when the email requires strict content privacy.

      Email authentication

      Three authentication controls your organization should leverage to stay secure.

      • Along with content encryption, it’s important to authenticate both the sender and recipient of an email to ensure that only legitimate users are able to send and receive it.
      • Implementing email authentication techniques prevents unsolicited email (e.g. spam) from entering your mailbox.
      • This also prevents unauthorized users from sending email on your organization’s behalf.
      • Having these standards in place would safeguard your organization from spam, spoofing, and phishing attacks.
      • The three authentication controls include:
        • Sender Policy Framework (SPF): Email validation control that verifies that the incoming email is from an authorized list of IP addresses provided by the sender’s domain administrator.
        • DomainKeys Identified Mail (DKIM): Enables recipients to verify that an email from a specific domain was authorized by the domain’s owner. This is conducted through cryptographic authentication by adding a digital signature to the message headers of outbound emails.
        • Domain Message Authentication Reporting & Conformance (DMARC): Provides domain-level protection of email channel by publishing DMARC records in the organization’s domain name system (DNS) and creates policies which prompts actions to take if an email fails authentication.

      Although these authentication controls are available for organizations to leverage, the adoption rate remains low. 73% of survey respondents indicated they didn’t deploy email authentication controls within their organization.

      Source: Mimecast, 2023.

      Email authentication controls

      All three authentication controls should be implemented to effectively secure your organization’s email. They ensure the emails you send and receive are securely authorized and legitimate.

      SPF DKIM DMARC

      Creating an SPF record identifies which IP addresses are allowed to send emails from your domain. Steps to implement SPF include the following:

      1. Create an SPF record by identifying the IP addresses that are authorized to send emails.
      2. Publish your SPF record into your DNS by creating a TXT record on your domain.

      Implementing DKIM helps prevent attackers from sending emails that pretend to come from your domain. Steps to implement DKIM include the following:

      1. Identify and enable domains you wish to configure DKIM to create DKIM keys.
      2. Copy the canonical names (CNAMEs) that are provided.
      3. Publish the CNAME records to your DNS service provider.

      Setting up DMARC ensures emails are validated and defines actions to take if an email fails authentication. These include:

      • None: Message is delivered to recipient and a DMARC report is sent to domain owner.
      • Quarantine: Message moved to quarantine folder and recipient is notified.
      • Reject: Message is not delivered to the recipient.
      • Steps to implement DMARC include:
      1. Create a DMARC record by including your organization’s email domain and IP addresses.
      2. Form a DMARC TXT record for your domain to include policies and publish it to your DNS.

      For more information:

      Data classification

      Ensure sensitive data is securely processed, analyzed, and stored.

      • Besides authenticating the legitimacy of an email and its traffic to the recipient, it’s important to have procedures in place to protect the contents of an email.
      • Data classification is found not only in databases and spreadsheets, but also in the email messages being communicated. Examples of data most commonly included in emails:
        • Personal identifiable information (PII): social security number, financial account number, passcodes/passwords
      • Applying data classification to your email can help identify the sensitivity of the information it contains. This ensures any critical data within an email message is securely processed and protected against unauthorized use, theft, and loss.
      • Emails can be classified based on various sensitivity levels. such as:
        • Top secret, public, confidential, internal

      Discover and Classify Your Data

      Leverage this Info-Tech blueprint for guidelines on implementing a data classification program for your organization.

      Info-Tech Insight
      Having tools and technologies in place to ensure that data is classified and backed up will enable better storage, analysis, and processing of the email.

      Data loss prevention (DLP)

      Protect your data from being lost/stolen.

      • Protecting an email’s contents through data classification is only one approach for improving email security. Having a data loss prevention solution would further increase security by minimizing the threat of sensitive information leaving your organization’s email network.
      • Examples of tools embedded in DLP solutions that help monitor an organization's email communication:
        • Monitoring data sent and received from emails: This ensures the data within an email communication is protected with the necessary encryption based on its sensitivity.
        • Detecting suspicious email activity: This includes analyzing users’ email behavior regarding email attachments and identifying irregular behaviors.
        • Flagging or blocking email activities which may lead to data loss: This prevents highly sensitive data from being communicated via email and reduces the risk of information being intercepted.
      • The types of DLP technologies that can be leveraged include:
        • Rule-based: Data that has been tagged by admins as sensitive can be blocklisted, which would flag and/or block data from being sent via email.
        • Machine learning: Data on users’ email behavior is collected, processed, and trained to understand the employee’s normal email behavior and detect/flag suspicious activities.
      • Implementing DLP solutions would complement your data classification techniques by ensuring proper measures are in place to secure your organization’s assets through policies, technology, and tools.

      48% of employees have accidently attached the wrong file to an email.

      39% of respondents have accidently sent emails that contained security information such as passwords and passcodes.

      Source: Tessian, 2021.

      User awareness & training

      A strong security awareness & training program is an important element of strengthening your email security.

      • Having all these tools and techniques in place to improve your email security will not be effective unless you also improve your employees’ awareness.
      • Employees should participate in email security training, especially since the majority utilize this channel of communication for day-to-day operations.
      • User awareness and training should go beyond phishing campaigns and should highlight the various types of email-based threats, the characteristics of these threats, and what procedures they can follow to minimize these threats.
      • 95% of data breaches are caused by human error. It can take nine months to discover and contain them, and they are expected to cost $8 trillion this year (Mimecast, 2023).
      • Investments in employee awareness and training would mitigate these risks by ensuring employees recognize and report suspicious emails, remain mindful of what type of data to share via email, and improve their overall understanding of the importance of email security.

      Develop a Security Awareness and Training Program That Empowers End Users

      Leverage this Info-Tech blueprint for assistance on creating various user training materials and empower your employees to become a main line of defense for your organization.

      64% of organizations conduct formal training sessions (in-person or computer-based).

      74% of organizations only focus on providing phishing-based training.

      Source: Proofpoint, 2021.

      Examples of email-based threats

      Phishing
      Email sent by threat actors designed to manipulate end user into providing sensitive information by posing as a trustworthy source

      Business Email Compromise
      Attackers trick a user into sending money or providing confidential information

      Spam
      Users receive unsolicited email, usually in bulk, some of which contains malware

      Spear Phishing
      A type of phishing attack where the email is sent to specific and targeted emails within the organization

      Whaling
      A type of phishing attack similar to spear phishing, but targeting senior executives within the organization

      Password/Email Exposure
      Employees use organizational email accounts and passwords to sign up for social media, leaving them susceptible to email and/or password exposure in a social media breach

      Email policies

      Having policies in place will enable these controls to be implemented.

      Developing security policies that are reasonable, auditable, enforceable, and measurable ensures proper procedures are followed and necessary measures are implemented to protect the organization. Policies relating to email security can be categorized into two groups:

      • User policy: Policies employees must adhere to when using their corporate email. Examples:
        • User acceptance of technology: Acknowledgment of legitimate and restrictive actions when using corporate email
        • Security awareness and training: Acknowledging completion of email security training
      • Administrator-set policy: Policies that are implemented by IT and/or security admins. Examples:
        • Email backup: Policy on how long emails should be archived and processes for disposing of them
        • Log retention: Policy on how to retain, process, and analyze logs created from email servers
        • Throttling: Policies that limit the number of emails sent by a sender and the number of recipients per email and per day depending on the employee’s grouping

      Develop and Deploy Security Policies

      Leverage this Info-Tech blueprint for assistance on developing and deploying actionable policies and creating an overall policy management lifecycle to keep your policies current, effective, and compliant.

      Info-Tech Insight
      Policies ensure acceptable standards are in place to protect the organization’s assets, including the creation, attachment, sending, and receiving of emails.

      Email security technologies & tools (SoftwareReviews)

      SoftwareReviews, a division of Info-Tech Research Group, provides enterprise software reviews to help organizations make more efficient decisions during the software selection process. Reviews are provided by authenticated IT professionals who have leveraged the software and provide unbiased insights on different vendors and their products.

      Learn from the collective knowledge of real IT professionals.

      • Know the products and features available.
      • Explore modules and detailed feature-level data.
      • Quickly understand the market.

      Evaluate market leaders through vendor rankings and awards.

      • Convince stakeholders with professional reports.
      • Avoid pitfalls with unfiltered data from real users.
      • Choose software with confidence.

      Cut through misleading marketing material.

      • Negotiate contracts based on data.
      • Know what to expect before you sign.
      • Effectively manage the vendor.

      Email security technologies & tools

      Leverage these tools for an enhanced email security solution.

      Email Security Checklist

      Follow these guidelines to ensure you are implementing best practices for securing your organization’s emails.

      • The Email Security Checklist is a tool to assess the current and future state of your organization’s email security and provides a holistic understanding on monitoring your progress within each category and associated controls.
      • The status column allows you to select the feature’s current implementation status, which includes the following options:
        • Enabled: The feature is deployed within the organization’s network.
        • Implemented: The feature is implemented within the organization’s network, but not yet deployed.
        • Not implemented: The feature has not been enabled or implemented.
      • Comments can be added for each feature to provide details such as indicating the progress on enabling/implementing a feature and why certain features are not yet implemented.

      Email Security Checklist

      Download the Email Security Checklist tool

      Related Info-Tech Research

      Discover and Classify Your Data
      Leverage this Info-Tech blueprint for guidelines on implementing a data classification program for your organization.

      Develop a Security Awareness and Training Program That Empowers End Users
      Leverage this Info-Tech blueprint for assistance on creating various user training materials and empower your employees to become a main line of defense for your organization.

      Develop and Deploy Security Policies
      Leverage this Info-Tech blueprint for assistance on developing and deploying actionable policies and creating an overall policy management lifecycle to keep your policies current, effective, and compliant.

      Bibliography

      “10 Best Practices for Email Security in 2022.” TitanFile, 22 Sept. 2022. Web.

      “2021 State of the Phish.” Proofpoint, 2021. Web.

      Ahmad, Summra. “11 Email Security Best Practices You Shouldn't Miss (2023).” Mailmunch, 9 Mar. 2023. Web.

      “Blumira's State of Detection and Response.” Blumira, 18 Jan. 2023. Web.

      Clay, Jon. “Email Security Best Practices for Phishing Prevention.” Trend Micro, 17 Nov. 2022. Web.

      Crane, Casey. “6 Email Security Best Practices to Keep Your Business Safe in 2019.” Hashed Out by The SSL Store™, 7 Aug. 2019. Web.

      Hateb, Seif. “Basic Email Security Guide.” Twilio Blog, Twilio, 5 Dec. 2022. Web.

      “How DMARC Advances Email Security.” CIS, 9 July 2021. Web.

      Pal, Suryanarayan. “10 Email Security Best Practices You Should Know in 2023.” Mailmodo, 9 Feb. 2023. Web.

      Pitchkites, Max. “Email Security: A Guide to Keeping Your Inbox Safe in 2023.” Cloudwards, 9 Dec. 2022. Web.

      Rudra, Ahona. “Corporate Email Security Checklist.” PowerDMARC, 4 July 2022. Web.

      “Sender Policy Framework.” Mimecast, n.d. Web.

      Shea, Sharon, and Peter Loshin. “Top 15 Email Security Best Practices for 2023: TechTarget.” TechTarget, 14 Dec. 2022. Web.

      “The Email Security Checklist: Upguard.” UpGuard, 16 Feb. 2022. Web.

      “The State of Email Security 2023.” Mimecast, 2023. Web.

      Wetherald, Harry. “New Product - Stop Employees Emailing the Wrong Attachments.” Tessian, 16 Sept. 2021. Web.

      “What Is DMARC? - Record, Verification & More: Proofpoint Us.” Proofpoint, 9 Mar. 2023. Web.

      “What Is Email Security? - Defining Security of Email: Proofpoint Us.” Proofpoint, 3 Mar.2023. Web.

      Wilton, Laird. “How to Secure Email in Your Business with an Email Security Policy.” Carbide, 31 Jan. 2022. Web.

      Manage Service Catalogs

      • Buy Link or Shortcode: {j2store}44|cart{/j2store}
      • Related Products: {j2store}44|crosssells{/j2store}
      • member rating overall impact: 9.0/10
      • member rating average dollars saved: $3,956
      • member rating average days saved: 24
      • Parent Category Name: Service Planning and Architecture
      • Parent Category Link: /service-planning-and-architecture

      The challenge

      • Your business users may not be aware of the full scope of your services.
      • Typically service information is written in technical jargon. For business users, this means that the information will be tough to understand.
      • Without a service catalog, you have no agreement o what is available, so business will assume that everything is.

      Our advice

      Insight

      • Define your services from a user's or customer perspective.
        • When your service catalog contains too much information that does not apply to most users, they will not use it.
      • Separate the line-of-business services from enterprise services. It simplifies your documentation process and makes the service catalog more comfortable to use.

      Impact and results 

      • Our approach helps you organize your service catalog in a business-friendly way while keeping it manageable for IT.
      • And manageable also means that your service catalog remains a living document. You can update your service records easily.
      • Your service catalog forms a visible bridge between IT and the business. Improve IT's perception by communicating the benefits of the service catalog.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started

      Our concise executive brief shows you why building a service catalog is a good idea for your company. We'll show you our methodology and the ways we can help you in handling this.

      Minimize the risks from attrition through an effective knowledge transfer process.

      Launch the initiative

      Our launch phase will walk you through the charter template, build help a balanced team, create your change message and communication plan to obtain buy-in from all your organization's stakeholders.

      • Design & Build a User-Facing Service Catalog – Phase 1: Launch the Project (ppt)
      • Service Catalog Project Charter (doc)

      Identify and define the enterprise services

      Group enterprise services which you offer to everyone in the company, logically together.

      • Design & Build a User-Facing Service Catalog – Phase 2: Identify and Define Enterprise Services (ppt)
      • Sample Enterprise Services (ppt)

      Identify and define your line-of-business (LOB) services

      These services apply only to one business line. Other business users should not see them in the catalog.

      • Design & Build a User-Facing Service Catalog – Phase 3: Identify and Define Line of Business Services (ppt)
      • Sample LOB Services – Industry Specific (ppt)
      • Sample LOB Services – Functional Group (ppt)

      Complete your services definition chart

      Complete this chart to allow the business to pick what services to include in the service catalog. It also allows you to extend the catalog with technical services by including IT-facing services. Of course, separated-out only for IT.

      • Design & Build a User-Facing Service Catalog – Phase 4: Complete Service Definitions (ppt)
      • Services Definition Chart (xls)

      Embrace Business-Managed Applications

      • Buy Link or Shortcode: {j2store}179|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $64,999 Average $ Saved
      • member rating average days saved: 18 Average Days Saved
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • The traditional model of managing applications does not address the demands of today’s rapidly changing market and digitally minded business, putting stress on scarce IT resources. The business is fed up with slow IT responses and overbearing desktop and system controls.
      • The business wants more control over the tools they use. Software as a service (SaaS), business process management (BPM), robotic process automation (RPA), artificial intelligence (AI), and low-code development platforms are all on their radar.
      • However, your current governance and management structures do not accommodate the risks and shifts in responsibilities to business-managed applications.

      Our Advice

      Critical Insight

      • IT is a business partner, not just an operator. Effective business operations hinge on high-quality, valuable, fit-for-purpose applications. IT provides the critical insights, guidance, and assistance to ensure applications are implemented and leveraged in a way that maximizes return on investment, whether it is being managed by end users or lines of business (LOBs). This can only happen if the organization views IT as a critical asset, not just a supporting player.
      • All applications should be business owned. You have applications because LOBs need them to meet the objectives and key performance indicators defined in the business strategy. Without LOBs, there would be no need for business applications. LOBs define what the application should be and do for it to be successful, so LOBs should own them.
      • Everything boils down to trust. The business is empowered to make their own decisions on how they want to implement and use their applications and, thus, be accountable for the resulting outcomes. Guardrails, role-based access, application monitoring, and other controls can help curb some risk factors, but it should not come at the expense of business innovation and time-sensitive opportunities. IT must trust the business will make rational application decisions, and the business must trust IT to support them in good times and bad.

      Impact and Result

      • Focus on the business units that matter. BMA can provide significant value to LOBs if teams and stakeholders are encouraged and motivated to adopt organizational and operational changes.
      • Reimagine the role of IT. IT is no longer the gatekeeper that blocks application adoption. Rather, IT enables the business to adopt the tools they need to be productive and they guide the business on successful BMA practices.
      • Instill business accountability. With great power comes great responsibility. If the business wants more control of their applications, they must be willing to take ownership of the outcomes of their decisions.

      Embrace Business-Managed Applications Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should embrace business-managed applications, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Embrace Business-Managed Applications – Phases 1-3
      • Business-Managed Applications Communication Template

      1. State your objectives

      Level-set the expectations for your business-managed applications.

      • Embrace Business- Managed Applications – Phase 1: State Your Objectives

      2. Design your framework and governance

      Identify and define your application managers and owners and build a fit-for-purpose governance model.

      • Embrace Business-Managed Applications – Phase 2: Design Your Framework & Governance

      3. Build your roadmap

      Build a roadmap that illustrates the key initiatives to implement your BMA and governance models.

      • Embrace Business-Managed Applications – Phase 3: Build Your Roadmap

      [infographic]

      Workshop: Embrace Business-Managed Applications

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 State Your Objectives

      The Purpose

      Define business-managed applications in your context.

      Identify your business-managed application objectives.

      State the value opportunities with business-managed applications.

      Key Benefits Achieved

      A consensus definition and list of business-managed applications goals

      Understanding of the business value business-managed applications can deliver

      Activities

      1.1 Define business-managed applications.

      1.2 List your objectives and metrics.

      1.3 State the value opportunities.

      Outputs

      Grounded definition of a business-managed application

      Goals and objectives of your business-managed applications

      Business value opportunity with business-managed applications

      2 Design Your Framework & Governance

      The Purpose

      Develop your application management framework.

      Tailor your application delivery and ownership structure to fit business-managed applications.

      Discuss the value of an applications committee.

      Discuss technologies to enable business-managed applications.

      Key Benefits Achieved

      Fit-for-purpose and repeatable application management selection framework

      Enhanced application governance model

      Applications committee design that meets your organization’s needs

      Shortlist of solutions to enable business-managed applications

      Activities

      2.1 Develop your management framework.

      2.2 Tune your delivery and ownership accountabilities.

      2.3 Design your applications committee.

      2.4 Uncover your solution needs.

      Outputs

      Tailored application management selection framework

      Roles definitions of application owners and managers

      Applications committee design

      List of business-managed application solution features and services

      3 Build Your Roadmap

      The Purpose

      Build your roadmap to implement busines-managed applications and build the foundations of your optimized governance model.

      Key Benefits Achieved

      Implementation initiatives

      Adoption roadmap

      Activities

      3.1 Build your roadmap.

      Outputs

      Business-managed application adoption roadmap

       

      Lead Staff through Change

      • Buy Link or Shortcode: {j2store}510|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: High Impact Leadership
      • Parent Category Link: /lead
      • Sixty to ninety percent of change initiatives fail, costing organizations dollars off the bottom line and lost productivity.
      • Seventy percent of change initiatives fail because of people-related issues, which place a major burden on managers to drive change initiatives successfully.
      • Managers are often too busy focusing on the process elements of change; as a result, they neglect major opportunities to leverage and mitigate staff behaviors that affect the entire team.

      Our Advice

      Critical Insight

      • Change is costly, but failed change is extremely costly. Managing change right the first time is worth the time and effort.
      • Staff pose the biggest opportunity and risk when implementing a change – managers must focus on their teams in order to maintain positive change momentum.
      • Large and small changes require the same change process to be followed but at different scales.
      • The size of a change must be measured according to the level of impact the change will have on staff, not how executives and managers perceive the change.
      • To effectively lead their staff through change, managers must anticipate staff reaction to change, develop a communication plan, introduce the change well, help their staff let go of old behaviors while learning new ones, and motivate their staff to adopt the change.

      Impact and Result

      • Anticipate and respond to staff questions about the change in order to keep messages consistent, organized, and clear.
      • Manage staff based on their specific concerns and change personas to get the best out of your team during the transition through change.
      • Maintain a feedback loop between staff, executives, and other departments in order to maintain the change momentum and reduce angst throughout the process.

      Lead Staff through Change Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Learn how to manage people throughout the change process

      Set up a successful change adoption.

      • Storyboard: Lead Staff through Change

      2. Learn the intricacies of the change personas

      Correctly identify which persona most closely resembles individual staff members.

      • None

      3. Assess the impact of change on staff

      Ensure enough time and effort is allocated in advance to people change management.

      • Change Impact Assessment Tool

      4. Organize change communications messages for a small change

      Ensure consistency and clarity in change messages to staff.

      • Basic Business Change Communication Worksheet

      5. Organize change communications messages for a large change

      Ensure consistency and clarity in change messages to staff.

      • Advanced Business Change Description Form

      6. Evaluate leadership of the change process with the team

      Improve people change management for future change initiatives.

      • Change Debrief Questionnaire
      [infographic]

      Modernize Your Microsoft Licensing for the Cloud Era

      • Buy Link or Shortcode: {j2store}304|cart{/j2store}
      • member rating overall impact: 9.1/10 Overall Impact
      • member rating average dollars saved: $102,414 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • Microsoft licensing is complicated. Often, the same software can be licensed a number of ways. It’s difficult to know which edition and licensing model is best.
      • Licensing and features often change with the release of new software versions, compounding the problem by making it difficult to stay current.
      • In tough economic times, IT is asked to reduce capital and operating expenses wherever possible. As one of the top five expense items in most enterprise software budgets, Microsoft licensing is a primary target for cost reduction.

      Our Advice

      Critical Insight

      • Focus on needs first. Conduct a thorough needs assessment and document the results. Well-documented needs will be your best asset in navigating Microsoft licensing and negotiating your agreement.
      • Beware the bundle. Be aware when purchasing the M365 suite that there is no way out. Negotiating a low price is critical, as all leverage swings to Microsoft once it is on your agreement.
      • If the cloud doesn’t fit, be ready to pay up or start making room. Microsoft has drastically reduced discounting for on-premises products, support has been reduced, and product rights have been limited. If you are planning to remain on premises, be prepared to pay up.

      Impact and Result

      • Understand what your organization needs and what your business requirements are. It’s always easier to purchase more later than try to reduce your spend.
      • Complete cost calculations carefully, as the cloud might end up costing significantly more for the desired feature set. However, in some scenarios, it may be more cost efficient for organizations to license in the cloud.
      • If there are significant barriers to cloud adoption, discuss and document them. You’ll need this documentation in three years when it’s time to renew your agreement.

      Modernize Your Microsoft Licensing for the Cloud Era Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Modernize Your Microsoft Licensing Deck – A deck to help you build a strategy for your Microsoft licensing renewal.

      This storyboard will help you build a strategy for your Microsoft licensing renewal from conducting a thorough needs assessment to examining your licensing position, evaluating Microsoft's licensing options, and negotiations.

      • Modernize Your Microsoft Licensing for the Cloud Era – Phases 1-4

      2. Microsoft Cloud Products Cost Modeler – A tool to model estimated costs for Microsoft's cloud products.

      The Microsoft Cloud Products Cost Modeler will provide a rough estimate of what you can expect to pay for Office 365 or Dynamics CRM licensing, before you enter into negotiations. This is not your final cost, but it will give you an idea.

      • Microsoft Cloud Products Cost Modeler

      3. Microsoft Licensing Purchase Reference Guide - A template to capture licensing stakeholder information, proposed changes to licensing, and negotiation items.

      The Microsoft Licensing Purchase Reference Guide can be used throughout the process of licensing review: from initial meetings to discuss compliance state and planned purchases, to negotiation meetings with resellers. Use it in conjunction with Info-Tech's Microsoft Licensing Effective License Position Template.

      • Microsoft Licensing Purchase Reference Guide

      4. Negotiation Timeline for Microsoft – A template to navigate your negotiations with Microsoft.

      This tool will help you plot out your negotiation timeline, depending on where you are in your contract negotiation process.

    • 6-12 months
    • Less than 3 months
      • Negotiation Timeline for Microsoft – Visio
      • Negotiation Timeline for Microsoft – PDF

      5. Effective Licensing Position Tool – A template to help you create an effective licensing position and determine your compliance position.

      This template helps organizations to determine the difference between the number of software licenses they own and the number of software copies deployed. This is known as the organization’s effective license position (ELP).

      • Effective Licensing Position Tool
      [infographic]

      Measure and Manage Customer Satisfaction Metrics That Matter the Most

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Lack of understanding of what is truly driving customer satisfaction or dissatisfaction.
      • Lack of insight into who our satisfied and dissatisfied customers are.
      • Lack of a system for early detection of declines in satisfaction.
      • Lack of clarity on what to improve and how resources should be allocated.

      Our Advice

      Critical Insight

      • All software companies measure satisfaction in some way, but many lack understanding of what’s truly driving customers to stay or leave. By understanding the true drivers of satisfaction, solution providers can measure and monitor satisfaction more effectively, pull actionable insights and feedback, and make changes to products and services that customers really care about and will keep them coming back to you to have their needs met.
      • Obstacles:
        • Use of metrics that don’t provide the insight needed to make impactful changes that will boost satisfaction and ultimately, retention and profit.
        • Lack of a clear definition of what satisfaction means to customers, metric definitions and/or standard methods of measurement, and a consistent monitoring cadence.

      Impact and Result

      • Understanding of who your satisfied and dissatisfied customers are.
      • Understanding of the true drivers of satisfaction and dissatisfaction among your customer segments.
      • Establishment of a repeatable process and cadence for effective satisfaction measurement and monitoring.
      • Development of an executable customer satisfaction improvement plan that identifies customer journey pain points and areas of dissatisfaction, and outlines how to improve them.
      • Knowledge of where money, time, and other resources are needed most to improve satisfaction levels and ultimately increase retention.

      Measure and Manage Customer Satisfaction Metrics That Matter the Most Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Measure and Manage the Customer Satisfaction Metrics that Matter the Most Deck – An overview of how to understand what drives customer satisfaction and how to measure and manage it for improved business outcomes.

      Understand the true drivers of customer satisfaction and build a process for managing and improving customer satisfaction.

      [infographic]

      Further reading

      Measure and Manage the Customer Satisfaction Metrics that Matter the Most

      Understand what truly keeps your customer satisfied. Start to measure what matters to improve customer experience and increase satisfaction and advocacy. 

      EXECUTIVE BRIEF

      Analyst perspective

      Understanding and measuring the true drivers of satisfaction enable the delivery of real customer value

      The image contains a picture of Emily Wright.

      “Healthy customer relationships are the paramount to long-term growth. When customers are satisfied, they remain loyal, spend more, and promote your company to others in their network. The key to high satisfaction is understanding and measuring the true drivers of satisfaction to enable the delivery of real customer value.

      Most companies believe they know who their satisfied customers are and what keeps them satisfied, and 76% of B2B buyers expect that providers understand their unique needs (Salesforce Research, 2020). However, on average B2B companies have customer experience scores of less than 50% (McKinsey, 2016). This disconnect between customer expectations and provider experience indicates that businesses are not effectively measuring and monitoring satisfaction and therefore are not making meaningful enhancements to their service, offerings, and overall experience.

      By focusing on the underlying drivers of customer satisfaction, organizations develop a truly accurate picture of what is driving deep satisfaction and loyalty, ensuring that their company will achieve sustainable growth and stay competitive in a highly competitive market.”

      Emily Wright

      Senior Research Analyst, Advisory

      SoftwareReviews

      Executive summary

      Your Challenge

      Common Obstacles

      SoftwareReviews’ Approach

      Getting a truly accurate picture of satisfaction levels among customers, and where to focus efforts to improve satisfaction, is challenging. Providers often find themselves reacting to customer challenges and being blindsided when customers leave. More effective customer satisfaction measurement is possible when providers self-assess for the following challenges:

      • Lack of understanding of what is truly driving customer satisfaction or dissatisfaction.
      • Lack of insight into who our satisfied and dissatisfied customers are.
      • Lack of a system for early detection of declines in satisfaction.
      • Lack of clarity of what needs to be improved and how resources should be allocated.
      • Lack of reliable internal data for effective customer satisfaction monitoring.

      What separates customer success leaders from developing a full view of their customers are several nagging obstacles:

      • Use of metrics that don’t provide the insight needed to make impactful changes that will boost satisfaction and ultimately, retention and profit.
      • Friction from customers participating in customer satisfaction studies.
      • Lack of data, or integrated databases from which to track, pull, and analyze customer satisfaction data.
      • Lack a clear definition of what satisfaction means to customers, metric definitions, and/or standard methods of measurement and a consistent monitoring cadence.
      • Lack of time, resources, or technology to uncover and effectively measure and monitor satisfaction drivers.

      Through the SoftwareReviews’ approach, customer success leaders will:

      • Understand who your satisfied and dissatisfied customers are.
      • Understand the true drivers of satisfaction and dissatisfaction among your customer segments.
      • Establish a repeatable process and cadence for effective satisfaction measurement and monitoring.
      • Develop an executable customer satisfaction improvement plan that identifies customer journey pain points and areas of dissatisfaction, and outlines how to improve them.
      • Know where money, time, and resources are needed most to improve satisfaction levels and ultimately retention.

      Overarching SoftwareReviews Advisory Insight:

      All companies measure satisfaction in some way, but many lack understanding of what’s truly driving customers to stay or leave. By understanding the true drivers of satisfaction, solution providers can measure and monitor satisfaction more effectively, pull actionable insights and feedback, and make changes to products and services that customers really care about. This will keep them coming back to you to have their needs met.

      Healthy Customer Relationships are vital for long-term success and growth

      Measuring customer satisfaction is critical to understanding the overall health of your customer relationships and driving growth.

      Through effective customer satisfaction measurement, organizations can:

      Improve Customer Experience

      Increase Retention and CLV

      Increase Profitability

      Reduce Costs

      • Provide insight into where and how to improve.
      • Enhance experience, increase loyalty.
      • By providing strong CX, organizations can increase revenue by 10-15% (McKinsey, 2014).
      • Far easier to retain existing customers than to acquire new ones.
      • Ensuring high satisfaction among customers increases Customer Lifetime Value (CLV) through longer tenure and higher spending.
      • NPS Promoter score has a customer lifetime value that's 600%-1,400% higher than a Detractor (Bain & Company, 2015).
      • Highly satisfied customers spend more through expansions and add-ons, as well as through their long tenure with your company.
      • They also spread positive word of mouth, which brings in new customers.
      • “Studies demonstrate a strong correlation between customer satisfaction and increased profits — with companies with high customer satisfaction reporting 5.7 times more revenue than competitors.” (Matthew Loper, CEO and Co-Founder of WELLTH, 2022)
      • Measuring, monitoring, and maintaining high satisfaction levels reduces costs across the board.
      • “Providing a high-quality customer experience can save up to 33% of customer service costs” (Deloitte, 2018).
      • Satisfied customers are more likely to spread positive word of mouth which reduces acquisition / marketing costs for your company.

      “Measuring customer satisfaction is vital for growth in any organization; it provides insights into what works and offers opportunities for optimization. Customer satisfaction is essential for improving loyalty rate, reducing costs and retaining your customers.”

      -Ken Brisco, NICE, 2019

      Poor customer satisfaction measurement is costly

      Virtually all companies measure customer satisfaction, but few truly do it well. All too often, customer satisfaction measurement consists of a set of vanity metrics that do not result in actionable insight for product/service improvement. Improper measurement can result in numerous consequences:

      Direct and Indirect Costs

      Being unaware of true drivers of satisfaction that are never remedied costs your business directly through customer churn, service costs, etc.

      Tarnished Brand

      Tarnished brand through not resolving issues drives dissatisfaction; dissatisfied customers share their negative experiences, which can damage brand image and reputation.

      Waste Limited Resources

      Putting limited resources towards vanity programs and/or fixes that have little to no bearing on core satisfaction drivers wastes time and money.

      “When customer dissatisfaction goes unnoticed, it can slowly kill a company. Because of the intangible nature of customer dissatisfaction, managers regularly underestimate the magnitude of customer dissatisfaction and its impact on the bottom line.”

      - Lakshmiu Tatikonda, “The Hidden Costs of Customer Dissatisfaction”, 2013

      SoftwareReviews Advisory Insight:

      Most companies struggle to understand what’s truly driving customers to stay or leave. By understanding the true satisfaction drivers, tech providers can measure and monitor satisfaction more effectively, avoiding the numerous harmful consequences that result from average customer satisfaction measurement.

      Does your customer satisfaction measurement process need improvement?

      Getting an accurate picture of customer satisfaction is no easy task. Struggling with any of the following means you are ready for a detailed review of your customer satisfaction measurement efforts:

      • Not knowing who your most satisfied customers are.
      • Lacking early detection for declining satisfaction – either reactive, or unaware of dissatisfaction as it’s occurring.
      • Lacking a process for monitoring changes in satisfaction and lack ability to be proactive; you feel blindsided when customers leave.
      • Inability to fix the problem and wasting money on the wrong areas, like vanity metrics that don’t bring value to customers.
      • Spending money and other resources towards fixes based on a gut feeling, without quantifying the real root cause drivers and investing in their improvement.
      • Having metrics and data but lacking context; don’t know what contributed to the metrics/results, why people are dissatisfied or what contributes to satisfaction.
      • Lacking clear definition of what satisfaction means to customers / customer segments.
      • Difficulty tying satisfaction back to financial results.

      Customers are more satisfied with software vendors who understand the difference between surface level and short-term satisfaction, and deep or long-term satisfaction

      Surface-level satisfaction

      Surface-level satisfaction has immediate effects, but they are usually short-term or limited to certain groups of users. There are several factors that contribute to satisfaction including:

      • Novelty of new software
      • Ease of implementation
      • Financial savings
      • Breadth of features

      Software Leaders Drive Deep Satisfaction

      Deep satisfaction has long-term and meaningful impacts on the way that organizations work. Deep satisfaction has staying power and increases or maintains satisfaction over time, by reducing complexity and delivering exceptional quality for end-users and IT alike. This report found that the following capabilities provided the deepest levels of satisfaction:

      • Usability and intuitiveness
      • Quality of features
      • Ease of customization
      • Vendor-specific capabilities

      The above solve issues that are part of everyday problems, and each drives satisfaction in deep and meaningful ways. While surface-level satisfaction is important, deep and impactful capabilities can sustain satisfaction for a longer time.

      Deep Customer Satisfaction Among Software Buyers Correlates Highly to “Emotional Attributes”

      Vendor Capabilities and Product Features remain significant but are not the primary drivers

      The image contains a graph to demonstrate a correlation to Satisfaction, all Software Categories.
      Source: SoftwareReviews buyer reviews (based on 82,560 unique reviews).

      Driving deep satisfaction among software customers vs. surface-level measures is key

      Vendor capabilities and product features correlate significantly to buyer satisfaction

      Yet, it’s the emotional attributes – what we call the “Emotional Footprint”, that correlate more strongly

      Business-Value Created and Emotional Attributes are what drives software customer satisfaction the most

      The image contains a screenshot of a graph to demonstrate Software Buyer Satisfaction Drivers and Emotional Attributes are what drives software customer satisfaction.

      Software companies looking to improve customer satisfaction will focus on business value created and the Emotional Footprint attributes outlined here.

      The essential ingredient is understanding how each is defined by your customers.

      Leaders focus on driving improvements as described by customers.

      SoftwareReviews Insight:

      These true drivers of satisfaction should be considered in your customer satisfaction measurement and monitoring efforts. The experience customers have with your product and brand is what will differentiate your brand from competitors, and ultimately, power business growth. Talk to a SoftwareReviews Advisor to learn how users rate your product on these satisfaction drivers in the SoftwareReviews Emotional Footprint Report.

      Benefits of Effective Customer Satisfaction Measurement

      Our research provides Customer Success leaders with the following key benefits:

      • Ability to know who is satisfied, dissatisfied, and why.
      • Confidence in how to understand or uncover the factors behind customer satisfaction; understand and identify factors driving satisfaction, dissatisfaction.
      • Ability to develop a clear plan for improving customer satisfaction.
      • Knowledge of how to establish a repeatable process for customer satisfaction measurement and monitoring that allows for proactivity when declines in satisfaction are detected.
      • Understanding of what metrics to use, how to measure them, and where to find the right information/data.
      • Knowledge of where money, time, and other resources are needed most to drive tangible customer value.

      “81% of organizations cite CX as a competitive differentiator. The top factor driving digital transformation is improving CX […] with companies reporting benefits associated with improving CX including:

      • Increased customer loyalty (92%)
      • An uplift in revenue (84%)
      • Cost savings (79%).”

      – Dan Cote, “Advocacy Blooms and Business Booms When Customers and Employees Engage”, Influitive, 2021

      The image contains a screenshot of a thought model that focuses on Measure & Manage the Customer Satisfaction Metrics That Matter the Most.

      Who benefits from improving the measurement and monitoring of customer satisfaction?

      This Research Is Designed for:

      • Customer Success leaders and marketers who are:
        • Responsible for understanding how to benchmark, measure, and understand customer satisfaction to improve satisfaction, NPS, and ROI.
        • Looking to take a more proactive and structured approach to customer satisfaction measurement and monitoring.
        • Looking for a more effective and accurate way to measure and understand how to improve customer satisfaction around products and services.

      This Research Will Help You:

      • Understand the factors driving satisfaction and dissatisfaction.
      • Know which customers are satisfied/dissatisfied.
      • Know where time, money, and resources are needed the most in order to improve or maintain satisfaction levels.
      • Develop a formal plan to improve customer satisfaction.
      • Establish a repeatable process for customer satisfaction measurement and monitoring that allows for proactivity when declines in satisfaction are detected.

      This Research Will Also Assist:

      • Customer Success Leaders, Marketing and Sales Directors and Managers, Product Marketing Managers, and Advocacy Managers/Coordinators who are responsible for:
        • Product improvements and enhancements
        • Customer service and onboarding
        • Customer advocacy programs
        • Referral/VoC programs

      This Research Will Help Them:

      • Coordinate and align on customer experience efforts and actions.
      • Gather and make use of customer feedback to improve products, solutions, and services provided.
      • Provide an amazing customer experience throughout the entirety of the customer journey.

      SoftwareReviews’ methodology for measuring the customer satisfaction metrics that matter the most

      1. Identify true customer satisfaction drivers

      2. Develop metrics dashboard

      3. Develop customer satisfaction measurement and management plan

      Phase Steps

      1. Identify data sources, documenting any gaps in data
      2. Analyze all relevant data on customer experiences and outcomes
      3. Document top satisfaction drivers
      1. Identify business goals, problems to be solved / define business challenges and marketing/customer success goals
      2. Use SR diagnostic to assess current state of satisfaction measurement, assessing metric alignment to satisfaction drivers
      3. Define your metrics dashboard
      4. Develop common metric definitions, language for discussing, and standards for measuring customer satisfaction
      1. Determine committee structure to measure performance metrics over time
      2. Map out gaps in satisfaction along customer journey/common points in journey where customers are least dissatisfied
      3. Build plan that identifies weak areas and shows how to fix using SR’s emotional footprint, other measures
      4. Create plan and roadmap for CSat improvement
      5. Create communication deck

      Phase Outcomes

      1. Documented satisfaction drivers
      2. Documented data sources and gaps in data
      1. Current state customer satisfaction measurement analysis
      2. Common metric definitions and measurement standards
      3. Metrics dashboard
      1. Customer satisfaction measurement plan
      2. Customer satisfaction improvement plan
      3. Customer journey maps
      4. Customer satisfaction improvement communication deck
      5. Customer Satisfaction Committee created

      Insight summary

      Understanding and measuring the true drivers of satisfaction enable the delivery of real customer value

      All software companies measure satisfaction in some way, but many lack understanding of what’s truly driving customers to stay or leave. By understanding the true drivers of satisfaction, solution providers can measure and monitor satisfaction more effectively, pull actionable insights and feedback, and make changes to products and services that customers really care about and which will keep them coming back to you to have their needs met.

      Positive experiences drive satisfaction more so than features and cost

      According to our analysis of software buyer reviews data*, the biggest drivers of satisfaction and likeliness to recommend are the positive experiences customers have with vendors and their products. Customers want to feel that:

      1. Their productivity and performance is enhanced, and the vendor is helping them innovate and grow as a company.
      2. Their vendor inspires them and helps them to continually improve.
      3. They can rely on the vendor and the product they purchased.
      4. They are respected by the vendor.
      5. They can trust that the vendor will be on their side and save them time.
      *8 million data points across all software categories

      Measure Key Relationship KPIs to gauge satisfaction

      Key metrics to track include the Business Value Created score, Net Emotional Footprint, and the Love/Hate score (the strength of emotional connection).

      Orient the organization around customer experience excellence

      1. Arrange staff incentives around customer value instead of metrics that are unrelated to satisfaction.
      2. Embed customer experience as a core company value and integrate it into all functions.
      3. Make working with your organization easy and seamless for customers.

      Have a designated committee for customer satisfaction measurement

      Best in class organizations create customer satisfaction committees that meet regularly to measure and monitor customer satisfaction, resolve issues quickly, and work towards improved customer experience and profit outcomes.

      Use metrics that align to top satisfaction drivers

      This will give you a more accurate and fulsome view of customer satisfaction than standard satisfaction metrics alone will.

      Guided Implementation

      What is our GI on measuring and managing the customer satisfaction metrics that matter most?

      Identify True Customer Satisfaction Drivers

      Develop Metrics Dashboard Develop Customer Satisfaction Measurement and Management Plan

      Call #1: Discuss current pain points and barriers to successful customer satisfaction measurement, monitoring and maintenance. Plan next call – 1 week.

      Call #2: Discuss all available data, noting any gaps. Develop plan to fill gaps, discuss feasibility and timelines. Plan next call – 1 week.

      Call #3: Walk through SoftwareReviews reports to understand EF and satisfaction drivers. Plan next call – 3 days.

      Call #4: Segment customers and document key satisfaction drivers. Plan next call – 2 week.

      Call #5: Document business goals and align them to metrics. Plan next call – 1 week.

      Call #6: Complete the SoftwareReviews satisfaction measurement diagnostic. Plan next call – 3 days.

      Call #7: Score list of metrics that align to satisfaction drivers. Plan next call – 2 days.

      Call #8: Develop metrics dashboard and definitions. Plan next call – 2 weeks.

      Call #9: Finalize metrics dashboard and definitions. Plan next call – 1 week.

      Call #10: Discuss committee and determine governance. Plan next call – 2 weeks.

      Call #11: Map out gaps in satisfaction along customer journey as they relate to top satisfaction drivers. Plan next call –2 weeks.

      Call #12: Develop plan and roadmap for satisfaction improvement. Plan next call – 1 week.

      Call #13: Finalize plan and roadmap. Plan next call – 1 week.

      Call # 14: Review and coach on communication deck.

      A Guided Implementation (GI) is series of calls with a SoftwareReviews Advisory analyst to help implement our best practices in your organization.

      For guidance on marketing applications, we can arrange a discussion with an Info-Tech analyst.

      Your engagement managers will work with you to schedule analyst calls.

      Software Reviews offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”
      Included within Advisory Membership Optional add-ons

      Bibliography

      “Are you experienced?” Bain & Company, Apr. 2015. Accessed 6 June. 2022.

      Brisco, Ken. “Measuring Customer Satisfaction and Why It’s So Important.” NICE, Feb. 2019. Accessed 6 June. 2022.

      CMO.com Team. “The Customer Experience Management Mandate.” Adobe Experience Cloud Blog, July 2019. Accessed 14 June. 2022.

      Cote, Dan. “Advocacy Blooms and Business Booms When Customers and Employees Engage.” Influitive, Dec. 2021. Accessed 15 June. 2022.

      Fanderl, Harald and Perrey, Jesko. “Best of both worlds: Customer experience for more revenues and lower costs.” McKinsey & Company, Apr. 2014. Accessed 15 June. 2022.

      Gallemard, Jeremy. “Why – And How – Should Customer Satisfaction Be Measured?” Smart Tribune, Feb. 2020. Accessed 6 June. 2022.

      Kumar, Swagata. “Customer Success Statistics in 2021.” Customer Success Box, 2021. Accessed 17 June. 2022.

      Lakshmiu Tatikonda, “The Hidden Costs of Customer Dissatisfaction”, Management Accounting Quarterly, vol. 14, no. 3, 2013, pp 38. Accessed 17 June. 2022.

      Loper, Matthew. “Why ‘Customer Satisfaction’ Misses the Mark – And What to Measure Instead.” Newsweek, Jan. 2022. Accessed 16 June. 2022.

      Maechler, Nicolas, et al. “Improving the business-to-business customer experience.” McKinsey & Company, Mar. 2016. Accessed 16 June.

      “New Research from Dimension Data Reveals Uncomfortable CX Truths.” CISION PR Newswire, Apr. 2017. Accessed 7 June. 2022.

      Sheth, Rohan. 75 Must-Know Customer Experience Statistics to move Your Business Forward in 2022.” SmartKarrot, Feb. 2022. Accessed 17 June. 2022.

      Smith, Mercer. “111 Customer Service Statistics and Facts You Shouldn’t Ignore.” HelpScout, May 2022. Accessed 17 June. 2022.

      “State of the Connected Customer.” Salesforce, 2020. Accessed 14 June. 2022

      “The true value of customer experiences.” Deloitte, 2018. Accessed 15 June. 2022.

      Reinforce End-User Security Awareness During Your COVID-19 Response

      • Buy Link or Shortcode: {j2store}311|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Endpoint Security
      • Parent Category Link: /endpoint-security

      Without the control over the areas in which employees are working, businesses are opening themselves up to a greater degree of risk during the pandemic. How does a business raise awareness for employees who are going to be working remotely?

      Our Advice

      Critical Insight

      • An expanding remote workforce requires training efforts to evolve to include the unique security threats that face remote end users.
      • By presenting security as a personal and individualized issue, you can make this new personal focus a driver for your organizational security awareness and training program.

      Impact and Result

      • Teach remote end users how to recognize current cyberattacks before they fall victim and turn them into active barriers against cyberattacks.
      • Use Info-Tech’s blueprint and materials to build a customized training program that uses best practices.

      Reinforce End-User Security Awareness During Your COVID-19 Response Research & Tools

      Start here

      COVID-19 is forcing many businesses to expand their remote working capabilities further than before. Using this blueprint, see how to augment your existing training or start from scratch during a remote work situation.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Reinforce End-User Security Awareness During Your COVID-19 Response Storyboard
      • Security Awareness and Training Program Development Tool
      • Security Awareness and Training Metrics Tool
      • End-User Security Knowledge Test Template

      1. Training Materials

      Use Info-Tech’s training materials to get you started on remote training and awareness.

      • Training Materials – Phishing
      • Training Materials – Incident Response
      • Training Materials – Cyber Attacks
      • Training Materials – Web Usage
      • Training Materials – Physical Computer Security
      • Training Materials – Mobile Security
      • Training Materials – Passwords
      • Training Materials – Social Engineering
      • Security Training Email Templates
      [infographic]

      Maintain an Organized Portfolio

      • Buy Link or Shortcode: {j2store}432|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $3,059 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • All too often, the portfolio of programs and projects looks more like a random heap than a strategically organized and balanced collection of investments that will drive the business forward.
      • Portfolio managers know that with the right kind of information and the right level of process maturity they can get better results through the portfolio; however, organizations often assume (falsely) that the required level of maturity is out of reach from their current state and perpetually delay improvements.

      Our Advice

      Critical Insight

      • The information needed to define clear and usable criteria for organizing the portfolio of programs and projects already exists. Portfolio managers only need to identify the sources of that information and institute processes for regularly reviewing that information in order to define those criteria.
      • Once a portfolio manager has a clear idea of the goals and constraints that shape what ought to be included (or removed) from the portfolio and once these have been translated into clear and usable portfolio criteria, basic portfolio management processes can be instituted to ensure that these criteria are used consistently throughout the various stages of the project lifecycle.
      • Portfolio management frameworks and processes do not need to be built from scratch. Well-known frameworks – such as the one outlined in COBIT 5 APO05 – can be instituted in a way that will allow even low-maturity organizations to start organizing their portfolio.
      • Organizations do not need to grow into portfolio management frameworks to get the benefits of an organized portfolio; instead, they can grow within such frameworks.

      Impact and Result

      • An organized portfolio will ensure that the projects and programs included in it are strategically aligned and can actually be executed within the finite constraints of budgetary and human resource capacity.
      • Portfolio managers are better empowered to make decisions about which projects should be included in the portfolio (and when) and are better empowered to make the very tough decisions about which projects should be removed from the portfolio (i.e. cancelled).
      • Building and maturing a portfolio management framework will more fully integrate the PMO into the broader IT management and governance frameworks, making it a more integral part of strategic decisions and a better business partner in the long run.

      Maintain an Organized Portfolio Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should maintain an organized portfolio of programs and projects, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess the current state of the portfolio and PPM processes

      Analyze the current mix of programs and projects in your portfolio and assess the maturity of your current PPM processes.

      • Maintain an Organized Portfolio – Phase 1: Assess the Current State of the Portfolio and PPM Processes
      • Project Portfolio Organizer
      • COBIT APO05 (Manage Portfolio) Alignment Workbook

      2. Enhance portfolio organization through improved PPM criteria and processes

      Enhance and optimize your portfolio management processes to ensure portfolio criteria are clearly defined and consistently applied across the project lifecycle when making decisions about which projects to include or remove from the portfolio.

      • Maintain an Organized Portfolio – Phase 2: Enhance Portfolio Organization Through Improved PPM Criteria and Processes
      • Portfolio Management Standard Operating Procedures

      3. Implement improved portfolio management practices

      Implement your portfolio management improvement initiatives to ensure long-term sustainable adoption of new PPM practices.

      • Maintain an Organized Portfolio – Phase 3: Implement Improved Portfolio Management Practices
      • Portfolio Management Improvement Roadmap Tool
      [infographic]

      Workshop: Maintain an Organized Portfolio

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess Portfolio Mix and Portfolio Process Current State

      The Purpose

      Analyze the current mix of the portfolio to determine how to better organize it according to organizational goals and constraints.

      Assess which PPM processes need to be enhanced to better organize the portfolio.

      Key Benefits Achieved

      An analysis of the existing portfolio of projects (highlighting areas of concern).

      An analysis of the maturity of current PPM processes and their ability to support the maintenance of an organized portfolio.

      Activities

      1.1 Pre-work: Prepare a complete project list.

      1.2 Define existing portfolio categories, criteria, and targets.

      1.3 Analyze the current portfolio mix.

      1.4 Identify areas of concern with current portfolio mix.

      1.5 Review the six COBIT sub-processes for portfolio management (APO05.01-06).

      1.6 Assess the degree to which these sub-processes have been currently achieved at the organization.

      1.7 Assess the degree to which portfolio-supporting IT governance and management processes exist.

      1.8 Perform a gap analysis.

      Outputs

      Analysis of the current portfolio mix

      Assessment of COBIT alignment and gap analysis.

      2 Define Portfolio Target Mix, Criteria, and Roadmap

      The Purpose

      Define clear and usable portfolio criteria.

      Record/design portfolio management processes that will support the consistent use of portfolio criteria at all stages of the project lifecycle.

      Key Benefits Achieved

      Clearly defined and usable portfolio criteria.

      A portfolio management framework that supports the consistent use of the portfolio criteria across all stages of the project lifecycle.

      Activities

      2.1 Identify determinants of the portfolio mix, criteria, and constraints.

      2.2 Define the target mix, portfolio criteria, and portfolio metrics.

      2.3 Identify sources of funding and resourcing.

      2.4 Review and record the portfolio criteria based upon the goals and constraints.

      2.5 Create a PPM improvement roadmap.

      Outputs

      Portfolio criteria

      Portfolio metrics for intake, monitoring, closure, termination, reprioritization, and benefits tracking

      Portfolio Management Improvement Roadmap

      3 Design Improved Portfolio Sub-Processes

      The Purpose

      Ensure that the portfolio criteria are used to guide decision making at each stage of the project lifecycle when making decisions about which projects to include or remove from the portfolio.

      Key Benefits Achieved

      Processes that support decision making based upon the portfolio criteria.

      Processes that ensure the portfolio remains consistently organized according to the portfolio criteria.

      Activities

      3.1 Ensure that the metrics used for each sub-process are based upon the standard portfolio criteria.

      3.2 Establish the roles, accountabilities, and responsibilities for each sub-process needing improvement.

      3.3 Outline the workflow for each sub-process needing improvement.

      Outputs

      A RACI chart for each sub-process

      A workflow for each sub-process

      4 Change Impact Analysis and Stakeholder Engagement Plan

      The Purpose

      Ensure that the portfolio management improvement initiatives are sustainably adopted in the long term.

      Key Benefits Achieved

      Stakeholder engagement.

      Sustainable long-term adoption of the improved portfolio management practices.

      Activities

      4.1 Conduct a change impact analysis.

      4.2 Create a stakeholder engagement plan.

      Outputs

      Change Impact Analysis

      Stakeholder Engagement Plan

      Completed Portfolio Management SOP

      Change Management's Role in Incident Prevention: standard changes

      • Large vertical image:
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      During peak business hours, I witnessed a straightforward database field addition bring down a whole e-commerce platform. It was meant to be standard procedure, the type of “standard change” that is automatically approved because we have performed it innumerable times.

      Adding a field to the end of a table and having applications retrieve data by field name instead of position made the change itself textbook low-impact. There is no need to alter the application or the functional flow. This could have been problematic in the past if you added a field in the middle of the list and it affected the values of other fields, but adding it at the end? That ought to have been impenetrable.

      However, it wasn't.

      Before I tell you what went wrong, let me explain why this is important to all of the IT professionals who are reading this.

      Over the past three decades, industry data has repeatedly supported what this incident taught me: our presumptions about “safe” changes are frequently our greatest weakness. Upon reviewing the ITIL research, I was not surprised to learn that failed changes, many of which were categorized as “standard” or “low-risk,” are responsible for about 80% of unplanned outages.

      When you look more closely, the numbers become even more concerning. Since I've been following the Ponemon Institute's work for years, I wasn't surprised to learn that companies with well-established change management procedures have 65% fewer unscheduled outages. The paradox surprised me: many of these “mature” procedures still operate under the premise that safety correlates with repetition.

      What I had been observing in the field for decades was confirmed when Gartner released their research showing that standard changes are responsible for almost 40% of change-related incidents. The very changes we consider safe enough to avoid thorough review subtly create some of our greatest risks. IBM's analysis supports the pattern I've seen in innumerable organizations: standard changes cause three times as much business disruption due to their volume and our decreased vigilance around them, whereas emergency changes receive all the attention and scrutiny.

      Aberdeen Group data indicates that the average cost of an unplanned outage has increased to $300,000 per hour, with change-related failures accounting for the largest category of preventable incidents. This data makes the financial reality stark.

      What precisely went wrong with the addition of that database field that caused our e-commerce platform to crash?

      We were unaware that the addition of this one field would cause the database to surpass an internal threshold, necessitating a thorough examination of its execution strategy. In its algorithmic wisdom, the database engine determined that the table structure had changed enough to necessitate rebuilding its access and retrieval mechanisms. Our applications relied on high-speed requests, and the new execution plan was terribly unoptimized for them.

      Instead of completing quotes or purchases, customers were spending minutes viewing error pages. All applications began to time out while they awaited data that just wasn't showing up in the anticipated amounts of time. Thousands of transactions were impacted by a single extra field that should have been invisible to the application layer.

      The field addition itself was not the primary cause. We assumed that since we had made similar adjustments dozens of times previously, this one would also act in the same way. Without taking into account the hidden complexities of database optimization thresholds, we had categorized it as a standard change based on superficial similarities.

      My approach to standard changes was completely altered by this experience, and it is now even more applicable in DevOps-driven environments. Many organizations use pipeline deployments, which produce a standard change at runtime. It's great for speed and reliability, but it can easily fall into the same trap.

      However, I have witnessed pipeline deployments result in significant incidents for non-code-related reasons. Due to timing, resource contention, or environmental differences that weren't noticeable in earlier runs, a deployment that performed flawlessly in development and staging abruptly fails in production. Although the automation boosts our confidence, it may also reveal blind spots.

      Over the course of thirty years, I have come to the unsettling realization that there is no such thing as a truly routine change in complex systems. Every modification takes place in a slightly different setting, with varying environmental factors, data states, and system loads. What we refer to as “standard changes” are actually merely modifications with comparable processes rather than risk profiles.

      For this reason, I support contextual change management. We must consider the system state, timing, dependencies, and cumulative effect of recent changes rather than just categorizing them based on their technical features. After three other changes have changed the system's behavior patterns, a change made at two in the morning on a Sunday with little system load is actually different from the same change made during peak business hours.

      Effective change advisory boards must therefore go beyond assessing individual changes separately. I've worked with organizations where the change board carefully considered and approved each modification on its own merits, only to find that the cumulative effect of seemingly unrelated changes led to unexpected interactions and stress on the system. The most developed change management procedures I've come across mandate that their advisory boards take a step back and look at the whole change portfolio over a specified period of time. They inquire whether we are altering the database too frequently during a single maintenance window. Could there be unanticipated interactions between these three different application updates? What is the total resource impact of this week's approved changes?

      It's the distinction between forest management and tree management. While each change may seem logical individually, when combined, they can create situations beyond the scope of any single change assessment.

      Having worked in this field for thirty years, I've come to the conclusion that our greatest confidences frequently conceal our greatest vulnerabilities. Our primary blind spots frequently arise from the changes we've made a hundred times before, the procedures we've automated and standardized, and the adjustments we've labeled as “routine.”

      Whether we should slow down our deployment pipelines or stop using standard changes is not the question. In the current competitive environment, speed and efficiency are crucial. The issue is whether we are posing the appropriate queries before carrying them out. Are we taking into account not only what the change accomplishes but also when it occurs, what else is changing at the same time, and how our systems actually look right now?

      I've discovered that the phrase “we've done this before” is more dangerous in IT operations than “what could go wrong?” Because, despite what we may believe, we never actually perform the same action twice in complex systems.

      Here is what I would like you to think about: which everyday modifications are subtly putting your surroundings at risk? Which procedures have you standardized or automated to the extent that you no longer challenge their presumptions? Most importantly, when was the last time your change advisory board examined your changes as a cohesive portfolio of system modifications rather than as discrete items on a checklist?

      Remember that simple addition to a database field the next time you're tempted to accept a standard change. The most unexpected outcomes can occasionally result from the most routine adjustments.

      I'm always up for a conversation if you want to talk about your difficulties with change management.

      Integrate IT Risk Into Enterprise Risk

      • Buy Link or Shortcode: {j2store}195|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,599 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance
      • IT risks, when considered, are identified and classified separately from the enterprise-wide perspective.
      • IT is expected to own risks over which they have no authority or oversight.
      • Poor behaviors, such as only considering IT risks when conducting compliance or project due diligence, have been normalized.

      Our Advice

      Critical Insight

      • Stop avoiding risk – integrate it. This provides a holistic view of uncertainty for the organization to drive innovative new approaches to optimize the organization’s ability to respond to risk.

      Impact and Result

      • Understand gaps in the organization’s current approach to risk management practices.
      • Establish a standardized approach for how IT risks impact the enterprise as a whole.
      • Drive a risk-aware organization toward innovation and consider alternative options for how to move forward.
      • Integrate IT risks into the foundational risk practice.

      Integrate IT Risk Into Enterprise Risk Research & Tools

      Integrated Risk Management Capstone – A framework for how IT risks can be integrated into your organization’s enterprise risk management program to enable strategic risk-informed decisions.

      This is a capstone blueprint highlighting the benefits of an integrated risk management program that uses risk information and data to inform strategic decision making. Throughout this research you will gain insight into the five core elements of integrating risk through assessing, governing, defining the program, defining the process, and implementing.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Integrate IT Risk Into Enterprise Risk Capstone
      • Integrated Risk Maturity Assessment
      • Risk Register Tool

      Infographic

      Further reading

      Integrate IT Risk Into Enterprise Risk

      Don’t fear IT risks, integrate them.

      EXECUTIVE BRIEF

      Analyst Perspective

      Having siloed risks is risky business for any enterprise.

      Photo of Valence Howden, Principal Research Director, CIO Practice.
      Valence Howden
      Principal Research Director, CIO Practice
      Photo of Petar Hristov Research Director, Security, Privacy, Risk & Compliance.
      Petar Hristov
      Research Director, Security, Privacy, Risk & Compliance
      Photo of Ian Mulholland Research Director, Security, Risk & Compliance.
      Ian Mulholland
      Research Director, Security, Risk & Compliance
      Photo of Brittany Lutes, Senior Research Analyst, CIO Practice.
      Brittany Lutes
      Senior Research Analyst, CIO Practice
      Photo of Ibrahim Abdel-Kader, Research Analyst, CIO Practice
      Ibrahim Abdel-Kader
      Research Analyst, CIO Practice

      Every organization has a threshold for risk that should not be exceeded, whether that threshold is defined or not.

      In the age of digital, information and technology will undoubtedly continue to expand beyond the confines of the IT department. As such, different areas of the organization cannot address these risks in silos. A siloed approach will produce different ways of identifying, assessing, responding to, and reporting on risk events. Integrated risk management is about embedding IT uncertainty to inform good decision making across the organization.

      When risk is integrated into the organization's enterprise risk management program, it enables a single view of all risks and the potential impact of each risk event. More importantly, it provides a consistent view of the risk event in relation to uncertainty that might have once been seemingly unrelated to IT.

      And all this can be achieved while remaining within the enterprise’s clearly defined risk appetite.

      Executive Summary

      Your Challenge

      Most organizations fail to integrate IT risks into enterprise risks:

      • IT risks, when considered, are identified and classified separately from the enterprise-wide perspective.
      • IT is expected to own risks over which they have no authority or oversight.
      • Poor behaviors, such as only considering IT risks when conducting compliance or project due diligence, have been normalized.

      Common Obstacles

      IT leaders have to overcome these obstacles when it comes to integrating risk:

      • Making business leaders aware of, involved in, and able to respond to all enterprise risks.
      • A lack of data or information being used to support a holistic risk management process.
      • A low level of enterprise risk maturity.
      • A lack of risk management capabilities.

      Info-Tech’s Approach

      By leveraging the Info-Tech Integrated Risk approach, your business can better address and embed risk by:

      • Understanding gaps in the organization’s current approach to risk management practices.
      • Establishing a standardized approach for how IT risks impact the enterprise as a whole.
      • Driving a risk-aware organization toward innovation and considering alternative options for how to move forward.
      • Helping integrate IT risks into the foundational risk practice.

      Info-Tech Insight

      Stop avoiding risk – integrate it. This provides a holistic view of uncertainty for the organization to drive innovative new approaches to optimize its ability to respond to risk.

      What is integrated risk management?

      • Integrated risk management is the process of ensuring all forms of risk information, including information and technology, are considered and included in the enterprise’s risk management strategy.
      • It removes the siloed approach to classifying risks related to specific departments or areas of the organization, recognizing that each of those risks is a threat to the overarching enterprise.
      • Aggregating the different threats or uncertainty that might exist within an organization allows for informed decisions to be made that align to strategic goals and continue to drive value back to the business.
      • By holistically considering the different risks, the organization can make informed decisions on the best course of action that will reduce any negative impacts associated with the uncertainty and increase the overall value.

      Enterprise Risk Management (ERM)

      • IT
      • Security
      • Digital
      • Vendor/Third Party
      • Other

      Enterprise risk management is the practice of identifying and addressing risks to your organization and using risk information to drive better decisions and better opportunities.

      IT risk is enterprise risk

      Multiple types of risk, 'Finance', 'IT', 'People', and 'Digital', funneling into 'ENTERPRISE RISKS'. IT risks have a direct and often aggregated impact on enterprise risks and opportunities in the same way other business risks can. This relationship must be understood and addressed through integrated risk management to ensure a consistent approach to risk.

      Your challenge

      Embedding IT risks into the enterprise risk management program is challenging because:

      • Most organizations classify risks based on the departments or areas of the business where the uncertainty is likely to happen.
      • Unnecessary expectations are placed on the IT department to own risks over which they have no authority or oversight.
      • Risks are often only identified when conducting due diligence for a project or ensuring compliance with regulations and standards.

      Risk-mature organizations have a unique benefit in that they often have established an overarching governance framework and embedded risk awareness into the culture.

      35% — Only 35% of organizations had embraced ERM in 2020. (Source: AICPA and NC State Poole College of Management)

      12% — Only 12% of organizations are leveraging risk as a tool to their strategic advantage. (Source: AICPA and NC State Poole College of Management)

      Common obstacles

      These barriers make integrating IT risks difficult to address for many organizations:

      • IT risks are not seen as enterprise risks.
      • The organization’s culture toward risk is not defined.
      • The organization’s appetite and threshold for risk are not defined.
      • Each area of the organization has a different method of identifying, assessing, and responding to risk events.
      • Access to reliable and informative data to support risk management is difficult to obtain.
      • Leadership does not see the business value of integrating risk into a single management program.
      • The organization’s attitudes and behaviors toward risk contradict the desired and defined risk culture.
      • Skills, training, and resources to support risk management are lacking, let alone those to support integrated risk management.

      Integrating risks has its challenges

      62% — Accessing and disseminating information is the main challenge for 62% of organizations maturing their organizational risk management. (Source: OECD)

      20-28% — Organizations with access to machine learning and analytics to address future risk events have 20 to 28% more satisfaction. (Source: Accenture)

      Integrate Risk and Use It to Your Advantage

      Accelerate and optimize your organization by leveraging meaningful risk data to make intelligent enterprise risk decisions.

      Risk management is more than checking an audit box or demonstrating project due diligence.

      Risk Drivers
      • Audit & compliance
      • Preserve value & avoid loss
      • Previous risk impact driver
      • Major transformation
      • Strategic opportunities
      Arrow pointing right. Only 7% of organizations are in a “leading” or “aspirational” level of risk maturity. (OECD, 2021) 63% of organizations struggle when it comes to defining their appetite toward strategy related risks. (“Global Risk Management Survey,” Deloitte, 2021) Late adopters of risk management were 70% more likely to use instinct over data or facts to inform an efficient process. (Clear Risk, 2020) 55% of organizations have little to no training on ERM to properly implement such practices. (AICPA, NC State Poole College of Management, 2021)
      1. Assess Enterprise Risk Maturity 3. Build a Risk Management Program Plan 4. Establish Risk Management Processes 5. Implement a Risk Management Program
      2. Determine Authority with Governance
      Unfortunately, less than 50% of those in risk focused roles are also in a governance role where they have the authority to provide risk oversight. (Governance Institute of Australia, 2020)
      IT can improve the maturity of the organization’s risk governance and help identify risk owners who have authority and accountability.

      Governance and related decision making is optimized with integrated and aligned risk data.

      List of 'Integrated Risk Maturity Categories': '1. Context & Strategic Direction', '2. Risk Culture and Authority', '3. Risk Management Process', and '4. Risk Program Optimization'. The five types of a risk in Enterprise Risk Management.

      ERM incorporates the different types of risk, including IT, security, digital, vendor, and other risk types.

      The program plan is meant to consider all the major risk types in a unified approach.

      The 'Risk Process' cycle starting with '1. Identify', '2. Assess', '3. Respond', '4. Monitor', '5. Report', and back to the beginning. Implementation of an integrated risk management program requires ongoing access to risk data by those with decision making authority who can take action.

      Integrated Risk Mapping — Downside Risk Focus

      A diagram titled 'Risk and Controls' beginning with 'Possible Sources' and a list of sources, 'Control Activities' to prevent, the 'RISK EVENT', 'Recovery Activities' to recover, and 'Possible Repercussions' with a list of ramifications.

      Integrated Risk Mapping — Downside and Upside Risk

      Third-Party Risk Example

      Example of a third-party risk mapped onto the diagram on the previous slide, but with potential upsides mapped out as well. The central risk event is 'Vendor exposes private customer data'. Possible Sources of the downside are 'External Attack' with likelihood prevention method 'Define security standard requirements for vendor assessment' and 'Exfiltration of data through fourth-party staff' with likelihood prevention method 'Ensure data is properly classified'. Possible Sources of the upside are 'Application rationalization' with likelihood optimization method 'Reduce number of applications in environment' and 'Review vendor assessment practices' with likelihood optimization method 'Improve vendor onboarding'. Possible Repercussions on the downside are 'Organization unable to operate in jurisdiction' with impact minimization method 'Engage in-house risk mitigation responses' and 'Fines levied against organization' with impact minimization method 'Report incident to any regulators'. Possible Repercussions on the upside are 'Easier vendor integration and management' with impact utilization method 'Improved vendor onboarding practices' and 'Able to bid on contracts with these requirements' with impact utilization method 'Vendors must provide attestations (e.g. SOC or CMMC)'.

      Insight Summary

      Overarching insight

      Stop fearing risk – integrate it. Integration leads to opportunities for organizations to embrace innovation and new digital technologies as well as reducing operational costs and simplifying reporting.

      Govern risk strategically

      Governance of risk management for information- and technology-related events is often misplaced. Just because it's classified as an IT risk does not mean it shouldn’t be owned by the board or business executive.

      Assess risk maturity

      Integrating risk requires a baseline of risk maturity at the enterprise level. IT can push integrating risks, but only if the enterprise is willing to adopt the attitudes and behaviors that will drive the integrated risk approach.

      Manage risk

      It is not a strategic decision to have different areas of the organization manage the risks perceived to be in their department. It’s the easy choice, but not the strategic one.

      Implement risk management

      Different areas of an enterprise apply risk management processes differently. Determining a single method for identification, assessment, response, and monitoring can ensure successful implementation of enterprise risk management.

      Tactical insight

      Good risk management will consider both the positives and negatives associated with a risk management program by recognizing both the upside and downside of risk event impact and likelihood.

      Integrated risk benefits

      IT Benefits

      • IT executives have a responsibility but not accountability when it comes to risk. Ensure the right business stakeholders have awareness and ability to make informed risk decisions.
      • Controls and responses to risks that are within the “IT” realm will be funded and provided with sufficient support from the business.
      • The business respects and values the role of IT in supporting the enterprise risk program, elevating its role into business partner.

      Business Benefits

      • Business executives and boards can make informed responses to the various forms of risk, including those often categorized as “IT risks.”
      • The compounding severity of risks can be formally assessed and ideally quantified to provide insight into how risks’ ramifications can change based on scenarios.
      • Risk-informed decisions can be used to optimize the business and drive it toward adopting innovation as a response to risk events.
      • Get your organization insured against cybersecurity threats at the lowest premiums possible.

      Measure the value of integrating risk

      • Reduce Operating Costs

        • Organizations can reduce their risk operating costs by 20 to 30% by adopting enterprise-wide digital risk initiatives (McKinsey & Company).
      • Increase Cybersecurity Threat Preparedness

        • Increase the organization’s preparedness for cybersecurity threats. 79% of organizations that were impacted by email threats in 2020 were not prepared for the hit (Diligent)
      • Increase Risk Management’s Impact to Drive Strategic Value

        • Currently, only 3% of organizations are extensively using risk management to drive their unique competitive advantage, compared to 35% of companies who do not use it at all (AICPA & NC State Poole College of Management).
      • Reduce Lost Productivity for the Enterprise

        • Among small businesses, 76% are still not considering purchasing cyberinsurance in 2021, despite the fact that ransomware attacks alone cost Canadian businesses $5.1 billion in productivity in 2020 (Insurance Bureau of Canada, 2021).

      “31% of CIO’s expected their role to expand and include risk management responsibilities.” (IDG “2021 State of the CIO,” 2021)

      Make integrated risk management sustainable

      58%

      Focus not just on the preventive risk management but also the value-creating opportunities. With 58% of organizations concerned about disruptive technology, it’s an opportunity to take the concern and transform it into innovation. (Accenture)

      70%

      Invest in tools that have data and analytics features. Currently, “gut feelings” or “experience” inform the risk management decisions for 70% of late adopters. (Clear Risk)

      54%

      Align to the strategic vision of the board and CEO, given that these two roles account for 54% of the accountability associated with extended enterprise risk management. (Extended Enterprise Risk Management Survey, 2020,” Deloitte)

      63%

      Include IT leaders in the risk committee to help informed decision making. Currently 63% of chief technology officers are included in the C‑suite risk committee. (AICPA & NC State Poole College of Management)

      Successful adoption of integrated risk management is often associated with these key elements.

      Assessment

      Assess your organization’s method of addressing risk management to determine if integrated risk is possible

      Assessing the organization’s risk maturity

      Mature or not, integrated risk management should be a consideration for all organizations

      The first step to integrating risk management within the enterprise is to understand the organization’s readiness to adopt practices that will enable it to successfully integrate information.

      In 2021, we saw enterprise risk management assessments become one of the most common trends, particularly as a method by which the organization can consolidate the potential impacts of uncertainties or threats (Lawton, 2021). A major driver for this initiative was the recognition that information and technology not only have enterprise-wide impacts on the organization’s risk management but that IT has a critical role in supporting processes that enable effective access to data/information.

      A maturity assessment has several benefits for an organization: It ensures there is alignment throughout the organization on why integrated risk is the right approach to take, it recognizes the organization’s current risk maturity, and it supports the organization in defining where it would like to go.

      Pie chart titled 'Organizational Risk Management Maturity Assessment Results' showing just under half 'Progressing', a third 'Established', a seventh 'Emerging', and a very small portion 'Leading or Aspirational'.

      Integrated Risk Maturity Categories

      Semi-circle with colored points indicating four categories.

      1

      Context & Strategic Direction Understand the organization’s main objectives and how risk can support or enhance those objectives.

      2

      Risk Culture and Authority Examine if risk-based decisions are being made by those with the right level of authority and if the organization’s risk appetite is embedded in the culture.

      3

      Risk Management Process Determine if the current process to identify, assess, respond to, monitor, and report on risks is benefitting the organization.

      4

      Risk Program Optimization Consider opportunities where risk-related data is being gathered, reported, and used to make informed decisions across the enterprise.

      Maturity should inform your approach to risk management

      The outcome of the risk maturity assessment should inform how risk management is approached within the organization.

      A row of waves starting light and small and becoming taller and darker in steps. The levels are 'Non-existent', 'Basic', 'Partially Integrated', 'Mostly Integrated', 'Fully Integrated', and 'Optimized'.

      For organizations with a low maturity, remaining superficial with risk will offer more benefits and align to the enterprise’s risk tolerance and appetite. This might mean no integrated risk is taking place.

      However, organizations that have higher risk maturity should begin to integrate risk information. These organizations can identify the nuances that would affect the severity and impact of risk events.

      Integrated Risk Maturity Assessment

      The purpose of the Integrated Risk Maturity Assessment is to assess the organization's current maturity and readiness for integrated risk management (IRM).

      Frequently and continually assessing your organization’s maturity toward integrated risk ensures the right risk management program can be adopted by your organization.

      Integrated Risk Maturity Assessment

      A simple tool to understand if your organization is ready to embrace integrated risk management by measuring maturity across four key categories: Context & Strategic Direction, Risk Culture & Authority, Risk Management Process, and Risk Program Optimization

      Sample of the Integrated Risk Maturity Assessment deliverable.

      Use the results from this integrated risk maturity assessment to determine the type of risk management program that can and should be adopted by your organization.

      Some organizations will need to remain siloed and focused on IT risk management only, while others will be able to integrate risk-related information to start enabling automatic controls that respond to this data.

      Build a Data Architecture Roadmap

      • Buy Link or Shortcode: {j2store}124|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $8,846 Average $ Saved
      • member rating average days saved: 23 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Data architecture involves many moving pieces requiring coordination to provide greatest value from data.
      • Data architects are at the center of this turmoil and must be able to translate high-level business requirements into specific instructions for data workers using complex data models.
      • Data architects must account for the constantly growing data and application complexity, more demanding needs from the business, an ever-increasing number of data sources, and a growing need to integrate components to ensure that performance isn’t compromised.

      Our Advice

      Critical Insight

      • Data architecture needs to evolve with the changing business landscape. There are four common business drivers that put most pressure on archaic architectures. As a result, the organization’s architecture must be flexible and responsive to changing business needs.
      • Data architecture is not just about models. Viewing data architecture as just technical data modeling can lead to structurally unsound data that does not serve the business.
      • Data is used differently across the layers of an organization’s data architecture, and the capabilities needed to optimize use of data change with it. Architecting and managing data from source to warehousing to presentation requires different tactics for optimal use.

      Impact and Result

      • Have a framework in place to identify the appropriate solution for the challenge at hand. Our three-phase practical approach will help you build a custom and modernized data architecture.
        • Identify and prioritize the business drivers in which data architecture changes would create the largest overall benefit, and determine the corresponding data architecture tiers that need to be addressed.
        • Discover the best-practice trends, measure your current state, and define the targets for your data architecture tactics.
        • Build a cohesive and personalized roadmap for restructuring your data architecture. Manage your decisions and resulting changes.

      Build a Data Architecture Roadmap Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why your organization should optimize its data architecture as it evolves with the drivers of the business to get the most from its data.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prioritize your data architecture with business-driven tactics

      Identify the business drivers that necessitate data architecture improvements, then create a tactical plan for optimization.

      • Build a Business-Aligned Data Architecture Optimization Strategy – Phase 1: Prioritize Your Data Architecture With Business-Driven Tactics
      • Data Architecture Driver Pattern Identification Tool
      • Data Architecture Optimization Template

      2. Personalize your tactics to optimize your data architecture

      Analyze how you stack up to Info-Tech’s data architecture capability model to uncover your tactical plan, and discover groundbreaking data architecture trends and how you can fit them into your action plan.

      • Build a Business-Aligned Data Architecture Optimization Strategy – Phase 2: Personalize Your Tactics to Optimize Your Data Architecture
      • Data Architecture Tactical Roadmap Tool
      • Data Architecture Trends Presentation

      3. Create your tactical data architecture roadmap

      Optimize your data architecture by following tactical initiatives and managing the resulting change brought on by those optimization activities.

      • Build a Business-Aligned Data Architecture Optimization Strategy – Phase 3: Create Your Tactical Data Architecture Roadmap
      • Data Architecture Decision Template
      [infographic]

      Workshop: Build a Data Architecture Roadmap

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify the Drivers of the Business for Optimizing Data Architecture

      The Purpose

      Explain approach and value proposition.

      Review the common business drivers and how the organization is driving a need to optimize data architecture.

      Understand Info-Tech’s five-tier data architecture model.

      Determine the pattern of tactics that apply to the organization for optimization.

      Key Benefits Achieved

      Understanding of the current data architecture landscape.

      Priorities for tactical initiatives in the data architecture practice are identified.

      Target state for the data quality practice is defined.

      Activities

      1.1 Explain approach and value proposition.

      1.2 Review the common business drivers and how the organization is driving a need to optimize data architecture.

      1.3 Understand Info-Tech’s five-tier data architecture model.

      1.4 Determine the pattern of tactics that apply to the organization for optimization.

      Outputs

      Five-tier logical data architecture model

      Data architecture tactic plan

      2 Determine Your Tactics For Optimizing Data Architecture

      The Purpose

      Define improvement initiatives.

      Define a data architecture improvement strategy and roadmap.

      Key Benefits Achieved

      Gaps, inefficiencies, and opportunities in the data architecture practice are identified.

      Activities

      2.1 Create business unit prioritization roadmap.

      2.2 Develop subject area project scope.

      2.3 Subject area 1: data lineage analysis, root cause analysis, impact assessment, business analysis

      Outputs

      Business unit prioritization roadmap

      Subject area scope

      Data lineage diagram

      3 Create a Strategy for Data Quality Project 2

      The Purpose

      Define improvement initiatives.

      Define a data quality improvement strategy and roadmap.

      Key Benefits Achieved

      Improvement initiatives are defined.

      Improvement initiatives are evaluated and prioritized to develop an improvement strategy.

      A roadmap is defined to depict when and how to tackle the improvement initiatives.

      Activities

      3.1 Create business unit prioritization roadmap.

      3.2 Develop subject area project scope.

      3.3 Subject area 1: data lineage analysis, root cause analysis, impact assessment, business analysis.

      Outputs

      Business unit prioritization roadmap

      Subject area scope

      Data lineage diagram

      Further reading

      Build a Data Architecture Roadmap

      Optimizing data architecture requires a plan, not just a data model.

      ANALYST PERSPECTIVE

      Integral to an insight-driven enterprise is a modern and business-driven data environment.

      “As business and data landscapes change, an organization’s data architecture needs to be able to keep pace with these changes. It needs to be responsive so as to not only ensure the organization continues to operate efficiently but that it supports the overall strategic direction of the organization.

      In the dynamic marketplace of today, organizations are constantly juggling disruptive forces and are finding the need to be more proactive rather than reactive. As such, organizations are finding their data to be a source of competitive advantage where the data architecture has to be able to not only support the increasing amount, sources, and rate at which organizations are capturing and collecting data but also be able to meet and deliver on changing business needs.

      Data architecture optimization should, therefore, aid in breaking down data silos and creating a more shared and all-encompassing data environment for better empowering the business.” (Crystal Singh, Director, Research, Data and Information Practice, Info-Tech Research Group)

      Our understanding of the problem

      This Research Is Designed For:
      • Data architects or their equivalent, looking to optimize and improve the efficiency of the capture, movement and storage of data for a variety of business drivers.
      • Enterprise architects looking to improve the backbone of the holistic approach of their organization’s structure.
      This Research Will Help You:
      • Identify the business drivers that are impacted and improved by best-practice data architecture.
      • Optimize your data architecture using tactical practices to address the pressing issues of the business to drive modernization.
      • Align the organization’s data architecture with the grander enterprise architecture.
      This Research Will Also Assist:
      • CIOs concerned with costs, benefits, and the overall structure of their organizations data flow.
      • Database administrators tasked with overseeing crucial elements of the data architecture.
      This Research Will Help Them:
      • Get a handle on the current situation of data within the organization.
      • Understand how data architecture affects the operations of the data sources within the enterprise.

      Executive summary

      Situation

      • The data architecture of a modern organization involves many moving pieces requiring coordination to provide greatest value from data.
      • Data architects are at the center of this turmoil and must be able to translate high-level business requirements into specific instructions for data workers using complex data models.

      Complication

      • Data architects must account for the constantly growing data and application complexity, and more demanding needs from the business.
      • There is an ever-increasing number of data sources and a growing need to integrate components to ensure that performance isn’t compromised.
      • There isn’t always a clearly defined data architect role, yet the responsibilities must be filled to get maximum value from data.

      Resolution

      • To deal with these challenges, a data architect must have a framework in place to identify the appropriate solution for the challenge at hand.
        • Identify and prioritize the business drivers in which data architecture changes would create the largest overall benefit, and determine the corresponding data architecture tiers that need to be addressed to customize your solution.
        • Discover the best practice trends, measure your current state, and define the targets for your data architecture tactics.
        • Build a cohesive and personalized roadmap for restructuring your data architecture. Manage your decisions and resulting changes.

      Info-Tech Insight

      1. Data architecture is not just about models. Viewing data architecture as just technical data modeling can lead to a data environment that does not aptly serve or support the business. Identify the priorities of your business and adapt your data architecture to those needs.
      2. Changes to data architecture are typically driven by four common business driver patterns. Use these as a shortcut to understand how to evolve your data architecture.
      3. Data is used differently across the layers of an organization’s data architecture; therefore, the capabilities needed to optimize the use of data change with it. Architecting and managing data from source to warehousing to presentation requires different tactics for optimal use.

      Your data is the foundation of your organization’s knowledge and ability to make decisions

      Data should be at the foundation of your organization’s evolution.

      The transformational insights that executives are constantly seeking to leverage can be uncovered with a data practice that makes high quality, trustworthy information readily available to the business users who need it.

      50% Organizations that embrace data are 50% more likely to launch products and services ahead of their competitors. (Nesta, 2016)

      Whether hoping to gain a better understanding of your business or trying to become an innovator in your industry, any organization can get value from its data regardless of where you are in your journey to becoming a data-driven enterprise:

      Business Monitoring
      • Data reporting
      • Uncover inefficiencies
      • Monitor progress
      • Track inventory levels
      Business Insights
      • Data analytics
      • Expose patterns
      • Predict future trends
      Business Optimization
      • Data-based apps
      • Build apps to automate actions based on insights
      Business Transformation
      • Monetary value of data
      • Create new revenue streams
      (Journey to Data Driven Enterprise, 2015)

      As organizations seek to become more data driven, it is imperative to better manage data for its effective use

      Here comes the zettabyte era.

      A zettabyte is a billion terabytes. Organizations today need to measure their data size in zettabytes, a challenge that is only compounded by the speed at which the data is expected to move.

      Arriving at the understanding that data can be the driving force of your organization is just the first step. The reality is that the true hurdles to overcome are in facing the challenges of today’s data landscape.

      Challenges of The Modern Data Landscape
      Data at rest Data movement
      Greater amounts Different types Uncertain quality Faster rates Higher complexity

      “The data environment is very chaotic nowadays. Legacy applications, data sprawl – organizations are grappling with what their data landscape looks like. Where are our data assets that we need to use?” (Andrew Johnston, Independent Consultant)

      Solution

      Well-defined and structured data management practices are the best way to mitigate the limitations that derive from these challenges and leverage the most possible value from your data.

      Refer to Info-Tech’s capstone Create a Plan For Establishing a Business-Aligned Data Management Practice blueprint to understand data quality in the context of data disciplines and methods for improving your data management capabilities.

      Data architecture is an integral aspect of data management

      Data Architecture

      The set of rules, policies, standards, and models that govern and define the type of data collected and how it is used, stored, managed, and integrated within the organization and its database systems.

      In general, the primary objective of data architecture is the standardization of data for the benefit of the organization.

      54% of leading “analytics-driven” enterprises site data architecture as a required skill for data analytics initiatives. (Maynard 2015)

      MYTH

      Data architecture is purely a model of the technical requirements of your data systems.

      REALITY

      Data architecture is largely dependent on a human element. It can be viewed as “the bridge between defining strategy and its implementation”. (Erwin 2016)

      Functions

      A strong data architecture should:

      • Define, visualize, and communicate data strategy to various stakeholders.
      • Craft a data delivery environment.
      • Ensure high data quality.
      • Provide a roadmap for continuous improvement.

      Business value

      A strong data architecture will help you:

      • Align data processes with business strategy and the overall holistic enterprise architecture.
      • Enable efficient flow of data with a stronger focus on quality and accessibility.
      • Reduce the total cost of data ownership.

      Data architects must maintain a comprehensive view of the organization’s rapidly proliferating data

      The data architect:
      • Acts as a “translator” between the business and data workers to communicate data and technology requirements.
      • Facilitates the creation of the data strategy.
      • Manages the enterprise data model.
      • Has a greater knowledge of operational and analytical data use cases.
      • Recommends data management policies and standards, and maintains data management artifacts.
      • Reviews project solution architectures and identifies cross impacts across the data lifecycle.
      • Is a hands-on expert in data management and warehousing technologies.
      • Is not necessarily it’s own designated position, but a role that can be completed by a variety of IT professionals.

      Data architects bridge the gap between strategic and technical requirements:

      Visualization centering the 'Data Architect' as the bridge between 'Data Workers', 'Business', and 'Data & Applications'.

      “Fundamentally, the role of a data architect is to understand the data in an organization at a reasonable level of abstraction.” (Andrew Johnston, Independent Consultant)

      Many are experiencing the pains of poor data architecture, but leading organizations are proactively tackling these issues

      Outdated and archaic systems and processes limit the ability to access data in a timely and efficient manner, ultimately diminishing the value your data should bring.

      59%

      of firms believe their legacy storage systems require too much processing to meet today’s business needs. (Attivio, Survey Big Data decision Makers, 2016)

      48%

      of companies experience pains from being reliant on “manual methods and trial and error when preparing data.” (Attivio, Survey Big Data decision Makers, 2016)

      44%
      +
      22%

      44% of firms said preparing data was their top hurdle for analytics, with 22% citing problems in accessing data. (Data Virtualization blog, Data Movement Killed the BI Star, 2016)

      Intuitive organizations who have recognized these shortcomings have already begun the transition to modernized and optimized systems and processes.

      28%

      of survey respondents say they plan to replace “data management and architecture because it cannot handle the requirements of big data.” (Informatica, Digital Transformation: Is Your Data Management Ready, 2016)

      50%

      Of enterprises plan to replace their data warehouse systems and analytical tools in the next few years. (TDWI, End of the Data Warehouse as we know it, 2017)

      Leading organizations are attacking data architecture problems … you will be left behind if you do not start now!

      Once on your path to redesigning your data architecture, neglecting the strategic elements may leave you ineffective

      Focusing on only data models without the required data architecture guidance can cause harmful symptoms in your IT department, which will lead to organization-wide problems.

      IT Symptoms Due to Ineffective Data Architecture

      Poor Data Quality

      • Inconsistent, duplicate, missing, incomplete, incorrect, unstandardized, out of date, and mistake-riddled data can plague your systems.

      Poor Accessibility

      • Delays in accessing data.
      • Limits on who can access data.
      • Limited access to data remotely.

      Strategic Disconnect

      • Disconnect between owner and consumer of data.
      • Solutions address narrow scope problems.
      • System barriers between departments.
      Leads to Poor Organizational Conditions

      Inaccurate Insights

      • Inconsistent and/or erroneous operational and management reports.
      • Ineffective cross-departmental use of analytics.

      Ineffective Decision Making

      • Slow flow of information to executive decision makers.
      • Inconsistent interpretation of data or reports.

      Inefficient Operations

      • Limits to automated functionality.
      • Increased divisions within organization.
      • Regulatory compliance violations.
      You need a solution that will prevent the pains.

      Follow Info-Tech’s methodology to optimize data architecture to meet the business needs

      The following is a summary of Info-Tech’s methodology:

      1

      1. Prioritize your core business objectives and identify your business driver.
      2. Learn how business drivers apply to specific tiers of Info-Tech’s five-tier data architecture model.
      3. Determine the appropriate tactical pattern that addresses your most important requirements.
      Visualization of the process described on the left: Business drivers applying to Info-Tech's five-tier data architecture, then determining tactical patterns, and eventually setting targets of your desired optimized state.

      2

      1. Select the areas of the five-tier architecture to focus on.
      2. Measure current state.
      3. Set the targets of your desired optimized state.

      3

      1. Roadmap your tactics.
      2. Manage and communicate change.
      A roadmap leading to communication.

      Info-Tech will get you to your optimized state faster by focusing on the important business issues

      First Things First

      1. Info-Tech’s methodology helps you to prioritize and establish the core strategic objectives behind your goal of modernizing data architecture. This will narrow your focus to the appropriate areas of your current data systems and processes that require the most attention.

      Info-Tech has identified these four common drivers that lead to the need to optimize your data architecture.

      • Becoming More Data Driven
      • Regulations and Compliance
      • Mergers and Acquisitions
      • New Functionality or Business Rule

      These different core objectives underline the motivation to optimize data architecture, and will determine your overall approach.

      Use the five-tier architecture to provide a consumable view of your data architecture

      Every organization’s data system requires a unique design and an assortment of applications and storage units to fit their business needs. Therefore, it is difficult to paint a picture of an ideal model that has universal applications. However, when data architecture is broken down in terms of layers or tiers, there exists a general structure that is seen in all data systems.

      Info-Tech's Five Tier Data Architecture. The five tiers being 'Sources' which includes 'Apps', 'Excel and other documents', and 'Access database(s)'; 'Integration and Translation' the 'Movement and transformation of data'; 'Warehousing' which includes 'Data Lakes & Warehouse(s) (Raw Data)'; 'Analytics' which includes 'Data Marts', 'Data Cube', 'Flat Files', and 'BI Tools'; and 'Presentation' which includes 'Reports' and 'Dashboards'.

      Thinking of your data systems and processes in this framework will allow you to see how different elements of the architecture relate to specific business operations.

      1. This blueprint will demonstrate how the business driver behind your redesign requires you to address specific layers of the five-tier data architecture.
      1. Once you’ve aligned your business driver to the appropriate data tiers, this blueprint will provide you with the best practice tactics you should apply to achieve an optimized data architecture.

      Use the five-tier architecture to prioritize tactics to improve your data architecture in line with your pattern

      Info-Tech’s Data Architecture Capability Model
      Info-Tech’s Data Architecture Capability Model featuring the five-tier architecture listing 'Core Capabilities' and 'Advanced Capabilities' within each tier, and a list of 'Cross Capabilities' which apply to all tiers.
      1. Based on your business driver, the relevant data tiers, and your organization’s own specific requirements you will need to establish the appropriate data architecture capabilities.
      2. This blueprint will help you measure how you are currently performing in these capabilities…
      3. And help you define and set targets so you can reach your optimized state.
      1. Once completed, these steps will be provided with the information you will need to create a comprehensive roadmap.
      2. Lastly, this blueprint will provide you with the tools to communicate this plan across your organization and offer change management guidelines to ensure successful adoption.
      Info-Tech Insight

      Optimizing data architecture requires a tactical approach, not a passive approach.

      The demanding task of optimization requires the ability to heavily prioritize. After you have identified why, determine how using our pre-built roadmap to address the four common drivers.

      Do not forget: data architecture is not a standalone concept; it fits into the more holistic design of enterprise architecture

      Data Architecture in Alignment

      Data architecture can not be designed to simply address the focus of data specialists or even the IT department.

      It must act as a key component in the all encompassing enterprise architecture and reflect the strategy and design of the entire business.

      Data architecture collaborates with application architecture in the delivery of effective information systems, and informs technology architecture on data related infrastructure requirements/considerations

      Please refer to the following blueprints to see the full picture of enterprise architecture:

      A diagram titled 'Enterprise Architecture' with multiple forms of architecture interacting with each other. At the top is 'Business Architecture' which feeds into 'Data Architecture' and 'Application Architecture' which feed into each other, and influence 'Infrastructure Architecture' and 'Security Architecture'.
      Adapted from TOGAF
      Refer to Phase C of TOGAF and Bizbok for references to the components of business architecture that are used in data architecture.

      Info-Tech’s data architecture optimization methodology helped a monetary authority fulfill strict regulatory pressures

      CASE STUDY

      Industry: Financial
      Source: Info-Tech Consulting
      Symbol for 'Monetary Authority Case Study'. Look for this symbol as you walk through the blueprint for details on how Info-Tech Consulting assisted this monetary authority.

      Situation: Strong external pressures required the monetary authority to update and optimize its data architecture.

      The monetary authority is responsible for oversight of the financial situation of a country that takes in revenue from foreign incorporation. Due to increased pressure from international regulatory bodies, the monetary authority became responsible for generating multiple different types of beneficial ownership reports based on corporation ownership data within 24 hours of a request.

      A stale and inefficient data architecture prevented the monetary authority from fulfilling external pressures.

      Normally, the process to generate and provide beneficial ownership reports took a week or more. This was due to multiple points of stale data architecture, including a dependence on outdated legacy systems and a broken process for gathering the required data from a mix of paper and electronic sources.

      Provide a structured approach to solving the problem

      Info-Tech helped the monetary authority identify the business need that resulted from regulatory pressures, the challenges that needed to be overcome, and actionable tactics for addressing the needs.

      Info-Tech’s methodology was followed to optimize the areas of data architecture that address the business driver.

      • External Requirements
      • Business Driver
          Diagnose Data Architecture Problems
        • Outdated architecture (paper, legacy systems)
        • Stale data from other agencies
        • Incomplete data
            Data Architecture Optimization Tactics
          1. Optimized Source Databases
          2. Improved Integration
          3. Data Warehouse Optimization
          4. Data Marts for Reports
          5. Report Delivery Efficiency

      As you walk through this blueprint, watch for additional case studies that walk through the details of how Info-Tech helped this monetary authority.

      This blueprint’s three-step process will help you optimize data architecture in your organization

      Phase 1
      Prioritize Your Data Architecture With Business-Driven Tactics
      Phase 2
      Personalize Your Tactics to Optimize Your Data Architecture
      Phase 3
      Create Your Tactical Data Architecture Roadmap
      Step 1: Identify Your Business Driver for Optimizing Data Architecture
      • Learn about what data architecture is and how it must evolve with the drivers of the business.
      • Determine the business driver that your organization is currently experiencing.
      • Data Architecture Driver Pattern Identification Tool

      Step 2: Determine Actionable Tactics to Optimize Data Architecture
      • Create your data architecture optimization plan to determine the high-level tactics you need to follow.
      • Data Architecture Optimization Template

      Step 1: Measure Your Data Architecture Capabilities
      • Determine where you currently stand in the data architecture capabilities across the five-tier data architecture.
      • Data Architecture Tactical Roadmap Tool

      Step 2: Set a Target for Data Architecture Capabilities
      • Identify your targets for the data architecture capabilities.
      • Data Architecture Tactical Roadmap Tool

      Step 3: Identify the Tactics that Apply to Your Organization
      • Understand the trends in the field of data architecture and how they can help to optimize your environment.
      • Data Architecture Trends Presentation

      Step 1: Personalize Your Data Architecture Roadmap
      • Personalize the tactics across the tiers that apply to you to build your personalized roadmap.
      • Data Architecture Tactical Roadmap Tool

      Step 2: Manage Your Data Architecture Decisions and the Resulting Changes
      • Document the changes in the organization’s data architecture.
      • Data architecture involves change management – learn how data architects should support change management in the organization.
      • Data Architecture Decision Template

      Use these icons to help direct you as you navigate this research

      Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

      A small monochrome icon of a wrench and screwdriver creating an X.

      This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

      A small monochrome icon depicting a person in front of a blank slide.

      This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Build a Business-Aligned Data Architecture Optimization Strategy – project overview

      PHASE 1
      Prioritize Your Data Architecture With Business-Driven Tactics
      PHASE 2
      Personalize Your Tactics to Optimize Your Data Architecture
      PHASE 3
      Create Your Tactical Data Architecture Roadmap
      Supporting Tool icon

      Best-Practice Toolkit

      1.1 Identify Your Business Driver for Optimizing Data Architecture

      1.2 Determine Actionable Tactics to Optimize Data Architecture

      2.1 Measure Your Data Architecture Capabilities

      2.2 Set a Target for Data Architecture Capabilities

      2.3 Identify the Tactics that Apply to Your Organization

      3.1 Personalize Your Data Architecture Roadmap

      3.2 Manage Your Data Architecture Decisions and the Resulting Changes

      Guided Implementations

      • Understand what data architecture is, how it aligns with enterprise architecture, and how data architects support the needs of the business.
      • Identify the business drivers that necessitate the optimization of the organization’s data architecture.
      • Create a tactical plan to optimize data architecture across Info-Tech’s five-tier logical data architecture model.
      • Understand Info-Tech’s tactical data architecture capability model and measure the current state of these capabilities at the organization.
      • Determine the target state of data architecture capabilities.
      • Understand the trends in the field of data architecture and identify how they can fit into your environment.
      • Use the results of the data architecture capability gap assessment to determine the priority of activities to populate your personalized data architecture optimization roadmap.
      • Understand how to manage change as a data architect or equivalent.
      Associated Activity icon

      Onsite Workshop

      Module 1:
      Identify the Drivers of the Business for Optimizing Data Architecture
      Module 2:
      Create a Tactical Plan for Optimizing Data Architecture
      Module 3:
      Create a Personalized Roadmap for Data Architecture Activities

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Preparation

      Workshop Day 1

      Workshop Day 2

      Workshop Day 3

      Workshop Day 4

      Workshop Day 5

      Organize and Plan Workshop Identify the Drivers of the Business for Optimizing Data Architecture Determine the Tactics For Optimizing Data Architecture Create Your Roadmap of Optimization Activities Create Your Personalized Roadmap Create a Plan for Change Management

      Morning Activities

      • Finalize workshop itinerary and scope.
      • Identify workshop participants.
      • Gather strategic documentation.
      • Engage necessary stakeholders.
      • Book interviews.
      • 1.1 Explain approach and value proposition.
      • 1.2 Review the common business drivers and how the organization is driving a need to optimize data architecture.
      • 2.1 Create your data architecture optimization plan.
      • 2.2 Interview key business stakeholders for input on business drivers for data architecture.
      • 3.1 Align with the enterprise architecture by interviewing the enterprise architect for input on the data architecture optimization roadmap.
      • 4.1 As a group, determine the roadmap activities that are applicable to your organization and brainstorm applicable initiatives.
      • 5.1 Use the Data Architecture Decision Documentation Template to document key decisions and updates.

      Afternoon Activities

      • 1.3 Understand Info-Tech’s Five-Tier Data Architecture.
      • 1.4 Determine the pattern of tactics that apply to the organization for optimization.
      • 2.3 With input from the business and enterprise architect, determine the current data architecture capabilities.
      • 3.3 With input from the business and enterprise architect, determine the target data architecture capabilities.
      • 4.2 Determine the timing and effort of the roadmap activities.
      • 5.2 Review best practices for change management.
      • 5.3 Present roadmap and findings to the business stakeholders and enterprise architect.

      Deliverables

      • Workshop Itinerary
      • Workshop Participant List
      1. Five-Tier Logical Data Architecture Model
      2. Data Architecture Tactic Plan
      1. Five-Tier Data Architecture Capability Model
      1. Data Architecture Tactical Roadmap
      1. Data Architecture Tactical Roadmap
      1. Data Architecture Decision Template

      Build a Business-Aligned Data Architecture Optimization Strategy

      PHASE 1

      Prioritize Your Data Architecture With Business-Driven Tactics

      Phase 1 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Prioritize Your Data Architecture With Business-Driven Tactics

      Proposed Time to Completion: 2 weeks
      Step 1.1: Identify Your Business Driver for Optimizing Data Architecture Step 1.2: Determine Actionable Tactics to Optimize Data Architecture
      Start with an analyst kick-off call:
      • Understand what data architecture is, what it is not, and how it fits into the broader enterprise architecture program.
      • Determine the drivers that fuel the need for data architecture optimization.
      Review findings with analyst:
      • Understand the Five-Tier Data Architecture Model and how the drivers of the business inform your priorities across this logical model of data architecture.
      Then complete these activities…
      • Complete the Data Architecture Driver Pattern Identification Tool.
      Then complete these activities…
      • Create a tactical data architecture optimization plan based on the business driver input.
      With these tools & templates:
      • Data Architecture Driver Pattern Identification Tool
      With these tools & templates:
      • Data Architecture Optimization Template

      Phase 1 Results & Insights

      • Data Architecture is not just about data models. The approach that Phase 1 guides you through will help to not only plan where you need to focus your efforts as a data architect (or equivalent) but also give you guidance in how you should go about optimizing the holistic data architecture environment based on the drivers of the business.

      Phase 1 will help you create a strategy to optimize your data architecture using actionable tactics

      In this phase, you will determine your focus for optimizing your data architecture based on the business drivers that are commonly felt by most organizations.

      1. Identify the business drivers that necessitate data architecture optimization efforts.
      2. Understand Info-Tech’s Five-Tier Data Architecture, a logical architecture model that will help you prioritize tactics for optimizing your data architecture environment.
      3. Identify tactics for optimizing the organization’s data architecture across the five tiers.

      “To stay competitive, we need to become more data-driven. Compliance pressures are becoming more demanding. We need to add a new functionality.”

      Info-Tech’s Five-Tier Data Architecture:

      1. Data Sources
      2. Data Integration and Translation
      3. Data Warehousing
      4. Data Analytics
      5. Data Presentation

      Tactical plan for Data Architecture Optimization

      Phase 1, Step 1: Identify Your Business Driver for Optimizing Data Architecture

      PHASE 1

      1.1 1.2
      Identify Your Business Driver for Optimizing Data Architecture Determine Actionable Tactics to Optimize Data Architecture

      This step will walk you through the following activities:

      • Understand how data architecture fits into the organization’s larger enterprise architecture.
      • Understand what data architecture is and how it should be driven by the business.
      • Identify the driver that is creating a need for data architecture optimization.

      This step involves the following participants:

      • Data Architect
      • Enterprise Architect

      Outcomes of this step

      • A starting point for the many responsibilities of the data architect role. Balancing business and technical requirements can be challenging, and to do so you need to first understand what is driving the need for data architecture improvements.
      • Holistic understanding of the organization’s architecture environment, including enterprise, application, data, and technology architectures and how they interact.

      Data architecture involves planning, communication, and understanding of technology

      Data Architecture

      A description of the structure and interaction of the enterprise’s major types and sources of data, logical data assets, physical data assets, and data management resources (TOGAF 9).

      The subject area of data management that defines the data needs of the enterprise and designs the master blueprints to meet those needs (DAMA DMBOK, 2009).

      IBM (2007) defines data architecture as the design of systems and applications that facilitate data availability and distribution across the enterprise.

      Definitions vary slightly across major architecture and management frameworks.

      However, there is a general consensus that data architecture provides organizations with:

      • Alignment
      • Planning
      • Road mapping
      • Change management
      • A guide for the organization’s data management program

      Data architecture must be based on business goals and objectives; developed within the technical strategies, constraints, and opportunities of the organization in support of providing a foundation for data management.

      Current Data Management
      • Alignment
      • Planning
      • Road mapping
      Goal for Data Management

      Info-Tech Insight

      Data Architecture is not just data models. Data architects must understand the needs of the business, as well as the existing people and processes that already exist in the organization to effectively perform their job.

      Review how data architecture fits into the broader architectural context

      A flow diagram starting with 'Business Processes/Activities' to 'Business Architecture' which through a process of 'Integration' flows to 'Data Architecture' and 'Application Architecture', the latter of which also flows into to the former, and they both flow into 'Technology Architecture' which includes 'Infrastructure' and 'Security'.

      Each layer of architecture informs the next. In other words, each layer has components that execute processes and offer services to the next layer. For example, data architecture can be broken down into more granular activities and processes that inform how the organization’s technology architecture should be arranged.

      Data does not exist on its own. It is informed by business architecture and used by other architectural domains to deliver systems, IT services, and to support business processes. As you build your practice, you must consider how data fits within the broader architectural framework.

      The Zachman Framework is a widely used EA framework; within it, data is identified as the first domain.

      The framework aims to standardize artifacts (work-products) within each architectural domain, provides a cohesive view of the scope of EA and clearly delineates data components. Use the framework to ensure that your target DA practice is aligned to other domains within the EA framework.

      'The Zachman Framework for Enterprise Architecture: The Enterprise Ontology', a complicated framework with top and bottom column headers and left and right row headers. Along the top are 'Classification Names': 'What', 'How', 'Where', 'Who', 'When', and 'Why'. Along the bottom are 'Enterprise Names': 'Inventory Sets', 'Process Flows', 'Distribution Networks', 'Responsibility Assignments', 'Timing Cycles', and 'Motivation Intentions'. Along the left are 'Audience Perspectives': 'Executive Perspective', 'Business Mgmt. Perspective', 'Architect Perspective', 'Engineer Perspective', 'Technician Perspective', and 'Enterprise Perspective'. Along the right are 'Model Names': 'Scope Contexts', 'Business Concepts', 'System Logic', 'Technology Physics', 'Tool Components', and 'Operations Instances'.
      (Source: Zachman International)

      Data architects operate in alignment with the other various architecture groups

      Data architects operate in alignment with the other various architecture groups, with coordination from the enterprise architect.

      Enterprise Architect
      The enterprise architect provides thought leadership and direction to domain architects.

      They also maintain architectural standards across all the architectural domains and serve as a lead project solution architect on the most critical assignments.

      • Business Architect
        A business subject matter expert who works with the line-of-business team to assist in business planning through capability-based planning.
      • Security Architect
        Plays a pivotal role in formulating the security strategy of the organization, working with the business and CISO/security manager. Recommends and maintains security standards, policies, and best practices.
      • Infrastructure Architect
        Recommends and maintains standards across the compute, storage, and network layers of the organization. Reviews project solution architectures to ensure compliance with infrastructure standards, regulations, and target state blueprints.
      • Application Architect
        Manages the business effectiveness, satisfaction, and maintainability of the application portfolio. Conduct application architecture assessments to document expected quality attribute standards, identify hotspots, and recommend best practices.
      • Data Architect
        Facilitates the creation of data strategy and has a greater understanding of operational and analytical data use cases. Manages the enterprise data model which includes all the three layers of modelling - conceptual, logical, and physical. Recommends data management policies and standards, and maintains data management artefacts. Reviews project solution architectures and identifies cross impacts across the data lifecycle.

      As a data architect, you must maintain balance between the technical and the business requirements

      The data architect role is integral to connecting the long-term goals of the business with how the organization plans to manage its data for optimal use.

      Data architects need to have a deep experience in data management, data warehousing, and analytics technologies. At a high level, the data architect plans and implements an organization’s data, reporting, and analytics roadmap.

      Some of the role’s primary duties and responsibilities include:

      1. Data modeling
      2. Reviewing existing data architecture
      3. Benchmark and improve database performance
      4. Fine tune database and SQL queries
      5. Lead on ETL activities
      6. Validate data integrity across all platforms
      7. Manage underlying framework for data presentation layer
      8. Ensure compliance with proper reporting to bureaus and partners
      9. Advise management on data solutions

      Data architects bridge the gap between strategic and technical requirements:

      Visualization centering the 'Data Architect' as the bridge between 'Data Workers', 'Business', and 'Data & Applications'.

      “Fundamentally, the role of a data architect is to understand the data in an organization at a reasonable level of abstraction.” (Andrew Johnston, Independent Consultant)

      Info-Tech Insight

      The data architect role is not always clear cut. Many organizations do not have a dedicated data architect resource, and may not need one. However, the duties and responsibilities of the data architect must be carried out to some degree by a combination of resources as appropriate to the organization’s size and environment.

      Understand the role of a data architect to ensure that essential responsibilities are covered in the organization

      A database administrator (DBA) is not a data architect, and data architecture is not something you buy from an enterprise application vendor.

      Data Architect Role Description

      • The data architect must develop (along with the business) a short-term and long-term vision for the enterprise’s data architecture.
      • They must be able to create processes for governing the identification, collection, and use of accurate and valid metadata, as well as for tracking data quality, completeness, and redundancy.
      • They need to create strategies for data security, backup, disaster recovery, business continuity, and archiving, and ensure regulatory compliance.

      Skills Necessary

      • Hands-on experience with data architecting and management, data mining, and large-scale data modeling.
      • Strong understanding of relational and non-relational data structures, theories, principles, and practices.
      • Strong familiarity with metadata management.
      • Knowledge of data privacy practices and laws.

      Define Policies, Processes, and Priorities

      • Policies
        • Boundaries of the data architecture.
        • Data architecture standards.
        • Data architecture security.
        • Responsibility of ownership for the data architecture and data repositories.
        • Responsibility for data architecture governance.
      • Processes
        • Data architecture communication.
        • Data architecture change management.
        • Data architecture governance.
        • Policy compliance monitoring.
      • Priorities
        • Align architecture efforts with business priorities.
        • Close technology gaps to meet service level agreements (SLAs).
        • Determine impacts on current or future projects.

      See Info-Tech’s Data Architect job description for a comprehensive description of the data architect role.

      Leverage data architecture frameworks to understand how the role fits into the greater Enterprise Architecture framework

      Enterprise data architectures are available from industry consortiums such as The Open Group (TOGAF®), and open source initiatives such as MIKE2.0.

      Logo for The Open Group.

      The Open Group TOGAF enterprise architecture model is a detailed framework of models, methods, and supporting tools to create an enterprise-level architecture.

      • TOGAF was first developed in 1995 and was based on the Technical Architecture Framework for Information Management (TAFIM) developed by the US Department of Defense.
      • TOGAF includes application, data, and infrastructure architecture domains providing enterprise-level, product-neutral architecture principles, policies, methods, and models.
      • As a member of The Open Group, it is possible to participate in ongoing TOGAF development initiatives.

      The wide adoption of TOGAF has resulted in the mapping of it to several other industry standards including CoBIT and ITIL.

      Logo for MIKE2.0.

      MIKE2.0 (Method for an Integrated Knowledge Environment), is an open source method for enterprise information management providing a framework for information development.

      • SAFE (Strategic Architecture for the Federated Enterprise) provides the technology solution framework for MIKE2.0
      • SAFE includes application, presentation, information, data, Infrastructure, and metadata architecture domains.

      Info-Tech Best Practice

      If an enterprise-level IT architecture is your goal, TOGAF is likely a better model. However, if you are an information and knowledge-based business then MIKE2.0 may be more relevant to your business.

      The data architect must identify what drives the need for data from the business to create a business-driven architecture

      As the business landscape evolves, new needs arise. An organization may undergo new compliance requirements, or look to improve their customer intimacy, which could require a new functionality from an application and its associated database.

      There are four common scenarios that lead to an organization’s need to optimize its data architecture and these scenarios all present unique challenges for a data architect:

      1. Becoming More Data Driven As organizations are looking to get more out of their data, there is a push for more accurate and timely data from applications. Data-driven decision making requires verifiable data from trustworthy sources. Result: Replace decisions made on gut or intuition with real and empirical data - make more informed and data-driven decisions.
      2. New Functionality or Business Rule In order to succeed as business landscapes change, organizations find themselves innovating on products or services and the way they do things. Changes in business rules, product or service offering, and new functionalities can subsequently demand more from the existing data architecture. Result: Prepare yourself to successfully launch new business initiatives with an architecture that supports business needs.
      3. Mergers and Acquisitions If an organization has recently acquired, been acquired, or is merging with another, the technological implications require careful planning to ensure a seamless fit. Application consolidation, retirement, data transfer, and integration points are crucial. Result: Leverage opportunities to incorporate and consolidate new synergistic assets to realize the ROI.
      4. Risk and Compliance Data in highly regulated organizations needs to be kept safe and secure. Architectural decisions around data impact the level of compliance within the organization. Result: Avoid the fear of data audits, regulatory violations, and privacy breaches.

      Info-Tech Best Practice

      These are not the only reasons why data architects need to optimize the organization’s data architecture. These are only four of the most common scenarios, however, other business needs can be addressed using the same concept as these four common scenarios.

      Use the Data Architecture Driver tool to identify your focus for data architecture

      Supporting Tool icon 1.1 Data Architecture Driver Pattern Identification Tool

      Follow Info-Tech’s process of first analyzing the needs of the business, then determining how best to architect your data based on these drivers. Data architecture needs to be able to rapidly evolve to support the strategic goals of the business, and the Data Architecture Driver Pattern Identification Tool will help you to prioritize your efforts to best do this.

      Tab 2. Driver Identification

      Objective: Objectively assess the most pressing business drivers.

      Screenshot of the Data Architecture Driver Pattern Identification Tool, tab 2.

      Tab 3. Tactic Pattern Plan, Section 1

      Purpose: Review your business drivers that require architectural changes in your environment.

      Screenshot of the Data Architecture Driver Pattern Identification Tool, tab 3, section 1.

      Tab 3. Tactic Pattern Plan, Section 2

      Purpose: Determine a list of tactics that will help you address the business drivers.

      Screenshot of the Data Architecture Driver Pattern Identification Tool, tab 3, section 2.

      Step
      • Evaluate business drivers to determine the data architecture optimization priorities and tactics.
      Step
      • Understand how each business driver relates to data architecture and how each driver gives rise to a specific pattern across the five-tier data architecture.
      Step
      • Review the list of high-level tactics presented to optimize your data architecture across the five tier architecture.

      Identify the drivers for improving your data architecture

      Associated Activity icon 1.1.1 1 hour

      INPUT: Data Architecture Driver tool assessment prompts.

      OUTPUT: Identified business driver that applies to your organization.

      Materials: Data Architecture Driver Pattern Identification Tool

      Participants: Data architect, Enterprise architect

      Instructions

      In Tab 2. Driver Identification of the Data Architecture Driver Pattern Identification Tool, assess the degree to which the organization is feeling the pains of the four most common business drivers:

      1. Is there a present or growing need for the business to be making data-driven decisions?
      2. Does the business want to explore a new functionality and hence require a new application?
      3. Is your organization acquiring or merging with another entity?
      4. Is your organization’s regulatory environment quick to change and require stricter reporting?

      Data architecture improvements need to be driven by business need.

      Screenshot of the Data Architecture Driver Pattern Identification Tool, tab 2 Driver Identification.
      Tab 2. Driver Identification

      “As a data architect, you have to understand the functional requirements, the non-functional requirements, then you need to make a solution for those requirements. There can be multiple solutions and multiple purposes. (Andrew Johnston, Independent Consultant)

      Interview the business to get clarity on business objectives and drivers

      Associated Activity icon 1.1.2 1 hour per interview

      INPUT: Sample questions targeting the activities, challenges, and opportunities of each business unit

      OUTPUT: Sample questions targeting the activities, challenges, and opportunities of each business unit

      Materials: Data Architecture Driver Pattern Identification Tool

      Participants: Data architect, Business representatives, IT representatives

      Identify 2-3 business units that demonstrate enthusiasm for or a positive outlook on improving how organizational data can help them in their role and as a unit.

      Conducting a deep-dive interview process with these key stakeholders will help further identify high-level goals for the data architecture strategy within each business unit. This process will help to secure their support throughout the implementation process by giving them a sense of ownership.

      Key Interview Questions:

      1. What are your primary activities? What do you do?
      2. What challenges do you have when completing your activities?
      3. How is poor data impacting your job?
      4. If [your selected domain]’s data is improved, what business issues would this help solve?

      Request background information and documentation from stakeholders regarding the following:

      • What current data management policies and processes exist (that you know of)?
      • Who are the data owners and end users?
      • Where are the data sources within the department stored?
      • Who has access to these data sources?
      • Are there existing or ongoing data issues within those data sources?

      Interview the enterprise architect to get input on the drivers of the business

      Associated Activity icon 1.1.3 2 hours

      INPUT: Data Architecture Driver tool assessment prompts.

      OUTPUT: Identified business driver that applies to your organization.

      Materials: Data Architecture Driver Pattern Identification Tool

      Participants: Data architect, Enterprise architect

      Data architecture improvements need to be driven by business need.

      Instructions

      As you work through Tab 2. Driver Identification of the Data Architecture Driver Pattern Identification Tool, consult with the enterprise architect or equivalent to assist you in rating the importance of each of the symptoms of the business drivers. This will help you provide greater value to the business and more aligned objectives.

      Screenshot of the Data Architecture Driver Pattern Identification Tool, tab 2 Driver Identification.
      Tab 2. Driver Identification

      Once you know what that need is, go to Step 2.

      Phase 1, Step 2: Establish Actionable Tactics to Optimize Data Architecture

      PHASE 1

      1.11.2
      Identify Your Business Driver for Optimizing Data ArchitectureDetermine Actionable Tactics to Optimize Data Architecture

      This step will walk you through the following activities:

      • Understand Info-Tech’s five-tier data architecture to begin focusing your architectural optimization.
      • Create your Data Architecture Optimization Template to plan your improvement tactics.
      • Prioritize your tactics based on the five-tier architecture to plan optimization.

      This step involves the following participants:

      • Data Architect
      • Enterprise Architect
      • DBAs

      Outcomes of this step

      • A tactical and prioritized plan for optimizing the organization’s data architecture according to the needs of the business.

      To plan a business-driven architecture, data architects need to keep the organization’s big picture in mind

      Remember… Architecting an organization involves alignment, planning, road mapping, design, and change management functions.

      Data architects must be heavily involved with:

      • Understanding the short- and long-term visions of the business to develop a vision for the organization’s data architecture.
      • Creating processes for governing the identification, collection, and use of accurate and valid data, as well as for tracking data quality, completeness, and redundancy.
      • They need to create strategies for data security, backup, disaster recovery, business continuity, and archiving, and ensure regulatory compliance.

      To do this, you need a framework. A framework provides you with the holistic view of the organization’s data environment that you can use to design short- and long-term tactics for improving the use of data for the needs of the business.

      Use Info-Tech’s five-tier data architecture to model your environment in a logical, consumable fashion.

      Info-Tech Best Practice

      The more complicated an environment is, the more need there is for a framework. Being able to pick a starting point and prioritize tasks is one of the most difficult, yet most essential, aspects of any architect’s role.

      The five tiers of an organization’s data architecture support the use of data throughout its lifecycle

      Info-Tech’s five-tier data architecture model summarizes an organization’s data environment at a logical level. Data flows from left to right, but can also flow from the presentation layer back to the warehousing layer for repatriation of data.

      Info-Tech's Five Tier Data Architecture. The five tiers being 'Sources' which includes 'App1 ', 'App2', 'Excel and other documents', 'Access database(s)', 'IOT devices', and 'External data feed(s) & social media'; 'Integration and Translation' which includes 'Solutions: SOA, Point to Point, Manual Loading, ESB , ETL, ODS, Data Hub' and 'Functions: Scrambling Masking Encryption, Tokenizing, Aggregation, Transformation, Migration, Modeling'; 'Warehousing' which includes 'Data Lakes & Warehouse(s) (Raw Data)', 'EIM, ECM, DAM', and 'Data Lakes & Warehouse(s) (Derived Data)'; 'Analytics' which includes 'Data Marts', 'Data Cube', 'Flat Files', 'BI Tools', and the 'Protected Zone: Data Marts - BDG Class Ref. MDM'; and 'Presentation' which includes 'Formulas', 'Thought Models', 'Reports', 'Dashboards', 'Presentations', and 'Derived Data (from analytics activities)'.

      Use the Data Architecture Optimization Template to build your improvement roadmap

      Supporting Tool icon 1.2 Data Architecture Optimization Template

      Download the Data Architecture Optimization Template.

      Overview

      Use this template to support your team in creating a tactical strategy for optimizing your data architecture across the five tiers of the organization’s architecture. This template can be used to document your organization’s most pressing business driver, the reasons for optimizing data architecture according to that driver, and the tactics that will be employed to address the shortcomings in the architecture.

      Sample of Info-Tech’s Data Architecture Optimization Template. Info-Tech’s Data Architecture Optimization Template Table of Contents
      1. Build Your Current Data Architecture Logical Model Use this section to document the current data architecture situation, which will provide context for your plan to optimize your data architecture.
      2. Optimization Plan Use this section to document the tactics that will be employed to optimize the current data architecture according to the tactic pattern identified by the business driver.

      Fill out as you go

      As you read about the details of the five-tier data architecture model in the following slides, start building your current logical data architecture model by filling out the sections that correspond to the various tiers. For example, if you identified that the most pressing business driver is becoming compliant with regulations, document the sources of data required for compliance, as well as the warehousing strategy currently being employed. This will help you to understand the organization’s data architecture at a logical level.

      Tier 1 represents all of the sources of your organization’s data

      Tier 1 of Info-Tech's Five Tier Data Architecture, 'Sources', which includes 'App1 ', 'App2', 'Excel and other documents', 'Access database(s)', 'IOT devices', and 'External data feed(s) & social media'.
      –› Data to integration layer

      Tier 1 is where the data enters the organization.

      All applications, data documents such as MS Excel spreadsheets, documents with table entries, manual extractions from other document types, user-level databases including MS Access and MySQL, other data sources, data feeds, big datasets, etc. reside here.

      This tier typically holds the siloed data that is so often not available across the enterprise because the data is held within department-level applications or systems. This is also the layer where transactions and operational activities occur and where data is first created or ingested.

      There are any number of business activities from transactions through business processes that require data to flow from one system to another, so it is often at this layer we see data created more than once, data corruption occurs, manual re-keying of data from system to system, and spaghetti-like point-to-point connections are built that are often fragile. This is usually the single most problematic area within an enterprise’s data environment. Application- or operational-level (siloed) reporting often occurs at this level.

      Info-Tech Best Practice

      An optimized Tier 1 has the following attributes:

      • Rationalized applications
      • Operationalized database administration
      • Databases governed, monitored, and maintained to ensure optimal performance

      Tier 2 represents the movement of data

      Tier 2 of Info-Tech's Five Tier Data Architecture, 'Integration and Translation', which includes 'Solutions: SOA, Point to Point, Manual Loading, ESB , ETL, ODS, Data Hub' and 'Functions: Scrambling Masking Encryption, Tokenizing, Aggregation, Transformation, Migration, Modeling'.
      –› Data to Warehouse Environment

      Find out more

      For more information on data integration, see Info-Tech’s Optimize the Organization’s Data Integration Practices blueprint.

      Tier 2 is where integration, transformation, and aggregation occur.

      Regardless of how you integrate your systems and data stores, whether via ETL, ESB, SOA, data hub, ODS, point-to-point, etc., the goal of this layer is to move data at differing speeds for one of two main purposes:

      1) To move data from originating systems to downstream systems to support integrated business processes. This ensures the data is pristine through the process and improves trustworthiness of outcomes and speed to task and process completion.

      2) To move data to Tier 3 - The Data Warehouse Architecture, where data rests for other purposes. This movement of data in its purest form means we move raw data to storage locations in an overall data warehouse environment reflecting any security, compliance and other standards in our choices for how to store.

      Also, this is where data is transformed for unique business purpose that will also be moved to a place of rest or a place of specific use. Data masking, scrambling, aggregation, cleansing and matching, and other data related blending tasks occur at this layer.

      Info-Tech Best Practice

      An optimized Tier 2 has the following attributes:

      • Business data glossary is leveraged
      • ETL is governed
      • ETL team is empowered
      • Data matching is facilitated
      • Canonical data model is present

      Tier 3 is where data comes together from all sources to be stored in a central warehouse environment

      Tier 3 is where data rests in long-term storage.

      This is where data rests (long-term storage) and also where an enterprise’s information, documents, digital assets, and any other content types are stored. This is also where derived and contrived data creations are stored for re-use, and where formulas, thought models, heuristics, algorithms, report styles, templates, dashboard styles, and presentations-layer widgets are all stored in the enterprise information management system.

      At this layer there may be many technologies and many layers of security to reflect data domains, classifications, retention, compliance, and other data needs. This is also the layer where data lakes exist as well as traditional relational databases, enterprise database systems, enterprise content management systems, and simple user-level databases.

      Info-Tech Best Practice

      An optimized Tier 3 has the following attributes:

      • Data warehouse is governed
      • Data warehouse operations and planning
      • Data library is comprehensive
      • Four Rosetta Stones of data are in place: BDG, data classification, reference data, master data.
      Data from integration layer –›
      Tier 3 of Info-Tech's Five Tier Data Architecture, 'Data Warehouse Environment' which includes 'Data Lakes & Warehouse(s) (Raw Data)', 'EIM, ECM, DAM'.
      –› Analytics

      Find out more

      For more information on Data Warehousing, see Info-Tech’s Build an Extensible Data Warehouse Foundation and Drive Business Innovation With a Modernized Data Warehouse Environment blueprints.

      Tier 4 is where knowledge and insight is born

      Tier 4 represents data being used for a purpose.

      This is where you build fit-for-purpose data sets (marts, cubes, flat files) that may now draw from all enterprise data and information sources as held in Tier 3. This is the first place where enterprise views of all data may be effectively done and with trust that golden records from systems of record are being used properly.

      This is also the layer where BI tools get their greatest use for performing analysis. Unlike Tier 3 where data is at rest, this tier is where data moves back into action. Data is brought together in unique combinations to support reporting, and analytics. It is here that the following enterprise analytic views are crafted:
      Exploratory, Inferential, Causal, Comparative, Statistical, Descriptive, Diagnostic, Hypothesis, Predictive, Decisional, Directional, Prescriptive

      Info-Tech Best Practice

      An optimized Tier 4 has the following attributes:

      • Reporting meets business needs
      • Data mart operations are in place
      • Governance of data marts, cubes, and BI tools in place
      Warehouse Environment –›
      Tier 4 of Info-Tech's Five Tier Data Architecture, 'Analytics', which includes 'Data Marts', 'Data Cube', 'Flat Files', and 'BI Tools'.
      –› Presentation

      Find out more

      For more information on BI tools and strategy, see Info-Tech’s Select and Implement a Business Intelligence and Analytics Solution and Build a Next Generation BI with a Game-Changing BI Strategy blueprints.

      The presentation layer, Tier 5, is where data becomes presentable information

      Tier 5 represents data in knowledge form.

      This is where the data and information combine in information insight mapping methods (presentations, templates, etc.). We craft and create new ways to slice and dice data in Tier 4 to be shown and shared in Tier 5.

      Templates for presenting insights are extremely valuable to an enterprise, both for their initial use, and for the ability to build deeper, more insightful analytics. Re-use of these also enables maximum speed for sharing, consuming the outputs, and collective understanding of these deeper meanings that is a critical asset to any enterprise. These derived datasets and the thought models, presentation styles, templates, and other derived and contrived assets should be repatriated into the derived data repositories and the enterprise information management systems respectively as shown in Tier 3.

      Find out more

      For more information on enterprise content management and metadata, see Info-Tech’s Develop an ECM Strategy and Break Open Your DAM With Intuitive Metadata blueprints.

      Tier 5 of Info-Tech's Five Tier Data Architecture, 'Presentation', which includes 'Formulas', 'Thought Models', 'Reports', 'Dashboards', 'Presentations', and 'Derived Data (from analytics activities)'. The 'Repatriation of data' feeds the derived data back into Warehousing.

      Info-Tech Best Practice

      An optimized Tier 5 has the following attributes:

      • Metadata creation is supervised
      • Metadata is organized
      • Metadata is governed
      • Content management capabilities are present

      Info-Tech Insight

      Repatriation of data and information is an essential activity for all organizations to manage organizational knowledge. This is the activity where information, knowledge, and insights that are stored in content form are moved back to the warehousing layer for long-term storage. Because of this, it is crucial to have an effective ECM strategy as well as the means to find information quickly and efficiently. This is where metadata and taxonomy come in.

      As a data architect, you must prioritize your focus according to business need

      Determine your focus.

      Now that you have an understanding of the drivers requiring data architecture optimization, as well as the current data architecture situation at your organization, it is time to determine the actions that will be taken to address the driver.

      1. Business driver

      Screenshot of Data Architecture Driver Pattern Identification Tool, Tab 2. Tactic Pattern Plan.
      Data Architecture Driver Pattern Identification Tool, Tab 2. Tactic Pattern Plan

      3. Documented tactic plan

      Data Architecture Optimization Template

      2. Tactics across the five tiers

      Another screenshot of Data Architecture Driver Pattern Identification Tool, Tab 2. Tactic Pattern Plan.

      The next four slides provide an overview of the priorities that accompany the four most common business drivers that require updates to a stale data architecture.

      Business driver #1: Adding a new functionality to an application can have wide impacts on data architecture

      Does the business wants to add a new application or supplement an existing application with a new functionality?

      Whether the business wants to gain better customer intimacy, achieve operational excellence, or needs to change its compliance and reporting strategy, the need for collecting new data through a new application or a new functionality within an existing application can arise. This business driver has the following attributes:

      • Often operational oriented and application driven.
      • An application is changed through an application version upgrade, migration to cloud, or application customization, or as a result of application rationalization or changes in the way that application data is generated.
      • However, not all new functionalities trigger this scenario. Non-data-related changes, such as a new interface, new workflows, or any other application functionality changes that do not involve data, will not have data architecture impacts.
      Stock photo of someone using a smartphone with apps.
      Modified icon for Tools & Templates. When this business driver arises, data architects should focus on optimizing architecture at the source tier and the integration of the new functionality. Tactics for this business driver should address the following pattern:
      Tiers 1 and 2 highlighted.

      Business driver #2: Organizations today are looking to become more data driven

      Does the business wants to better leverage its data?

      An organization can want to use its data for multiple reasons. Whether these reasons include improving customer experience or operational excellence, the data architect must ensure that the organization’s data aggregation environment, reporting and analytics, and presentation layer are assessed and optimized for serving the needs of the business.

      “Data-drivenness is about building tools, abilities, and, most crucially, a culture that acts on data.” (Carl Anderson, Creating a Data-Driven Organization)

      Tactics for this business driver should address the following pattern:
      Tiers 3, 4, and 5 highlighted.
      Modified icon for Tools & Templates. When this business driver arises, data architects should focus on optimizing architecture at the source tier and the integration of the new functionality.
      Stock photo of someone sitting at multiple computers with analytics screens open.
      • This scenario is typically project driven and analytical oriented.
      • The business is looking to leverage data and information by processing data through BI tools and self-service.
      • Example: The organization wants to include new third-party data, and needs to build a new data mart to provide a slice of data for analysis.

      Business driver #3: Risk and compliance demands can put pressure on outdated architectures

      Is there increasing pressure on the business to maintain compliance requirements as per regulations?

      An organization can want to use its data for multiple reasons. Whether these reasons include improving customer experience or operational excellence, the data architect must ensure that the organization’s data aggregation environment, reporting and analytics, and presentation layer are assessed and optimized for serving the needs of the business.

      There are different types of requirements:
      • Can be data-element driven. For example, PII, PHI are requirements around data elements that are associated with personal and health information.
      • Can be process driven. For example, some requirements restrict data read/write to certain groups.
      Stock photo of someone pulling a block out of a Jenga tower.
      Modified icon for Tools & Templates. When this business driver arises, data architects should focus on optimizing architecture where data is stored: at the sources, the warehouse environment, and analytics layer. Tactics for this business driver should address the following pattern:
      Tiers 1, 3, and 4 highlighted.

      Business driver #4: Mergers and acquisitions can require a restructuring of the organization’s data architecture

      Is the organization looking to acquire or merge with another organization or line of business?

      There are three scenarios that encompass the mergers and acquisitions business driver for data architecture:

      1. The organization acquires/merges with another organization and wants to integrate the data.
      2. The organization acquires/merges a subset of an organization (a line of business, for example) and wants to integrate the data.
      3. The organization acquires another organization for competitive purposes, and does not need to integrate the data.
      Regardless of what scenario your organization falls into, you must go through the same process of identifying the requirements for the new data:
      1. Understand what data you are getting.
        The business may acquire another organization for the data, for the technology, and/or for algorithms (for example). If the goal is to integrate the new data, you must understand if the data is unstructured, structured, how much data, etc.
      2. Plan for the integration of the new data into your environment.
        Do you have the expertise in-house to integrate the data? Database structures and systems are often mismatched (for example, acquired company could have an Oracle database whereas you are an SAP shop) and this may require expertise from the acquired company or a third party.
      3. Integrate the new data.
        Often, the extraction of the new data is the easy part. Transforming and loading the data is the difficult and costly part.
      “As a data architect, you must do due diligence of the acquired firm. What are the workflows, what are the data sources, what data is useful, what is useless, what is the value of the data, and what are the risks of embedding the data?” (Anonymous Mergers and Acquisitions Consultant)
      Modified icon for Tools & Templates. When this business driver arises, data architects should focus on optimizing architecture at the source tier, the warehousing layer, and analytics. Tiers 1, 3, and 4 highlighted.

      Determine your tier priority pattern and the tactics that you should address based on the business drivers

      Associated Activity icon 1.2.1 30 minutes

      INPUT: Business driver assessment

      OUTPUT: Tactic pattern and tactic plan

      Materials: Data Architecture Driver Pattern Identification Tool, Data Architecture Optimization Template

      Participants: Data architect, Enterprise architect

      Instructions
      1. After you have assessed the organization’s business driver on Tab 1. Driver Identification, move to Tab 2. Tactic Pattern Plan.
      2. Here, you will find a summary of the business driver that applies to you, as well as the tier priority pattern that will help you to focus your efforts for data architecture.
      3. Document the Tier Priority Pattern and associated tactics in Section 2. Optimization Plan of the Data Architecture Optimization Plan.
      Screenshot of Data Architecture Driver Tool.
      Data Architecture Driver Tool
      Arrow pointing right. Sample of Data Architecture Optimization Template
      Data Architecture Optimization Template

      Info-Tech Insight

      Our approach will help you to get to the solution of the organization’s data architecture problems as quickly as possible. However, keep in mind that you should still address the other tiers of your data architecture even if they are not part of the pattern we identified. For example, if you need to become more data driven, don’t completely ignore the sources and the integration of data. However, to deliver the most and quickest value, focus on tiers 3, 4, and 5.

      This phase helped you to create a tactical plan to optimize your data architecture according to business priorities

      Phase 1 is all about focus.

      Data architects and those responsible for updating an organization’s data architecture have a wide-open playing field with which to take their efforts. Being able to narrow down your focus and generate an actionable plan will help you provide more value to the organization quickly and get the most out of your data.

        Phase 1
        • Business Drivers
          • Tactic Pattern
            • Tactical Plan

      Now that you have your prioritized tactical plan, move to Phase 2. This phase will help you map these priorities to the essential capabilities and measure where you stack up in these capabilities. This is an essential step in creating your data architecture roadmap and plan for coming years to modernize the organization’s data architecture.

      To identify what the monetary authority needed from its data architecture, Info-Tech helped determine the business driver

      CASE STUDY

      Industry: Financial
      Source: Info-Tech Consulting
      Symbol for 'Monetary Authority Case Study'.

      Part 1

      Prior to receiving new external requirements, the monetary Authority body had been operating with an inefficient system. Outdated legacy systems, reports in paper form, incomplete reports, and stale data from other agencies resulted in slow data access. The new requirements demanded speeding up this process.

      Diagram comparing the 'Original Reporting' requirement of 'Up to 7 days' vs the 'New Requirement' of 'As soon as 1 hour'. The steps of reporting in that time are 'Report Request', 'Gather Data', and 'Make Report'.

      Although the organization understood it needed changes, it first needed to establish what were the business objectives, and which areas of their architecture they would need to focus on.

      The business driver in this case was compliance requirements, which directed attention to the sources, aggregation, and insights tiers.

      Tiers 1, 3, and 4 highlighted.

      Looking at the how the different tiers relate to certain business operations, the organization uncovered the best practise tactics to achieving an optimized data architecture.

      1. Source Tactics: 3. Warehousing Tactics: 4. Analytics Tactics:
      • Identify data sources
      • Ensure data quality
      • Properly catalogue data
      • Properly index data
      • Provide the means for data accessibility
      • Allow for data reduction/space for report building

      Once the business driver had been established, the organization was able to identify the specific areas it would eventually need to evaluate and remedy as needed.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.1

      Sample of activity 1.1.1 'Identify the drivers for improving your data architecture'. Identify the business driver that will set the direction of your data architecture optimization plan.

      In this activity, the facilitator will guide the team in identifying the business driver that is creating the need to improve the organization’s data architecture. Data architecture needs to adapt to the changing needs of the business, so this is the most important step of any data architecture improvements.

      1.2.1

      Sample of activity 1.2.1 'Determine your tier priority pattern and the tactics that you should address based on the business drivers'. Determine the tactics that you will use to optimize data architecture.

      In this activity, the facilitator will help the team create a tactical plan for optimizing the organization’s data architecture across the five tiers of the logical model. This plan can then be followed when addressing the business needs.

      Build a Business-Aligned Data Architecture Optimization Strategy

      PHASE 2

      Personalize Your Tactics to Optimize Your Data Architecture

      Phase 2 will determine your tactics that you should implement to optimize your data architecture

      Business Drivers
      Each business driver requires focus on specific tiers and their corresponding capabilities, which in turn correspond to tactics necessary to achieve your goal.
      New Functionality Risk and Compliance Mergers and Acquisitions Become More Data Driven
      Tiers 1. Data Sources 2. Integration 3. Warehousing 4. Insights 5. Presentation
      Capabilities Current Capabilities
      Target Capabilities
      Example Tactics Leverage indexes, partitions, views, and clusters to optimize performance.

      Cleanse data source.

      Leverage integration technology.

      Identify matching approach priorities.

      Establish governing principles.

      Install performance enhancing technologies.

      Establish star schema and snowflake principles.

      Share data via data mart.

      Build metadata architecture:
      • Data lineage
      • Sharing
      • Taxonomy
      • Automatic vs. manual creation

      Phase 2 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Personalize Your Tactics to Optimize Your Data Architecture

      Proposed Time to Completion: 2 weeks
      Step 2.1: Measure Your Data Architecture Capabilities Step 2.2: Set a Target for Data Architecture Capabilities Step 2.3: Identify the Tactics That Apply to Your Organization
      Start with an analyst kick-off call:
      • Understand Info-Tech’s data architecture capability model to begin identifying where to develop tactics for optimizing your data architecture.
      Review findings with analyst:
      • Understand Info-Tech’s data architecture capability model to begin identifying where to develop tactics for optimizing your data architecture.
      Finalize phase deliverable:
      • Learn about the trends in data architecture that can be leveraged to develop tactics.
      Then complete these activities…
      • Measure your current state across the tiers of the capability model that will help address your business driver.
      Then complete these activities…
      • Measure your target state for the capabilities that will address your business driver.
      Then complete these activities…
      • Review the tactical roadmap that was created with guidance from the capability gap analysis.
      With these tools & templates:
      • Data Architecture Tactical Roadmap Tool
      With these tools & templates:
      • Data Architecture Tactical Roadmap Tool
      With these tools & templates:
      • Data Architecture Trends Presentation Template

      Phase 2 Results & Insights

      • Data architecture is not just data models. Understand the essential capabilities that your organization needs from its data architecture to develop a tactical plan for optimizing data architecture across its people, processes, and technology.

      Phase 2, Step 1: Measure Your Data Architecture Capabilities

      PHASE 2

      2.1 2.2 2.3
      Measure Your Data Architecture Capabilities Set a Target for Data Architecture Capabilities Identify the Tactics That Apply to Your Organization

      This step will walk you through the following activities:

      • As you walk through the data architecture capability model, measure your current state in each of the relevant capabilities.
      • Distinguish between essential and nice-to-have capabilities for your organization.

      This step involves the following participants:

      • Data Architect

      Outcomes of this step

      • A framework for generating a tactical plan for data architecture optimization.
      • Knowledge of the various trends in the data architecture field that can be incorporated into your plan.

      To personalize your tactical strategy, you must measure up your base data architecture capabilities

      What is a capability?

      Capabilities represent a mixture of people, technology, and processes. The focus of capability design is on the outcome and the effective use of resources to produce a differentiating capability or an essential supporting capability.

      To personalize your tactics, you have to understand what the essential capabilities are across the five tiers of an organization’s data architecture. Then, assess where you currently stand in these capabilities and where you need to go in order to build your optimization plan.

      'Capability' as a mixture of 'People', 'Technology', 'Process', and 'Assets'.

      Info-Tech’s data architecture capability model can be laid over the five-tier data architecture to understand the essential and advanced capabilities that an organization should have, and to build your tactical strategy for optimizing the organization’s data architecture across the tiers.

      Use Info-Tech’s data architecture capability model as a resource to assess and plan your personalized tactics

      Info-Tech’s data architecture capability model can be laid over the five-tier data architecture to understand the essential and advanced capabilities that an organization should have, and to build your tactical strategy for optimizing the organization’s data architecture across the tiers.

      Info-Tech’s Data Architecture Capability Model featuring the five-tier architecture listing 'Core Capabilities' and 'Advanced Capabilities' within each tier, and a list of 'Cross Capabilities' which apply to all tiers.

      Use the Data Architecture Tactical Roadmap Tool to create a tailored plan of action

      Supporting Tool icon 2.1.1 Data Architecture Tactical Roadmap Tool

      Instructions

      Use the Data Architecture Tactical Roadmap Tool as your central tool to develop a tactical plan of action to optimize the organization’s data architecture.

      This tool contains the following sections:

      1. Business Driver Input
      2. Capability Assessment
      3. Capability Gap Analysis
      4. Tactical Roadmap
      5. Metrics
      6. Initiative Roadmap

      INFO-TECH DELIVERABLE

      Sample of the Info-Tech deliverable Data Architecture Tactical Roadmap Tool.

      Benefits of using this tool:

      • Comprehensive documentation of data architecture capabilities present in leading organizations.
      • Generates an accurate architecture roadmap for your organization that is developed in alignment with the broader enterprise architecture and related architectural domains.

      To create a plan for your data architecture priorities, you must first understand where you currently stand

      Now that you understand the business problem that you are trying to solve, it is time to take action in solving the problem.

      The organization likely has some of the capabilities that are needed to solve the problem, but also a need to improve other capabilities. To narrow down the capabilities that you should focus on, first select the business driver that was identified in Phase 1 in Tab 1. Business Driver Input of the Data Architecture Tactical Roadmap Tool. This will customize the roadmap tool to deselect the capabilities that are likely to be less relevant to your organization.

      For Example: If you identified your business driver as “becoming more data-driven”, you will want to focus on measuring and building out the capabilities within Tiers 3, 4, and 5 of the capability model.

      Data Architecture Capability Model
      Info-Tech’s Data Architecture Capability Model with tiers 3, 4, and 5 highlighted.

      Note

      If you want to assess your organization for all of the capabilities across the data architecture capability model, select “Comprehensive Data Architecture Assessment” in Tab 1. Business Driver Input of the Data Architecture Tactical Roadmap Tool.

      Determine your current state across the related architecture tiers

      Associated Activity icon 2.1.2 1 hour

      INPUT: Current data architecture capabilities.

      OUTPUT: An idea of where you currently stand in the capabilities.

      Materials: Data Architecture Tactical Roadmap Tool

      Participants: Data architect, Enterprise architect, Business representatives

      Use the Data Architecture Tactical Roadmap Tool to evaluate the baseline and target capabilities of your practice in terms of how data architecture is approached and executed.

      Instructions
      1. Invite the appropriate stakeholders to participate in this exercise.
      2. On Tab 2. Practice Components, assess the current and target states of each capability on a scale of 1–5.
      3. Note: “Ad hoc” implies a capability is completed, but randomly, informally, and without a standardized method.
        These results will set the baseline against which you will monitor performance progress and keep track of improvements over time.
      To assess data architecture maturity, Info-Tech uses the Capability Maturity Model Integration (CMMI) program for rating capabilities on a scale of 1 to 5:

      1 = Initial/Ad hoc

      2 = Developing

      3 = Defined

      4 = Managed and Measurable

      5 = Optimized

      Info-Tech Insight

      Focus on Early Alignment. Assessing capabilities within specific people’s job functions can naturally result in disagreement or debate, especially between business and IT people. Objectively facilitate any debate and only finalize capability assessments when there is full alignment. Remind everyone that data architecture should ultimately serve business needs wherever possible.

      Phase 2, Step 2: Set a Target for Data Architecture Capabilities

      PHASE 2

      2.12.22.3
      Measure Your Data Architecture CapabilitiesSet a Target for Data Architecture CapabilitiesIdentify the Tactics That Apply to Your Organization

      This step will walk you through the following activities:

      • Determine your target state in each of the relevant capabilities.
      • Distinguish between essential and nice-to-have capabilities for your organization.

      This step involves the following participants:

      • Data Architect

      Outcomes of this step

      • A holistic understanding of where the organization’s data architecture currently sits, where it needs to go, and where the biggest gaps lie.

      To create a plan for your data architecture priorities, you must also understand where you need to get to in the future

      Keep the goal in mind by documenting target state objectives. This will help to measure the highest priority gaps in the organization’s data architecture capabilities.

      Example driver = Becoming more data driven Arrow pointing right. Info-Tech’s Data Architecture Capability Model with tiers 3, 4, and 5 highlighted. Arrow pointing right. Current Capabilities Arrow pointing right. Target Capabilities
      Gaps and Priorities
      Stock photo of a hand placing four shelves arranged as stairs. On the first step is a mini-cut-out of a person walking.

      Determine your future state across the relevant tiers of the data architecture capability model

      Associated Activity icon 2.2.1 2 hours

      INPUT: Current state of data architecture capabilities.

      OUTPUT: Target state of data architecture capabilities.

      Materials: Data Architecture Tactical Roadmap Tool

      Participants: Data architect

      The future of data architecture is now.

      Determine the state of data architecture capabilities that the organization needs to reach to address the drivers of the business.

      For example: If you identified your business driver as “becoming more data driven”, you will want to focus on the capabilities within Tiers 3, 4, and 5 of the capability model.

      Driver = Becoming more data driven Arrow pointing right. Info-Tech’s Data Architecture Capability Model with tiers 3, 4, and 5 highlighted. Arrow pointing right. Target Capabilities

      Identify where gaps in your data architecture capabilities lie

      Associated Activity icon 2.2.2 1 hour

      INPUT: Current and target states of data architecture capabilities.

      OUTPUT: Holistic understanding of where you need to improve data architecture capabilities.

      Materials: Data Architecture Tactical Roadmap Tool

      Participants: Data architect

      Visualization of gap assessment of data quality practice capabilities

      To enable deeper analysis on the results of your capability assessment, Tab 4. Capability Gap Analysis in the Data Architecture Tactical Roadmap Tool creates visualizations of the gaps identified in each of your practice capabilities and related data management practices. These diagrams serve as analysis summaries.

      Gap Assessment of Data Source Capabilities

      Sample of the Data Architecture Tactical Roadmap Tool, tab 4. Capability Gap Analysis.

      Use Tab 3. Data Quality Practice Scorecard to enhance your data quality project.

      1. Enhance your gap analyses by forming a relative comparison of total gaps in key practice capability areas, which will help in determining priorities.
      2. Put these up on display to improve discussion in the gap analyses and prioritization sessions.
      3. Improve the clarity and flow of your strategy template, final presentations, and summary documents by copying and pasting the gap assessment diagrams.

      Phase 2, Step 3: Identify the Tactics That Apply to Your Organization

      PHASE 2

      2.12.22.3
      Measure Your Data Architecture CapabilitiesSet a Target for Data Architecture CapabilitiesIdentify the Tactics That Apply to Your Organization

      This step will walk you through the following activities:

      • Before making your personal tactic plan, identify the trends in data architecture that can benefit your organization.
      • Understand Info-Tech’s data architecture capability model.
      • Initiate the Data Architecture Roadmap Tool to begin creating a roadmap for your optimization plan.

      This step involves the following participants:

      • Data Architect

      Outcomes of this step

      • A framework for generating a tactical plan for data architecture optimization.
      • Knowledge of the various trends in the data architecture field that can be incorporated into your plan.

      Capitalize on trends in data architecture before you determine the tactics that apply to you

      Stop here. Before you begin to plan for optimization of the organization’s data environment, get a sense of the sustainability and scalability of the direction of the organization’s data architecture evolution.

      Practically any trend in data architecture is driven by an attempt to solve one or more the common challenges of today’s tumultuous data landscape, otherwise known as “big data.” Data is being produced in outrageous amounts, at very high speeds, and in a growing number of types and structures.

      To meet these demands, which are not slowing down, you must keep ahead of the curve. Consider the internal and external catalysts that might fuel your organization’s need to modernize its data architecture:

      Big Data

      Data Storage

      Advanced analytics

      Unstructured data

      Integration

      Hadoop ecosystem

      The discussion about big data is no longer about what it is, but how do businesses of all types operationalize it.

      Is your organization currently capturing and leveraging big data?

      Are they looking to do so in the near future?

      The cloud

      The cloud offers economical solutions to many aspects of data architecture.

      Have you dealt with issues of lack of storage space or difficulties with scalability?

      Do you need remote access to data and tools?

      Real-time architecture

      Advanced analytics (machine learning, natural language processing) often require data in real-time. Consider Lambda and Kappa architectures.

      Has your data flow prevented you from automation, advanced analytics, or embracing the world of IoT?

      Graph databases

      Self-service data access allows more than just technical users to participate in analytics. NoSQL can uncover buried relationships in your data.

      Has your organization struggled to make sense of different types of unstructured data?

      Is ETL enough?

      What SQL is to NoSQL, ETL is to NoETL. Integration techniques are being created to address the high variety and high velocity of data.

      Have your data scientists wasted too much time and resources in the ETL stage?

      Read the Data Architecture Trends Presentation to understand the current cutting edge topics in data architecture

      Supporting Tool icon 2.1 Data Architecture Trends Presentation

      The speed at which new technology is changing is making it difficult for IT professionals to keep pace with best practices, let alone cutting edge technologies.

      The Info-Tech Data Architecture Trends Presentation provides a glance at some of the more significant innovations in technology that are driving today’s advanced data architectures.

      This presentation also explains how these trends relate to either the data challenges you may be facing, or the specific business drivers you are hoping to bring to your organization.

      Sample of the Data Architecture Trends Presentation.
      Data Architecture Trends Presentation

      Gaps between your current and future capabilities will help you to determine the tactics that apply to you

      Now that you know where the organization currently stands, follow these steps to begin prioritizing the initiatives:

      1. What are you trying to accomplish? Determine target states that are framed in quantifiable objectives that can be clearly communicated. The more specific the objectives are the better.
      2. Evaluate the “delta,” or difference between where the organization currently stands and where it needs to go. This will be expressed in terms of gap closure strategies, and will help clarify the initiatives that will populate the road map.
      3. Determine the relative business value of each initiative, as well as the relative complexities of successfully implementing them. These scores should be created with stakeholder input, and then plotted in an effort/transition quadrant map to determine where the quickest and most valuable wins lie.
      Current State Gap Closure Strategies Target State Data Architecture Tactical Roadmap
      • Organization objectives
      • Functional needs
      • Current operating models
      • Technology assets
      Initiatives involving:
      • Organizational changes
      • Functional changes
      • Technology changes
      • Process changes
      • Performance objectives (revenue growth, customer intimacy, growth of organization)
      • Operating model improvements
      • Prioritized, simplified, and compelling vision of how the organization will optimize data architecture

      (Source: “How to Build a Roadmap”)

      Info-Tech Insight

      Optimizing data architecture requires a tactical approach, not a passive approach. The demanding task of optimization requires the ability to heavily prioritize. After you have identified why, determine how using our pre-built roadmap to address the four common drivers.

      Each of the layers of an organization’s data architecture have associated challenges to optimization

      Stop! Before you begin, recognize these “gotchas” that can present roadblocks to creating an effective data architecture environment.

      Before diving headfirst into creating your tactical data architecture plan, documenting the challenges associated with each aspect of the organization’s data architecture can help to identify where you need to focus your energy in optimizing each tier. The following table presents the common challenges across the five tiers:

      Source Tier

      Integration Tier

      Warehousing Tier

      Analytics Tier

      Presentation Tier

      Inconsistent data models Performance issues Scalability of the data warehouse Data currency, flexibility Model interoperability
      Data quality measures: data accuracy, timeliness, accessibility, relevance Duplicated data Infrastructure needed to support volume of data No business context for using the data in the correct manner No business context for using the data in the correct manner
      Free-form field and data values beyond data domain Tokenization and other required data transformations Performance
      Volume
      Greedy consumers can cripple performance
      Insufficient infrastructure
      Inefficiencies in building the data mart Report proliferation/chaos (“kitchen sink dashboards”)
      Reporting out of source systems DB model inefficiencies
      Manual errors;
      Application usability
      Elasticity

      Create metrics before you plan to optimize your data architecture

      Associated Activity icon 2.2.3 1 hour

      INPUT: Tactics that will be used to optimize data architecture.

      OUTPUT: Metrics that can be used to measure optimization success.

      Materials: Data Architecture Tactical Roadmap Tool

      Participants: Data architect

      Metrics will help you to track your optimization efforts and ensure that they are providing value to the organization.

      There are two types of metrics that are useful for data architects to track and measure: program metrics and project metrics. Program metrics represent the activities that the data architecture program, which is the sum of multiple projects, should help to improve. Project metrics are the more granular metrics that track each project.

      Program Metrics

      • TCO of IT
        • Costs associated with applications, databases, data maintenance
        • Should decrease with better data architecture (rationalized apps, operationalized databases)
      • Cost savings:
        • Retiring a legacy system and associated databases
        • Consolidated licensing
        • Introducing shared services
      • Data systems under maintenance (maintenance burden)
      • End-user data requests fulfilled
      • Improvement of time of delivery of reports and insights

      Project Metrics

      • Percent of projects in alignment with EA
      • Percent of projects compliant with the EA governance process (architectural due diligence rate)
      • Reducing time to market for launching new products
        • Reducing human error rates
        • Speeding up order delivery
        • Reducing IT costs
        • Reducing severity and frequency of security incidents

      Use Tab 6. Metrics of the Data Architecture Tactical Roadmap Tool to document and track metrics associated with your optimization tactics.

      Use Info-Tech’s resources to build your data architecture capabilities

      The following resources from Info-Tech can be used to improve the capabilities that were identified as having a gap. Read more about the details of the five-tier architecture in the blueprints below:

      Data Governance

      Data architecture depends on effective data governance. Use our blueprint, Enable Shared Insights With an Effective Data Governance Engine to get more out of your architecture.

      Data Quality

      The key to maintaining high data quality is a proactive approach that requires you to establish and update strategies for preventing, detecting, and correcting errors. Find out more on how to improve data quality with Info-Tech’s blueprint, Restore Trust in Your Data Using a Business-Aligned Data Quality Management Approach.

      Master Data Management

      When you start your data governance program, you will quickly realize that you need an effective MDM strategy for managing your critical data assets. Use our blueprint, Develop a Master Data Management Strategy and Roadmap to Better Monetize Data to get started with MDM.

      Data Warehouse

      The key to maintaining high data quality is a proactive approach that requires you to establish and update strategies for preventing, detecting, and correcting errors. Find out more on how to improve data quality with Info-Tech’s blueprint, Drive Business Innovation With a Modernized Data Warehouse Environment.

      With the optimal tactics identified, the monetary authority uncovered areas needing improvement

      CASE STUDY

      Industry: Financial
      Source: Info-Tech Consulting
      Symbol for 'Monetary Authority Case Study'.

      Part 2

      After establishing the appropriate tactics based on its business driver, the monetary authority was able to identify its shortcomings and adopt resolutions to remedy the issues.

      Best Practice Tactic Current State Solution
      Tier 1 - Data Sources Identify data sources Data coming from a number of locations. Create data model for old and new systems.
      Ensure data quality Internal data scanned from paper and incomplete. Data cleansing and update governance and business rules for migration to new system.
      External sources providing conflicting data.
      Tier 3 - Data Warehousing Data catalogue Data aggregated incompletely. Built proper business data glossary for searchability.
      Indexing Data warehouse performance sub-optimal. Architected data warehouse for appropriate use (star schema).
      Tier 4 - Data Analytics Data accessibility Relevant data buried in warehouse. Build data marts for access.
      Data reduction Accurate report building could not be performed in current storage. Built interim solution sandbox, spin up SQL database.

      Establishing these solutions provided the organization with necessary information to build their roadmap and move towards implementing an optimized data architecture.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of a Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.1 – 2.2.2

      Sample of activities 2.1.1 and 2.2.2, the first being 'Determine your current state across the related architecture tiers'. Evaluate your current capabilities and design your target data quality practice from two angles

      In this assessment and planning activity, the team will evaluate the current and target capabilities for your data architecture’s ability to meet business needs based on the essential capabilities across the five tiers of an organization’s architectural environment.

      2.2.3

      Sample of activity 2.2.3 'Create metrics before you plan to optimize your data architecture'. Create metrics to track the success of your optimization plan.

      The Info-Tech facilitator will guide you through the process of creating program and project metrics to track as you optimize your data architecture. This will help to ensure that the tactics are helping to improve crucial business attributes.

      Build a Business-Aligned Data Architecture Optimization Strategy

      PHASE 3

      Create Your Tactical Data Architecture Roadmap

      Phase 3 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Create Your Tactical Data Architecture Roadmap

      Proposed Time to Completion: 2 weeks
      Step 3.1: Personalize Your Data Architecture RoadmapStep 3.2: Manage Your Data Architecture Decisions and the Resulting Changes
      Start with an analyst kick-off call:
      • Review the tactical plan that addresses the business drivers by optimizing your data architecture in the relevant focus areas.
      Review findings with analyst:
      • Discuss and review the roadmap of optimization activities, including dependencies, timing, and ownership of activities.
      • Understand how change management is an integral aspect of any data architecture optimization plan.
      Then complete these activities…
      • Create your detailed data architecture initiative roadmap.
      Then complete these activities…
      • Create your Data Architecture Decision Template to document the changes that are going to be made to optimize your data architecture environment.
      • Review how change management fits into the data architecture improvement program.
      With these tools & templates:
      • Data Architecture Tactical Roadmap Tool
      With these tools & templates:
      • Data Architecture Decision Template

      Phase 3 Results & Insights

      • Phase 3 will help you to build a personalized roadmap and plan for optimizing data architecture in your organization. In carrying out this roadmap, changes will, by necessity, occur. Therefore, an integral aspect of a data architect’s role is change management. Use the resources included in Phase 3 to smoothen the change management process.

      Phase 3, Step 1: Personalize Your Data Architecture Roadmap

      PHASE 3

      3.1 3.2
      Personalize Your Data Architecture Roadmap Manage Your Data Architecture Decisions and the Resulting Changes

      This step will walk you through the following activities:

      • Determine the timing, effort, and ownership of the recommended optimization initiatives.
      • Brainstorm initiatives that are not yet on the roadmap but apply to you.

      This step involves the following participants:

      • Data Architect
      • DBAs
      • Enterprise Architect

      Outcomes of this step

      • A roadmap of specific initiatives that map to the tactical plan for optimizing your organization’s data architecture.
      • A plan for communicating high-level business objectives to data workers to address the issues of the business.

      Now that you have tactical priorities, identify the actionable steps that will lead you to an optimized data architecture

      Phase 1 and 2 helped you to identify tactics that address some of the most common business drivers. Phase 3 will bring you through the process of practically planning what those tactics look like in your organization’s environment and create a roadmap to plan how you will generate business value through optimization of your data architecture environment.

      Diagram of the three phases and the goals of each one. The first phase says 'Identify your data architecture business driver' and highlights 'Business Driver 3' out of four to focus on in Phase 2. Phase 2 says 'Optimization tactics across the five-tier logical data architecture' and identifies four of six 'Tactics' to use in Phase 3. Phase 3 is a 'Practical Roadmap of Initiatives' and utilizes a timeline of initiatives in which to apply the chosen tactics.

      Use the Data Architecture Tactic Roadmap Tool to personalize your roadmap

      Supporting Tool icon 3.1.1 Data Architecture Tactic Roadmap Tool
      Generating Your Roadmap
      1. On Tab 5. Tactic and Initiative Planning, you will find a list of tactics that correspond to every capability that applies to your chosen driver and where there is a gap. In addition, each tactic has a sequence of “Suggested Initiatives,” which represent the best-practice steps that you should take to optimize your data architecture according to your priorities and gaps.
      2. Customize this list of initiatives according to your needs.
      3. The Gantt chart is generated in Tab 7. Initiative Roadmap, and can be used to organize your plan and ensure that all of the essential aspects of optimizing data architecture are addressed.
      4. The roadmap can be used as an “executive brief” roadmap and as a communication tool for the business.
      Screenshot of the Data Architecture Tactic Roadmap Tool, Tab 5. Tactic and Initiative Planning.
      Tab 5. Tactic and Initiative Planning

      Screenshot of the Data Architecture Tactic Roadmap Tool, Tab 7. Initiative Roadmap.
      Tab 7. Initiative Roadmap

      Determine the details of your data architecture optimization activities

      Associated Activity icon 3.1.2 1 hour

      INPUT: Timing of initiatives for optimizing data architecture.

      OUTPUT: Optimization roadmap

      Materials: Data Architecture Tactic Roadmap Tool

      Participants: Data architect, Enterprise Architect

      Instructions

      1. With the list of suggested activities in place on Tab 5. Tactic and Initiative Planning, select whether or not the initiatives will be included in the roadmap. By default, all of the initiatives are set to “Yes.”
      2. Plan the sequence, starting time, and length of each initiative, as well as the assigned responsibility of the initiative in Tab 5. Tactic and Initiative Planning of the Data Architecture Tactic Roadmap Tool.
      3. The tool will a generate a Gantt chart based on the start and length of your initiatives.
      4. The Gantt chart is generated in Tab 7. Initiative Roadmap.
      Screenshot of the Data Architecture Tactic Roadmap Tool, Tab 5. Tactic and Initiative Planning. Tab 5. Tactic and Initiative Planning Screenshot of the Data Architecture Tactic Roadmap Tool, Tab 7. Initiative Roadmap. Tab 7. Initiative Roadmap

      Info-Tech Insight

      The activities that populate the roadmap can be taken as best practice activities. If you want an actionable, comprehensive, and prescriptive plan for optimizing your data architecture, fill in the timing of the activities and print the roadmap. This can serve as a rapid communication tool for your data architecture plan to the business and other architects.

      Optimizing data architecture relies on communication between the business and data workers

      Remember: Data architects bridge the gap between strategic and technical requirements of data.

      Visualization centering the 'Data Architect' as the bridge between 'Data Workers', 'Business', and 'Data & Applications'.

      Therefore, as you plan the data and its interactions with applications, it is imperative that you communicate the plan and its implications to the business and the data workers. Stock photo of coworkers communicating.
      Also remember: In Phase 1, you built your tactical data architecture optimization plan.
      Sample 1 of the Data Architecture Optimization Template. Sample 2 of the Data Architecture Optimization Template.
      Use this document to communicate your plan for data architecture optimization to both the business and the data workers. Socialize this document as a representation of your organization’s current data architecture as well as where it is headed in the future.

      Communicate your data architecture optimization plan to the business for approval

      Associated Activity icon 3.1.3 2 hours

      INPUT: Data Architecture Tactical Roadmap

      OUTPUT: Communication plan

      Materials: Data Architecture Optimization Template

      Participants: Data Architect, Business representatives, IT representatives

      Instructions

      Begin by presenting your plan and roadmap to the business units who participated in business interviews in activity 1.1.3 of Phase 1.

      If you receive feedback that suggests that you should make revisions to the plan, consult Info-Tech Research Group for suggestions on how to improve the plan.

      If you gain approval for the plan, communicate it to DBAs and other data workers.

      Iterative optimization and communication plan:
      Visualization of the Iterative optimization and communication plan. 'Start here' at 'Communicate Plan and Roadmap to the Business', and then continue in a cycle of 'Receive Approval or Suggested Modifications', 'Get Advice for Improvements to the Plan', 'Revise Plan', and back to the initial step until you receive 'Approval', then 'Present to Data Workers'.

      With a roadmap in place, the monetary authority followed a tactical and practical plan to repair outdated data architecture

      CASE STUDY

      Industry: Financial
      Source: Info-Tech Consulting
      Symbol for 'Monetary Authority Case Study'.

      Part 3

      After establishing the appropriate tactics based on its business driver, the monetary authority was able to identify its shortcomings and adopt resolutions to remedy the issues.

      Challenge

      A monetary authority was placed under new requirements where it would need to produce 6 different report types on its clients to a regulatory body within a window potentially as short as 1 hour.

      With its current capabilities, it could complete such a task in roughly 7 days.

      The organization’s data architecture was comprised of legacy systems that had poor searchability. Moreover, the data it worked with was scanned from paper, regularly incomplete and often inconsistent.

      Solution

      The solution first required the organization to establish the business driver behind the need to optimize its architecture. In this case, it would be compliance requirements.

      With Info-Tech’s methodology, the organization focused on three tiers: data sources, warehousing, and analytics.

      Several solutions were developed to address the appropriate lacking capabilities. Firstly, the creation of a data model for old and new systems. The implementation of governance principles and business rules for migration of any data. Additionally, proper indexing techniques and business data glossary were established. Lastly, data marts and sandboxes were designed for data accessibility and to enable a space for proper report building.

      Results

      With the solutions established, the monetary authority was given information it needed to build a comprehensive roadmap, and is currently undergoing the implementation of the plan to ensure it will experience its desired outcome – an optimized data architecture built with the capacity to handle external compliance requirements.

      Phase 3, Step 2: Manage Your Data Architecture Decisions and the Resulting Changes

      PHASE 3

      3.13.2
      Personalize Your Data Architecture RoadmapManage Your Data Architecture Decisions and the Resulting Changes

      This step will walk you through the following activities:

      • With a plan in place, document the major architectural decisions that have been and will be made to optimize data architecture.
      • Create a plan for change and release management, an essential function of the data architect role.

      This step involves the following participants:

      • Data Architect
      • Enterprise Architect

      Outcomes of this step

      • Resources for documenting and managing the inevitable change associated with updates to the organization’s data architecture environment.

      To implement data architecture changes, you must plan to accommodate the issues that come with change

      Once you have a plan in place, one the most challenging aspects of improving an organization is yet to come…overcoming change!

      “When managing change, the job of the data architect is to avoid unnecessary change and to encapsulate necessary change.

      You must provide motivation for simplifying change, making it manageable for the whole organization.” (Andrew Johnston, Independent Consultant)

      Stock photo of multiple hands placing app/website design elements on a piece of paper.

      Create roadmap

      Arrow pointing down.

      Communicate roadmap

      Arrow pointing down.

      Implement roadmap

      Arrow pointing down.

      Change management

      Use the Data Architecture Decision Template when architectural changes are made

      Supporting Tool icon 3.2 Data Architecture Decision Template
      Document the architectural decisions made to provide context around changes made to the organization’s data environment.

      The goal of this Data Architecture Decision Template is to provide data architects with a template for managing the changes that accompany major architectural decisions. As you work through the Build a Business-Aligned Data Architecture Optimization Strategy blueprint, you will create a plan for tactical initiatives that address the drivers of the business to optimize your data architecture. This plan will bring about changes to the organization’s data architecture that need change management considerations.

      Document any major changes to the organization’s data architecture that are required to evolve with the organization’s drivers. This will ensure that major architectural changes are documented, tracked, and that the context around the decision is maintained.

      “Environment is very chaotic nowadays – legacy apps, sprawl, ERPs, a huge mix and orgs are grappling with what our data landscape look like? Where are our data assets that we need to use?” (Andrew Johnston, Independent Consultant)

      Sample of the Data Architecture Decision Template.

      Use Info-Tech’s Data Architecture Decision Template to document any major changes in the organization’s data architecture.

      Leverage Info-Tech’s resources to smooth change management

      As changes to the architectural environment occur, data architects must stay ahead of the curve and plan the change management considerations that come with major architectural decisions.

      “When managing change, the job of the data architect is to avoid unnecessary change and to encapsulate necessary change.

      You must provide motivation for simplifying change, making it manageable for the whole organization.” (Andrew Johnston, Independent Consultant)

      See Info-Tech’s resources on change management to smooth changes:
      Banner for the blueprint set 'Optimize Change Management' with subtitle 'Turn and face the change with a right-sized change management process'.
      Sample of the Optimize Change Management blueprint.

      Change Management Blueprint

      Sample of the Change Management Roadmap Tool.

      Change Management Roadmap Tool

      Use Info-Tech’s resources for effective release management

      As changes to the architectural environment occur, data architects must stay ahead of the curve and plan the release management considerations around new hardware and software releases or updates.

      Release management is a process that encompasses the planning, design, build, configuration, and testing of hardware and software releases to create a defined set of release components (ITIL). Release activities can include the distribution of the release and supporting documentation directly to end users. See Info-Tech’s resources on Release Management to smooth changes:

      Banner for the blueprint set 'Take a Holistic View to Optimize Release Management' with subtitle 'Build trust by right-sizing your process using appropriate governance'.
      Samples of the Release Management blueprint.

      Release Management Blueprint

      Sample of the Release Management Process Standard Template.

      Release Management Process Standard Template

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of a Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.1

      Sample of activity 3.1.2 'Determine the timing of your data architecture optimization activities'. Create your personalized roadmap of activities.

      In this activity, the facilitator will guide the team in evaluating practice gaps highlighted by the assessment, and compare these gaps at face value so general priorities can be documented. The same categories as in 3.1.1 are considered.

      3.1.3

      Sample of activity 3.1.3 'Communicate your Data Architecture Optimization Plan to the business for approval'. Communicate your data architecture optimization plan.

      The facilitator will help you to identify the optimal medium and timing for communicating your plan for optimizing your data architecture.

      Insight breakdown

      Insight 1

      • Data architecture needs to evolve along with the changing business landscape. There are four common business drivers that put most pressure on archaic architectures. As a result, the organization’s architecture must be flexible and responsive to changing business needs.

      Insight 2

      • Data architecture is not just about models.
        Viewing data architecture as just technical data modeling can lead to structurally unsound data that does not serve the business.

      Insight 3

      • Data is used differently across the layers of an organization’s data architecture, and the capabilities needed to optimize use of data change with it. Architecting and managing data from source to warehousing to presentation requires different tactics for optimal use.

      Summary of accomplishment

      Knowledge Gained

      • An understanding of what data architecture is, how data architects can provide value to the organization, and how data architecture fits into the larger enterprise architecture picture.
      • The capabilities required for optimization of the organization’s data architecture across the five tiers of the logical data architecture model.

      Processes Optimized

      • Prioritization and planning of data architect responsibilities across the five tiers of the five-tier logical data architecture model.
      • Roadmapping of tactics that address the most common business drivers of the organization.
      • Architectural change management.

      Deliverables Completed

      • Data Architecture Driver Pattern Identification Tool
      • Data Architecture Optimization Template
      • Data Architecture Trends Presentation
      • Data Architecture Roadmap Tool
      • Data Architecture Decision Template

      Research contributors and experts

      Photo of Ron Huizenga, Senior Product Manager, Embarcadero Technologies, Inc. Ron Huizenga, Senior Product Manager
      Embarcadero Technologies, Inc.

      Ron Huizenga has over 30 years of experience as an IT executive and consultant in enterprise data architecture, governance, business process reengineering and improvement, program/project management, software development, and business management. His experience spans multiple industries including manufacturing, supply chain, pipelines, natural resources, retail, healthcare, insurance, and transportation.

      Photo of Andrew Johnston, Architect, Independent Consultant. Andrew Johnston, Architect Independent Consultant

      An independent consultant with a unique combination of managerial, commercial, and technical skills, Andrew specializes in the development of strategies and technical architectures that allow businesses to get the maximum benefit from their IT resources. He has been described by clients as a "broad spectrum" architect, summarizing his ability to engage in many problems at many levels.

      Research contributors

      Internal Contributors
      Logo for Info-Tech Research Group.
      • Steven J. Wilson, Senior Director, Research & Advisory Services
      • Daniel Ko, Research Manager
      • Bernie Gilles, Senior Director, Research & Advisory Services
      External Contributors
      Logo for Embarcadero.
      Logo for Questa Computing. Logo for Geha.
      • Ron Huizenga, Embercardo Technologies
      • Andrew Johnston, Independent Consultant
      • Darrell Enslinger, Government Employees Health Association
      • Anonymous Contributors

      Bibliography

      Allen, Mark. “Get the ETL Out of Here.” MarkLogic. Sep, 2016. Web. 25 Apr 2017.[http://www.marklogic.com/blog/get-the-etl-out-of-here/]

      Anadiotis, George. “Streaming hot: Real-time big data architecture matters.” ZDNet. Jan, 2017. Web. 25 Apr 2017. [http://www.zdnet.com/article/streaming-hot-real-time-big-data-architecture-matters/]

      Aston, Dan. “The Economic value of Enterprise Architecture and How to Show It.” Erwin. Aug, 2016. Web. 20 Apr 2017. [http://erwin.com/blog/economic-value-enterprise-architecture-show/]

      Baer, Tony. “2017 Trends to Watch: Big Data.” Ovum. Nov, 2016. Web. 25 Apr 2017.

      Bmc. “Benefits & Advantages of Hadoop.” Bmc. Web. 25 Apr 2017. [http://www.bmcsoftware.ca/guides/hadoop-benefits-business-case.html]

      Boyd, Ryan, et al. “Relational vs. Graph Data Modeling” DZone. Mar 2016. Web. 25 Apr 2017. [https://dzone.com/articles/relational-vs-graph-data-modeling]

      Brahmachar, Satya. “Theme To Digital Transformation - Journey to Data Driven Enterprise” Feb, 2015. Web. 20 Apr 2017. [http://satyabrahmachari-thought-leader.blogspot.ca/2015/02/i-smac-theme-to-digital-transformation.html]

      Capsenta. “NoETL.” Capsenta. Web. 25 Apr 2017. [https://capsenta.com/wp-content/uploads/2015/03/Capsenta-Booklet.pdf]

      Connolly, Shaun. “Implementing the Blueprint for Enterprise Hadoop” Hortonworks. Apr, 2014. Web. 25 Apr 2017. https://hortonworks.com/blog/implementing-the-blue...

      Forbes. “Cloud 2.0: Companies Move From Cloud-First To Cloud-Only.” Forbes. Apr, 2017. Web. 25 Apr 2017. [https://www.forbes.com/sites/vmware/2017/04/07/cloud-2-0-companies-move-from-cloud-first-to-cloud-only/#5cd9d94a4d5e]

      Forgeat, Julien. “Lambda and Kappa.” Ericsson. Nov 2015. Web 25 Apr 2017. [https://www.ericsson.com/research-blog/data-knowledge/data-processing-architectures-lambda-and-kappa/]

      Grimes, Seth. “Is It Time For NoETL?” InformationWeek. Mar, 2010. Web. 25 Apr 2017. [http://www.informationweek.com/software/information-management/is-it-time-for-noetl/d/d-id/1087813]

      Gupta, Manav. et al. “How IB‹ leads in building big data analytics solutions in the cloud.” IBM. Feb, 2016. Web. 25 Apr 2017. [https://www.ibm.com/developerworks/cloud/library/cl-ibm-leads-building-big-data-analytics-solutions-cloud-trs/index.html#N102DE]

      “How To Build A Roadmap.” Hub Designs Magazine. Web 25 Apr 2017. [https://hubdesignsmagazine.com/2011/03/05/how-to-build-a-roadmap/]

      IBM. “Top industry use cases for stream computing.” IBM. Oct, 2015. Web. 25 Apr 2017. [https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=IMW14704USEN]

      Mateos-Garcia, Juan, et al. “Skills Of The Datavores.” Nesta. July. 2015. Web. 8 Aug 2016. [https://www.nesta.org.uk/sites/default/files/skills_of_the_datavores.pdf].

      Maynard, Steven. “Analytics: Don’t Forget The Human Element” Forbes. 2015. Web. 20 Apr. 2017. [http://www.ey.com/Publication/vwLUAssets/EY-Forbes-Insights-Data-and-Analytics-Impact-Index-2015/$FILE/EY-Forbes-Insights-Data-and-Analytics-Impact-Index-2015.pdf]

      Neo4j. “From Relational to Neo4j.” Neo4j. Web. 25 Apr 2017. [https://neo4j.com/developer/graph-db-vs-rdbms/#_from_relational_to_graph_databases]

      NoETL “NoETL.” NoETL. Web. 25 Apr 2017. [http://noetl.org/]

      Nolan, Roger. “Digital Transformation: Is Your Data Management Ready?” Informatica. Jun, 2016. Web. 20 Apr 2017. [https://blogs.informatica.com/2016/06/10/digital-transformation-data-management-ready/#fbid=hmBYQgS6hnm]

      OpsClarity. “2016 State of Fast Data & Streaming Applications.” OpsClarity. Web. 25 Apr 2017. [https://www.opsclarity.com/wp-content/uploads/2016/07/2016FastDataSurvey.pdf]

      Oracle. “A Relational Database Overview.” Oracle. Web. 25 Apr 2017. [https://docs.oracle.com/javase/tutorial/jdbc/overview/database.html]

      Ponemon Institute LLC. “Big Data Cybersecurity Analytics Research Repor.t” Cloudera. Aug, 2016. Web. 25 Apr 2017. [https://www.cloudera.com/content/dam/www/static/documents/analyst-reports/big-data-cybersecurity-analytics-research-report.pdf]

      Sanchez, Jose Juan. “Data Movement Killed the BI Star.” DV Blog. May, 2016. Web. 20 Apr. 2017. [http://www.datavirtualizationblog.com/data-movement-killed-the-bi-star/]

      SAS. “Hadoop; What it is and why does it matter?” SAS. Web. 25 Apr 2017. [https://www.sas.com/en_ca/insights/big-data/hadoop.html#hadoopusers]

      Schumacher, Robin. “A Quick Primer on graph Databases for RDBMS Professionals.” Datastax. Jul, 2016. Web. 25 Apr 2017. [http://www.datastax.com/2016/07/quick-primer-on-graph-databases-for-rdbms-professionals]

      Swoyer, Steve. “It’s the End of the Data Warehouse as We Know It.” TDWI. Jan, 2017. Web. 20 Apr. 2017. [https://upside.tdwi.org/articles/2017/01/11/end-of-the-data-warehouse-as-we-know-it.aspx]

      Webber, Jim, and Ian Robinson. “The Top 5 Use Cases of Graph Databases.” Neo4j. 2015. Web. 25 Apr 2017. [http://info.neo4j.com/rs/773-GON-065/images/Neo4j_Top5_UseCases_Graph%20Databases.pdf]

      Zachman Framework. [https://www.zachman.com/]

      Zupan, Jane. “Survey of Big Data Decision Makers.” Attiv/o. May, 2016. Web. 20 Apr 2017. [https://www.attivio.com/blog/post/survey-big-data-decision-makers]

      Manage Poor Performance While Working From Home

      • Buy Link or Shortcode: {j2store}599|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $1,600 Average $ Saved
      • member rating average days saved: 18 Average Days Saved
      • Parent Category Name: Manage & Coach
      • Parent Category Link: /manage-coach
      • For many, emergency WFH comes with several new challenges such as additional childcare responsibilities, sudden changes in role expectations, and negative impacts on wellbeing. These new challenges, coupled with previously existing ones, can result in poor performance. Owing to the lack of physical presence and cues, managers may struggle to identify that an employee’s performance is suffering. Even after identifying poor performance, it can be difficult to address remotely when such conversations would ideally be held in person.

      Our Advice

      Critical Insight

      • Poor performance must be managed, despite the pandemic. Evaluating root causes of performance issues is more important than ever now that personal factors such as lack of childcare and eldercare for those working from home are complicating the issue.

      Impact and Result

      • Organizations need to have a clear process for improving performance for employees working remotely during the COVID-19 pandemic. Provide managers with resources to help them identify performance issues and uncover their root causes as part of addressing overall performance. This will allow managers to connect employees with the required support while working with them to improve performance.

      Manage Poor Performance While Working From Home Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Follow the remote performance improvement process

      Determine how managers can identify poor performance remotely and help them navigate the performance improvement process while working from home.

      • Manage Poor Performance While Working From Home Storyboard
      • Manage Poor Performance While Working From Home: Manager Guide
      • Manage Poor Performance While Working From Home: Infographic

      2. Clarify roles and leverage resources

      Clarify roles and responsibilities in the performance improvement process and tailor relevant resources.

      • Wellness and Working From Home
      [infographic]

      Further reading

      Manage Poor Performance While Working From Home

      Assess and improve remote work performance with our ready-to-use tools.

      Executive Summary

      McLean & Company Insight

      Poor performance must be managed, despite the pandemic. Evaluating root causes of performance issues is more important than ever now that personal factors such as lack of childcare and eldercare for those working from home are complicating the issue.

      Situation

      COVID-19 has led to a sudden shift to working from home (WFH), resulting in a 72% decline in in-office work (Ranosa, 2020). While these uncertain times have disrupted traditional work routines, employee performance remains critical, as it plays a role in determining how organizations recover. Managers must not turn a blind eye to performance issues but rather must act quickly to support employees who may be struggling.

      Complication

      For many, emergency WFH comes with several new challenges such as additional childcare responsibilities, sudden changes in role expectations, and negative impacts on wellbeing. These new challenges, coupled with previously existing ones, can result in poor performance. Owing to the lack of physical presence and cues, managers may struggle to identify that an employee’s performance is suffering. Even after identifying poor performance, it can be difficult to address remotely when such conversations would ideally be held in person.

      Solution

      Organizations need to have a clear process for improving performance for employees working remotely during the COVID-19 pandemic. Provide managers with resources to help them identify performance issues and uncover their root causes as part of addressing overall performance. This will allow managers to connect employees with the required support while working with them to improve performance.

      Manage Poor Performance While Working From Home is made up of the following resources:

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide
      Storyboard

      This storyboard is organized by the four steps of the performance improvement process: identify, initiate, deploy, and follow up/decide. These will appear on the left-hand side of the slides as a roadmap.

      The focus is on how HR can design the process for managing poor performance remotely and support managers through it while emergency WFH measures are in place. Key responsibilities, email templates, and relevant resources are included at the end.

      Adapt the process as necessary for your organization.

      Manager Guide

      The manager guide contains detailed advice for managers on navigating the process and focuses on the content of remote performance discussions.

      It consists of the following sections:

      • Identifying poor performance.
      • Conducting performance improvement discussions.
      • Uncovering and addressing root causes of poor performance.
      Manager Infographic

      The manager infographic illustrates the high-level steps of the performance improvement process for managers in a visually appealing and easily digestible manner.

      This can be used to easily outline the process, providing managers with a resource to quickly reference as they navigate the process with their direct reports.

      In this blueprint, “WFH” and “remote working” are used interchangeably.

      This blueprint will not cover the performance management framework; it is solely focused on managing performance issues.

      For information on adjusting the regular performance management process during the pandemic, see Performance Management for Emergency Work-From-Home.

      Identify how low performance is normally addressed

      A process for performance improvement is not akin to outlining the steps of a performance improvement plan (PIP). The PIP is a development tool used within a larger process for performance improvement. Guidance on how to structure and use a PIP will be provided later in this blueprint.

      Evaluate how low performance is usually brought to the attention of HR in a non-remote situation:
      • Do managers approach HR for an employee transfer or PIP without having prior performance conversations with the employee?
      • Do managers come to HR when they need support in developing an employee in order to meet expectations?
      • Do managers proactively reach out to HR to discuss appropriate L&D for staff who are struggling?
      • Do some departments engage with the process while others do not?
      Poor performance does not signal the immediate need to terminate an employee. Instead, managers should focus on helping the struggling employee to develop so that they may succeed.
      Evaluate how poor performance is determined:
      • Do managers use performance data or concrete examples?
      • Is it based on a subjective assessment by the manager?
      Keep in mind that “poor performance” now might look different than it did before the pandemic. Employees must be aware of the current expectations placed on them before they can be labeled as underperforming – and the performance expectations must be assessed to ensure they are realistic.

      For information on adjusting performance expectations during the pandemic, see Performance Management for Emergency Work-From-Home.

      The process for non-union and union employees will likely differ. Make sure your process for unionized employees aligns with collective agreements.

      Determine how managers can identify poor performance of staff working remotely

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide
      Identify: Determine how managers can identify poor performance.
      In person, it can be easy to see when an employee is struggling by glancing over at their desk and observing body language. In a remote situation, this can be more difficult, as it is easy to put on a brave face for the half-hour to one-hour check-in. Advise managers on how important frequent one-one-ones and open communication are in helping identify issues when they arise rather than when it’s too late.

      Managers must clearly document and communicate instances where employees aren’t meeting role expectations or are showing other key signs that they are not performing at the level expected of them.

      What to look for:
      • PM data/performance-related assessments
      • Continual absences
      • Decreased quality or quantity of output
      • Frequent excuses (e.g. repeated internet outages)
      • Lack of effort or follow-through
      • Missed deadlines
      • Poor communication or lack of responsiveness
      • Failure to improve
      It’s crucial to acknowledge an employee might have an “off week” or need time to adjust to working from home, which can be addressed with performance management techniques. Managers should move into the process for performance improvement when:
      • Performance fluctuates frequently or significantly.
      • Performance has dropped for an extended period of time.
      • Expectations are consistently not being met.

      While it’s important for managers to keep an eye out for decreased performance, discourage them from over-monitoring employees, as this can lead to a damaging environment of distrust.

      Support managers in initiating performance conversations and uncovering root causes

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide
      Initiate: Require that managers have several conversations about low performance with the employee.
      Before using more formal measures, ensure managers take responsibility for connecting with the employee to have an initial performance conversation where they will make the performance issue known and try to diagnose the root cause of the issue.

      Coach managers to recognize behaviors associated with the following performance inhibitors:

      Personal Factors

      Personal factors, usually outside the workplace, can affect an employee’s performance.

      Lack of clarity

      Employees must be clear on performance expectations before they can be labeled as a poor performer.

      Low motivation

      Lack of motivation to complete work can impact the quality of output and/or amount of work an employee is completing.

      Inability

      Resourcing, technology, organizational change, or lack of skills to do the job can all result in the inability of an employee to perform at their best.

      Poor people skills

      Problematic people skills, externally with clients or internally with colleagues, can affect an employee’s performance or the team’s engagement.

      Personal factors are a common performance inhibitor due to emergency WFH measures. The decreased divide between work and home life and the additional stresses of the pandemic can bring up new cases of poor performance or exacerbate existing ones. Remind managers that all potential root causes should still be investigated rather than assuming personal factors are the problem and emphasize that there can be more than one cause.

      Ensure managers continue to conduct frequent performance conversations

      Once an informal conversation has been initiated, the manager should schedule frequent one-on-one performance conversations (above and beyond performance management check-ins).

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide
      Explain to managers the purpose of these discussions is to:
      • Continue to probe for root causes.
      • Reinforce role expectations and performance targets.
      • Follow up on any improvements.
      • Address the performance issue and share relevant resources (e.g. HR or employee assistance program [EAP]).
      Given these conversations will be remote, require managers to:
      • Use video whenever possible to read physical cues and body language.
      • Bookend the conversation. Starting each meeting by setting the context for the discussion and finishing with the employee reiterating the key takeaways back will ensure there are no misunderstandings.
      • Document the conversation and share with HR. This provides evidence of the conversations and helps hold managers accountable.
      What is HR’s role? HR should ensure that the manager has had multiple conversations with the employee before moving to the next step. Furthermore, HR is responsible for ensuring manages are equipped to have the conversations through coaching, role-playing, etc.

      For more information on the content of these conversations or for material to leverage for training purposes, see Manage Poor Performance While Working From Home: Manager Guide.

      McLean & Company Insight

      Managers are there to be coaches, not therapists. Uncovering the root cause of poor performance will allow managers to pinpoint supports needed, either within their expertise (e.g. coaching, training, providing flexible hours) or by directing the employee to proper external resources such as an EAP.

      Help managers use formal performance improvement tools with remote workers

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide
      Deploy: Use performance improvement tools.
      If initial performance conversations were unsuccessful and performance does not improve, refer managers to performance improvement tools:
      • Suggest any other available support and resources they have not yet recommended (e.g. EAP).
      • Explore options for co-creation of a development plan to increase employee buy-in. If the manager has been diligent about clarifying role expectations, invite the employee to put together their own action plan for meeting performance goals. This can then be reviewed and finalized with the manager.
      • Have the manager use a formal PIP for development and to get the employee back on track. Review the development plan or PIP with the manager before they share it with the employee to ensure it is clear and has time bound, realistic goals for improvement.
      Using a PIP solely to avoid legal trouble and terminate employees isn’t true to its intended purpose. This is what progressive discipline is for.In the case of significant behavior problems, like breaking company rules or safety violations, the manager will likely need to move to progressive discipline. HR should advise managers on the appropriate process.

      When does the issue warrant progressive discipline? If the action needs to stop immediately, (e.g. threatening or inappropriate behavior) and/or as outlined in the collective agreement.

      Clarify remote PIP stages and best practices

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide
      Sample Stages:
      1. Written PIP
      • HR reviews and signs off on PIP
      • Manager holds meeting to provide employee with PIP
      • Employee reviews the PIP
      • Manager and employee provide e-signatures
      • Signed PIP is given to HR
      2. Possible Extension
      3. Final Notice
      • Manager provides employee with final notice if there has been no improvement in agreed time frame
      • Copy of signed final notice letter given to HR

      Who is involved?

      The manager runs the meeting with the employee. HR should act as a support by:

      • Ensuring the PIP is clear, aligned with the performance issue, and focused on development, prior to the meeting.
      • Pointing to resources and making themselves available prior to, during, and after the meeting.
        • When should HR be involved? HR should be present in the meeting if the manager has requested it or if the employee has approached HR beforehand with concerns about the manager. Keep in mind that if the employee sees HR has been unexpectedly invited to the video call, it could add extra stress for them.
      • Reviewing documentation and ensuring expectations and the action plan are reasonable and realistic.

      Determine the length of the PIP

      • The length of the initial PIP will often depend on the complexity of the employee’s role and how long it will reasonably take to see improvements. The minimum (before a potential extension) should be 30-60 days.
      • Ensure the action plan takes sustainment into account. Employees must be able to demonstrate improvement and sustain improved performance in order to successfully complete a PIP.

      Timing of delivery

      Help the manager determine when the PIP meeting will occur (what day, time of day). Take into account the schedule of the employee they will be meeting with (e.g. avoid scheduling right before an important client call).

      1

      Identify

      2

      Initiate

      3

      Deploy

      4

      a) Follow Up
      b) Decide

      Follow up: If the process escalated to step 3 and is successful.

      What does success look like? Performance improvement must be sustained after the PIP is completed. It’s not enough to simply meet performance improvement goals and expectations; the employee must continue to perform.

      Have the manager schedule a final PIP review with the employee. Use video, as this enables the employee and manager to read body language and minimize miscommunication/misinterpretation.

      • If performance expectations have been met, instruct managers to document this in the PIP, inform the employee they are off the PIP, and provide it to HR.

      The manager should also continue check-ins with the employee to ensure sustainment and as part of continued performance management.

      • Set a specific timeline, e.g. every two weeks or every month. Choose a cadence that works best for the manager and employee.

      OR

      Decide: Determine action steps if the process is unsuccessful.

      If at the end of step 3 performance has not sufficiently improved, the organization (HR and the manager) should either determine if the employee could/should be temporarily redeployed while the emergency WFH is still in place, if a permanent transfer to a role that is a better fit is an option, or if the employee should be let go.

      See the Complete Manual for COVID-19 Layoffs blueprint for information on layoffs in remote environments.

      Managers, HR, and employees all have a role to play in performance improvement

      Managers
      • Identify the outcomes the organization is looking for and clearly outline and communicate the expectations for the employee’s performance.
      • Diagnose root cause(s) of the performance issue.
      • Support employee through frequent conversations and feedback.
      • Coach for improved performance.
      • Visibly recognize and broadcast employee achievements.
      Employees
      • Have open and honest conversations with their manager, acknowledge their accountability, and be receptive to feedback.
      • Set performance goals to meet expectations of the role.
      • Prepare for frequent check-ins regarding improvement.
      • Seek support from HR as required.
      HR
      • Provide managers with a process, training, and support to improve employee performance.
      • Coach managers to ensure employees have been made aware of their role expectations and current performance and given specific recommendations on how to improve.
      • Reinforce the process for improving employee performance to ensure that adequate coaching conversations have taken place before the formal PIP.
      • Coach employees on how to approach their manager to discuss challenges in meeting expectations.

      HR should conduct checkpoints with both managers and employees in cases where a formal PIP was initiated to ensure the process for performance improvement is being followed and to support both parties in improving performance.

      Email templates

      Use the templates found on the next slides to draft communications to employees who are underperforming while working from home.

      Customize all templates with relevant information and use them as a guide to further tailor your communication to a specific employee.

      Customization Recommendations

      Review all slides and adjust the language or content as needed to suit the needs of the employee, the complexity of their role, and the performance issue.

      • The pencil icon to the left denotes slides requiring customization of the text. Customize text in grey font and be sure to convert all font to black when you are done.

      Included Templates

      1. Performance Discussion Follow-Up
      2. PIP Cover Letter

      This template is not a substitute for legal advice. Ensure you consult with your legal counsel, labor relations representative, and union representative to align with collective agreements and relevant legislation.

      Sample Performance Discussion Follow-Up

      Hello [name],

      Thank you for the commitment and eagerness in our meeting yesterday.

      I wanted to recap the conversation and expectations for the month of [insert month].

      As discussed, you have been advised about your recent [behavior, performance, attendance, policy, etc.] where you have demonstrated [state specific issue with detail of behavior/performance of concern]. As per our conversation, we’ll be working on improvement in this area in order to meet expectations set out for our employees.

      It is expected that employees [state expectations]. Please do not hesitate to reach out to me if there is further clarification needed or you if you have any questions or concerns. The management team and I are committed to helping you achieve these goals.

      We will do a formal check-in on your progress every [insert day] from [insert time] to review your progress. I will also be available for daily check-ins to support you on the right track. Additionally, you can book me in for desk-side coaching outside of my regular desk-side check-ins. If there is anything else I can do to help support you in hitting these goals, please let me know. Other resources we discussed that may be helpful in meeting these objectives are [summarize available support and resources]. By working together through this process, I have no doubt that you can be successful. I am here to provide support and assist you through this.

      If you’re unable to show improvements set out in our discussion by [date], we will proceed to a formal performance measure that will include a performance improvement plan. Please let me know if you have any questions or concerns; I am here to help.

      Please acknowledge this email and let me know if you have any questions.

      Thank you,

      PIP Cover Letter

      Hello [name] ,

      This is to confirm our meeting on [date] in which we discussed your performance to date and areas that need improvement. Please find the attached performance improvement plan, which contains a detailed action plan that we have agreed upon to help you meet role expectations over the next [XX days]. The aim of this plan is to provide you with a detailed outline of our performance expectations and provide you the opportunity to improve your performance, with our support.

      We will check in every [XX days] to review your progress. At the end of the [XX]-day period, we will review your performance against the role expectations set out in this performance improvement plan. If you don’t meet the performance requirements in the time allotted, further action and consequences will follow.

      Should you have any questions about the performance improvement plan or the process outlined in this document, please do not hesitate to discuss them with me.

      [Employee name], it is my personal objective to help you be a fully productive member of our team. By working together through this performance improvement plan, I have no doubt that you can be successful. I am here to provide support and assist you through the process. At this time, I would also like to remind you about the [additional resources available at your organization, for example, employee assistance program or HR].

      Please acknowledge this email and let me know if you have any questions.

      Thank you,

      Prepare and customize manager guide and resources

      Sample of Manage Poor Performance While Working From Home: Manager Guide. Manage Poor Performance While Working From Home: Manager Guide

      This tool for managers provides advice on navigating the process and focuses on the content of remote performance discussions.

      Sample of Set Meaningful Employee Performance Measures. Set Meaningful Employee Performance Measures

      See this blueprint for information on setting holistic measures to inspire employee performance.

      Sample of Manage Poor Performance While Working From Home: Infographic. Manage Poor Performance While Working From Home: Infographic

      This tool illustrates the high-level steps of the performance improvement process.

      Sample of Wellness and Working From Home: Infographic. Wellness and Working From Home: Infographic

      This tool highlights tips to manage physical and mental health while working from home.

      Sample of Build a Better Manager: Team Essentials. Build a Better Manager: Team Essentials

      See this solution set for more information on kick-starting the effectiveness of first-time IT managers with essential management skills.

      Sample of Leverage Agile Goal Setting for Improved Employee Engagement & Performance. Leverage Agile Goal Setting for Improved Employee Engagement & Performance

      See this blueprint for information on dodging the micromanaging foul and scoring with agile short-term goal setting.

      Bibliography

      Arringdale, Chris. “6 Tips For Managers Trying to Overcome Performance Appraisal Anxiety.” TLNT. 18 September 2015. Accessed 2018.

      Borysenko, Karlyn. “What Was Management Thinking? The High Cost of Employee Turnover.” Talent Management and HR. 22 April 2015. Accessed 2018.

      Cook, Ian. “Curbing Employee Turnover Contagion in the Workplace.” Visier. 20 February 2018. Accessed 2018.

      Cornerstone OnDemand. Toxic Employees in the Workplace. Santa Monica, California: Cornerstone OnDemand, 2015. Web.

      Dewar, Carolyn and Reed Doucette. “6 elements to create a high-performing culture.” McKinsey & Company. 9 April 2018. Accessed 2018.

      Eagle Hill. Eagle Hill National Attrition Survey. Washington, D.C.: Eagle Hill, 2015. Web.

      ERC. “Performance Improvement Plan Checklist.” ERC. 21 June 2017. Accessed 2018.

      Foster, James. “The Impact of Managers on Workplace Engagement and Productivity.” Interact. 16 March 2017. Accessed 2018.

      Godwins Solicitors LLP. “Employment Tribunal Statistics for 2015/2016.” Godwins Solicitors LLP. 8 February 2017. Accessed 2018.

      Mankins, Michael. “How to Manage a Team of All-Stars.” Harvard Business Review. 6 June 2017. Accessed 2018.

      Maxfield, David, et al. The Value of Stress-Free Productivity. Provo, Utah: VitalSmarts, 2017. Web.

      Murphy, Mark. “Skip Your Low Performers When Starting Performance Appraisals.” Forbes. 21 January 2015. Accessed 2018.

      Quint. “Transforming into a High Performance Organization.” Quint Wellington Redwood. 16 November 2017. Accessed 2018.

      Ranosa, Rachel. "COVID -19: Canadian Productivity Booms Despite Social Distancing." Human Resources Director, 14 April 2020. Accessed 2020.

      Build a Vendor Security Assessment Service

      • Buy Link or Shortcode: {j2store}318|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $17,501 Average $ Saved
      • member rating average days saved: 17 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Vendor security risk management is a growing concern for many organizations. Whether suppliers or business partners, we often trust them with our most sensitive data and processes.
      • More and more regulations require vendor security risk management, and regulator expectations in this area are growing.
      • However, traditional approaches to vendor security assessments are seen by business partners and vendors as too onerous and are unsustainable for information security departments.

      Our Advice

      Critical Insight

      • An efficient and effective assessment process can only be achieved when all stakeholders are participating.
      • Security assessments are time-consuming for both you and your vendors. Maximize the returns on your effort with a risk-based approach.
      • Effective vendor security risk management is an end-to-end process that includes assessment, risk mitigation, and periodic re-assessments.

      Impact and Result

      • Develop an end-to-end security risk management process that includes assessments, risk treatment through contracts and monitoring, and periodic re-assessments.
      • Base your vendor assessments on the actual risks to your organization to ensure that your vendors are committed to the process and you have the internal resources to fully evaluate assessment results.
      • Understand your stakeholder needs and goals to foster support for vendor security risk management efforts.

      Build a Vendor Security Assessment Service Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a vendor security assessment service, review Info-Tech’s methodology, and understand the three ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define governance and process

      Determine your business requirements and build your process to meet them.

      • Build a Vendor Security Assessment Service – Phase 1: Define Governance and Process
      • Vendor Security Policy Template
      • Vendor Security Process Template
      • Vendor Security Process Diagram (Visio)
      • Vendor Security Process Diagram (PDF)

      2. Develop assessment methodology

      Develop the specific procedures and tools required to assess vendor risk.

      • Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology
      • Service Risk Assessment Questionnaire
      • Vendor Security Questionnaire
      • Vendor Security Assessment Inventory

      3. Deploy and monitor process

      Implement the process and develop metrics to measure effectiveness.

      • Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process
      • Vendor Security Requirements Template
      [infographic]

      Workshop: Build a Vendor Security Assessment Service

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Governance and Process

      The Purpose

      Understand business and compliance requirements.

      Identify roles and responsibilities.

      Define the process.

      Key Benefits Achieved

      Understanding of key goals for process outcomes.

      Documented service that leverages existing processes.

      Activities

      1.1 Review current processes and pain points.

      1.2 Identify key stakeholders.

      1.3 Define policy.

      1.4 Develop process.

      Outputs

      RACI Matrix

      Vendor Security Policy

      Defined process

      2 Define Methodology

      The Purpose

      Determine methodology for assessing procurement risk.

      Develop procedures for performing vendor security assessments.

      Key Benefits Achieved

      Standardized, repeatable methodologies for supply chain security risk assessment.

      Activities

      2.1 Identify organizational security risk tolerance.

      2.2 Develop risk treatment action plans.

      2.3 Define schedule for re-assessments.

      2.4 Develop methodology for assessing service risk.

      Outputs

      Security risk tolerance statement

      Risk treatment matrix

      Service Risk Questionnaire

      3 Continue Methodology

      The Purpose

      Develop procedures for performing vendor security assessments.

      Establish vendor inventory.

      Key Benefits Achieved

      Standardized, repeatable methodologies for supply chain security risk assessment.

      Activities

      3.1 Develop vendor security questionnaire.

      3.2 Define procedures for vendor security assessments.

      3.3 Customize the vendor security inventory.

      Outputs

      Vendor security questionnaire

      Vendor security inventory

      4 Deploy Process

      The Purpose

      Define risk treatment actions.

      Deploy the process.

      Monitor the process.

      Key Benefits Achieved

      Understanding of how to treat different risks according to the risk tolerance.

      Defined implementation strategy.

      Activities

      4.1 Define risk treatment action plans.

      4.2 Develop implementation strategy.

      4.3 Identify process metrics.

      Outputs

      Vendor security requirements

      Understanding of required implementation plans

      Metrics inventory

      Design and Build a User-Facing Service Catalog

      • Buy Link or Shortcode: {j2store}395|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $62,821 Average $ Saved
      • member rating average days saved: 29 Average Days Saved
      • Parent Category Name: Service Management
      • Parent Category Link: /service-management
      • Business users don’t know what breadth of services are available to them.
      • It is difficult for business users to obtain useful information regarding services because they are often described in technical language.
      • Business users have unrealistic expectations of what IT can do for them.
      • There is no defined agreement on what is available, so the business assumes everything is.

      Our Advice

      Critical Insight

      • Define services from the business user’s perspective, not IT’s perspective.
        • A service catalog is of no use if a user looks at it and sees a significant amount of information that doesn’t apply to them.
      • Separate the enterprise services from the Line of Business (LOB) services.
        • This will simplify the process of documenting your service definitions and make it easier for users to navigate, which leads to a higher chance of user acceptance.

      Impact and Result

      • Our program helps you organize your services in a way that is relevant to the users, and practical and manageable for IT.
      • Our approach to defining and categorizing services ensures your service catalog remains a living document. You may add or revise your service records with ease.
      • Our program creates a bridge between IT and the business. Begin transforming IT’s perception within the organization by communicating the benefits of the service catalog.

      Design and Build a User-Facing Service Catalog Research & Tools

      Start here – read the Executive Brief

      Read our concise executive brief to understand why building a Service Catalog is a good idea for your business, and how following our approach will help you accomplish this difficult task.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Launch the project

      The Launch the Project phase will walk through completing Info-Tech's project charter template. This phase will help build a balanced project team, create a change message and communication plan, and achieve buy-in from key stakeholders.

      • Design & Build a User-Facing Service Catalog – Phase 1: Launch the Project
      • Service Catalog Project Charter

      2. Identify and define enterprise services

      The Identify and Define Enterprise Services phase will help to target enterprise services offered by the IT team. They are offered to everyone in the organization, and are grouped together in logical categories for users to access them easily.

      • Design & Build a User-Facing Service Catalog – Phase 2: Identify and Define Enterprise Services
      • Sample Enterprise Services

      3. Identify and define Line of Business (LOB) services

      After completing this phase, all services IT offers to each LOB or functional group should have been identified. Each group should receive different services and display only these services in the catalog.

      • Design & Build a User-Facing Service Catalog – Phase 3: Identify and Define Line of Business Services
      • Sample LOB Services – Industry Specific
      • Sample LOB Services – Functional Group

      4. Complete the Services Definition Chart

      Completing the Services Definition Chart will help the business pick which information to include in the catalog. This phase also prepares the catalog to be extended into a technical service catalog through the inclusion of IT-facing fields.

      • Design & Build a User-Facing Service Catalog – Phase 4: Complete Service Definitions
      • Services Definition Chart
      [infographic]

      Workshop: Design and Build a User-Facing Service Catalog

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Launch the Project

      The Purpose

      The purpose of this module is to help engage IT with business decision making.

      Key Benefits Achieved

      This module will help build a foundation for the project to begin. The buy-in from key stakeholders is key to having them take onus on the project’s completion.

      Activities

      1.1 Assemble the project team.

      1.2 Develop a communication plan.

      1.3 Establish metrics for success.

      1.4 Complete the project charter.

      Outputs

      A list of project members, stakeholders, and a project leader.

      A change message, communication strategy, and defined benefits for each user group.

      Metrics used to monitor the usefulness of the catalog, both from a performance and monetary perspective.

      A completed project charter to engage users in the initiative.

      2 Identify and Define Enterprise Services

      The Purpose

      The purpose of this module is to review services which are offered across the entire organization.

      Key Benefits Achieved

      A complete list of enterprise services defined from the user’s perspective to help them understand what is available to them.

      Activities

      2.1 Identify enterprise services used by almost everyone across the organization.

      2.2 Categorize services into logical groups.

      2.3 Define the services from the user’s perspective.

      Outputs

      A complete understanding of enterprise services for both IT service providers and business users.

      Logical groups for organizing the services in the catalog.

      Completed definitions in business language, preferably reviewed by business users.

      3 Identify and Define Line of Business (LOB) Services

      The Purpose

      The purpose of this module is to define the remaining LOB services for business users, and separate them into functional groups.

      Key Benefits Achieved

      Business users are not cluttered with LOB definitions that do not pertain to their business activities.

      Business users are provided with only relevant IT information.

      Activities

      3.1 Identify the LOBs.

      3.2 Determine which one of two methodologies is more suitable.

      3.3 Identify LOB services using appropriate methodology.

      3.4 Define services from a user perspective.

      Outputs

      A structured view of the different functional groups within the business.

      An easy to follow process for identifying all services for each LOB.

      A list of every service for each LOB.

      Completed definitions in business language, preferably reviewed by business users.

      4 Complete the Full Service Definitions

      The Purpose

      The purpose of this module is to guide the client to completing their service record definitions completely.

      Key Benefits Achieved

      This module will finalize the deliverable for the client by defining every user-facing service in novice terms.

      Activities

      4.1 Understand the components to each service definition (information fields).

      4.2 Pick which information to include in each definition.

      4.3 Complete the service definitions.

      Outputs

      A selection of information fields to be included in the service catalog.

      A selection of information fields to be included in the service catalog.

      A completed service record design, ready to be implemented with the right tool.

      Further reading

      Design and Build a User-Facing Service Catalog

      Improve user satisfaction with IT with a convenient menu-like catalog.

      Our understanding of the problem

      This Research Is Designed For:

      • CIOs
      • Directors and senior managers within IT and the business

      This Research Will Help You:

      • Articulate all of the services IT provides to the business in a language the business users understand.
      • Improve IT and business alignment through a common understanding of service features and IT support.

      This Research Will Help Them

      • Standardize and communicate how users request access to services.
      • Standardize and communicate how users obtain support for services.
      • Clearly understand IT’s role in providing each service.

      What is a service catalog?

      The user-facing service catalog is the go-to place for IT service-related information.

      The catalog defines, documents, and organizes the services that IT delivers to the organization. The catalog also describes the features of the services and how the services are intended to be used.

      The user-facing service catalog creates benefits for both the business and IT.

      For business users, the service catalog:

      1. Documents how to request access to the service, hours of availability, delivery timeframes, and customer responsibilities.
      2. Specifies how to obtain support for the services, support hours, and documentation.

      For IT, the service catalog:

      1. Identifies who owns the services and who is authorized to use the services.
      2. Specifies IT support requirements for the services, including support hours and documentation.

      What is the difference between a user-facing service catalog and a technical service catalog?

      This blueprint is about creating a user-facing service catalog written and organized in a way that focuses on the services from the business’ view.

      User facing

      User-friendly, intuitive, and simple overview of the services that IT provides to the business.

      The items you would see on the menu at a restaurant are an example of User Facing. The content is relatable and easy to understand.

      Technical

      Series of technical workflows, supporting services, and the technical components that are required to deliver a service.

      The recipe book with cooking instructions is an example of Technical Facing. This catalog is intended for the IT teams and is “behind the scene.”

      What is a service and what does it mean to be service oriented?

      The sum of the people, processes, and technologies required to enable users to achieve a business outcome is a Service.

      A service is used directly by the end users and is perceived as a coherent whole.

      Business Users →Service = Application & Systems + People & Processes

      Service Orientation is…

      • A focus on business requirements and business value, rather than IT driven motives.
      • Services are designed to enable required business activities.
      • Services are defined from the business perspective using business language.

      In other words, put on your user hat and leave behind the technical jargons!

      A lack of a published user-facing service catalog could be the source of many pains throughout your organization

      IT Pains

      • IT doesn’t understand all the services they provide.
      • Business users would go outside of IT for solutions, proliferating shadow IT.
      • Business users have a negative yet unrealistic perception of what IT is capable of.
      • IT has no way of managing expectations for their users, which tend to inflate.
      • There is often no defined agreement on services; the business assumes everything is available.

      Business Pains

      • Business users don’t know what services are available to them.
      • It is difficult to obtain useful information regarding a service because IT always talks in technical language.
      • Without a standard process in place, business users don’t know how to request access to a service with multiple sources of information available.
      • Receiving IT support is a painful, long process and IT doesn’t understand what type of support the business requires.

      An overwhelming majority of IT organizations still need to improve how they demonstrate their value to the business

      This image contains a pie chart with a slice representing 23% of the circle This image contains a pie chart with a slice representing 47% of the circle This image contains a pie chart with a slice representing 92% of the circle

      23% of IT is still viewed as a cost center.

      47% of business executives believe that business goals are going unsupported by IT.

      92% of IT leaders see the need to prove the business value of IT’s contribution.

      How a Service Catalog can help:

      Use the catalog to demonstrate how IT is an integral part of the organization and IT services are essential to achieve business objectives.

      Source: IT Communication in Crisis Report

      Transform the perception of IT by articulating all the services that are provided through the service catalog in a user-friendly language.

      Source: Info-Tech Benchmarking and Diagnostic Programs

      Increase IT-business communication and collaboration through the service catalog initiative. Move from technology focused to service-oriented.

      Source: IT Communication in Crisis Report

      Project Steps

      Phase 1 – Project Launch

      1.2 Project Team

      The team must be balanced between representatives from the business and IT.

      1.2 Communication Plan

      Communication plan to facilitate input from both sides and gain adoption.

      1.3 Identify Metrics

      Metrics should reflect the catalog benefits. Look to reduced number of service desk inquiries.

      1.4 Project Charter

      Project charter helps walk you through project preparation.

      This blueprint separates enterprise service from line of business service.

      This image contains a comparison between Enterprise IT Service and Line of Business Service, which will be discussed in further detail later in this blueprint.

      Project steps

      Phase 2 – Identify and Define Enterprise Services

      2.1 Identify the services that are used across the entire organization.

      2.2 Users must be able to identify with the service categories.

      2.3 Create basic definitions for enterprise services.

      Phase 3 – Identify and Define Line of Business Services

      3.1 Identify the different lines of business (LOBs) in the organization.

      3.2 Understand the differences between our two methodologies for identifying LOB services.

      3.3 Use methodology 1 if you have thorough knowledge of the business.

      3.4 Use methodology 2 if you only have an IT view of the LOB.

      Phase 4 – Complete Service Definitions

      4.1 Understand the different components to each service definition, or the fields in the service record.

      4.2 Identify which information to include for each service definition.

      4.3 Define each enterprise service according to the information and field properties.

      4.3 Define each LOB service according to the information and field properties.

      Define your service catalog in bundles to achieve better catalog design in the long run

      Trying to implement too many services at once can be overwhelming for both IT and the users. You don’t have to define and implement all of your services in one release of the catalog.

      Info-Tech recommends implementing services themselves in batches, starting with enterprise, and then grouping LOB services into separate releases. Why? It benefits both IT and business users:

      • It enables a better learning experience for IT – get to test the first release before going full-scale. In other words, IT gets a better understanding of all components of their deliverable before full adoption.
      • It is easier to meet customer agreements on what is to be delivered early, and easier to be able to meet those deadlines.
      This image depicts how you can use bundles to simplify the process of catalog design using bundles. The cycle includes the steps: Identify Services; Select a Service Bundle; Review Record Design; followed by a cycle of: Pick a service; Service X; Service Data Collection; Create Service Record, followed by Publish the bundle; Communicate the bundle; Rinse and Repeat.

      After implementing a service catalog, your IT will be able to:

      Use the service catalog to communicate all the services that IT provides to the business.

      Improve IT’s visibility within the organization by creating a single source of information for all the value creating services IT has to offer. The service catalog helps the business understand the value IT brings to each service, each line of business, and the overall organization.

      Concentrate more on high-value IT services.

      The service catalog contains information which empowers business users to access IT services and information without the help of IT support staff. The reduction in routine inquiries decreases workload and increases morale within the IT support team, and allows IT to concentrate on providing higher value services.

      Reduce shadow IT and gain control of services.

      Service catalog brings more control to your IT environment by reducing shadow IT activities. The service catalog communicates business requests responsively in a language the business users understand, thus eliminating the need for users to seek outside help.

      After implementing a service catalog, your business will be able to:

      Access IT services with ease.

      The language of IT is often confusing for the business and the users don’t know what to do when they have a concern. With a user-facing service catalog, business users can access information through a single source of information, and better understand how to request access or receive support for a service through clear, consistent, and business-relevant language.

      Empower users to self-serve.

      The service catalog enables users to “self-serve” IT services. Instead of calling the service desk every time an issue occurs, the users can rely on the service catalog for information. This simplified process not only reduces routine service requests, but also provides information in a faster, more efficient manner that increases productivity for both IT and the business.

      Gain transparency on the IT services provided.

      With every service clearly defined, business users can better understand the current support level, communicate their expectation for IT accountability, and help IT align services with critical business strategies.

      Leverage the different Info-Tech deliverable tools to help you along the way

      1. Project Charter

      A project charter template with a few samples completed. The project charter helps you govern the project progress and responsibilities.

      2. Enterprise Service Definitions

      A full list of enterprise definitions with features and descriptions pre-populated. These are meant to get you on your feet defining your own enterprise services, or editing the ones already there.

      3. Basic Line of Business Service Definitions

      Similar to the enterprise services deliverable, but with two separate deliverables focusing on different perspectives – functional groups services (e.g. HR and finance) and industry-specific services (e.g. education and government).

      Service Definitions & Service Record Design

      Get a taste of a completed service catalog with full service definitions and service record design. This is the final product of the service catalog design once all the steps and activities have been completed.

      The service catalog can be the foundation of your future IT service management endeavors

      After establishing a catalog of all IT services, the following projects are often pursued for other objectives. Service catalog is a precursor for all three.

      1. Technical Service Catalog

      Need an IT-friendly breakdown of each service?
      Keep better record of what technical components are required to deliver a service. The technical service catalog is the IT version of a user-facing catalog.

      2. Service-Based Costing

      Want to know how much each IT service is costing you?
      Get a better grip on the true cost of IT. Using service-based costing can help justify IT expenses and increase budgetary allotment.

      3. Chargeback

      Want to hold each business unit accountable for the IT services they use?
      Some business units abuse their IT services because they are thought to be free. Keep them accountable and charge them for what they use.

      The service catalog need not be expensive – organizations of all sizes (small, medium, large) can benefit from a service catalog

      No matter what size organization you may be, every organization can create a service catalog. Small businesses can benefit from the catalog the same way a large organization can. We have an easy step-by-step methodology to help introduce a catalog to your business.

      It is common that users do not know where to go to obtain services from IT… We always end up with a serious time-crunch at the beginning of a new school year. With automated on- and off-boarding services, this could change for the better.Dean Obermeyer, Technology Coordinator, Los Alamos Public Schools

      CIO Call to Action

      As the CIO and the project sponsor, you need to spearhead the development of the service catalog and communicate support to drive engagement and adoption.

        Start

      1. Select an experienced project leader
      2. Identify stakeholders and select project team members with the project leader
      3. Throughout the project

      4. Attend or lead the project kick-off meeting
      5. Create checkpoints to regularly touch base with the project team
      6. Service catalog launch

      7. Communicate the change message from beginning to implementation

      Identify a project leader who will drive measurable results with this initiative

      The project leader acts on behalf of the CIO and must be a senior level staff member who has extensive knowledge of the organization and experiences marshalling resources.

      Influential & Impactful

      Developing a service catalog requires dedication from many groups within IT and outside of IT.
      The project leader must hold a visible, senior position and can marshal all the necessary resources to ensure the success of the project. Ability to exert impact and influence around both IT and the business is a must.

      Relationship with the Business

      The user-facing service catalog cannot be successful if business input is not received.
      The project leader must leverage his/her existing relationship with the business to test out the service definitions and the service record design.

      Results Driven

      Creating a service catalog is not an easy job and the project leader must continuously engage the team members to drive results and efficiency.
      The highly visible nature of the service catalog means the project leader must produce a high-quality outcome that satisfies the business users.

      Info-Tech’s methodology helps organization to standardize how to define services

      CASE STUDY A
      Industry Municipal Government
      Source Onsite engagement

      Municipal Government
      The IT department of a large municipal government in the United States provides services to a large number of customers in various government agencies.
      Service Catalog Initiative
      The municipal government allocated a significant amount of resources to answer routine inquiries that could have been avoided through user self-service. The government also found that they do not organize all the services IT provides, and they could not document and publish them to the customer. The government has already begun the service catalog initiative, but was struggling with how to identify services. Progress was slow because people were arguing amongst themselves – the project team became demoralized and the initiative was on the brink of failure.
      Results
      With Info-Tech’s onsite support, the government was able to follow a standardized methodology to identify and define services from the user perspective. The government was able to successfully communicate the initiative to the business before the full adoption of the service catalog.

      We’re in demos with vendors right now to purchase an ITSM tool, and when the first vendor looked at our finished catalog, they were completely impressed.- Client Feedback

      [We feel] very confident. The group as a whole is pumped up and empowered – they're ready to pounce on it. We plan to stick to the schedule for the next three months, and then review progress/priorities. - Client Feedback

      CASE STUDY B
      Industry Healthcare
      Source Onsite engagement

      Healthcare Provider
      The organization is a healthcare provider in Canada. It treats patients with medical emergencies, standard operations, and manages a faculty of staff ranging from nurses and clerks, to senior doctors. This organization is run across several hospitals, various local clinics, and research centers.
      Service Catalog Initiative
      Because the organization is publicly funded, it is subject to regular audit requirements – one of which is to have a service catalog in place.
      The organization also would like to charge back its clients for IT-related costs. In order to do this, the organization must be able to trace it back to each service. Therefore, the first step would be to create a user-facing service catalog, followed by the technical service catalog, which then allows the organization to do service-based costing and chargeback.
      Results
      By leveraging Info-Tech’s expertise on the subject, the healthcare provider was able to fast-track its service catalog development and establish the groundwork for chargeback abilities.

      "There is always some reticence going in, but none of that was apparent coming out. The group dynamic was very good. [Info-Tech] was able to get that response, and no one around the table was silent.
      The [expectation] of the participants was that there was a purpose in doing the workshop. Everybody knew it was for multiple reasons, and everyone had their own accountability/stakes in the development of it. Highly engaged."
      - Client Feedback

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Launch the Project

      Identify Enterprise Services

      Identify Line of Business Services

      Complete Service Definitions

      Best-Practice Toolkit

      1.1 Assemble the project team.

      1.2 Develop a communication plan.

      1.3 Establish metrics for success.

      1.4 Complete the project charter.

      2.1 Identify services available organization-wide.

      2.2 Categorize services into logical groups.

      2.3 Define the services.

      3.1 Identify different LOBs.

      3.2 Pick one of two methodologies.

      3.3 Use method to identify LOB services.

      4.1 Learn components to each service definition.

      4.2 Pick which information to include in each definition.

      4.3 Define each service accordingly.

      Guided Implementations Identify the project leader with the appropriate skills.

      Assemble a well-rounded project team.

      Develop a mission statement and change messages.

      Create a comprehensive list of enterprise services that are used across the organization.

      Create a categorization scheme that is based on the needs of the business users.

      Walk through the two Info-Tech methodologies and understand which one is applicable.

      Define LOB services using the appropriate methodology.

      Decide what should be included and what should be kept internal for the service record design.

      Complete the full service definitions.

      Onsite Workshop Phase 1 Results:

      Clear understanding of project objectives and support obtained from the business.

      Phase 2 Results:

      Enterprise services defined and categorized.

      Phase 3 Results:

      LOB services defined based on user perspective.

      Phase 4 Results:

      Service record designed according to how IT wishes to communicate to the business.

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
      Activities

      Launch the Project

      Identify Enterprise Services

      Identify Line of Business Services

      Complete Service Definitions

      1.1 Assemble the project team.

      1.2 Develop a communication plan.

      1.3 Establish metrics for success.

      1.4 Complete the project charter.

      2.1 Identify services available organization-wide.

      2.2 Categorize services into logical groups.

      2.3 Define the services.

      3.1 Identify different LOBs.

      3.2 Pick one of two methodologies.

      3.3 Use method to identify LOB services.

      4.1 Learn components to each service definition.

      4.2 Pick which information to include in each definition.

      4.3 Define each service accordingly.

      Deliverables
      • Service Catalog Project Charter
      • Enterprise Service Definitions
      • LOB Service Definitions – Functional groups
      • LOB Service Definitions – Industry specific
      • Service Definitions Chart

      PHASE 1

      Launch the Project

      Design & Build a User-Facing Service Catalog

      Step 1 – Create a project charter to launch the initiative

      1. Complete the Project Charter
      2. Create Enterprise Services Definitions
      3. Create Line of Business Services Definitions
      4. Complete Service Definitions

      This step will walk you through the following activities:

      • Develop a mission statement to obtain buy-ins from both IT and business stakeholders.
      • Assemble a well-rounded project team to increase the success of the project.
      • Identify and obtain support from stakeholders.
      • Create an impactful change message to the organization to promote the service catalog.
      • Determine project metrics to measure the effectiveness and value of the initiative.

      Step Insights

      • The project leader must have a strong relationship with the business, the ability to garner user input, and the authority to lead the team in creating a user-facing catalog that is accessible and understandable to the user.
      • Having two separate change messages prepared for IT and the business is a must. The business change message advocates how the catalog will make IT more accessible to users, and the IT message centers around how the catalog will make IT’s life easier through a standardized request process.

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Launch the project
      Proposed Time to Completion: 2 weeks
      Step 1.2: Create change messages

      Step 1.2: Create change messages

      Start with an analyst kick off call:

      • Identify the key objectives of creating a user-facing service catalog.
      • Identify the necessary members of the project team.

      Review findings with analyst:

      • Prioritize project stakeholders according to their involvement and influence.
      • Create a change message for IT and the business articulating the benefits.

      Then complete these activities…

    • Assemble a team with representatives from all areas of IT.
    • Identify the key project stakeholders.
    • Create a project mission statement.
    • Then complete these activities…

    • Create a separate change message for IT and the business.
    • Determine communication methods and channels.
    • With these tools & templates: Service

      Catalog Project Charter

      With these tools & templates:

      Service Catalog Project Charter

      Use Info-Tech’s Service Catalog Project Charter to begin your initiative

      1.1 Project Charter

      The following section of slides outline how to effectively use Info-Tech’s sample project charter.

      The Project Charter is used to govern the initiative throughout the project. IT should provide the foundation for project communication and monitoring.

      It has been pre-populated with information appropriate for Service Catalog projects. Please review this sample text and change, add, or delete information as required.

      Building the charter as a group will help you to clarify your key messages and help secure buy-in from critical stakeholders upfront.

      You may feel like a full charter isn’t necessary, and depending on your organizational size, it might not be. However, the exercise of building the charter is important none-the-less. No matter your current climate, some elements of communicating the value and plans for implementing the catalog will be necessary.

      The Charter includes the following sections:

      • Mission Statement
      • Project team members
      • Project stakeholders
      • Change message
      • Communication and organizational plan
      • Metrics

      Use Info-Tech’s Service Catalog Project Charter.

      Create a mission statement to articulate the purpose of this project

      The mission statement must be compelling because embarking on creating a service catalog is no easy task. It requires significant commitment from different people in different areas of the business.

      Good mission statements are directive, easy to understand, narrow in focus, and favor substance over vagueness.

      While building your mission statement, think about what it is intended to do, i.e. keep the project team engaged and engage others to adopt the service catalog. Included in the project charter’s mission statement section is a brief description of the goals and objectives of the service catalog.

      Ask yourself the following questions:

      1. What frustrations does your business face regarding IT services?
      2. f our company continues growing at this rate, will IT be able to manage service levels?
      3. How has IT benefited from consolidating IT services into a user perspective?

      Project Charter

      Info-Tech’s project charter contains two sample mission statements, along with additional tips to help you create yours.

      Tackle the project with a properly assembled team to increase the speed and quality in which the catalog will be created

      Construct a well-balanced project team to increase your chances of success.

      Project Leader

      Project leader will be the main catalyst for the creation of the catalog. This person is responsible for driving the whole initiative.

      Project Participants

      IT project participants’ input and business input will be pivotal to the creation of the catalog.

      Project Stakeholders

      The project stakeholders are the senior executives who have a vested interest in the service catalog. IT must produce periodic and targeted communication to these stakeholders.

      Increase your chances of success by creating a dynamic group of project participants

      Your project team will be a major success factor for your service catalog. Involvement from IT management and the business is a must.

      IT Team Member

      IT Service Desk Manager

      • The Service Desk team will be an integral part of the service catalog creation. Because of their client-facing work, service desk technicians can provide real feedback about how users view and request services.

      Senior Manager/Director of Application

      • The Application representative provides input on how applications are used by the business and supported by IT.

      Senior Manager/Director of Infrastructure

      • The infrastructure representative provides input on services regarding data storage, device management, security, etc.

      Business Team Member

      Business IT Liaison

      • This role is responsible for bridging the communication between IT and the business. This role could be fulfilled by the business relationship manager, service delivery manager, or business analyst. It doesn’t have to be a dedicated role; it could be part of an existing role.

      Business representatives from different LOBs

      • Business users need to validate the service catalog design and ensure the service definitions are user facing and relevant.

      Project Charter

      Input your project team, their roles, and relevant contact information into your project charter, Section 2.

      Identify the senior managers who are the stakeholders for the service catalog

      Obtain explicit buy-in from both IT and business stakeholders.

      The stakeholders could be your biggest champions for the service catalog initiative, or they could pull you back significantly. Engage the stakeholders at the start of the project and communicate the benefits of the service catalog to them to gain their approval.

      Stakeholders

      Benefits

      CIO
      • Improved visibility and perception for IT
      • Ability to better manage business expectation

      Manager of Service Desk

      • Reduced number of routine inquires
      • Respond to business needs faster and uniformly

      Senior Manager/Director of Application & Infrastructure

      • Streamlined and standardized request/support process
      • More effective communication with the business

      Senior Business Executives from Major LOBs

      • Self-service increases user productivity for business users
      • Better quality of services provided by IT

      Project Charter

      Document a list of stakeholders, their involvement in the process (why they are stakeholders), and their contact information in Section 3.

      Articulate the creation of the service catalog to the organization

      Spread the word of service catalog implementation. Bring attention to your change message through effective mediums and organizational changes.

      Key aspects of a communication plan

      The methods of communication (e.g. newsletters, email broadcast, news of the day, automated messages) notify users of implementation.

      In addition, it is important to know who will deliver the message (delivery strategy). Talking to the business leaders is very important, and you need IT executives to deliver the message. Work hard on obtaining their support as they are the ones communicating to their staff and could be your project champions.

      Recommended organizational changes

      The communication plan should consist of changes that will affect the way users interact with the catalog. Users should know of any meetings pertinent to the maintenance and improvement of the catalog, and ways to access the catalog (e.g. link on desktop/start menu).

      This image depicts the cycle of communicating change. the items in the cycle include: What is the change?; Why are we doing it?; How are we going to go about it?; What are we trying to achieve?; How often will we be updated?

      The Qualities of Leadership: Leading Change

      Project Charter

      Your communication plan should serve as a rough guide. Communication happens in several unpredictable happenstances, but the overall message should be contained within.

      Ensure you get the whole company on board for the service catalog with a well practiced change message

      The success of your catalog implementation hinges on the business’ readiness.

      One of the top challenges for organizations that are implementing a service catalog is the acceptance and adoption of the change. Effective planning for implementation and communication is pivotal. Ensure you create tailored plans for communication and understand how the change will impact staff.

      1. Draft your change message
      2. “Better Service, Better Value.” It is important to have two change messages prepared: one for the IT department and one for business users.
        Outline a few of the key benefits each user group will gain from adopting the service catalog (e.g. Faster, ease of use, convenient, consistent…)

      3. Address feedback
      4. Anticipate some resistances of service catalog adoption and prepare responses. These may be the other benefits which were not included in the change message (e.g. IT may be reluctant to think in business language.)

      5. Conduct training sessions
      6. Host lunch & learns to demonstrate the value of the service catalog to both business and IT user groups.
        These training sessions also serve as a great way to gather feedback from users regarding style and usability.

      Project Charter

      Pick your communication medium, and then identify your target audience. You should have a change message for each: the IT department and the business users. Pay careful consideration to wording and phrasing with regard for each.

      Track metrics throughout the project to keep stakeholders informed

      In order to measure the success of your service catalog, you must establish baseline metrics to determine how much value the catalog is creating for your business.

      1. Number of service requests via the service catalog
      2. The number of service catalog requests should be carefully monitored so that it does not fluctuate too greatly. In general, the number of requests via the service catalog should increase, which indicates a higher level of self-serve.

      3. Number of inquiry calls to the service desk
      4. The number of inquiry calls should decrease because customers are able to self-serve routine IT inquiries that would otherwise have gone through the service desk.

      5. Customer satisfaction – specific questions
      6. The organization could adopt the following sample survey questions:
        From 0-5: How satisfied are you with the functionality of the service catalog? How often do you turn to the service catalog first to solve IT problems?

      7. Number of non-standard requests
      8. The number of non-standard requests should decrease because a majority of services should eventually be covered in the service catalog. Users should be able to solve nearly any IT related problem through navigating the service catalog.

      Metric Description Current Metric Future Goal
      Number of service requests via the Service Catalog
      Number of inquiry calls to the service desk
      Customer Satisfaction – specific question
      Number of non-standard requests

      Use metrics to monitor the monetary improvements the service catalog creates for the business

      When measuring against your baseline, you should expect to see the following two monetary improvements:

      1. Improved service desk efficiency
      2. (# of routine inquiry calls reduced) x (average time for a call) x (average service desk wage)

        Routine inquiries often take up a significant portion of the service desk’s effort, and the majority of them can be answered via the service catalog, thus reducing the amount of time required for a service desk employee to engage in routine solutions. The reduction in routine inquiries allows IT to allocate resources to high-value services and provide higher quality of support.

      Example

      Originally, the service desk of an organization answers 850 inquiries per month, and around 540 of them are routine inquiries requesting information on when a service is available, who they can contact if they want to receive a service, and what they need to do if they want access to a service, etc.

      IT successfully communicated the introduction of the service catalog to the business and 3 months after the service catalog was implemented, the number of routine inquiries dropped to 60 per month. Given that the average time for IT to answer the inquiry is 10 minutes (0.167 hour) and the hourly wage of a service desk technician is $25, the monthly monetary cost saving of the service catalog is:

      (540 – 60) x 0.167 x 25 = $2004.00

      • Reduced expense by eliminating non-standard requests

      (Average additional cost of non-standard request) x (Reduction of non-standard request)
      +
      (Extra time IT spends on non-standard request fulfilment) x (Average wage)

      Non-standard requests require a lot of time, and often a lot of money. IT frequently incurs additional cost because the business is not aware of how to properly request service or support. Not only can the service catalog standardize and streamline the service request process, it can also help IT define its job boundary and say no to the business if needed.

      Example

      The IT department of an organization often finds itself dealing with last-minute, frustrating service requests from the business. For example, although equipment requests should be placed a week in advance, the business often requests equipment to be delivered the next day, leaving IT to pay for additional expedited shipping costs and/or working fanatically to allocate the equipment. Typically, these requests happen 4 times a month, with an additional cost of $200.00. IT staff work an extra 6 hours per each non-standard request at an hourly wage of $30.00.

      With the service catalog, the users are now aware of the rules that are in place and can submit their request with more ease. IT can also refer the users to the service catalog when a non-standard request occurs, which helps IT to charge the cost to the department or not meet the terms of the business.

      The monthly cost saving in this case is:

      $200.00 x 4 + 6 hours x 30 = $980.00

      Create your project charter for the service catalog initiative to get key stakeholders to buy in

      1.1 2-3 hours

      The project charter is an important document to govern your project process. Support from the project sponsors is important and must be documented. Complete the following steps working with Info-Tech’s sample Project Charter.

      1. The project leader and the core project team must identify key reasons for creating a service catalog. Document the project objectives and benefits in the mission statement section.
      2. Identify and document your project team. The team must include representatives from the Infrastructure, Applications, Service desk, and a Business-IT Liaison.
      3. Identify and document your project stakeholders. The stakeholders are those who have interest in seeing the service catalog completed. Stakeholders for IT are the CIO and management of different IT practices. Stakeholders for the business are executives of different LOBs.
      4. Identify your target audience and choose the communication medium most effective to reach them. Draft a communication message hitting all key elements.
        Info-Tech’s project charter contains sample change messages for the business and IT.
      5. Develop a strategy as to how the change message will be distributed, i.e. the communication and organizational change plan.
      6. Use the metrics identified as a base to measure your service catalog’s implementation. If you have identified any other objectives, add new metrics to monitor your progress from the baseline to reaching those objectives.
      7. Sign and date the project charter to officiate commitment to completing the project and reaching your objectives. Have the signed and dated charter available to members of the project team.

      INPUT

      • A collaborative discussion between team members

      OUTPUT

      • Thorough briefing for project launch
      • A committed team

      Materials

      • Communication message and plan
      • Metric tracking

      Participants

      • Project leader
      • Core project team

      Obtain buy-in from business users at the beginning of the service catalog initiative

      CASE STUDY A
      Industry Government
      Source Onsite engagement

      Challenge

      The nature of government IT is quite complex: there are several different agencies located in a number of different areas. It is extremely important to communicate the idea of the service catalog to all the users, no matter the agency or location.

      The IT department had yet to let business leaders of the various agencies know about the initiative and garner their support for the project. This has proven to be prohibitive for gaining adoption from all users.

      Solution

      The IT leaders met and identified all the opportunities to communicate the service catalog to the business leaders and end users.

      To meet with the business leaders, IT leaders hosted a service level meeting with the business directors and managers. They adopted a steering committee for the continuation of the project.

      To communicate with business users, IT leaders published announcements on the intranet website before releasing the catalog there as well.

      Results

      Because IT communicated the initiative, support from business stakeholders was obtained early and business leaders were on board shortly after.

      IT also managed to convince key business stakeholders to become project champions, and leveraged their network to communicate the initiative to their employees.

      With this level of adoption, it meant that it was easier for IT to garner business participation in the project and to obtain feedback throughout.

      Info-Tech assists project leader to garner support from the project team

      CASE STUDY A
      Industry Government
      Source Onsite engagement

      Challenge

      The project received buy-in from the CIO and director of infrastructure. Together they assembled a team and project leader.

      The two struggled to get buy-in from the rest of the team, however. They didn’t understand the catalog or its benefits and objectives. They were reluctant to change their old ways. They didn’t know how much work was required from them to accomplish the project.

      Solution

      With the Info-Tech analyst on site, the client was able to discuss the benefits within their team as well as the project team responsibilities.

      The Info-Tech analyst convinced the group to move towards focusing on a business- and service-oriented mindset.

      The workshop discussion was intended to get the entire team on board and engaged with meeting project objectives.

      Results

      The project team had experienced full buy-in after the workshop. The CIO and director relived their struggles of getting project members on-board through proper communication and engagement.

      Engaging the members of the project team with the discussion was key to having them take ownership in accomplishing the project.

      The business users understood that the service catalog was to benefit their long-term IT service development.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
      The following are sample activities that will be conducted by Info-Tech analysts with your team:
      1.1 this image contains a screenshot from section 1.1 of this blueprint. Begin your project with a mission statement
      A strong mission statement that outlines the benefits of the project is needed to communicate the purpose of the project. The onsite Info-Tech analysts will help you customize the message and establish the foundation of the project charter.
      1.2 this image contains a screenshot from section 1.2 of this blueprint.

      Identify project team members

      Our onsite analysts will help you identify high-value team members to contribute to this project.

      1.3 This image contains a screenshot from section 1.3 of this blueprint.

      Identify important business and IT stakeholders

      Buy-in from senior IT and business management is a must. Info-Tech will help you identify the stakeholders and determine their level of influence and impact.

      1.4 This image contains a screenshot from section 1.4 of this blueprint.

      Create a change message for the business and IT

      It is important to communicate changes early and the message must be tailored for each target audience. Our analysts will help you create an effective message by articulating the benefits of the service catalog to the business and to IT.

      1.5 This image contains a screenshot from section 1.5 of this blueprint.

      Determine service project metrics

      To demonstrate the value of the service catalog, IT must come up with tangible metrics. Info-Tech’s analysts will provide some sample metrics as well as facilitate a discussion around which metrics should be tracked and monitored.

      PHASE 2

      Identify and Define Enterprise Services

      Design & Build a User-Facing Service Catalog

      Step 2 – Create Enterprise Services Definitions

      1. Complete the Project Charter
      2. Create Enterprise Services Definitions
      3. Create Line of Business Services Definitions
      4. Complete Service Definitions

      This step will walk you through the following activities:

      • Identify and define enterprise services that are commonly used across the organization.
      • Create service descriptions and features to accurately sum up the functionality of each service.
      • Create service categories and assign each service to a category.

      Step Insights

      • When defining services, be sure to carefully distinguish between what is a feature and what is a service. Often, separate services are defined in situations when they would be better off as features of existing services, and vice versa.
      • When coming up with enterprise services categories, ensure the categories group the services in a way that is intuitive. The users should be able to find a service easily based on the names of the categories.

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Define Enterprise Services
      Proposed Time to Completion: 4 weeks

      Step 2.1: Identify enterprise services

      Step 2.2: Create service categories

      Start with an analyst kick off call:

      • Identify enterprise services that are commonly used.
      • Ensure the list is comprehensive and capture common IT needs.
      • Create service descriptions and features.

      Review findings with analyst:

      • Review full list of identified enterprise services.
      • Identify service categories that are intuitive to the users.

      Then complete these activities…

      • Use Info-Tech’s sample enterprise service definitions as a guide, and change/add/delete the service definitions to customize them to your organization.

      Then complete these activities…

      • Group identified services into categories that are intuitive to the users.

      With these tools & templates: Service

      Sample Enterprise Services

      With these tools & templates:

      Sample Enterprise Services

      Identify enterprise services in the organization apart from the services available to lines of business

      Separating enterprise services from line of business services helps keep things simple to organize the service catalog. -

      Documentation of all business-facing IT services is an intimidating task, and a lack of parameters around this process often leads to longer project times and unsatisfactory outcomes.

      To streamline this process, separating enterprise services from line of business services allows IT to effectively and efficiently organize these services. This method increases the visibility of the service catalog through user-oriented communication plans.

      Enterprise Services are common services that are used across the organization.

      1. Common Services for all users within the organization (e.g. Email, Video Conferencing, Remote Access, Guest Wireless)
      2. Service Requests organized into Service Offerings (e.g. Hardware Provisioning, Software Deployment, Hardware Repair, Equipment Loans)
      3. Consulting Services (e.g. Project Management, Business Analysis, RFP Preparation, Contract Negotiation)

      All user groups access Enterprise Services

      Enterprise Services

      • Finance
      • IT
      • Sales
      • HR

      Ensure your enterprise services are defined from the user perspective and are commonly used

      If you are unsure whether a service is enterprise wide, ask yourself these two questions:

      This image contains an example of how you would use the two questions: Does the user directly use the service themselves?; and; Is the service used by the entire organization (or nearly everyone)?. The examples given are: A. Video Conferencing; B. Exchange Server; C. Email & Fax; D. Order Entry System

      Leverage Info-Tech’s Sample Enterprise Services definition

      2.1 Info-Tech’s Sample Enterprise Services definitions

      Included with this blueprint is Info-Tech’s Sample Enterprise Services definitions.

      The sample contains dozens of services common across most organizations; however, as a whole, they are not complete for every organization. They must be modified according to the business’ needs. Phase two will serve as a guide to identifying an enterprise service as well as how to fill out the necessary fields.

      This image contains a screenshot of definitions from Info-Tech's Sample Enterprises services

      Info-Tech Insight

      Keep track of which services you either modify or delete. You will have to change the same services in the final Info-Tech deliverable.

      The next slide will introduce you to the information for each service record that can be edited.

      Info-Tech’s Sample Enterprise Services definitions is designed to be easily customized

      2.1 Info-Tech’s Sample Enterprise Services definitions

      Below is an example of a service record and its necessary fields of information. This is information that can be kept, deleted, or expanded upon.

      Name the service unambiguously and from the user’s perspective.

      Brief description of how the service allows users to perform tasks.

      Describe the functionality of the service and how it helps users to achieve their business objectives.

      Cluster the services into logical groups.

      Service Name Description Features Category
      Email Email communication to connect with other employees, suppliers, and customers
      • Inbox
      • Calendar
      • Resource Scheduling (meeting rooms)
      • Access to shared mailboxes
      • Limit on mailbox size (‘x’ GB)
      • Address book/external contacts
      • Spam filtering, virus protection
      • Archiving and retrieval of older emails
      • Web/browser access to email
      • Mass email/notification (emergency, surveys, reporting)
      • Setting up a distribution list
      • Setting up Active Sync for email access on mobile devices
      Communications

      Distinguish between a feature and a unique service

      It can be difficult to determine what is considered a service itself, and what is a feature of another service. Use these tips and examples below to help you standardize this judgement.

      Example 1

      Web Conferencing has already been defined as a service. Is Audio Conferencing its own service or a feature of Web Conferencing?

      Info-Tech Tip: Is Audio Conferencing run by the same application as the Web Conferencing? Does it use the same equipment? If not, Audio Conferencing is probably its own service.

      Example 2

      Web Conferencing has already been defined as a service. Is “Screen Sharing” its own service or a feature of Web Conferencing?

      Info-Tech Tip: It depends on how the user interacts with Screen Sharing. Do they only screen share when engaged in a Web Conference? If so, Screen Sharing is a feature and not a service itself.

      Example 3

      VoIP is a popular alternative to landline telephone nowadays, but should it be part of the telephony service or a separate service?

      Info-Tech Tip: It depends on how the VoIP phone is set up.

      If the user uses the VoIP phone the same way they would use a landline phone – because the catalog is user facing – consider the VoIP as part of the telephone service.

      If the user uses their computer application to call and receive calls, consider this a separate service on its own.

      Info-Tech Insight

      While there are some best practices for coming up with service definitions, it is not an exact science and you cannot accommodate everyone. When in doubt, think how most users would perceive the service.

      Change or delete Info-Tech’s enterprise services definitions to make them your own

      2.1 3 hours

      You need to be as comprehensive as possible and try to capture the entire breadth of services IT provides to the business.

      To achieve this, a three-step process is recommended.

      1. First, assemble your project team. It is imperative to have representatives from the service desk. Host two separate workshops, one with the business and one with IT. These workshops should take the form of focus groups and should take no more than 1-2 hours.
      2. Business Focus Group:
      • In an open-forum setting, discuss what the business needs from IT to carry out their day-to-day activities.
      • Engage user-group representatives and business relationship managers.

      IT Focus Group:

      • In a similar open-forum setting, determine what IT delivers to the business. Don’t think about it from a support perspective, but from an “ask” perspective – e.g. “Service Requests.
      • Engage the following individuals: team leads, managers, directors.
    • Review results from the focus groups and compare with your service desk tickets – are there services users inquire about frequently that are not included? Finalize your list of enterprise services as a group.
    • INPUT

      • Modify Info-Tech’s sample services

      OUTPUT

      • A list of some of your business’ enterprise services

      Materials

      • Whiteboard/marker
      • Info-Tech sample enterprise services

      Participants

      • Key members of the project team
      • Service desk rep
      • Business rep

      Using Info-Tech’s Sample Enterprise Services, expand upon the services to add those that we did not include

      2.2 1-3 hours (depending on size and complexity of the IT department)

      Have your user hat on when documenting service features and descriptions. Try to imagine how the users interact with each service.

      1. Once you have your service name, start with the service feature. This field lists all the functionality the service provides. Think from the user’s perspective and document the IT-related activities they need to complete.
      2. Review the service feature fields with internal IT first to make sure there isn’t any information that IT doesn’t want to publish. Afterwards, review with business users to ensure the language is easy to understand and the features are relatable.
      3. Lastly, create a high-level service description that defines the nature of the service in one or two sentences.

      INPUT

      • Collaborate and discuss to expand on Info-Tech’s example

      OUTPUT

      • A complete list of your business’ enterprise services

      Materials

      • Whiteboard/marker
      • Info-Tech sample enterprise services

      Participants

      • Key members of the project team
      • Service desk rep
      • Business rep

      Follow Info-Tech’s guidelines to establish categories for the enterprise services that IT provides to the business

      Similar to the services and their features, there is no right or wrong way to categorize. The best approach is to do what makes sense for your organization and understand what your users think.

      What are Service Categories?

      Categories organize services into logical groups that the users can identify with. Services with similar functions are grouped together in a common category.

      When deciding your categories, think about:

      • What is best for the users?
      • Look at the workflows from the user perspective: how and why do they use the service?
      • Will the user connect with the category name?
      • Will they think about the services within the category?
      Enterprise Service Categories
      Accounts and Access
      Collaboration
      Communication
      Connectivity
      Consulting
      Desktop, Equipment, & Software
      Employee Services
      Files and Documents
      Help & Support
      Training

      Sample categories

      Categorize the services from the list below; how would you think to group them?

      There is no right or wrong way to categorize services; it is subjective to how they are provided by IT and how they are used by the business. Use the aforementioned categories to group the following services. Sample solutions are provided on the following slide.

      Service Name
      Telephone
      Email
      Remote access
      Internet
      BYOD (wireless access)
      Instant Messaging
      Video Conferencing
      Audio Conferencing
      Guest Wi-Fi
      Document Sharing

      Tips and tricks:

      1. Think about the technology behind the service. Is it the same application that provides the services? For example: is instant messaging run by the same application as email?
      2. Consider how the service is used by the business. Are two services always used together? If instant messaging is always used during video conferencing, then they belong in the same category.
      3. Consider the purpose of the services. Do they achieve the same outcomes? For example, document sharing is different from video conferencing, though they both support a collaborative working environment.

      This is a sample of different categorizations – use these examples to think about which would better suit your business

      Example 1 Example 2

      Desktop, Equipment, & Software Services

      Connectivity

      Mobile Devices

      Communications

      Internet

      Telephone

      BYOD (wireless access)

      Telephone

      Guest Wi-Fi

      Internet

      Email

      Remote Access

      Instant Messaging

      Video Conferencing

      Audio Conferencing

      Communications

      Collaboration

      Storage and Retrieval

      Accounts and Access

      Telephone

      Email

      Document Sharing

      Remote access

      Email

      Instant Messaging

      Connectivity

      Mobile Devices

      Video Conferencing

      Internet

      BYOD (wireless access)

      Audio Conferencing

      Guest Wi-Fi

      Guest Wi-Fi

      Document Sharing

      Info-Tech Insight

      Services can have multiple categories only if it means the users will be better off. Try to limit this as much as possible.

      Neither of these two examples are the correct answer, and no such thing exists. The answers you came up with may well be better suited for the users in your business.

      With key members of your project team, categorize the list of enterprise services you have created

      2.3 1 hour

      Before you start, you must have a modified list of all defined enterprise services and a modified list of categories.

      1. Write down the service names on sticky notes and write down the categories either on the whiteboard or on the flipchart.
      2. Assign the service to a category one at a time. For each service, obtain consensus on how the users would view the service and which category would be the most logical choice. In some cases, discuss whether a service should be included in two categories to create better searchability for the users.
      3. If a consensus could not be reached on how to categorize a service, review the service features and category name. In some cases, you may go back and change the features or modify or create new categories if needed.

      INPUT

      • Collaborate and discuss to expand on Info-Tech’s example

      OUTPUT

      • A complete list of your business’ enterprise services

      Materials

      • Whiteboard/marker
      • Info-Tech sample enterprise services

      Participants

      • Key members of the project team
      • Service desk rep
      • Business rep

      Accounts & Access Services

      • User ID & Access
      • Remote Access
      • Business Applications Access

      Communication Services

      • Telephone
      • Email
      • Mobile devices

      Files & Documents

      • Shared Folders
      • File Storage
      • File Restoration
      • File Archiving

      Collaboration

      • Web Conferencing
      • Audio Conferencing
      • Video Conferencing
      • Chat
      • Document Sharing

      Employee Services

      • Onboarding & Off Boarding
      • Benefits Self Service
      • Time and Attendance
      • Employee Records Management

      Help & Support

      • Service Desk
      • Desk Side Support
      • After Hours Support

      Desktop, Equipment, & Software

      • Printing
      • Hardware Provisioning
      • Software Provisioning
      • Software Support
      • Device Move
      • Equipment Loaner

      Education & Training Services

      • Desktop Application Training
      • Corporate Application Training
      • Clinical Application Training
      • IT Training Consultation

      Connectivity

      • BYOD (wireless access)
      • Internet
      • Guest Wi-Fi

      IT Consulting Services

      • Project Management
      • Analysis
      • RFP Reviews
      • Solution Development
      • Business Analysis/Requirements Gathering
      • RFI/RFP Evaluation
      • Security Consulting & Assessment
      • Contract Management
      • Contract Negotiation

      IT department identifies a comprehensive list of enterprise services

      CASE STUDY A
      Industry Government
      Source Onsite engagement

      Challenge

      Because of the breadth of services IT provides across several agencies, it was challenging to identify what was considered enterprise beyond just the basic ones (email, internet, etc.)

      IT recognized that although the specific tasks of service could be different, there are many services that are offered universally across the organization and streamlining the service request and delivery process would reduce the burden on IT.

      Solution

      The client began with services that users interact with on a daily basis; this includes email, wireless, telephone, internet, printing, etc.

      Then, they focused on common service requests from the users, such as software and hardware provisioning, as well as remote access.

      Lastly, they began to think of other IT services that are provided across the organization, such as RFP/RFI support, project management analysis, employee onboarding/off-boarding, etc.

      Results

      By going through the lists and enterprise categories, the government was able to come up with a comprehensive list of all services IT provides to the business.

      Classifying services such as onboarding meant that IT could now standardize IT services for new recruits and employee termination.

      By capturing all enterprise services offered to the organization, IT centralized its management of services instead of having scattered request processes.

      Organization distinguishes features from services using Info-Tech’s tips and techniques

      CASE STUDY B
      Industry Government
      Source Onsite engagement

      Challenge

      For some services, the project team had difficulty deciding on what was a service and what was a feature. They found it hard to distinguish between a service with features or multiple services.

      For example, the client struggled to define the Wi-Fi services because they had many different user groups and different processes to obtain the service. Patients, visitors, doctors, researchers, and corporate employees all use Wi-Fi, but the service features for each user group were different.

      Solution

      The Info-Tech analyst came on-site and engaged the project team in a discussion around how the users would view the services.

      The analyst also provided tips and techniques on identifying services and their features.

      Because patients and visitors do not access Wi-Fi or receive support for the service in the same way as clinical or corporate employees, Wi-Fi was separated into two services (one for each user group).

      Results

      Using the tips and techniques that were provided during the onsite engagement, the project team was able to have a high degree of clarity on how to define the services by articulating who the authorized users are, and how to access the process.

      This allowed the group to focus on the users’ perspective and create clear, unambiguous service features so that users could clearly understand eligibility requirements for the service and how to request them.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts

      this is a picture of an Info-Tech Analyst

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
      The following are sample activities that will be conducted by Info-Tech analysts with your team:
      2.1 This image contains a screenshot from section 2.1 of this blueprint.

      Understand what enterprise services are

      The project team must have a clear understanding of what qualifies as an enterprise service. The onsite analysts will also promote a user-oriented mindset so the catalog focuses on business needs.

      2.2 this image contains a screenshot from section 2.2 of this blueprint.

      Identify enterprise services

      The Info-Tech analysts will provide a list of ready-to-use services and will work with the project team to change, add, and delete service definitions and to customize the service features.

      2.3 this image contains a screenshot from section 2.3 of this blueprint.

      Identify categories for enterprise services

      The Info-Tech analyst will again emphasize the importance of being service-oriented rather than IT-oriented. This will allow the group to come up with categories that are intuitive to the users.

      PHASE 3

      Identify and Define Line of Business Services

      Design & Build a User-Facing Service Catalog

      Step 3 – Create Line of Business Services Definitions

      1. Complete the Project Charter
      2. Create Enterprise Services Definitions
      3. Create Line of Business Services Definitions
      4. Complete Service Definitions

      This step will walk you through the following activities:

      • Identify lines of business (LOB) within the organization as well as the user groups within the different LOBs.
      • Determine which one of Info-Tech’s two approaches is more suitable for your IT organization.
      • Define and document LOB services using the appropriate approach.
      • Categorize the LOB services based on the organization’s functional structure.

      Step Insights

      • Collaboration with the business significantly strengthens the quality of line of business service definitions. A significant amount of user input is crucial to create impactful and effective service definitions.
      • If a strong relationship with the business is not in place, IT can look at business applications and the business activities they support in order to understand how to define line of business services.

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Define LOB Services

      Proposed Time to Completion: 4 weeks

      Step 3.1: Identify LOB services

      Step 3.2: Define LOB services

      Start with an analyst kick off call:

      • Identify enterprise services that are commonly used.
      • Ensure the list is comprehensive and capture common IT needs.
      • Create service descriptions and features.

      Review findings with analyst:

      • Use either the business view or the IT view methodology to identify and define LOB services.

      Then complete these activities…

      • Select one of the methodologies and either compile a list of business applications or a list of user groups/functional departments.

      Then complete these activities…

      • Validate the service definitions and features with business users.

      With these tools & templates: Service

      LOB Services – Functional Group
      LOB Services – Industry Specific

      With these tools & templates:

      LOB Services – Functional Group
      LOB Services – Industry Specific

      Communicate with your business users to get a clear picture of each line of business

      Within a business unit, there are user groups that use unique applications and IT services to perform business activities. IT must understand which group is consuming each service to document to their needs and requirements. Only then is it logical to group services into lines of business.

      Covering every LOB service is a difficult task. Info-Tech offers two approaches to identifying LOB services, though we recommend working alongside business user groups to have input on how each service is used directly from the users. Doing so makes the job of completing the service catalog easier, and the product more detailed and user friendly.

      Some helpful questions to keep in mind when characterizing user groups:

      • Where do they fall on the organizational chart?
      • What kind of work do they do?
      • What is included in their job description?
      • What are tasks that they do in addition to their formal responsibilities?
      • What do they need from IT to do their day-to-day tasks?
      • What does their work day look like?
      • When, why, and how do they use IT services?

      Info-Tech Insight

      With business user input, you can answer questions as specific as “What requirements are necessary for IT to deliver value to each line of business?” and “What does each LOB need in order to run their operation?”

      Understand when it is best to use one of Info-Tech’s two approaches to defining LOB services

      1. Business View

      Business View is the preferred method for IT departments with a better understanding of business operations. This is because they can begin with input from the user, enabling them to more successfully define every service for each user group and LOB.

      In addition, IT will also have a chance to work together with the business and this will improve the level of collaboration and communication. However, in order to follow this methodology, IT needs to have a pre-established relationship with the business and can demonstrate their knowledge of business applications.

      2. IT View

      The IT view begins with considering each business application used within the organization’s lines of business. Start with a broad view, following with a process of narrowing down, and then iterate for each business application.

      This process leads to each unique service performed by every application within the business’ LOBs.

      The IT view does not necessarily require a substantial amount of information about the business procedures. IT staff are capable of deducing what business users often require to maintain their applications’ functionality.

      Use one of Info-Tech’s two methodologies to help you identify each LOB service

      Choose the methodology that fits your IT organization’s knowledge of the business.

      This image demonstrates a comparison between the business view of service and the IT View of Service. Under the Business View, the inputs are LOB; User Groups; and Business Activity. Under the IT View, the inputs are Business Application and Functionality, and the outputs are Business Activity; User Groups; and LOB.

      1. Business View

      If you do have knowledge of business operations, using the business view is the better option and the service definition will be more relatable to the users.

      2. IT View

      For organizations that don’t have established relationships with the business or detailed knowledge of business activities, IT can decompose the application into services. They have more familiarity and comfort with the business applications than with business activities.

      It is important to continue after the service is identified because it helps confirm and solidify the names and features. Determining the business activity and the user groups can help you become more user-oriented.

      Identifying LOB services using Info-Tech’s Business View method

      We will illustrate the two methodologies with the same example.

      If you have established an ongoing relationship with the business and you are familiar with their business operations, starting with the LOB and user groups will ensure you cover all the services IT provides to the business and create more relatable service names.

      This is a screenshot of an example of the business view of Service.

      Identifying LOB services using Info-Tech’s IT View method

      If you want to understand what services IT provides to the Sales functional group, and you don’t have comprehensive knowledge of the department, you need to start with the IT perspective.

      This is a screenshot of an example of the business view of Service.

      Info-Tech Insight

      If you are concerned about the fact that people always associate a service with an application, you can include the application in the service name or description so users can find the service through a search function.

      Group LOB services into functional groups as you did enterprise services into categories

      3.1 Sample Line of Business Services Definitions – Functional Groups & Industry Examples

      Like categories for enterprise services in Phase Two, LOB services are grouped into functional groups. Functional groups are the components of an organizational chart (HR, Finance, etc.) that are found in a company’s structure.

      Functional Groups

      Functional groups enable a clear view for business users of what services they need, while omitting services that do not apply to them. This does not overwhelm them, and provides them with only relevant information.

      Industry Services

      To be clear, industry services can be put into functional groups.

      Info-Tech provides a few sample industry services (without their functional group) to give an idea of what LOB service is specific to these industries. Try to extrapolate from these examples to create LOB services for your business.

      Use Info-Tech’s Sample LOB Services – Functional Group and Sample LOB Services – Industry Specific documents.

      This is a screenshot of Info-Tech's Functional Group Services

      Info-Tech Insight

      Keep track of which services you either modify or delete. You will have to change the same services in the final Info-Tech deliverable.

      Identify the user group and business activity within each line of business – Business view

      3.1 30-45 minutes per line of business

      Only perform this activity if you have a relationship with the business that can enable you to generate business input on service identifications and definitions.

      In a group of your project participants, repeat the sequence for each LOB.

      1. Brainstorm each user group within the LOB that is creating value for the business by performing functional activities.
      2. Think of what each individual end user must do to create their value. Think of the bigger picture rather than specifics at this point. For example, sales representatives must communicate with clients to create value.
      3. Now that you have each user group and the activities they perform, consider the specifics of how they go about doing that activity. Consider each application they use and how much they use that application. Think of any and all IT services that could occur as a result of that application usage.

      INPUT

      • A collaborative discussion (with a business relationship)

      OUTPUT

      • LOB services defined from the business perspective

      Materials

      • Sticky notes
      • Whiteboard/marker

      Participants

      • Members of the project team
      • Representatives from the LOBs

      Identify the user group and business activity within each line of business – IT view

      3.1 30-45 minutes per application

      Only perform this activity if you cannot generate business input through your relationships, and must begin service definitions with business applications.

      In a group of your project participants, repeat the sequence for each application.

      1. Brainstorm all applications that the business provides through IT. Cross out the ones that provide enterprise services.
      2. In broad terms, think about what the application is accomplishing to create value for the business from IT’s perspective. What are the modules? Is it recording interactions with the clients? Each software can have multiple functionalities.
      3. Narrow down each functionality performed by the application and think about how IT helps deliver that value. Create a name for the service that the users can relate to and understand.
      4. → Optional

      5. Now go beyond the service and think about the business activities. They are always similar to IT’s application functionality, but from the user perspective. How would the user think about what the application’s functionality to accomplish that particular service is? At this point, focus on the service, not the application.
      6. Determine the user groups for each service. This step will help you complete the service record design in phase 4. Keep in mind that multiple user groups may access one service.

      INPUT

      • A collaborative discussion (without a business relationship)

      OUTPUT

      • LOB services defined from the IT perspective

      Materials

      • Sticky notes
      • Whiteboard/marker

      Participants

      • Members of the project team

      You must review your LOB service definitions with the business before deployment

      Coming up with LOB service definitions is challenging for IT because it requires comprehension of all lines of business within the organization as well as direct interaction with the business users.

      After completing the LOB service definitions, IT must talk to the business to ensure all the user groups and business activities are covered and all the features are accurate.

      Here are some tips to reviewing your LOB Service Catalog generated content:

      • If you plan to talk to a business SME, plan ahead to help complete the project in time for rollout.
      • Include a business relationship manager on the project team to facilitate discussion if you do not have an established relationship with the business.

      Sample Meeting Agenda

      Go through the service in batches. Present 5-10 related services to the business first. Start with the service name and then focus on the features.

      In the meeting, discuss whether the service features accurately sum up the business activities, or if there are missing key activities. Also discuss whether certain services should be split up into multiple services or combined into one.

      Organization identifies LOB services using Info-Tech’s methodologies

      CASE STUDY A
      Industry Government
      Source Onsite engagement

      Challenge

      There were many users from different LOBs, and IT provided multiple services to all of them. Tracking them and who had access to what was difficult.

      IT didn’t understand who provided the services (service owner) and who the customers were (business owner) for some of the services.

      Solution

      After identifying the different Lines of Business, they followed the first approach (Business View) for those that IT had sufficient knowledge of in terms of business operations:

      1. Identified lines of business
      2. Identified user groups
      3. Identified business activities

      For the LOBs they weren’t familiar with, they used the IT view method, beginning with the application:

      1. Identified business apps
      2. Deduced the functionalities of each application
      3. Traced the application back to the service and identified the service owner and business owner

      Results

      Through these two methodologies, IT was able to define services according to how the users both perceive and utilize them.

      IT was able to capture all the services it provides to each line of business effectively without too much help from the business representatives.

      By capturing all enterprise services offered to the organization, IT centralized its management of services instead of having scattered request processes.

      Info-Tech helps organization to identify LOB services using the IT View

      CASE STUDY B
      Industry Healthcare
      Source Onsite engagement

      Challenge
      The organization uses a major application containing several modules used by different users for various business activities.

      The challenge was to break down the application into multiple services in a way that makes sense to the business users. Users should be able to find services specific to them easily.

      Therefore, the project team must understand how to map the modules to different services and user groups.


      Solution
      The project team identified the major lines of business and took various user groups such as nurses and doctors, figured out their daily tasks that require IT services, and mapped each user-facing service to the functionality of the application.

      The project team then went back to the application to ensure all the modules and functionalities within the application were accounted for. This helped to ensure that services for all user groups were covered and prepared to be released in the catalog.


      Results
      Once the project team had come up with a comprehensive list of services for each line of business, they were able to sit with the business and review the services.

      IT was also able to use this opportunity to demonstrate all the services it provides. Having all the LOB services demonstrates IT has done its preparation and can show the value they help create for the business in a language the users can understand. The end result was a strengthened relationship between the business and the IT department.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts

      This is a picture of an Info-Tech Analyst

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
      The following are sample activities that will be conducted by Info-Tech analysts with your team:
      3.1 this image contains a screenshot from section 3.1 of this blueprint.

      Understand what Line of Business services are

      The onsite analysts will provide a clear distinction between enterprise services and LOB services. The analysts will also articulate the importance of validating LOB services with the business.

      3.2 this image contains a screenshot from section 3.2 of this blueprint.

      Identify LOB services using the business’ view

      There are two methods for coming up with LOB services. If IT has comprehensive knowledge of the business, they can identify the services by outlining the user groups and their business activities.

      3.3 This image contains a screenshot from section 3.3 of this blueprint.

      Identify LOB services using IT’s view

      If IT does not understand the business and cannot obtain business input, Info-Tech’s analysts will present the second method, which allows IT to identify services with more comfortability through business applications/systems.

      3.4 This image contains a screenshot from section 3.4 of this blueprint.

      Categorize the LOB services into functional groups

      The analysts will help the project team categorize the LOB services based on user groups or functional departments.

      PHASE 4

      Complete Service Definitions

      Design & Build a User-Facing Service Catalog

      Step 4: Complete service definitions and service record design

      1. Complete the Project Charter
      2. Create Enterprise Services Definitions
      3. Create Line of Business Services Definitions
      4. Complete Service Definitions

      This step will walk you through the following activities:

      • Select which fields of information you would like to include in your service catalog design.
      • Determine which fields should be kept internal for IT use only.
      • Complete the service record design with business input if possible.

      Step Insights

      • Don’t overcomplicate the service record design. Only include the pieces of information the users really need to see.
      • Don’t publish anything that you don’t want to be held accountable for. If you are not ready, keep the metrics and costs internal.
      • It is crucial to designate a facilitator and a decision maker so confusions and disagreements regarding service definitions can be resolved efficiently.

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 4: Complete service definitions
      Proposed Time to Completion (in weeks): 4 weeks

      Step 4.1: Design service record

      Step 4.2: Complete service definitions

      Start with an analyst kick off call:

      • Review Info-Tech’s sample service record and determine which fields to add/change/delete.
      • Determine which fields should be kept internal.

      Review findings with analyst:

      • Complete all fields in the service record for each identified service.

      Then complete these activities…

      • Finalize the design of the service record and bring over enterprise services and LOB services.

      Then complete these activities…

      • Test the service definitions with business users prior to catalog implementation.

      With these tools & templates: Service

      Services Definition Chart

      With these tools & templates:

      Services Definition Chart

      Utilize Info-Tech’s Services Definition Chart to map out your final service catalog design

      Info-Tech’s Sample Services Definition Chart

      Info-Tech has provided a sample Services Definition Chart with standard service definitions and pre-populated fields. It is up to you throughout this step to decide which fields are necessary to your business users, as well as how much detail you wish to include in each of them.

      This image contains a screenshot from Info-Tech's Services Definition Chart.

      Info-Tech Insight

      Keep track of which services you either modify or delete. You will have to change the same services in the final Info-Tech deliverable.

      Tips and techniques for service record design

      The majority of the fields in the service catalog are user facing, which means they must be written in business language that the users can understand.

      If there is any confusion or disagreement in filling out the fields, a facilitator is required to lead the working groups in coming up with a definitive answer. If a decision is still not reached, it should be escalated to the decision maker (usually the service owner).

      IT-Facing Fields

      There are IT facing fields that should not be published to the business users – they are for the benefit of IT. For example, you may want to keep Performance Metrics internal to IT until you are ready to discuss it with the business.

      If the organization is interested in creating a Technical Service Catalog following this initiative, these fields will provide a helpful starting place for IT to identify the people, process, and technology required to support user-facing services.

      Info-Tech Insight

      It is important for IT-facing fields to be kept internal. If business users are having trouble with a service and the service owner’s name is available to them, they will phone them for support even if they are not the support owner.

      Design your service catalog with business input: have the user in mind

      When completing the service record, adopt the principle that “Less is More.” Keep it simple and write the service description from the user’s perspective, without IT language. From the list below, pick which fields of information are important to your business users.

      What do the users need to access the service quickly and with minimal assistance?

      The depicted image contains an example of an analysis of what users need to access the service quickly and with minimal assistance. The contents are as follows. Under Service Overview, Name; Description; Features; Category; and Supporting Services. Under Owners, are Service Owner; Business Owner. Under Access Policies and Procedures, are Authorized Users; Request Process; Approval Requirements/Process; Turnaround Time; User Responsibility. Under Availability and Service Levels are Support Hours; Hours of Availability; Planned Downtime; and Metrics. Under Support Policies & Procedures are Support Process; Support Owner; Support Documentation. Under Costs are Internal Cost; Customer Cost. The items which are IT Facing are coloured Red. These include Supporting Services; Service Owner; Business Owner; Metrics; Support Owner; and Internal Cost.

      Identify service overview

      “What information must I have in each service record? What are the fundamentals required to define a service?”

      Necessary Fields – Service Description:

      • Service name → a title for the service that gives a hint of its purpose.
      • Service description → what the service does and expected outcomes.
      • Service features → describe functionality of the service.
      • Service category → an intuitive way to group the service.
      • Support services → applications/systems required to support the service.

      Description: Delivers electronic messages to and from employees.

      Features:

      • Desk phone
      • Teleconference phones (meeting rooms)
      • Voicemail
      • Recover deleted voicemails
      • Team line: call rings multiple phones/according to call tree
      • Employee directory
      • Caller ID, Conference calling

      Category: Communications

      This image contains an example of a Service overview table. The headings are: Description; Features; Category; Supporting Services (Systems, Applications).

      Identify owners

      Who is responsible for the delivery of the service and what are their roles?

      Service Owner and Business Owner

      Service owner → the IT member who is responsible and accountable for the delivery of the service.

      Business owner → the business partner of the service owner who ensures the provided service meets business needs.

      Example: Time Entry

      Service Owner: Manager of Business Solutions

      Business Owner: VP of Human Resources

      This image depicts a blank table with the headings Service Owner, and Business Owner

      Info-Tech Insight

      For enterprise services that are used by almost everyone in the organization, the business owner is the CIO.

      Identify access policies and procedures

      “Who is authorized to access this service? How do they access it?”

      Access Policies & Procedures

      Authorized users → who can access the service.

      Request process → how to request access to the service.

      Approval requirement/process → what the user needs to have in place before accessing the service.

      Example: Guest Wi-Fi

      Authorized Users: All people on site not working for the company

      Request Process: Self-Service through website for external visitors

      Approval Requirement/Process: N/A

      This image depicts a blank table with the headings: Authorized Users; Request Process; Approval Requirement/Process

      Info-Tech Insight

      Clearly defining how to access a service saves time and money by decreasing calls to the service desk and getting users up and running faster. The result is higher user productivity.

      Identify access policies and procedures

      “Who is authorized to access this service? How do they access it?”

      Access Policies & Procedures

      Requirements & pre-requisites → details of what must happen before a service can be provided.

      Turnaround time → how much time it will take to grant access to the service.

      User responsibility → What the user is expected to do to acquire the service.

      Example: Guest Wi-Fi

      Requirements & Pre-requisites: Disclaimer of non-liability and acceptance

      Turnaround time: Immediate

      User Responsibility: Adhering to policies outlined in the disclaimer

      This image depicts a blank table with the headings: Authorized Users; Request Process; Approval Requirement/Process

      Info-Tech Insight

      Clearly defining how to access a service saves time and money by decreasing calls to the service desk and getting users up and running faster. The result is higher user productivity.

      Identify availability and service levels

      “When is this service available to users? What service levels can the user expect?”

      Availability & Service Levels

      Support hours → what days/times is this service available to users?

      Hours of availability/planned downtime → is there scheduled downtime for maintenance?

      Performance metrics → what level of performance can the user expect for this service?

      Example: Software Provisioning

      Support Hours: Standard business hours

      Hours of Availability/Planned Downtime: Standard business hours; can be agreed to work beyond operating hours either earlier or later

      Performance Metrics: N/A

      This image depicts a blank table with the headings: Support hours; Hours of availability/planned downtime; Performance Metrics.

      Info-Tech Insight

      Manage user expectations by clearly documenting and communicating service levels.

      Identify support policies and procedures

      “How do I obtain support for this service?”

      Support Policies & Procedures

      Support process → what is the process for obtaining support for this service?

      Support owner → who can users contact for escalations regarding this service?

      Support documentation → where can users find support documentation for this service?

      Example: Shared Folders

      Support Process: Contact help desk or submit a ticket via portal

      Support Owner: Manager, client support

      Support Documentation: .pdf of how-to guide

      This image depicts a blank table with the headings: Support Process; Support Owner; Support Documentation

      Info-Tech Insight

      Clearly documenting support procedures enables users to get the help they need faster and more efficiently.

      Identify service costs and approvals

      “Is there a cost for this service? If so, how much and who is expensing it?”

      Costs

      Internal Cost → do we know the total cost of the service?

      Customer Cost → a lot of services are provided without charge to the business; however, certain service requests will be charged to a department’s budget.

      Example: Hardware Provisioning

      Internal Cost: For purposes of audit, new laptops will be expensed to IT.

      Customer Cost: Cost to rush order 10 new laptops with retina displays for the graphics team. Charged for extra shipment cost, not for cost of laptop.

      This image depicts a blank table with the headings: Internal Costs; Customer costs

      Info-Tech Insight

      Set user expectations by clearly documenting costs associated with a service and how to obtain approval for these costs if required.

      Complete the service record design fields for every service

      4.1 3 Hours

      This is the final activity to completing the service record design. It has been a long journey to make it here; now, all that is left is completing the fields and transferring information from previous activities.

      1. Organize the services however you think is most appropriate. A common method of organization is alphabetically by enterprise category, and then each LOB functional group.
      2. Determine which fields you would like to keep or edit to be part of your design. Also add any other fields you can think of which will add value to the user or IT. Remember to keep them IT facing if necessary.
      3. Complete the fields for each service one by one. Keep in mind that for some services, a field or two may not apply to the nature of that service and may be left blank or filled with a null value (e.g. N/A).

      INPUT

      • A collaborative discussion

      OUTPUT

      • Completed service record design ready for a catalog

      Materials

      • Info-Tech sample service record design.

      Participants

      • Project stakeholders, business representatives

      Info-Tech Insight

      Don’t forget to delete or bring over the edited LOB and Enterprise services from the phase 2 and 3 deliverables.

      Complete the service definitions and get them ready for publication

      Now that you have completed the first run of service definitions, you can go back and complete the rest of the identified services in batches. You should observe increased efficiency and effectiveness in filling out the service definitions.

      This image depicts how you can use bundles to simplify the process of catalog design using bundles. The cycle includes the steps: Identify Services; Select a Service Bundle; Review Record Design; followed by a cycle of: Pick a service; Service X; Service Data Collection; Create Service Record, followed by Publish the bundle; Communicate the bundle; Rinse and Repeat.

      This blueprint’s purpose is to help you design a service catalog. There are a number of different platforms to build the catalog offered by application vendors. The sophistication of the catalog depends on the size of your business. It may be as simple as an Excel book, or something as complex as a website integrated with your service desk.

      Determine how you want to publish the service catalog

      There are various levels of maturity to consider when you are thinking about how to deploy your service catalog.

      1. Website/User Portal 2. Catalog Module Within ITSM Tool

      3. Homegrown Solution

      Prerequisite

      An internet website, or a user portal

      An existing ITSM tool with a built-in service catalog module

      Database development capabilities

      Website development capabilities

      Pros

      Low cost

      Low effort

      Easy to deploy

      Customized solution tailored for the organization

      High flexibility regarding how the service catalog is published

      Cons

      Not aesthetically appealing

      Lacking sophistication

      Difficult to customize to organization’s needs

      Limitation on how the service catalog info is published

      High effort

      High cost

      → Maturity Level →

      Organization uses the service catalog to outline IT’s and users’ responsibilities

      CASE STUDY A
      Industry Government
      Source Onsite engagement

      Challenge

      The client had collected a lot of good information, but they were not sure about what to include to ensure the users could understand the service clearly.

      They were also not sure what to keep internal so the service catalog did not increase IT’s workload. They want to help the business, but not appear as if they are capable of solving everything for everyone immediately. There was a fear of over-commitment.

      Solution

      The government created a Customer Responsibility field for each service, so it was not just IT who was providing solutions. Business users needed to understand what they had to do to receive some services.

      The Service Owner and Business Owner fields were also kept internal so users would go through the proper request channel instead of calling Service Owners directly.

      Lastly, the Performance Metrics field was kept internal until IT was ready to present service metrics to the business.

      Results

      The business was provided clarity on their responsibility and what was duly owed to them by IT staff. This established clear boundaries on what was to be expected of IT services projected into the future.

      The business users knew what to do and how to obtain the services provided to them. In the meantime, they didn’t feel overwhelmed by the amount of information provided by the service catalog.

      Organization leverages the service catalog as a tool to define IT workflows and business processes

      CASE STUDY B
      Industry Healthcare
      Source Onsite engagement

      Challenge

      There is a lack of clarity and a lack of agreement between the client’s team members regarding the request/approval processes for certain services. This was an indication that there is a level of ambiguity around process. Members were not sure what was the proper way to access a service and could not come up with what to include in the catalog.

      Different people from different teams had different ways of accessing services. This could be true for both enterprise and LOB services.

      Solution

      The Info-Tech analyst facilitated a discussion about workflows and business processes.

      In particular, the discussion focused around the approval/authorization process, and IT’s workflows required to deliver the service. The Info-Tech analyst on site walked the client through their different processes to determine which one should be included in the catalog.

      Results

      The discussion brought clarity to the project team around both IT and business process. Using this new information, IT was able to communicate to the business better, and create consistency for IT and the users of the catalog.

      The catalog design was a shared space where IT and business users could confer what the due process and responsibilities were from both sides. This increased accountability for both parties.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts

      this is a picture of an Info-Tech Analyst

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.
      The following are sample activities that will be conducted by Info-Tech analysts with your team:
      4.1 this image contains a screenshot from section 4.1 of this blueprint.

      Determine which fields should be included in the record design

      The analysts will present the sample service definitions record and facilitate a discussion to customize the service record so unique business needs are captured.

      4.2 this image contains a screenshot from section 4.2.1 of this blueprint.

      Determine which fields should be kept internal

      The onsite analysts will explain why certain fields are used but not published. The analysts will help the team determine which fields should be kept internal.

      4.3 this image contains a screenshot from section 4.3 of this blueprint.

      Complete the service definitions

      The Info-Tech analysts will help the group complete the full service definitions. This exercise will also provide the organization with a clear understanding of IT workflows and business processes.

      Summary of accomplishment

      Knowledge Gained

      • Understanding why it is important to identify and define services from the user’s perspective.
      • Understand the differences between enterprise services and line of business services.
      • Distinguish service features from services.
      • Involve the business users to define LOB services using either IT’s view or LOB’s view.

      Processes Optimized

      • Enterprise services identification and documentation.
      • Line of business services identification and documentation.

      Deliverables Completed

      • Service catalog project charter
      • Enterprise services definitions
      • Line of business service definitions – functional groups
      • Line of business service definitions – industry specific
      • Service definition chart

      Project step summary

      Client Project: Design and Build a User-Facing Service Catalog

      1. Launch the Project – Maximize project success by assembling a well-rounded team and managing all important stakeholders.
      2. Identify Enterprise Services – Identify services that are used commonly across the organization and categorize them in a user-friendly way.
      3. Identify Line of Business Services – Identify services that are specific to each line of business using one of two Info-Tech methodologies.
      4. Complete the Service Definitions – Determine what should be presented to the users and complete the service definitions for all identified services.

      Info-Tech Insight

      This project has the ability to fit the following formats:

      • Onsite workshop by Info-Tech Research Group consulting analysts.
      • Do-it-yourself with your team.
      • Remote delivery (Info-Tech Guided Implementation).

      Related Info-Tech research

      Establish a Service-Based Costing Model

      Develop the right level of service-based costing capability by applying our methodology.

      Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud

      • Buy Link or Shortcode: {j2store}472|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Cloud Strategy
      • Parent Category Link: /cloud-strategy
      • The organization is planning to move resources to cloud or devise a networking strategy for their existing cloud infrastructure to harness value from cloud.
      • The right topology needs to be selected to deploy network level isolation, design the cloud for management efficiencies and provide access to shared services on cloud.
      • A perennial challenge for infrastructure on cloud is planning for governance vs flexibility which is often overlooked.

      Our Advice

      Critical Insight

      Don’t wait until the necessity arises to evaluate your networking in the cloud. Get ahead of the curve and choose the topology that optimizes benefits and supports organizational needs in the present and the future.

      Impact and Result

      • Define organizational needs and understand the pros and cons of cloud network topologies to strategize for the networking design.
      • Consider the layered complexities of addressing the governance vs. flexibility spectrum for your domains when designing your networks.

      Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud Deck – A document to guide you through designing your network in the cloud.

      What cloud networking topology should you use? How do you provide access to shared resources in the cloud or hybrid infrastructure? What sits in the hub and what sits in the spoke?

      • Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud Storyboard
      [infographic]

      Further reading

      Considerations for a Hub and Spoke Model When Deploying Infrastructure in the Cloud

      Don't revolve around a legacy design; choose a network design that evolves with the organization.

      Analyst Perspective

      Cloud adoption among organizations increases gradually across both the number of services used and the amount those services are used. However, network builders tend to overlook the vulnerabilities of network topologies, which leads to complications down the road, especially since the structures of cloud network topologies are not all of the same quality. A network design that suits current needs may not be the best solution for the future state of the organization.

      Even if on-prem network strategies were retained for ease of migration, it is important to evaluate and identify the cloud network topology that can not only elevate the performance of your infrastructure in the cloud, but also that can make it easier to manage and provision resources.

      An "as the need arises" strategy will not work efficiently since changing network designs will change the way data travels within your network, which will then need to be adopted to existing application architectures. This becomes more complicated as the number of services hosted in the cloud grows.

      Keep a network strategy in place early on and start designing your infrastructure accordingly. This gives you more control over your networks and eliminates the need for huge changes to your infrastructure down the road.

      This is a picture of Nitin Mukesh

      Nitin Mukesh
      Senior Research Analyst, Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      The organization is planning to move resources to the cloud or devise a networking strategy for their existing cloud infrastructure to harness value from the cloud.

      The right topology needs to be selected to deploy network level isolation, design the cloud for management efficiencies, and provide access to shared services in the cloud.

      A perennial challenge for infrastructure in the cloud is planning for governance vs. flexibility, which is often overlooked.

      Common Obstacles

      The choice of migration method may result in retaining existing networking patterns and only making changes when the need arises.

      Networking in the cloud is still new, and organizations new to the cloud may not be aware of the cloud network designs they can consider for their business needs.

      Info-Tech's Approach

      Define organizational needs and understand the pros and cons of cloud network topologies to strategize for the networking design.

      Consider the layered complexities of addressing the governance vs. flexibility spectrum for your domains when designing your networks.

      Insight Summary

      Don't wait until the necessity arises to evaluate your networking in the cloud. Get ahead of the curve and choose the topology that optimizes benefits and supports organizational needs in the present and future.

      Your challenge

      Selecting the right topology: Many organizations migrate to the cloud retaining a mesh networking topology from their on-prem design, or they choose to implement the mesh design leveraging peering technologies in the cloud without a strategy in place for when business needs change. While there may be many network topologies for on-prem infrastructure, the network design team may not be aware of the best approach in cloud platforms for their requirements, or a cloud networking strategy may even go overlooked during the migration.

      Finding the right cloud networking infrastructure for:

      • Management efficiencies
      • Network-level isolation of resources
      • Access to shared services

      Deciding between governance and flexibility in networking design: In the hub and spoke model, if a domain is in the hub, the greater the governance over it, and if it sits in the spoke, the higher the flexibility. Having a strategy for the most important domains is key. For example, some security belongs in the hub and some security belongs in the spoke. The tradeoff here is if it sits completely in the spoke, you give it a lot of freedom, but it becomes harder to standardize across the organization.

      Mesh network topology

      A mesh is a design where virtual private clouds (VPCs) are connected to each other individually creating a mesh network. The network traffic is fast and can be redirected since the nodes in the network are interconnected. There is no hierarchical relationship between the networks, and any two networks can connect with each other directly.

      In the cloud, this design can be implemented by setting up peering connections between any two VPCs. These VPCs can also be set up to communicate with each other internally through the cloud service provider's network without having to route the traffic via the internet.

      While this topology offers high redundancy, the number of connections grows tremendously as more networks are added, making it harder to scale a network using a mesh topology.

      Mesh Network on AWS

      This is an image of a Mesh Network on AWS

      Source: AWS, 2018

      Constraints

      The disadvantages of peering VPCs into a mesh quickly arise with:

      • Transitive connections: Transitive connections are not supported in the cloud, unlike with on-prem networking. This means that if there are two networks that need to communicate, a single peering link can be set up between them. However, if there are more than two networks and they all need to communicate, they should all be connected to each other with separate individual connections.
      • Cost of operation: The lack of transitive routing requires many connections to be set up, which adds up to a more expensive topology to operate as the number of networks grows. Cloud providers also usually limit the number of peering networks that can be set up, and this limit can be hit with as few as 100 networks.
      • Management: Mesh tends to be very complicated to set up, owing to the large number of different peering links that need to be established. While this may be manageable for small organizations with small operations, for larger organizations with robust cybersecurity practices that require multiple VPCs to be deployed and interconnected for communications, mesh opens you up to multiple points of failure.
      • Redundancy: With multiple points of failure already being a major drawback of this design, you also cannot have more than one peered connection between any two networks at the same time. This makes designing your networking systems for redundancy that much more challenging.
      Number of virtual networks 10 20 50 100
      Peering links required
      [(n-1)*n]/2
      45 190 1225 4950

      Proportional relationship of virtual networks to required peering links in a mesh topology

      Case study

      INDUSTRY: Blockchain
      SOURCE: Microsoft

      An organization with four members wants to deploy a blockchain in the cloud, with each member running their own virtual network. With only four members on the team, a mesh network can be created in the cloud with each of their networks being connected to each other, adding up to a total of 12 peering connections (four members with three connections each). While the members may all be using different cloud accounts, setting up connections between them will still be possible.

      The organization wants to expand to 15 members within the next year, with each new member being connected with their separate virtual networks. Once grown, the organization will have a total of 210 peering connections since each of the virtual networks will then need 14 peering connections. While this may still be possible to deploy, the number of connections makes it harder to manage and would be that much more difficult to deploy if the organization grows to even 30 or 40 members. The new scale of virtual connections calls for an alternative networking strategy that cloud providers offer – the hub and spoke topology.

      This is an image of the connections involved in a mesh network with four participants.

      Source: Microsoft, 2017

      Hub and spoke network topology

      In hub and spoke network design, each network is connected to a central network that facilitates intercommunication between the networks. The central network, also called the hub, can be used by multiple workloads/servers/services for hosting services and for managing external connectivity. Other networks connected to the hub through network peering are called spokes and host workloads.

      Communications between the workloads/servers/services on spokes pass in or out of the hub where they are inspected and routed. The spokes can also be centrally managed from the hub with IT rules and processes.

      A hub and spoke design enable a larger number of virtual networks to be interconnected as each network only needs one peered connection (to the hub) to be able to communicate with any other network in the system.

      Hub and Spoke Network on AWS

      This is an image of the Hub and Spoke Network on AWS

      What hub and spoke networks do better

      1. Ease of connectivity: Hub and spoke decreases the liabilities of scale that come from a growing business by providing a consistent connection that can be scaled easily. As more networks are added to an organization, each will only need to be connected once – to the hub. The number of connections is considerably lower than in a mesh topology and makes it easier to maintain and manage.
      2. Business agility and scalability: It is easier to increase the number of networks than in mesh, making it easier to grow your business into new channels with less time, investment, and risk.
      3. Data collection: With a hub and spoke design, all data flows through the hub – depending on the design, this includes all ingress and egress to and from the system. This makes it an excellent central network to collect all business data.
      4. Network-level isolation: Hub and spoke enables separation of workloads and tiers into different networks. This is particularly useful to ensure an issue affecting a network or a workload does not affect the rest.
      5. Network changes: Changes to a separated network are much easier to carry out knowing the changes made will not affect all the other connected networks. This reduces work-hours significantly when systems or applications need to be altered.
      6. Compliance: Compliance requirements such as SOC 1 and SOC 2 require separate environments for production, development, and testing, which can be done in a hub and spoke model without having to re-create security controls for all networks.

      Hub and spoke constraints

      While there are plenty of benefits to using this topology, there are still a few notable disadvantages with the design.

      Point-to-point peering

      The total number of total peered connections required might be lower than mesh, but the cost of running independent projects is cheaper on mesh as point-to-point data transfers are cheaper.

      Global access speeds with a monolithic design

      With global organizations, implementing a single monolithic hub network for network ingress and egress will slow down access to cloud services that users will require. A distributed network will ramp up the speeds for its users to access these services.

      Costs for a resilient design

      Connectivity between the spokes can fail if the hub site dies or faces major disruptions. While there are redundancy plans for cloud networks, it will be an additional cost to plan and build an environment for it.

      Leverage the hub and spoke strategy for:

      Providing access to shared services: Hub and spoke can be used to give workloads that are deployed on different networks access to shared services by placing the shared service in the hub. For example, DNS servers can be placed in the hub network, and production or host networks can be connected to the hub to access it, or if the central network is set up to host Active Directory services, then servers in other networks can act as spokes and have full access to the central VPC to send requests. This is also a great way to separate workloads that do not need to communicate with each other but all need access to the same services.

      Adding new locations: An expanding organization that needs to add additional global or domestic locations can leverage hub and spoke to connect new network locations to the main system without the need for multiple connections.

      Cost savings: Apart from having fewer connections than mesh that can save costs in the cloud, hub and spoke can also be used to centralize services such as DNS and NAT to be managed in one location rather than having to individually deploy in each network. This can bring down management efforts and costs considerably.

      Centralized security: Enterprises can deploy a center of excellence on the hub for security, and the spokes connected to it can leverage a higher level of security and increase resilience. It will also be easier to control and manage network policies and networking resources from the hub.

      Network management: Since each spoke is peered only once to the hub, detecting connectivity problems or other network issues is made simpler in hub and spoke than on mesh. A network manager deployed on the cloud can give access to network problems faster than on other topologies.

      Hub and spoke – mesh hybrid

      The advantages of using a hub and spoke model far exceed those of using a mesh topology in the cloud and go to show why most organizations ultimately end up using the hub and spoke as their networking strategy.

      However, organizations, especially large ones, are complex entities, and choosing only one model may not serve all business needs. In such cases, a hybrid approach may be the best strategy. The following slides will demonstrate the advantages and use cases for mesh, however limited they might be.

      Where it can be useful:

      An organization can have multiple network topologies where system X is a mesh and system Y is a hub and spoke. A shared system Z can be a part of both systems depending on the needs.

      An organization can have multiple networks interconnected in a mesh and some of the networks in the mesh can be a hub for a hub-spoke network. For example, a business unit that works on data analysis can deploy their services in a spoke that is connected to a central hub that can host shared services such as Active Directory or NAT. The central hub can then be connected to a regional on-prem network where data and other shared services can be hosted.

      Hub and spoke – mesh hybrid network on AWS

      This is an image of the Hub and spoke – mesh hybrid network on AWS

      Why mesh can still be useful

      Benefits Of Mesh

      Use Cases For Mesh

      Security: Setting up a peering connection between two VPCs comes with the benefit of improving security since the connection can be private between the networks and can isolate public traffic from the internet. The traffic between the networks never has to leave the cloud provider's network, which helps reduce a class of risks.

      Reduced network costs: Since the peered networks communicate internally through the cloud's internal networks, the data transfer costs are typically cheaper than over the public internet.

      Communication speed: Improved network latency is a key benefit from using mesh because the peered traffic does not have to go over the public internet but rather the internal network. The network traffic between the connections can also be quickly redirected as needed.

      Higher flexibility for backend services: Mesh networks can be desirable for back-end services if egress traffic needs to be blocked to the public internet from the deployed services/servers. This also helps avoid having to set up public IP or network address translation (NAT) configurations.

      Connecting two or more networks for full access to resources: For example, consider an organization that has separate networks for each department, which don't all need to communicate with each other. Here, a peering network can be set up only between the networks that need to communicate with full or partial access to each other such as finance to HR or accounting to IT.

      Specific security or compliance need: Mesh or VPC peering can also come in handy to serve specific security needs or logging needs that require using a network to connect to other networks directly and in private. For example, global organizations that face regulatory requirements of storing or transferring data domestically with private connections.

      Systems with very few networks that do not need internet access: Workloads deployed in networks that need to communicate with each other but do not require internet access or network address translation (NAT) can be connected using mesh especially when there are security reasons to keep them from being connected to the main system, e.g. backend services such as testing environments, labs, or sandboxes can leverage this design.

      Designing for governance vs. flexibility in hub and spoke

      Governance and flexibility in managing resources in the cloud are inversely proportional: The higher the governance, the less freedom you have to innovate.

      The complexities of designing an organization's networks grow with the organization as it becomes global and takes on more services and lines of business. Organizations that choose to deploy the hub and spoke model face a dilemma in choosing between governance and flexibility for their networks. Organizations need to find that sweet spot to find the right balance between how much they want to govern their systems, mainly for security- and cost-monitoring, and how much flexibility they want to provide for innovation and other operations, since the two usually tend to have an inverse relationship.

      This decision in hub and spoke usually means that the domains chosen for higher governance must be placed in the hub network, and the domains that need more flexibility in a spoke. The key variables in the following slide will help determine the placement of the domain and will depend entirely on the organization's context.

      The two networking patterns in the cloud have layered complexities that need to be systematically addressed.

      Designing for governance vs. flexibility in hub and spoke

      If a network has more flexibility in all or most of these domains, it may be a good candidate for a spoke-heavy design; otherwise, it may be better designed in a hub-centric pattern.

      • Function: The function the domain network is assigned to and the autonomy the function needs to be successful. For example, software R&D usually requires high flexibility to be successful.
      • Regulations: The extent of independence from both internal and external regulatory constraints the domain has. For example, a treasury reporting domain typically has high internal and external regulations to adhere to.
      • Human resources: The freedom a domain has to hire and manage its resources to perform its function. For example, production facilities in a huge organization have the freedom to manage their own resources.
      • Operations: The freedom a domain has to control its operations and manage its own spending to perform its functions. For example, governments usually have different departments and agencies, each with its own budget to perform its functions.
      • Technology: The independence and the ability a domain has to manage its selection and implementation of technology resources in the cloud. For example, you may not want a software testing team to have complete autonomy to deploy resources.

      Optimal placement of services between the hub and spoke

      Shared services and vendor management

      Resources that are shared between multiple projects or departments or even by the entire organization should be hosted on the hub network to simplify sharing these services. For example, e-learning applications that may be used by multiple business units to train their teams, Active Directory accessed by most teams, or even SAAS platforms such as O365 and Salesforce can leverage buying power and drive down the costs for the organization. Shared services should also be standardized across the organization and for that, it needs to have high governance.

      Services that are an individual need for a network and have no preexisting relationship with other networks or buying power and scale can be hosted in a spoke network. For example, specialized accounting software used exclusively by the accounting team or design software used by a single team. Although the services are still a part of the wider network, it helps separate duties from the shared services network and provides flexibility to the teams to customize and manage their services to suit their individual needs.

      Network egress and interaction

      Network connections, be they in the cloud or hybrid-cloud, are used by everyone to either connect to the internet, access cloud services, or access the organization's data center. Since this is a shared service, a centralized networking account must be placed in the hub for greater governance. Interactions between the spokes in a hub and spoke model happens through the hub, and providing internet access to the spokes through the hub can help leverage cost benefits in the cloud. The network account will perform routing duties between the spokes, on-prem assets, and egress out to the internet.

      For example, NAT gateways in the cloud that are managed services are usually charged by the hour, and deploying NAT on each spoke can be harder to manage and expensive to maintain. A NAT gateway deployed in a central networking hub can be accessed by all spokes, so centralizing it is a great option.

      Note that, in some cases, when using edge locations for data transfers, it may be cost effective to deploy a NAT in the spoke, but such cases usually do not apply to most organizational units.

      A centralized network hub can also be useful to configure network policies and network resources while organizational departments can configure non-network resources, which helps separate responsibilities for all the spokes in the system. For example, subnets and routes can be controlled from the central network hub to ensure standardized network policies across the network.

      Security

      While there needs to be security in the hub and the spokes individually, finding the balance of operation can make the systems more robust. Hub and spoke design can be an effective tool for security when a principal security hub is hosted in the hub network. The central security hub can collect data from the spokes as well as non-spoke sources such as regulatory bodies and threat intelligence providers, and then share the information with the spokes.

      Threat information sharing is a major benefit of using this design, and the hub can take actions to analyze and enrich the data before sharing it with spokes. Shared services such as threat intelligence platforms (TIP) can also benefit from being centralized when stationed in the hub. A collective defense approach between the hub and spoke can be very successful in addressing sophisticated threats.

      Compliance and regulatory requirements such as HIPAA can also be placed in the hub, and the spokes connected to it can make use of it instead of having to deploy it in each spoke individually.

      Cloud metering

      The governance vs. flexibility paradigm usually decides the placement of cloud metering, i.e. if the organization wants higher control over cloud costs, it should be in the central hub, whereas if it prioritizes innovation, the spokes should be allowed to control it. Regardless of the placement of the domain, the costs can be monitored from the central hub using cloud-native monitoring tools such as Azure Monitor or any third-party software deployed in the hub.

      For ease of governance and since resources are usually shared at a project level, most cloud service providers suggest that an individual metering service be placed in the spokes. The centralized billing system of the organization, however, can make use of scale and reserved instances to drive down the costs that the spokes can take advantage of. For example, billing and access control resources are placed in the lower levels in GCP to enable users to set up projects and perform their tasks. These billing systems in the lower levels are then controlled by a centralized billing system to decide who pays for the resources provisioned.

      Don't get stuck with your on-prem network design. Design for the cloud.

      1. Peering VPCs into a mesh design can be an easy way to get onto the cloud, but it should not be your networking strategy for the long run.
      2. Hub and spoke network design offers more benefits than any other network strategy to be adopted only when the need arises. Plan for the design early on and keep a strategy in place to deploy it as early as possible.
      3. Hybrid of mesh and hub and spoke will be very useful in connecting multiple large networks especially when they need to access the same resources without having to route the traffic over the internet.
      4. Governance vs. flexibility should be a key consideration when designing for hub and spoke to leverage the best out of your infrastructure.
      5. Distribute domains across the hub or spokes to leverage costs, security, data collection, and economies of scale, and to foster secure interactions between networks.

      Cloud network design strategy

      This is an image of the framework for developing a Cloud Network Design Strategy.

      Bibliography

      Borschel, Brett. "Azure Hub Spoke Virtual Network Design Best Practices." Acendri Solutions, 13 Jan. 2022. Web.
      Singh, Garvit. "Amazon Virtual Private Cloud Connectivity Options." AWS, January 2018. Web.
      "What Is the Hub and Spoke Information Sharing Model?" Cyware, 16 Aug. 2021. Web.
      Youseff, Lamia. "Mesh and Hub-and-Spoke Networks on Azure." Microsoft, Dec. 2017. Web.

      Review and Improve Your IT Policy Library

      • Buy Link or Shortcode: {j2store}193|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $34,724 Average $ Saved
      • member rating average days saved: 14 Average Days Saved
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance
      • Your policies are out of date, disorganized, and complicated. They don’t reflect current regulations and don’t actually mitigate your organization’s current IT risks.
      • Your policies are difficult to understand, aren’t easy to find, or aren’t well monitored and enforced for compliance. As a result, your employees don’t care about your policies.
      • Policy issues are taking up too much of your time and distracting you from the real issues you need to address.

      Our Advice

      Critical Insight

      A dynamic and streamlined policy approach will:

      1. Right-size policies to address the most critical IT risks.
      2. Clearly lay out a step-by-step process to complete daily tasks in compliance.
      3. Obtain policy adherence without having to be “the police.”

      To accomplish this, the policy writer must engage their audience early to gather input on IT policies, increase policy awareness, and gain buy-in early in the process.

      Impact and Result

      • Develop more effective IT policies. Clearly express your policy goals and objectives, standardize the approach to employee problem solving, and write policies your employees will actually read.
      • Improve risk coverage. Ensure full coverage on the risk landscape, including legal regulations, and establish a method for reporting, documenting, and communicating risks.
      • Improve employee compliance. Empathize with your employees and use policy to educate, train, and enable them instead of restricting them.

      Review and Improve Your IT Policy Library Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to write better policies that mitigate the risks you care about and get the business to follow them, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess

      Assess your risk landscape and design a plan to update your policy network based on your most critical risks.

      • Review and Improve Your IT Policy Library – Phase 1: Assess
      • Policy Management RACI Chart Template
      • Policy Management Tool
      • Policy Action Plan

      2. Draft and implement

      Use input from key stakeholders to write clear, consistent, and concise policies that people will actually read and understand. Then publish them and start generating policy awareness.

      • Review and Improve Your IT Policy Library – Phase 2: Draft and Implement
      • Policy Template
      • Policy Communication Plan Template

      3. Monitor, enforce, revise

      Use your policies to create a compliance culture in your organization, set KPIs, and track policy effectiveness.

      • Review and Improve Your IT Policy Library – Phase 3: Monitor, Enforce, Revise
      [infographic]

      Workshop: Review and Improve Your IT Policy Library

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish & Assess

      The Purpose

      Identify the pain points associated with IT policies.

      Establish the policy development process.

      Begin formulating a plan to re-design the policy network.

      Key Benefits Achieved

      Establish the policy process.

      Highlight key issues and pain points regarding policy.

      Assign roles and responsibilities.

      Activities

      1.1 Introduce workshop.

      1.2 Identify the current pain points with policy management.

      1.3 Establish high-level goals around policy management.

      1.4 Select metrics to measure achievement of goals.

      1.5 Create an IT policy working group (ITPWG).

      1.6 Define the scope and purpose of the ITPWG.

      Outputs

      List of issues and pain points for policy management

      Set of six to ten goals for policy management

      Baseline and target measured value

      Amended steering committee or ITPWG charter

      Completed RACI chart

      Documented policy development process

      2 Assess Your Risk Landscape & Map Policies to Risks; Create a Policy Action Plan

      The Purpose

      Identify key risks.

      Develop an understanding of which risks are most critical.

      Design a policy network that best mitigates those risks.

      Key Benefits Achieved

      Use a risk-driven approach to decide which policies need to be written or updated first.

      Activities

      2.1 Identify risks at a high level.

      2.2 Assess each identified risk scenario on impact and likelihood.

      2.3 Map current and required policies to risks.

      2.4 Assess policy effectiveness.

      2.5 Create a policy action plan.

      2.6 Select policies to be developed during workshop.

      Outputs

      Ranked list of IT’s risk scenarios

      Prioritized list of IT risks (simplified risk register)

      Policy action plan

      3 Develop Policies

      The Purpose

      Outline what key features make a policy effective and write policies that mitigate the most critical IT risks.

      Key Benefits Achieved

      Write policies that work and get them approved.

      Activities

      3.1 Define the policy audience, constraints, and in-scope and out-of-scope requirements for a policy.

      3.2 Draft two to four policies

      Outputs

      Drafted policies

      4 Create a Policy Communication and Implementation Plan and Monitor & Reassess the Portfolio

      The Purpose

      Build an understanding of how well the organization’s value creation activities are being supported.

      Key Benefits Achieved

      Identify an area or capability that requires improvement.

      Activities

      4.1 Review draft policies and update if necessary.

      4.2 Create a policy communication plan.

      4.3 Select KPIs.

      4.4 Review root-cause analysis techniques.

      Outputs

      Final draft policies

      Policy communications plan

      KPI tracking log

      Get Started With FinOps

      • Buy Link or Shortcode: {j2store}473|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Cloud Strategy
      • Parent Category Link: /cloud-strategy
      • Runaway cloud costs are wrecking the CIO’s budget, but cloud costs are hard to reign in because vendors are not always up front about the true costs, it’s easy to oversubscribe to services and quickly run up costs with pay-as-you-go service, and cloud bills are complex.
      • While IT isn’t the business owner for cloud services, they often carry the cost of overruns on their budget, and don’t have the skills or influence to more effectively manage cloud costs.
      • Truly optimizing cloud spend and maximizing business value from cloud requires insight and collaboration from IT/engineering, finance, and business owners, but those teams are often siloed and manage their cloud usage or spend differently.

      Our Advice

      Critical Insight

      • The business units that need to collaborate to make FinOps work are often siloed, with different processes, data, metrics and cloud expertise. Coordinating their efforts to encourage shared responsibility can be a big obstacle to overcome.
      • FinOps requires a cultural shift to empower every cloud user to take accountability for cloud cost optimization.
      • To get started with FinOps, it’s essential to first break down those silos and get the multiple teams involved on the same page. Everyone must understand how FinOps is part of their responsibilities.

      Impact and Result

      • Implementing FinOps will lead to improved visibility and control over cloud spend, optimized resource allocation and reduced cloud waste, enhanced transparency, improved forecasting and budgeting, and increased accountability over cloud costs across business units.
      • This blueprint will help you get started with FinOps by identifying the roles involved in FinOps, defining the key activities that must be conducted, and assigning ownership to each task. This will help foster a shared responsibility for FinOps and encourage everyone to work toward common goals.

      Get Started With FinOps Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Get Started With FinOps Deck – A guide to defining and assigning the roles and activities involved in FinOps.

      This storyboard will help you define FinOps roles and structure of the FinOps and other teams, identify key activities, and assign ownership to each. It will also provide guidance on analyzing the results of the RACI chart.

      • Get Started With FinOps Storyboard

      2. FinOps RACI Chart – A tool to help you assess the current state of FinOps activities and assign ownership to each.

      This tool will help you assess the current state of FinOps activities and assign ownership to each activity. Use the outputs of the exercise to define how roles across the organization will be involved in FinOps and where to focus efforts in maturing in FinOps.

      • FinOps RACI Chart
      [infographic]

      Further reading

      Get Started With FinOps

      FinOps goes beyond identifying cloud savings. It empowers every cloud user to maximize the value of their spend.

      Executive Brief

      Analyst Perspective

      The first step of FinOps is collectively realizing that maximizing value is every cloud user's responsibility.

      Natalie Sansone

      Natalie Sansone, PhD
      Research Director, Infrastructure & Operations
      Info-Tech Research Group

      As cloud adoption increases, and with it the complexity of cloud environments, managing and optimizing cloud spend has become both a top challenge and priority for IT organizations. In response, the practice of FinOps has emerged to help organizations maximize the value they get from the cloud. As its popularity surges, organizations are told they must do FinOps, but many feel their practice is not yet mature. One of their biggest obstacles is empowering engineers and other cloud users to work toward this shared goal with other teams.

      To grow and mature your FinOps practice, your first challenge is breaking down silos, encouraging collaboration across varying business units, and getting all cloud users to be accountable for their cloud usage and spend and to understand the shared goals of FinOps. Beyond finding ways to reduce cloud costs, FinOps is a cultural shift that enables better collaboration between distributed teams. It allows them to leverage data to identify opportunities to maximize business value from cloud investments.

      Whether you’re starting the FinOps journey or looking to mature your practice, this blueprint will help you organize by defining the required role and tasks. Then you can work through a collective exercise to ensure everyone understands who is involved and responsible for each activity. You’ll gain the information you need and be better positioned to continuously improve and mature your processes, but success begins with everyone understanding that FinOps is a shared responsibility.

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      • Runaway cloud costs are wrecking the CIO’s budget, but these are hard to rein in because cloud vendors are not always upfront about the true costs. It’s easy to oversubscribe to services and quickly run up costs with pay-as-you-go service and complex bills.
      • While IT isn’t the business owner for cloud services, they often carry the cost of overruns on their budget, and don’t have the skills or influence to more effectively manage cloud costs.
      • Truly optimizing cloud spend and maximizing its business value requires insight and collaboration from IT/engineering, finance, and business owners, but those teams are often siloed and manage their cloud usage/spend differently.
      • IT leaders are instructed to implement a FinOps practice, but don’t truly understand what that is, who needs to be involved, or where to start.
      • Business units that must collaborate to make FinOps work are often siloed and have different processes, data, metrics, and cloud expertise. Coordinating efforts to encourage shared responsibility can be a challenge. FinOps requires a cultural shift to empower every cloud user to take accountability for cost optimization.
      • Lack of visibility into cloud usage, spending patterns, and cost drivers along with inadequate tools to get the required data to drive decision making. This leads to hindered progress.
      • Implementing FinOps will improve visibility and control over cloud spend, optimize resource allocation and reduce waste, enhance transparency, improve forecasting and budgeting, and improve cost accountability across business units.
      • To get started with FinOps, first it’s essential to break down those silos and coordinate the multiple teams involved. Everyone must understand how FinOps is part of their responsibilities.
      • This blueprint will help you identify the roles involved in FinOps, define the key activities that must be conducted, and assign ownership to each task. This will help foster a shared responsibility for FinOps and encourage everyone to work toward common goals.

      Info-Tech Insight

      FinOps is not just about driving cloud savings. It’s a cultural shift empowering every cloud user to maximize the value of their spend. The first step of FinOps is therefore to help everyone understand their share of responsibility.

      What is FinOps?

      Definition

      “FinOps is an evolving cloud financial management discipline and cultural practice that enables organizations to get maximum business value by helping engineering, finance, technology, and business teams to collaborate on data-driven spending decisions.”

      Definition Updated: November 2021 by the FinOps Foundation Technical Advisory Council

      The ultimate purpose of FinOps is to bring business value to your organization by reducing cloud waste.

      • FinOps is the people, processes, and tools you use to eliminate waste and ensure you get the most value from your cloud spend.
      • FinOps is the framework within which teams can operate to ensure they are optimizing their use of cloud resources.
      • FinOps brings financial accountability to cloud spend.
      • FinOps is a culture practice where everyone collaborates and takes ownership for their cloud usage while being supported and governed by a central group. It breaks down silos so teams that haven’t worked closely together in the past collaborate toward shared goals.
      • It brings financial accountability and cultural change to cloud spend by enabling distributed teams to better collaborate and leverage data to decide where/when to invest in cloud for maximum business value.
      • FinOps is not done by an individual or just one team. It’s a change in the way that many disparate teams work together, from engineering to finance to business teams.

      Common misconceptions about FinOps

      FinOps is not

      FinOps is

      • Only about saving money
      • Only focused on activities related to cost optimization
      • IT financial management, which involves tracking and analyzing all costs associated with IT services
      • An activity (or set of activities) done by one person or team
      • Short for financial operations
      • About maximizing value. FinOps is optimizing cloud costs to provide maximum business value and support scalability (sometimes this means investing more money in cloud)
      • FinOps also involves building a culture of accountability, visibility, and collaboration around cloud usage and cost
      • Focused specifically on managing/optimizing cloud costs
      • A cultural shift around how disparate teams work together, people from all areas of the organization can play a role
      • The term is a portmanteau (combination) of Finance and (Dev)Ops, emphasizing the collaboration between business and engineering teams1
      1 “What is FinOps?” FinOps Foundation, 2023

      FinOps’ popularity has exploded in recent years

      2012 - The practice of FinOps begins to emerge through early scalers in public cloud like Adobe and Intuit

      2017 - Many IT departments begin to use the cloud for limited use cases, but very few enterprises are all in the cloud

      2019 - Many companies begin moving to a cloud-first strategy, shifting IT spend from capital to operational expenditure (CapEx to OpEx), complicating cloud bills

      February 2019 - The FinOps Foundation is born out of Cloudability’s Customer Advisory Board meeting where many cloud practitioners discuss the need for a community of practitioners

      June 2020 - The FinOps Foundation merges with Linux Foundation and sets the standard for cloud financial management

      Sources: Carr, 2022; Linux Foundation, 2023, Storment & Fuller, 2023.

      The image contains a graph that demonstrates the increasing number of people listing FinOps as a skill.

      Where did the term come from?

      The term FinOps has risen in popularity over the last few years. Originally, organizations used the term cloud cost management, then cloud cost optimization, then more broadly, cloud financial management. The latter has now been largely replaced by FinOps.

      Why is FinOps so essential? (1/2)

      The shift from fixed to variable spend has changed the way organizations must manage and report on costs.

      In the traditional data center era:

      • The enterprise procured infrastructure through large capital refreshes of data center hardware.
      • Infrastructure teams tried their best to avoid running out of storage before the next hardware refresh. Equipment was intentionally oversized to accommodate unexpected growth.
      • IT teams would not worry about how much infrastructure resources they consumed, provided they stayed within planned capacity limits. If capacity ran low, resource usage would be adjusted.
      • The business might not like laying out large capital expenditures, but it had full visibility into the cost and got to approve spending in advance using financial controls.
      • Monthly costs were well-understood and monthly or infrequent reporting was acceptable because day-to-day costs did not vary.
      • Mature organizations might chargeback or showback costs to application teams based on number of virtual machines or other measures, but traditional on-premises chargeback wouldn't save money overall.

      Why is FinOps so essential? (2/2)

      The shift from fixed to variable spend has changed the way organizations must manage and report on costs.

      In the cloud era:

      • Infrastructure resources must no longer be provisioned in advance through spending capital budgets.
      • Capacity management isn’t a major concern. Spare capacity is always available, and savings can result from not paying for unnecessary capacity.
      • Cloud services often offer pay-as-you-go pricing models, allowing more control and flexibility to pay only for the resources you consume.
      • When services use more resources than they need, running costs increase. Cost reductions are realized through reducing the size of allocated resources.
      • The variable consumption model can reduce operating costs but can make budgeting and forecasting difficult. IT and the business can no longer predict what they will pay for infrastructure resources.
      • Billing is no longer straightforward and monthly. Resources are individually charged in micro amounts. Costs must be regularly reviewed as unexpected or forgotten resource usage can add up significantly.

      Managing cloud spend remains a challenge for many organizations

      Given the variable nature of cloud costs and complex pricing structures, it can be easy to overspend without mature FinOps processes in place. Indeed, 82% of organizations cite managing cloud spend as one of their top challenges.

      Respondents reported that public cloud spend was over budget by an average of 18%, up from 13% the previous year.

      Source: Flexera 2023 State of the Cloud Report, n=750

      Organization's top cloud challenges.

      While FinOps adoption has rapidly increased, maturity has not

      Most organizations understand the value of FinOps but are not mature in their practice.

      NetApp’s 2023 State of CloudOps Report found that:

      96% say FinOps is important to their cloud strategy

      9% have a mature FinOps practice

      92% report that they struggle with FinOps

      Source: NetApp, 2023 State of CloudOps Report, n=310 IT decision makers in the United States responsible for public cloud infrastructure investments.

      Flexera’s 2023 State of the Cloud report found that 72% of organizations have a dedicated FinOps team.

      Flexera’s annual report also found that year over year, cloud cost responsibilities are increasingly shifting away from Finance/Accounting and Vendor Management teams and over to FinOps teams as they emerge and mature.

      Source: Flexera, 2023 State of the Cloud Report, n=750 decision-makers and users around the world

      Build Resilience Against Ransomware Attacks

      • Buy Link or Shortcode: {j2store}317|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $68,467 Average $ Saved
      • member rating average days saved: 21 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Sophisticated ransomware attacks are on the rise and evolving quickly.
      • Executives want reassurance but are not ready to write a blank check. We need to provide targeted and justified improvements.
      • Emerging strains can exfiltrate sensitive data, encrypt systems, and destroy backups in hours, which makes recovery a grueling challenge.

      Our Advice

      Critical Insight

      • Malicious agents design progressive, disruptive attacks to pressure organizations to pay a ransom.
      • Organizations misunderstand ransomware risk scenarios, which obscures the likelihood and impact of an attack.
      • Conventional approaches focus on response and recovery, which do nothing to prevent an attack and are often ineffective against sophisticated attacks.

      Impact and Result

      • Conduct a thorough assessment of your current state; identify potential gaps and assess the possible outcomes of an attack.
      • Analyze attack vectors and prioritize controls that prevent ransomware attacks, and implement ransomware protections and detection to reduce your attack surface.
      • Visualize, plan, and practice your response and recovery to reduce the potential impact of an attack.

      Build Resilience Against Ransomware Attacks Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build Resilience Against Ransomware Attacks

      Use this step-by-step guide to assess your ransomware readiness and implement controls that will improve your ability to prevent incursions and defend against attacks.

      • Build Resilience Against Ransomware Attacks – Phases 1-4

      2. Ransomware Resilience Assessment – Complete the ransomware resilience assessment and establish metrics.

      Use this assessment tool to assess existing protection, detection, response, and recovery capabilities and identify potential improvements.

      • Ransomware Resilience Assessment

      3. Threat Preparedness Workbook – Improve protection and detection capabilities.

      Use this threat preparedness workbook to evaluate the threats and tactics in the ransomware kill chain using the MITRE framework and device appropriate countermeasures.

      • Enterprise Threat Preparedness Workbook

      4. Tabletop Planning Exercise and Example Results – Improve response and recovery capabilities with a tabletop exercise for your internal IT team.

      Adapt this tabletop planning session template to plan and practice the response of your internal IT team to a ransomware scenario.

      • Tabletop Exercise – Internal (Ransomware Template)
      • Ransomware Tabletop Planning Results – Example (Visio)
      • Ransomware Tabletop Planning Results – Example (PDF)

      5. Ransomware Response Runbook and Workflow – Document ransomware response steps and key stakeholders.

      Adapt these workflow and runbook templates to coordinate the actions of different stakeholders through each stage of the ransomware incident response process.

      • Ransomware Response Runbook Template
      • Ransomware Response Workflow Template (Visio)
      • Ransomware Response Workflow Template (PDF)

      6. Extended Tabletop Exercise and Leadership Guide – Run a tabletop test to plan and practice the response of your leadership team.

      Adapt this tabletop planning session template to plan leadership contributions to the ransomware response workflow. This second tabletop planning session will focus on communication strategy, business continuity plan, and deciding whether the organization should pay a ransom.

      • Tabletop Exercise – Extended (Ransomware Template)
      • Leadership Guide for Extended Ransomware

      7. Ransomware Resilience Summary Presentation – Summarize status and next steps in an executive presentation.

      Summarize your current state and present a prioritized project roadmap to improve ransomware resilience over time.

      • Ransomware Resilience Summary Presentation

      Infographic

      Workshop: Build Resilience Against Ransomware Attacks

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess Ransomware Resilience

      The Purpose

      Set workshop goals, review ransomware trends and risk scenarios, and assess the organization’s resilience to ransomware attacks.

      Key Benefits Achieved

      Develop a solid understanding of the likelihood and impact of a ransomware attack on your organization.

      Complete a current state assessment of key security controls in a ransomware context.

      Activities

      1.1 Review incidents, challenges, and project drivers.

      1.2 Diagram critical systems and dependencies and build risk scenario.

      1.3 Assess ransomware resilience.

      Outputs

      Workshop goals

      Ransomware Risk Scenario

      Ransomware Resilience Assessment

      2 Protect and Detect

      The Purpose

      Improve your capacity to protect your organization from ransomware and detect attacks along common vectors.

      Key Benefits Achieved

      Identify targeted countermeasures that improve protection and detection capabilities.

      Activities

      2.1 Assess ransomware threat preparedness.

      2.2 Determine the impact of ransomware techniques on your environment.

      2.3 Identify countermeasures to improve protection and detection capabilities.

      Outputs

      Targeted ransomware countermeasures to improve protection and detection capabilities.

      Targeted ransomware countermeasures to improve protection and detection capabilities.

      Targeted ransomware countermeasures to improve protection and detection capabilities.

      3 Respond and Recover

      The Purpose

      · Improve your organization’s capacity to respond to ransomware attacks and recover effectively.

      Key Benefits Achieved

      Build response and recovery capabilities that reduce the potential business disruption of successful ransomware attacks.

      Activities

      3.1 Review the workflow and runbook templates.

      3.2 Update/define your threat escalation protocol.

      3.3 Define scenarios for a range of incidents.

      3.4 Run a tabletop planning exercise (IT).

      3.5 Update your ransomware response runbook.

      Outputs

      Security Incident Response Plan Assessment.

      Tabletop Planning Session (IT)

      Ransomware Workflow and Runbook.

      4 Improve Ransomware Resilience.

      The Purpose

      Identify prioritized initiatives to improve ransomware resilience.

      Key Benefits Achieved

      Identify the role of leadership in ransomware response and recovery.

      Communicate workshop outcomes and recommend initiatives to improve ransomware resilience.

      Activities

      4.1 Run a tabletop planning exercise (Leadership).

      4.2 Identify initiatives to close gaps and improve resilience.

      4.3 Review broader strategies to improve your overall security program.

      4.4 Prioritize initiatives based on factors such as effort, cost, and risk.

      4.5 Review the dashboard to fine tune your roadmap.

      4.6 Summarize status and next steps in an executive presentation.

      Outputs

      Tabletop Planning Session (Leadership)

      Ransomware Resilience Roadmap and Metrics

      Ransomware Workflow and Runbook

      Further reading

      Build Ransomware Resilience

      Prevent ransomware incursions and defend against ransomware attacks

      EXECUTIVE BRIEF

      Executive Summary

      Your Challenge

      Ransomware is a high-profile threat that demands immediate attention:

      • Sophisticated ransomware attacks are on the rise and evolving quickly.
      • Emerging strains can exfiltrate sensitive data, encrypt systems, and destroy backups in only a few hours, which makes recovery a grueling challenge.
      • Executives want reassurance but aren't ready to write a blank check. Improvements must be targeted and justified.

      Common Obstacles

      Ransomware is more complex than other security threats:

      • Malicious agents design progressive, disruptive attacks to pressure organizations to pay a ransom.
      • Organizations misunderstand ransomware risk scenarios, which obscures the likelihood and impact of an attack.
      • Conventional approaches focus on response and recovery, which do nothing to prevent an attack and are often ineffective against sophisticated attacks.

      Info-Tech's Approach

      To prevent a ransomware attack:

      • Conduct a through assessment of your current state, identify potential gaps, and assess the possible outcomes of an attack.
      • Analyze attack vectors and prioritize controls that prevent ransomware attacks, and implement ransomware protection and detection to reduce your attack surface.
      • Visualize, plan, and practice your response and recovery to reduce the potential impact of an attack.

      Info-Tech Insight

      Resilience is not a trampoline, where you're down one moment and up the next. It's more like climbing a mountain. It takes time, planning, and help from people around you to work through challenges. Focus on what is in your organization's control, and cultivate strengths that allow you to protect assets, detect incursions, respond effectively, and recovery quickly.

      Analyst Perspective

      Ransomware is an opportunity and a challenge.

      As I write, the frequency and impact of ransomware attacks continue to increase, with no end in sight. Most organizations will experience ransomware in the next 24 months, some more than once, and business leaders know it. You will never have a better chance to implement best practice security controls as you do now.

      The opportunity comes with important challenges. Hackers need to spend less time in discovery before they deploy an attack, which have become much more effective. You can't afford to rely solely on your ability to respond and recover. You need to build a resilient organization that can withstand a ransomware event and recover quickly.

      Resilient organizations are not impervious to attack, but they have tools to protect assets, detect incursions, and respond effectively. Resilience is not a trampoline, where you're down one moment and up the next. It's more like climbing a mountain. It takes time, planning, and help from people around you to overcome challenges and work through problems. But eventually you reach the top and look back at how far you've come.

      This is an image of Michael Hébert

      Michel Hébert
      Research Director, Security and Privacy
      Info-Tech Research Group

      Ransomware attacks are on the rise and evolving quickly.

      Three factors contribute to the threat:

      • The rise of ransomware-as-a-service, which facilitates attacks.
      • The rise of crypto-currency, which facilitates anonymous payment.
      • State sponsorship of cybercrime.

      Elementus maps ransomware payments made through bitcoin. Since 2019, victims made at least $2B in payments.

      A handful of criminal organizations, many of whom operate out of cybercrime hotbeds in Russia, are responsible for most of the damage. The numbers capture only the ransom paid, not the clean-up cost and economic fallout over attacks during this period.

      Total ransom money collected (2015 – 2021): USD 2,592,889,121

      This image contains a bubble plot graph showing the total ransom money collected between the years 2015 - 2021.

      The frequency and impact of ransomware attacks are increasing

      Emerging strains can exfiltrate sensitive data, encrypt systems and destroy backups in only a few hours, which makes recovery a grueling challenge.

      Sophos commissioned a vendor agnostic study of the real-world experience of 5,600 IT professionals in mid-sized organizations across 31 countries and 15 industries.

      The survey was conducted in Jan – Feb 2022 and asked about the experience of respondents over the previous year.

      66%
      Hit by ransomware in 2021
      (up from 37% in 2020)

      90%
      Ransomware attack affected their ability to operate

      $812,360 USD
      Average ransom payment

      $4.54M
      Average remediation cost (not including ransom)

      ONE MONTH
      Average recovery time

      Meanwhile, organizations continue to put their faith in ineffective ransomware defenses.

      Of the respondents whose organizations weren't hit by ransomware in 2021 and don't expect to be hit in the future, 72% cited either backups or cyberinsurance as reasons why they anticipated an attack.

      While these elements can help recover from an attack, they don't prevent it in the first place.

      Source: Sophos, State of Ransomware (2022)
      IBM, Cost of A Data Breach (2022)

      The 3-step ransomware attack playbook

      • Get in
      • Spread
      • Profit

      At each point of the playbook, malicious agents need to achieve something before they can move to the next step.

      Resilient organizations look for opportunities to:

      • Learn from incursions
      • Disrupt the playbook
      • Measure effectiveness

      Initial access

      Execution

      Privilege Escalation

      Credential Access

      Lateral Movement

      Collection

      Data Exfiltration

      Data encryption

      Deliver phishing email designed to avoid spam filter.

      Launch malware undetected.

      Identify user accounts.

      Target an admin account.

      Use brute force tactics to crack it.

      Move through the network and collect data.

      Infect as many critical systems and backups as possible to limit recovery options.

      Exfiltrate data to gain leverage.

      Encrypt data, which triggers alert.

      Deliver ransom note.

      Ransomware is more complex than other security threats

      Ransomware groups thrive through extortion tactics.

      • Traditionally, ransomware attacks focused on encrypting files as an incentive for organizations to pay up.
      • As organizations improved backup and recovery strategies, gangs began targeting, encrypting, and destroying back ups.
      • Since 2019, gangs have focused on a double-extortion strategy: exfiltrate sensitive or protected data before encrypting systems and threaten to publish them.

      Organizations misunderstand ransomware risk scenarios, which obscures the potential impact of an attack.

      Ransom is only a small part of the equation. Four process-related activities drive ransomware recovery costs:

      • Detection and Response – Activities that enable detection, containment, eradication and recovery.
      • Notification – Activities that enable reporting to data subjects, regulators, law enforcement, and third parties.
      • Lost Business – Activities that attempt to minimize the loss of customers, business disruption, and revenue.
      • Post Breach Response – Redress activities to victims and regulators, and the implementation of additional controls.

      Source: IBM, Cost of a Data Breach (2022)

      Disrupt the attack each stage of the attack workflow.

      An effective response with strong, available backups will reduce the operational impact of an attack, but it won't spare you from its reputational and regulatory impact.

      Put controls in place to disrupt each stage of the attack workflow to protect the organization from intrusion, enhance detection, respond quickly, and recover effectively.

      Shortening dwell time requires better protection and detection

      Ransomware dwell times and average encryption rates are improving dramatically.

      Hackers spend less time in your network before they attack, and their attacks are much more effective.

      Avg dwell time
      3-5 Days

      Avg encryption rate
      70 GB/h

      Avg detection time
      11 Days

      What is dwell time and why does it matter?

      Dwell time is the time between when a malicious agent gains access to your environment and when they are detected. In a ransomware attack, most organizations don't detect malicious agents until they deploy ransomware, encrypt their files, and lock them out until they pay the ransom.

      Effective time is a measure of the effectiveness of the encryption algorithm. Encryption rates vary by ransomware family. Lockbit has the fastest encryption rate, clocking in at 628 GB/h.

      Dwell times are dropping, and encryption rates are increasing.

      It's more critical than ever to build ransomware resilience. Most organizations do not detect ransomware incursions in time to prevent serious business disruption.

      References: Bleeping Computers (2022), VentureBeat, Dark Reading, ZDNet.

      Resilience depends in part on response and recovery capabilities

      This blueprint will focus on improving your ransomware resilience to:

      • Protect against ransomware.
      • Detect incursions.
      • Respond and recovery effectively.

      Response

      Recovery

      This image depicts the pathway for response and recovery from a ransomware event.

      For in-depth assistance with disaster recovery planning, refer to Info-Tech's Create a Right-Sized Disaster Recovery.

      Info-Tech's ransomware resilience framework

      Disrupt the playbooks of ransomware gangs. Put controls in place to protect, detect, respond and recover effectively.

      Prioritize protection

      Put controls in place to harden your environment, train savvy end users, and prevent incursions.

      Support recovery

      Build and test a backup strategy that meets business requirements to accelerate recovery and minimize disruption.

      Protect Detect Respond

      Recover

      Threat preparedness

      Review ransomware threat techniques and prioritize detective and mitigation measures for initial and credential access, privilege escalation, and data exfiltration.

      Awareness and training

      Develop security awareness content and provide cybersecurity and resilience training to employees, contractors and third parties.

      Perimeter security

      Identify and implement network security solutions including analytics, network and email traffic monitoring, and intrusion detection and prevention.

      Respond and recover

      Identify disruption scenarios and develop incident response, business continuity, and disaster recovery strategies.

      Access management

      Review the user access management program, policies and procedures to ensure they are ransomware-ready.

      Vulnerability management

      Develop proactive vulnerability and patch management programs that mitigate ransomware techniques and tactics.

      This image contains the thought map for Info-Tech's Blueprint: Build Resilience Against Ransomware Attacks.

      Info-Tech's ransomware resilience methodology

      Assess resilience Protect and detect Respond and recover Improve resilience
      Phase steps
      1. Build ransomware risk scenario
      2. Conduct resilience assessment
      1. Assess attack vectors
      2. Identify countermeasures
      1. Review Security Incident Management Plan
      2. Run Tabletop Test (IT)
      3. Document Workflow and Runbook
      1. Run Tabletop Test (Leadership)
      2. Prioritize Resilience Initiatives
      Phase outcomes
      • Ransomware Resilience Assessment
      • Risk Scenario
      • Targeted ransomware countermeasures to improve protection and detection capabilities
      • Security Incident Response Plan Assessment
      • Tabletop Test (IT)
      • Ransomware Workflow and Runbook
      • Tabletop Test (Leadership)
      • Ransomware Resilience Roadmap & Metrics

      Insight Summary

      Shift to a ransomware resilience model

      Resilience is not a trampoline, where you're down one moment and up the next. It's more like climbing a mountain. It takes time, planning, and help from people around you to work through challenges.

      Focus on what is in your organization's control, and cultivate strengths that allow you to protect assets, detect incursions, and respond and recover quickly

      Visualize challenges

      Build risk scenarios that describe how a ransomware attack would impact organizational goals.

      Understand possible outcomes to motivate initiatives, protect your organization, plan your response, and practice recovery.

      Prioritize protection

      Dwell times and effective times are dropping dramatically. Malicious agents spend less time in your network before they deploy an attack, and their attacks are much more effective. You can't afford to rely on your ability to respond and recover alone.

      Seize the moment

      The frequency and impact of ransomware attacks continue to increase, and business leaders know it. You will never have a better chance to implement best practice security controls than you do now.

      Measure ransomware resilience

      The anatomy of ransomware attack is relatively simple: malicious agents get in, spread, and profit. Deploy ransomware protection metrics to measure ransomware resilience at each stage.

      Key deliverable

      Ransomware resilience roadmap

      The resilience roadmap captures the key insights your work will generate, including:

      • An assessment of your current state and a list of initiatives you need to improve your ransomware resilience.
      • The lessons learned from building and testing the ransomware response workflow and runbook.
      • The controls you need to implement to measure and improve your ransomware resilience over time.

      Project deliverables

      Info-Tech supports project and workshop activities with deliverables to help you accomplish your goals and accelerate your success.

      Ransomware Resilience Assessment

      Measure ransomware resilience, identify gaps, and draft initiatives.

      Enterprise Threat Preparedness Workbook

      Analyze common ransomware techniques and develop countermeasures.

      Ransomware Response Workflow & Runbook

      Capture key process steps for ransomware response and recovery.

      Ransomware Tabletop Tests

      Run tabletops for your IT team and your leadership team to gather lessons learned.

      Ransomware Resilience Roadmap

      Capture project insights and measure resilience over time.

      Plan now or pay later

      Organizations worldwide spent on average USD 4.62M in 2021 to rectify a ransomware attack. These costs include escalation, notification, lost business and response costs, but did not include the cost of the ransom. Malicious ransomware attacks that destroyed data in destructive wiper-style attacks cost an average of USD 4.69M.

      Building better now is less expensive than incurring the same costs in addition to the clean-up and regulatory and business disruption costs associated with successful ransomware attacks.

      After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research and advisory services helped them achieve.

      Source: IBM, Cost of a Data Breach (2022)

      See what members have to say about the ransomware resilience blueprint:

      • Overall Impact: 9.8 / 10
      • Average $ Saved: $98,796
      • Average Days Saved: 17

      "Our advisor was well-versed and very polished. While the blueprint alone was a good tool to give us direction, his guidance made it significantly faster and easier to accomplish than if we had tried to tackle it on our own."

      CIO, Global Manufacturing Organization

      Blueprint benefits

      IT benefits

      Business benefits

      • Provide a structured approach for your organization to identify gaps, quantify the risk, and communicate status to drive executive buy-in.
      • Create a practical ransomware incident response plan that combines a high-level workflow with a detailed runbook to coordinate response and recovery.
      • Present an executive-friendly project roadmap with resilience metrics that summarizes your plan to address gaps and improve your security posture.
      • Enable leadership to make risk-based, informed decisions on resourcing and investments to improve ransomware readiness.
      • Quantify the potential impact of a ransomware attack on your organization to drive risk awareness.
      • Identify existing gaps so they can be addressed, whether by policy, response plans, technology, or a combination of these.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Executive brief case study

      SOURCE: Interview with CIO of large enterprise

      Organizations who "build back better" after a ransomware attack often wish they had used relevant controls sooner.

      Challenge

      In February 2020, a large organization found a ransomware note on an admin's workstation. They had downloaded a local copy of the organization's identity management database for testing and left a port open on their workstation. Hackers exfiltrated it and encrypted the data on the workstation. They demanded a ransom payment to decrypt the data.

      Complication

      Because private information was breached, the organization informed the state-level regulator. With 250,000 accounts affected, plans were made to require password changes en masse. A public announcement was made two days after the breach to ensure that everyone affected could be reached.

      The organization decided not to pay the ransom because it had a copy on an unaffected server.

      Resolution

      The organization was praised for its timely and transparent response.

      The breach motivated the organization to put more protections in place, including:

      • The implementation of a deny-by-default network.
      • The elimination of remote desktop protocol and secure shell.
      • IT mandating MFA.
      • New endpoint-detection and response systems.

      Executive brief case study

      SOURCE: Info-Tech Workshop Results
      iNDUSTRY: Government

      Regional government runs an Info-Tech workshop to fast-track its ransomware incident response planning

      The organization was in the middle of developing its security program, rolling out security awareness training for end users, and investing in security solutions to protect the environment and detect incursions. Still, the staff knew they still had holes to fill. They had not yet fully configured and deployed security solutions, key security policies were missing, and they had didn't have a documented ransomware incident response plan.

      Workshop results

      Info-Tech advisors helped the organization conduct a systematic review of existing processes, policies, and technology, with an eye to identify key gaps in the organization's ransomware readiness. The impact analysis quantified the potential impact of a ransomware attack on critical systems to improve the organizational awareness ransomware risks and improve buy-in for investment in the security program.

      Info-Tech's tabletop planning exercise provided a foundation for the organization's actual response plan. The organization used the results to build a ransomware response workflow and the framework for a more detailed runbook. The workshop also helped staff identifies ways to improve the backup strategy and bridge further gaps in their ability to recover.

      The net result was a current-state response plan, appropriate capability targets aligned with business requirements, and a project roadmap to achieve the organization's desired state of ransomware readiness.

      Guided implementation

      What kind of analyst experiences do clients have when working through this blueprint?

      Scoping Call Phase 1 Phase 2 Phase 3 Phase 4

      Call #1:

      Discuss context, identify challenges, and scope project requirements.

      Identify ransomware resilience metrics.

      Call #2:

      Build ransomware risk scenario.

      Call #4:

      Review common ransomware attack vectors.

      Identify and assess mitigation controls.

      Call #5:

      Document ransomware workflow and runbook.

      Call #7:

      Run tabletop test with leadership.

      Call #3:

      Assess ransomware resilience.

      Call #6:

      Run tabletop test with IT.

      Call #8:

      Build ransomware roadmap.

      Measure ransomware resilience metrics.

      A guided implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 6 to 8 calls over the course of 4 to 6 months.

      Workshop overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5
      Activities

      Assess ransomware resilience

      Protect and detect

      Respond and recover

      Improve ransomware resilience

      Wrap-up (offsite and offline)

      1.1 1 Review incidents, challenges, and project drivers.

      1.1.2 Diagram critical systems and dependencies.

      1.1.3 Build ransomware risk scenario.

      2.1 1. Assess ransomware threat preparedness.

      2.2 2. Determine the impact of ransomware techniques on your environment.

      2.3 3. Identify countermeasures to improve protection and detection capabilities.

      3.1.1 Review the workflow and runbook templates.

      3.1.2 Update/define your threat escalation protocol.

      3.2.1 Define scenarios for a range of incidents.

      3.2.2 Run a tabletop planning exercise (IT).

      3.3.1 Update your ransomware response workflow.

      4.1.1 Run a tabletop planning exercise (leadership).

      4.1.2 Identify initiatives to close gaps and improve resilience.

      4.1.3 Review broader strategies to improve your overall security program.

      4.2.1 Prioritize initiatives based on factors such as effort, cost, and risk.

      4.2.2 Review the dashboard to fine tune your roadmap.

      4.3.1 Summarize status and next steps in an executive presentation.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      5.3 Revisit ransomware resilience metrics in three months.

      Deliverables
      1. Workshop goals
      2. Ransomware Risk Scenario
      3. Ransomware Resilience Assessment
      1. Targeted ransomware countermeasures to improve protection and detection capabilities.
      1. Security Incident Response Plan Assessment
      2. Tabletop Planning Session (IT)
      3. Ransomware Workflow and Runbook
      1. Tabletop Planning Session (Leadership)
      2. Ransomware Resilience Roadmap and Metrics
      3. Ransomware Summary Presentation
      1. Completed Ransomware Resilience Roadmap
      2. Ransomware Resilience Assessment
      3. Ransomware Resilience Summary Presentation

      Phase 1

      Assess ransomware resilience

      Phase 1 Phase 2 Phase 3 Phase 4

      1.1 Build ransomware risk scenario

      1.2 Conduct resilience assessment

      2.1 Assess attack vectors

      2.2 Identify countermeasures

      3.1 Review Security Incident Management Plan

      3.2 Run Tabletop Test (IT)

      3.3 Document Workflow and Runbook

      4.1 Run Tabletop Test (Leadership)

      4.2 Prioritize resilience initiatives

      4.3 Measure resilience metrics

      This phase will walk you through the following activities:

      • Conducting a maturity assessment.
      • Reviewing selected systems and dependencies.
      • Assessing a ransomware risk scenario.

      This phase involves the following participants:

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      Build Ransomware Resilience

      Step 1.1

      Build ransomware risk scenario

      Activities

      1.1.1 Review incidents, challenges and project drivers

      1.1.2 Diagram critical systems and dependencies

      1.1.3 Build ransomware risk scenario

      Assess ransomware resilience

      This step will guide you through the following activities:

      • Reviewing incidents, challenges, and drivers.
      • Diagraming critical systems and dependencies.
      • Building a ransomware risk scenario.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)
      • Subject-Matter Experts

      Outcomes of this step

      • Establish a repeatable process to evaluate and improve ransomware readiness across your environment.
      • Build a ransomware risk scenario to assess the likelihood and impact of an attack.

      1.1.1 Review incidents, challenges, and project drivers

      1 hour

      Brainstorm the challenges you need to address in the project. Avoid producing solutions at this stage, but certainly record suggestions for later. Use the categories below to get the brainstorming session started.

      Past incidents and other drivers

      • Past incidents (be specific):
        • Past security incidents (ransomware and other)
        • Close calls (e.g. partial breach detected before damage done)
      • Audit findings
      • Events in the news
      • Other?

      Security challenges

      • Absent or weak policies
      • Lack of security awareness
      • Budget limitations
      • Other?

      Input

      • Understanding of existing security capability and past incidents.

      Output

      • Documentation of past incidents and challenges.
      • Level-setting across the team regarding challenges and drivers.

      Materials

      • Whiteboard or flip chart (or a shared screen if staff are remote)

      Participants

      • Security Incident Response Team (SIRT)

      1.1.2 Diagram critical systems and dependencies (1)

      1 hour

      Brainstorm critical systems and their dependencies to build a ransomware risk scenario. The scenario will help you socialize ransomware risks with key stakeholders and discuss the importance of ransomware resilience.

      Focus on a few key critical systems.

      1. On a whiteboard or flip chart paper, make a list of systems to potentially include in scope. Consider:
        1. Key applications that support critical business operations.
        2. Databases that support multiple key applications.
        3. Systems that hold sensitive data (e.g. data with personally identifiable information [PII]).
      2. Select five to ten systems from the list.
        1. Select systems that support different business operations to provide a broader sampling of potential impacts and recovery challenges.
        2. Include one or two non-critical systems to show how the methodology addresses a range of criticality and context.

      Input

      • High-level understanding of critical business operations and data sets.

      Output

      • Clarify context, dependencies, and security and recovery challenges for some critical systems.

      Materials

      • Whiteboard or flip chart (or a shared screen if staff are remote)

      Participants

      • Security Incident Response Team (SIRT)
      • System SMEs (if not covered by SIRT members)

      1.1.2 Diagram critical systems and dependencies (2)

      1 hour

      1. A high-level topology or architectural diagram is an effective way to identify dependencies and communicate risks to stakeholders.

      Start with a WAN diagram, then your production data center, and then each critical
      system. Use the next three slides as your guide.

      Notes:

      • If you have existing diagrams, you can review those instead. However, if they are too detailed, draw a higher-level diagram to provide context. Even a rough sketch is a useful reference tool for participants.
      • Keep the drawings tidy and high level. Visualize the final diagram before you start to draw on the whiteboard to help with spacing and placement.
      • Collaborate with relevant SMEs to identify dependencies.

      Input

      • High-level understanding of critical business operations and data sets.

      Output

      • Clarify context, dependencies, and security and recovery challenges for some critical systems.

      Materials

      • Whiteboard or flip chart (or a shared screen if staff are remote)

      Participants

      • Security Incident Response Team (SIRT)
      • System SMEs (if not covered by SIRT members)

      For your WAN diagram, focus on data center and business locations

      Start with a high-level network diagram like this one, and then dig deeper (see following slides) to provide more context. Below is an example; of course, your sketched diagrams may be rougher.

      This image contains a nexample of a High level Network Diagram.

      Diagram your production data center to provide context for the systems in scope

      Creating a high-level diagram provides context across different IT disciplines involved in creating your DRP. If you have multiple production data centers, focus on the data center(s) relevant to the selected systems. Below is an example.

      This image contains a nexample of a high level diagram which focuses on the data centers relevent to the selected system.

      Diagram each selected system to identify specific dependencies and redundancies

      Diagram the "ecosystem" for each system, identifying server, storage, and network dependencies. There may be overlap with the production data center diagram – but aim to be specific here. Below is an example that illustrates front-end and back-end components.

      When you get to this level of detail, use this opportunity to level-set with the team. Consider the following:

      • Existing security (Are these systems protected by your existing security monitoring and threat detection tools?).
      • Security challenges (e.g. public-facing systems).
      • Recovery challenges (e.g. limited or infrequent backups).
      This is an example of a diagram of a system ecosystem.

      Note the limitations of your security, backup, and DR solutions

      Use the diagrams to assess limitations. Gaps you identify here will often apply to other aspects of your environment.

      1. Security limitations
      • Are there any known security vulnerabilities or risks, such as external access (e.g. for a customer portal)? If so, are those risks mitigated? Are existing security solutions being fully used?
    • Backup limitations
      • What steps are taken to ensure the integrity of your backups (e.g. through inline or post-backup scanning, or the use of immutable backups)? Are there multiple restore points to provide more granularity when determining how far back you need to go for a clean backup?
    • Disaster recovery limitations
      • Does your DR solution account for ransomware attacks or is it designed only for one-way failover (i.e. for a smoking hole scenario)?
    • We will review the gaps we identify through the project in phase 4.

      For now, make a note of these gaps and continue with the next step.

      Draft risk scenarios to illustrate ransomware risk

      Risk scenarios help decision-makers understand how adverse events affect business goals.

      • Risk-scenario building is the process of identifying the critical factors that contribute to an adverse event and crafting a narrative that describes the circumstances and consequences if it were to happen.
      • Risk scenarios set up the risk analysis stage of the risk assessment process. They are narratives that describe in detail:
        • The asset at risk.
        • The threat that can act against the asset.
        • Their intent or motivation.
        • The circumstances and threat actor model associated with the threat event.
        • The potential effect on the organization.
        • When or how often the event might occur.

      Risk scenarios are further distilled into a single sentence or risk statement that communicates the essential elements from the scenario.

      Risk identification → Risk scenario → Risk statement

      Well-crafted risk scenarios have four components

      The slides walk through how to build a ransomware risk scenario

      THREAT Exploits an ASSET Using a METHOD Creating an EFFECT.

      An actor capable of harming an asset

      Anything of value that can be affected and results in loss

      Technique an actor uses to affect an asset

      How loss materializes

      Examples: Malicious or untrained employees, cybercriminal groups, malicious state actors

      Examples: Systems, regulated data, intellectual property, people

      Examples: Credential compromise, privilege escalation, data exfiltration

      Examples: Loss of data confidentiality, integrity, or availability; impact on staff health and safety

      Risk scenarios are concise, four to six sentence narratives that describe the core elements of forecasted adverse events.

      Use them to engage stakeholders with the right questions and guide them to make informed decisions about how to address ransomware risks.

      1.1.3 Build ransomware risk scenario (1)

      2 hours

      In a ransomware risk scenario, the threat, their motivations, and their methods are known. Malicious agents are motivated to compromise critical systems, sabotage recovery, and exfiltrate data for financial gain.

      The purpose of building the risk scenario is to highlight the assets at risk and the potential effect of a ransomware attack.

      As a group, consider critical or mission-essential systems identified in step 1.1.2. On a whiteboard, brainstorm the potential adverse effect of a loss of system availability, confidentiality or integrity.

      Consider the impact on:

      • Information systems.
      • Sensitive or regulated data.
      • Staff health and safety.
      • Critical operations and objectives.
      • Organizational finances.
      • Reputation and brand loyalty.

      Input

      • Understanding of critical systems and dependencies.

      Output

      • Ransomware risk scenario to engage guide stakeholders to make informed decisions about addressing risks.

      Materials

      • Whiteboard or flip chart (or a shared screen if staff are remote)

      Participants

      • Security Incident Response Team (SIRT)

      1.1.3 Build ransomware risk scenario (2)

      2 hours

      1. On a whiteboard, brainstorm how threat agents will exploit vulnerabilities in critical assets to reach their goal. Redefine attack vectors to capture what could result from a successful initial attack.
      2. Bring together the critical risk elements into a single risk scenario.
      3. Distill the risk scenario into a single risk statement that captures the threat, the asset it will exploit, the method it will use, and the impact it will have on the organization.
      4. You can find a sample risk scenario and risk statement on the next slide.

      THREAT Exploits an ASSET Using a METHOD Creating an EFFECT.

      Inputs for risk scenario identification

      Risk analysis

      Critical assets

      ERP, CRM, FMS, LMS

      Operational technology

      Sensitive or regulated data

      Threat agents

      Cybercriminals

      Methods

      Compromise end user devices through social engineering attacks,. Compromise networks through external exposures and software vulnerabilities.

      Identify and crack administrative account. Escalate privileges. Move laterally.

      Collect data, destroy backups, exfiltrate data for leverage, encrypt systems,.

      Threaten to publish exfiltrated data and demand ransom.

      Adverse effect

      Serious business disruption

      Financial damage

      Reputational damage

      Potential litigation

      Average downtime: 30 Days

      Average clean-up costs: USD 1.4M

      Sample ransomware risk scenario

      Likelihood: Medium
      Impact: High

      Risk scenario

      Cyber-criminals penetrate the network, exfiltrate critical or sensitive data, encrypt critical systems, and demand a ransom to restore access.

      They threaten to publish sensitive data online to pressure the organization to pay the ransom, and reach out to partners, staff, and students directly to increase the pressure on the organization.

      Network access likely occurs through a phishing attack, credential compromise, or remote desktop protocol session.

      Risk statement

      Cybercriminals penetrate the network, compromise backups, exfiltrate and encrypt data, and disrupt computer systems for financial gain.

      Threat Actor:

      • Cybercriminals

      Assets:

      • Critical systems (ERP, FMS, CRM, LMS)
      • HRIS and payroll
      • Data warehouse
      • Office 365 ecosystem (email, Teams)

      Effect:

      • Loss of system availability
      • Lost of data confidentiality

      Methods:

      • Phishing
      • Credential compromise
      • Compromised remote desktop protocol
      • Privilege escalation
      • Lateral movement
      • Data collection
      • Data exfiltration
      • Data encryption

      Step 1.2

      Conduct resilience assessment

      Activities

      1.2.1 Complete resilience assessment

      1.2.2 Establish resilience metrics

      This step will guide you through the following activities :

      • Completing a ransomware resilience assessment
      • Establishing baseline metrics to measure ransomware resilience.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)
      • Subject-matter experts

      .Outcomes of this step

      • Current maturity, targets, and initial gap analysis

      Maturity levels in this blueprint draw on the CMMI framework

      The maturity levels are based on the Capability Maturity Model Integration framework. We outline our modifications below.

      CMMI Maturity Level – Default Descriptions:

      CMMI Maturity Level – Modified for This Assessment:

      • Level 1 – Initial: Unpredictable and reactive. Work gets completed but is often delayed and over budget.
      • Level 2 – Managed: Managed on the project level. Projects are planned, performed, measured, and controlled.
      • Level 3 – Defined: Proactive rather than reactive. Organization-wide standards provide guidance across projects, programs, and portfolios.
      • Level 4 – Quantitatively managed: Measured and controlled. Organization is data-driven, with quantitative performance improvement objectives that are predictable and align to meet the needs of internal and external stakeholders.
      • Level 5 – Optimizing: Stable and flexible. Organization is focused on continuous improvement and is built to pivot and respond to opportunity and change. The organization's stability provides a platform for agility and innovation.
      • Level 1 – Initial/ad hoc: Not well defined and ad hoc in nature.
      • Level 2 – Developing: Established but inconsistent and incomplete.
      • Level 3 – Defined: Formally established, documented, and repeatable.
      • Level 4 – Managed and measurable: Managed using qualitative and quantitative data to ensure alignment with business requirements.
      • Level 5 – Optimizing: Qualitative and quantitative data is used to continually improve.

      (Source: CMMI Institute, CMMI Levels of Capability and Performance)

      Info-Tech's ransomware resilience framework

      Disrupt the playbooks of ransomware gangs. Put controls in place to protect, detect, respond and recover effectively.

      Prioritize protection

      Put controls in place to harden your environment, train savvy end users, and prevent incursions.

      Support recovery

      Build and test a backup strategy that meets business requirements to accelerate recovery and minimize disruption.

      Protect Detect Respond

      Recover

      Threat preparedness

      Review ransomware threat techniques and prioritize detective and mitigation measures for initial and credential access, privilege escalation, and data exfiltration.

      Awareness and training

      Develop security awareness content and provide cybersecurity and resilience training to employees, contractors and third parties.

      Perimeter security

      Identify and implement network security solutions including analytics, network and email traffic monitoring, and intrusion detection and prevention.

      Respond and recover

      Identify disruption scenarios and develop incident response, business continuity, and disaster recovery strategies.

      Access management

      Review the user access management program, policies and procedures to ensure they are ransomware-ready.

      Vulnerability management

      Develop proactive vulnerability and patch management programs that mitigate ransomware techniques and tactics.

      1.2.1 Complete the resilience assessment

      2-3 hours

      Use the Ransomware Resilience Assessment Tool to assess maturity of existing controls, establish a target state, and identify an initial set of initiatives to improve ransomware resilience.

      Keep the assessment tool on hand to add gap closure initiatives as you proceed through the project.

      Download the Ransomware Resilience Assessment

      Outcomes:

      • Capture baseline resilience metrics to measure progress over time.
        • Low scores are common. Use them to make the case for security investment.
        • Clarify the breadth of security controls.
        • Security controls intersect with a number of key processes and technologies, each of which are critical to ransomware resilience.
      • Key gaps identified.
        • Allocate more time to subsections with lower scores.
        • Repeat the scorecard at least annually to clarify remaining areas to address.

      Input

      • Understanding of current security controls

      Output

      • Current maturity, targets, and gaps

      Materials

      • Ransomware Resilience Assessment Tool

      Participants

      • Security Incident Response Team (SIRT)

      This is an image of the Ransomeware Resilience Assessment Table from Info-Tech's Ransomware Resilience Assessment Blueprint.

      1.2.2 Establish resilience metrics

      Ransomware resilience metrics track your ability to disrupt a ransomware attack at each stage of its workflow.

      Measure metrics at the start of the project to establish a baseline, as the project nears completion to measure progress.

      Attack workflow Process Metric Target trend Current Goal
      GET IN Vulnerability Management % Critical patches applied Higher is better
      Vulnerability Management # of external exposures Fewer is better
      Security Awareness Training % of users tested for phishing Higher is better
      SPREAD Identity and Access Management Adm accounts / 1000 users Lower is better
      Identity and Access Management % of users enrolled for MFA Higher is better
      Security Incident Management Avg time to detect Lower is better
      PROFIT Security Incident Management Avg time to resolve Lower is better
      Backup and Disaster Recovery % critical assets with recovery test Higher is better
      Backup and Disaster Recovery % backup to immutable storage Higher is better

      Phase 2

      Improve protection and detection capabilities

      Phase 1Phase 2Phase 3Phase 4

      1.1 Build ransomware risk scenario

      1.2 Conduct resilience assessment

      2.1 Assess attack vectors

      2.2 Identify countermeasures

      3.1 Review Security Incident Management Plan

      3.2 Run Tabletop Test (IT)

      3.3 Document Workflow and Runbook

      4.1 Run Tabletop Test (Leadership)

      4.2 Prioritize resilience initiatives

      4.3 Measure resilience metrics

      This phase will walk you through the following activities:

      • Assessing common ransomware attack vectors.
      • Identifying countermeasures to improve protection and detection capabilities.

      This phase involves the following participants:

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      Build Ransomware Resilience

      Step 2.1

      Assess attack vectors

      Activities

      2.1.1 Assess ransomware threat preparedness

      2.1.2 Determine the impact of ransomware techniques on your environment

      This step involves the following activities:

      • Assessing ransomware threat preparedness.
      • Configuring the threat preparedness tool.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      Outcomes of this step

      Assess risks associated with common ransomware attack vectors.

      Improve protection and detection capabilities

      Use the MITRE attack framework to prepare

      This phase draws on MITRE to improve ransomware protection and detection capabilities

      • The activities in this phase provide guidance on how to use the MITRE attack framework to protect your organizations against common ransomware techniques and tactics, and detect incursions.
      • You will:
        • Review common ransomware tactics and techniques.
        • Assess their impact on your environment.
        • Identify relevant countermeasures.
      • The Enterprise Threat Preparedness Workbook included with the project blueprint will be set up to deal with common ransomware threats and tactics.

      Download the Enterprise Threat Preparedness Workbook

      Review ransomware tactics and techniques

      Ransomware attack workflow

      Deliver phishing email designed to avoid spam filter.

      Launch malware undetected.

      Identify user accounts.

      Target an admin account.

      Use brute force tactics to crack it.

      Move through the network. Collect data.

      Infect critical systems and backups to limit recovery options.

      Exfiltrate data to gain leverage.

      Encrypt data, which triggers alert.

      Deliver ransom note.

      Associated MITRE tactics and techniques

      • Initial access
      • Execution
      • Privilege escalation
      • Credential access
      • Lateral movement
      • Collection
      • Data Exfiltration
      • Data encryption

      Most common ransomware attack vectors

      • Phishing and social engineering
      • Exploitation of software vulnerabilities
      • Unsecured external exposures
        • e.g. remote desktop protocols
      • Malware infections
        • Email attachments
        • Web pages
        • Pop-ups
        • Removable media

      2.1.1 Assess ransomware threat preparedness

      Estimated Time: 1-4 hours

      1. Read through the instructions in the Enterprise Threat Preparedness Workbook.
      2. Select ransomware attack tactics to analyze. Use the workbook to understand:
        1. Risks associated with each attack vector.
        2. Existing controls that can help you protect the organization and detect an incursion.
      3. This initial analysis is meant to help you understand your risk before you apply additional controls.

      Once you're comfortable, follow the instructions on the following pages to configure the MITRE ransomware analysis and identify how to improve your protection and detection capabilities.

      Download the Enterprise Threat Preparedness Workbook

      Input

      • Knowledge about existing infrastructure.
      • Security protocols.
      • Information about ransomware attack tactics, techniques, and mitigation protocols.

      Output

      • Structured understanding of the risks facing the enterprise based on your current preparedness and security protocols.
      • Protective and detective measures to improve ransomware resilience.

      Materials

      • Enterprise Threat Preparedness Workbook

      Participants

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      2.1.2 Determine the impact of techniques

      Estimated Time: 1-4 hours

      1. The Enterprise Threat Preparedness Workbook included with the project blueprint is set up to deal with common ransomware use cases.

      If you would like to change the set-up, go through the following steps.

      • Review the enterprise matrix. Select the right level of granularity for your analysis. If you are new to threat preparedness exercises, the Technique Level is a good starting point.
      • As you move through each tactic, align each sheet to your chosen technique domain to ensure the granularity of your analysis is consistent.
      • Read the tactics sheet from left to right. Determine the impact of the technique on your environment. For each control, indicate current mitigation levels using the dropdown list.

      The following slides walk you through the process with screenshots from the workbook.

      Download the Enterprise Threat Preparedness Workbook

      Input

      • Knowledge about existing infrastructure.
      • Security protocols.
      • Information about ransomware attack tactics, techniques, and mitigation protocols.

      Output

      • Structured understanding of the risks facing the enterprise based on your current preparedness and security protocols.
      • Protective and detective measures to improve ransomware resilience.

      Materials

      • Enterprise Threat Preparedness Workbook

      Participants

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      Select the domain for the analysis

      • The Tactics Dashboard is a live feed of your overall preparedness for the potential attack vectors that your organization may face. These 14 tactics correspond to the Enterprise Matrix used by the MITRE ATT&CK® framework.
      • The technique domain on the right side of the sheet is split in two main groups:
      • The Technique Level
        • - High-level techniques that an attacker may use to gain entry to your network.
        • - The Technique Level is a great starting point if you are new to threat preparedness.
      • The Sub-Technique Level
        • - Individual sub-techniques found throughout the MITRE ATT&CK® Framework.
        • - More mature organizations will find the Sub-Technique Level generates a deeper and more precise understanding of their current preparedness.

      Info-Tech Insight

      Dwell times and effective times are dropping dramatically. Malicious agents spend less time in your network before they deploy an attack, and their attacks are much more effective. You can't afford to rely on your ability to respond and recover alone.

      This is the first screenshot from Info-Tech's Tactic Preparedness Assessment Dashboard.

      Keep an eye on the enterprise matrix

      As you fill out the Tactic tabs with your evaluation, the overall reading will display the average of your overall preparedness for that tactic.

      Choosing the Technique Domain level will increase the accuracy of the reporting at the cost of speed.

      The Technique level is faster but provides less specifics for each control and analyzes them as a group.

      The Sub-Technique level is much more granular, but each tactic and technique has several sub-techniques that you will need to account for.

      Check with the dashboard to see the associated risk level for each of the tactics based on the legend. Tactics that appear white have not yet been assessed or are rated as "N/A" (not applicable).

      This is the second screenshot from Info-Tech's Tactic Preparedness Assessment Dashboard.

      When you select your Technique Domain, you cannot change it again. Changing the domain mid-analysis will introduce inaccuracies in your security preparedness.

      Configure the tactics tabs

      • Each tactic has a corresponding tab at the bottom of the Excel workbook.
        Adjusting the Technique Domain level will change the number of controls shown.
      • Next, align the sheet to the domain you selected on Tab 2 before you continue. As shown in the example to the right,
        • Select "1" for Technique Level.
        • Select "2" for Sub-Technique Level.
      • This will collapse the controls to your chosen level of granularity.

      This is a screenshot showing how you can configure the tactics tab of the Ransomware Threat Preparedness Workbook

      Read tactic sheets from left to right

      This is a screenshot of the tactics tab of the Ransomware Threat Preparedness Workbook

      Technique:

      How an attacker will attempt to achieve their goals through a specific action.

      ID:

      The corresponding ID number on the MITRE ATT&CK® Matrix for quick reference.

      Impact of the Technique(s):

      If an attack of this type is successful on your network, how deep does the damage run?

      Current Mitigations:

      What security protocols do you have in place right now that can help prevent an attacker from successfully executing this attack technique? The rating is based on the CMMI scale.

      Determine the impact of the technique

      • For each control, indicate the current mitigation level using the dropdown list.
      • Only use "N/A" if you are confident that the control is not required in your organization.

      Info-Tech Insight

      We highly recommend that you write comments about your current-state security protocols. First, it's great to have documented your thought processes in the event of a threat modeling session. Second, you can speak to deficits clearly, when asked.

      This is the second screenshot from Info-Tech's Reconnaissance Tactic Analysis

      Review technique preparedness

      • If you have chosen the Technique level, the tool should resemble this image:
        • High-level controls are analyzed, and sub-controls hidden.
        • The sub-techniques under the broader technique show how a successful attack from this vector would impact your network.
      • Each sub-technique has a note for additional context:
        • Under Impact, select the overall impact for the listed controls to represent how damaging you believe the controls to be.
        • Next select your current preparedness maturity in terms of preparedness for the same techniques. Ask yourself "What do I have that contributes to blocking this technique?"

      This is the third screenshot from Info-Tech's Reconnaissance Tactic Analysis

      Info-Tech Insight

      You may discover that you have little to no mitigation actions in place to deal with one or many of these techniques. However, look at this discovery as a positive: You've learned more about the potential vectors and can actively work toward remediating them rather than hoping that a breach never happens through one of these avenues.

      Review sub-technique preparedness

      If you have chosen the Sub-Technique level, the tool should resemble this image.

      • The granular controls are being analyzed. However, the grouped controls will still appear. It is important to not fill the grouped sections, to make sure the calculations run properly.
      • The average of your sub-techniques will be calculated to show your overall preparedness level.
      • Look at the sub-techniques under the broader technique and consider how a successful attack from this vector would impact your network.

      Each sub-technique has a note for additional context and understanding about what the techniques are seeking to do and how they may impact your enterprise.

      • Because of the enhanced granularity, the final risk score is more representative of an enterprise's current mitigation capabilities.
      This is the fourth screenshot from Info-Tech's Reconnaissance Tactic Analysis

      Step 2.2

      Identify countermeasures

      Activities

      2.2.1 Identify countermeasures

      This step involves the following activities:

      • Identifying countermeasures

      This step involves the following participants:

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      Outcomes of this step

      Identification of countermeasures to common ransomware techniques, and tactics to improve protection and detection capabilities.

      Improve Protection and Detection Capabilities

      Review technique countermeasures

      As you work through the tool, your dashboard will prioritize your threat preparedness for each of the various attack techniques to give you an overall impression of your preparedness.

      For each action, the tool includes detection and remediation actions for you to consider either for implementation or as table stakes for your next threat modeling sessions.

      Note: Some sheets will have the same controls. However, the context of the attack technique may change your answers. Be sure to read the tactic and technique that you are on when responding to the controls.

      This is an image of the Privilege Escalation Tactic Analysis Table

      This is an image of the Defense Evasion Tactic Analysis Table

      Prioritize the analysis of ransomware tactics and sub-techniques identified on slide 45. If your initial analysis in Activity 2.2.1 determined that you have robust security protocols for some of the attack vectors, set these domains aside.

      2.2.1 Identify countermeasures

      Estimated Time: 1-4 hours

      1. Review the output of the Enterprise Threat Preparedness Workbook. Remediation efforts are on the right side of the sheet. These are categorized as either detection actions or mitigation actions.
        1. Detection actions:
        • What can you do before an attack occurs, and how can you block attacks? Detection actions may thwart an attack before it ever occurs.
      2. Mitigation actions:
        • If an attacker is successful through one of the attack methods, how do you lessen the impact of the technique? Mitigation actions address this function to slow and hinder the potential spread or damage of a successful attack.
    • Detection and mitigation measures are associated with each technique and sub-technique. Not all techniques will be able to be detected properly or mitigated. However, understanding their relationships can better prepare your defensive protocols.
    • Add relevant control actions to the initiative list in the Ransomware Resilience Assessment.
    • Input

      • Knowledge about existing infrastructure.
      • Security protocols.
      • Information about ransomware attack tactics, techniques, and mitigation protocols.
      • Outputs from the Threat Preparedness Workbook.

      Output

      • Structured understanding of the risks facing the enterprise based on your current preparedness and security protocols.
      • Protective and detective measures to improve ransomware resilience.

      Materials

      • Enterprise Threat Preparedness Workbook
      • Ransomware Resilience Assessment

      Participants

      • Security Incident Response Team (SIRT)
      • System subject-matter experts (SMEs)

      Phase 3

      Improve response and recovery capabilities

      Phase 1Phase 2Phase 3Phase 4

      1.1 Build ransomware risk scenario

      1.2 Conduct resilience assessment

      2.1 Assess attack vectors

      2.2 Identify countermeasures

      3.1 Review Security Incident Management Plan

      3.2 Run Tabletop Test (IT)

      3.3 Document Workflow and Runbook

      4.1 Run Tabletop Test (Leadership)

      4.2 Prioritize resilience initiatives

      4.3 Measure resilience metrics

      This phase will guide you through the following steps:

      • Documenting your threat escalation protocol.
      • Identify response steps and gaps.
      • Update your response workflow and runbook.

      This phase involves the following participants:

      • Security Incident Response Team (SIRT)

      Build Ransomware Resilience

      Step 3.1

      Review security incident management plan

      Activities

      3.1.1 Review the workflow and runbook templates

      3.1.2 Update/define your threat escalation protocol

      This step will walk you through the following activities:

      • Reviewing the example Workflow and Runbook
      • Updating and defining your threat escalation protocol.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)

      Outcomes of this step

      • Clear escalation path for critical incidents.
      • Common understanding of incident severity that will drive escalation.

      Improve response and recovery capabilities

      3.1.1 Review the workflow and runbook templates

      30 minutes

      This blueprint includes sample information in the Ransomware Response Workflow Template and Ransomware Response Runbook Template to use as a starting points for the steps in Phase 3, including documenting your threat escalation protocol.

      • The Ransomware Response Workflow Template contains an example of a high-level security incident management workflow for a ransomware attack. This provides a structure to follow for the tabletop planning exercise and a starting point for your ransomware response workflow.
        The Workflow is aimed at incident commanders and team leads. It provides an at-a-glance view of the high-level steps and interactions between stakeholders to help leaders coordinate response.
      • The Ransomware Response Runbook Template is an example of a security incident management runbook for a ransomware attack. This includes a section for a threat escalation protocol that you can use as a starting point.
        The Runbook is aimed at the teams executing the response. It provides more specific actions that need to be executed at each phase of the incident response.

      Download the Ransomware Response Workflow Template

      Download the Ransomware Response Runbook Template

      Input

      • No Input Required

      Output

      • Visualize the end goal

      Materials

      • Example workflow and runbook in this blueprint

      Participants

      • Security Incident Response Team (SIRT)

      Two overlapping screenshots are depicted, including the table of contents from the Ransomware Response Runbook.

      3.1.2 Update/define your threat escalation protocol

      1-2 hours

      Document the Threat Escalation Protocol sections in the Ransomware Response Workflow Template or review/update your existing runbook. The threat escalation protocol defines which stakeholders to involve in the incident management process, depending on impact and scope. Specifically, you will need to define the following:

      Impact and scope criteria: Impact considers factors such as the criticality of the system/data, whether PII is at risk, and whether public notification is required. Scope considers how many systems or users are impacted.

      Severity assessment: Define the severity levels based on impact and scope criteria.

      Relevant stakeholders: Identify stakeholders to notify for each severity level, which can include external stakeholders.

      If you need additional guidance, see Info-Tech's Develop and Implement a Security Incident Management Program blueprint, which takes a broader look at security incidents.

      Input

      • Current escalation process (formal or informal).

      Output

      • Define criteria for severity levels and relevant stakeholders.

      Materials

      • Ransomware Response Workflow Template

      Participants

      • Security Incident Response Team (SIRT)

      This is an image of the Threat Escalation Protocol Criteria and Stakeholders.

      Step 3.2

      Run Tabletop Test (IT)

      Activities

      3.2.1 Define scenarios for a range of incidents

      3.2.2 Run a tabletop planning exercise

      This step will guide you through the following activities:

      • Defining scenarios for a range of incidents.
      • Running a tabletop planning exercise.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)
      • Other stakeholders (as relevant)

      Outcomes of this step

      • Current-state incident response workflow, including stakeholders, steps, timeline.
      • Process and technology gaps to be addressed.

      Improve response and recovery capabilities

      3.2.1 Define scenarios for a range of incidents

      30 minutes

      As a group, collaborate to define scenarios that enable you to develop incident response details for a wide range of potential incidents. Below are example scenarios:

      • Scenario 1: An isolated attack on one key system. The database for a critical application is compromised. Assume the attack was not detected until files were encrypted, but that you can carry out a repair-in-place by wiping the server and restoring from backups.
      • Scenario 2: A site-wide impact that warrants broader disaster recovery. Several critical systems are compromised. It would take too long to repair in-place, so you need to failover to your DR environment, in addition to executing security response steps. (Note: If you don't have a DRP, see Info-Tech's Create a Right-Sized Disaster Recovery Plan.)
      • Scenario 3: A critical outsourced service or cloud service is compromised. You need to work with the vendor to determine the scope of impact and execute a response. This includes determining if your on-prem systems were also compromised.
      • Scenario 4: One or multiple end-user devices are compromised. Your response to the above scenarios would include assessing end-user devices as a possible source or secondary attack, but this scenario would provide more focus on the containing an attack on end-user devices.

      Note: The above is too much to execute in one 30-minute session, so plan a series of exercises as outlined on the next slide.

      Input

      • No input required

      Output

      • Determine the scope of your tabletop planning exercises

      Materials

      • Whiteboard or flip chart (or a shared screen if staff are remote)

      Participants

      • Security Incident Response Team (SIRT)

      Optimize the time spent by participants by running a series of focused exercises

      Not all stakeholders need to be present at every tabletop planning exercise. First, run an exercise with IT that focuses on the technical response. Run a second tabletop for non-IT stakeholders that focuses on the non-IT response, such as crisis communications, working with external stakeholders (e.g. law enforcement, cyberinsurance).

      Sample schedule:

      • Q1: Hold two sessions that run Scenarios 1 and 2 with relevant IT participants (see Activity 3.2.1). The focus for these sessions will be primarily on the technical response. For example, include notifying leadership and their role in decision making, but don't expand further on the details of their process. Similarly, don't invite non-IT participants to these sessions so you can focus first on understanding the IT response. Invite executives to the Q2 exercise, where they will have more opportunity to be involved.
      • Q2: Hold one session with the SIRT and non-IT stakeholders. Use the results of the Q1 exercises as a starting point and expand on the non-IT response steps (e.g. notifying external parties, executive decisions on response options).
      • Q3 and Q4: Run other sessions (e.g. for Scenarios 3 and 4) with relevant stakeholders. Ensure your ransomware incident response plan covers a wide range of possible scenarios.
      • Run ongoing exercises at least annually. Once you have a solid ransomware incident response plan, incorporate ransomware-based tabletop planning exercises into your overall security incident management testing and maintenance schedule.

      Info-Tech Insight

      Schedule these sessions well in advance to ensure appropriate resources are available. Document this in an annual test plan summary that outlines the scope, participants, and dates and times for the planned sessions.

      3.2.2 Run a tabletop planning exercise

      1-2 hours

      Remember that the goal is a deeper dive into how you would respond to an attack so you can clarify steps and gaps. This is not meant to just be a read-through of your plan. Follow the guidelines below:

      1. Select your scenario and invite relevant participants (see the previous slides).
      2. Guide participants through the incident and capture the steps and gaps along the way. Focus on one stakeholder at a time through each phase but be sure to get input from everyone. For example, focus on the Service Desk's steps for detection, then do the same as relevant to other stakeholders. Move on to analysis and do the same. (Tip: The distinction between phases is not always clear, and that's okay. Similarly, eradication and recovery might be the same set of steps. Focus on capturing the detail; you can clarify the relevant phase later.)
      3. Record the results (e.g. capture it in Visio) for reference purposes. (Tip: You can run the exercise directly in Visio. However, there's a risk that the tool may become a distraction. Enlist a scribe who is proficient with Visio so you don't need to wait for information to be captured and plan to save the detailed formatting and revising for later. )

      Refer to the Ransomware Tabletop Planning Results – Example as a guide for what to capture. Aim for more detail than found in your Ransomware Response Workflow (but not runbook-level detail).

      Download the Ransomware Tabletop Planning Results – Example

      Input

      • Baseline ransomware response workflow

      Output

      • Clarify your response workflow, capabilities, and gaps

      Materials

      • Whiteboard or sticky notes or index cards, or a shared screen

      Participants

      • Security Incident Response Team (SIRT)

      This is an example of a Ransomware Response Tabletop Planning Results Page.

      Step 3.3

      Document Workflow and Runbook

      Activities

      3.3.1 Update your ransomware response workflow

      3.3.2 Update your ransomware response runbook

      This step will guide you through the following activities:

      • Updating your ransomware response workflow.
      • Updating your ransomware response runbook.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)

      Outcomes of this step

      • An updated incident response workflow and runbook based on current capabilities.

      Improve response and recovery capabilities

      3.3.1 Update your ransomware response workflow

      1 hour

      Use the results from your tabletop planning exercises (Activity 3.2.2) to update and clarify your ransomware response workflow. For example:

      • Update stakeholder swim-lanes: Clarify which stakeholders need a swim lane (e.g. where interactions between groups needs to be clarified). For example, consider an SIRT swim-lane that combines the relevant technical response roles, but have separate swim-lanes for other groups that the SIRT interacts with (e.g. Service Desk, the Executive Team).
      • Update workflow steps: Use the detail from the tabletop exercises to clarify and/or add steps, as well as further define the interactions between swim-lanes.(Tip: Your workflow needs to account for a range of scenarios. It typically won't be as specific as the tabletop planning results, which focus on only one scenario.)
      • Clarify the overall the workflow: Look for and correct any remaining areas of confusion and clutter. For example, consider adding "Go To" connectors to minimize lines crossing each other, adding color-coding to highlight key related steps (e.g. any communication steps), and/or resizing swim-lanes to reduce the overall size of the workflow to make it easier to read.
      • Repeat the above after each exercise: Continue to refine the workflow as needed until you reach the stage where you just need to validate that your workflow is still accurate.

      Input

      • Results from tabletop planning exercises (Activity 3.2.2)

      Output

      • Clarify your response workflow

      Materials

      • Ransomware Response Workflow

      Participants

      • Security Incident Response Team (SIRT)

      This is a screenshot from the ransomeware response tabletop planning

      3.3.2 Update your ransomware response runbook

      1 hour

      Use the results from your tabletop planning exercises (Activity 3.2.2) to update your ransomware response runbook. For example:

      • Align stakeholder sections with the workflow: Each stakeholder swim-lane in the workflow needs its own section in the runbook.
      • Update incident response steps: Use the detail from the tabletop exercise to clarify instructions for each stakeholder. This can include outlining specific actions, defining which stakeholders to work with, and referencing relevant documentation (e.g. vendor documentation, step-by-step restore procedures). (Tip: As with the workflow, the runbook needs to account for a range of scenarios, so it will include a list of actions that might need to be taken depending on the incident, as illustrated in the example runbook.)
      • Review and update your threat escalation protocol: It's best to define your threat escalation protocol before the tabletop planning exercise to help identify participants and avoid confusion. Now use the exercise results to validate or update that documentation.
      • Repeat the above after each exercise. Continue to refine your runbook as needed until you reach the stage where you just need to validate that your runbook is still accurate.

      Input

      • Results from tabletop planning exercises (Activity 3.2.2)

      Output

      • Clarified response runbook

      Materials

      • Ransomware Response Workflow

      Participants

      • Security Incident Response Team (SIRT)

      This is a screenshot of the Ransomware Response Runbook

      Phase 4

      Improve ransomware resilience

      Phase 1Phase 2Phase 3Phase 4

      1.1 Build ransomware risk scenario

      1.2 Conduct resilience assessment

      2.1 Assess attack vectors

      2.2 Identify countermeasures

      3.1 Review Security Incident Management Plan

      3.2 Run Tabletop Test (IT)

      3.3 Document Workflow and Runbook

      4.1 Run Tabletop Test (Leadership)

      4.2 Prioritize resilience initiatives

      4.3 Measure resilience metrics

      This phase will guide you through the following steps:

      • Identifying initiatives to improve ransomware resilience.
      • Prioritizing initiatives in a project roadmap.
      • Communicating status and recommendations.

      This phase involves the following participants:

      • Security Incident Response Team (SIRT)

      Build Ransomware Resilience

      Step 4.1

      Run Tabletop Test (leadership)

      Activities

      • 4.1.1 Identify initiatives to close gaps and improve resilience
      • 4.1.2 Review broader strategies to improve your overall security program

      This step will walk you through the following activities:

      • Identifying initiatives to close gaps and improve resilience.
      • Reviewing broader strategies to improve your overall security program.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)

      Outcomes of this step

      • Specific potential initiatives based on a review of the gaps.
      • Broader potential initiatives to improve your overall security program.

      Improve ransomware resilience

      4.1.1 Identify initiatives to close gaps and improve resilience

      1 hour

      1. Use the results from the activities you have completed to identify initiatives to improve your ransomware readiness.
      2. Set up a blank spreadsheet with two columns and label them "Gaps" and "Initiatives." (It will be easier to copy the gaps and initiatives from this spreadsheet to you project roadmap, rather than use the Gap Initiative column in the Ransomware Readiness Maturity Assessment Tool.)
      3. Review your tabletop planning results:
        1. Summarize the gaps in the "Gaps" column in your spreadsheet created for this activity.
        2. For each gap, write down potential initiatives to address the gap.
        3. Where possible, combine similar gaps and initiatives. Similarly, the same initiative might address multiple gaps, so you don't need to identify a distinct initiative for every gap.
      4. Review the results of your maturity assessment completed in Phase 1 to identify additional gaps and initiatives in the spreadsheet created for this activity.

      Input

      • Tabletop planning results
      • Maturity assessment

      Output

      • Identify initiatives to improve ransomware readiness

      Materials

      • Blank spreadsheet

      Participants

      • Security Incident Response Team (SIRT)

      4.1.2 Review broader strategies to improve your overall security program

      1 hour

      1. Review the following considerations as outlined on the next few slides:
        • Implement core elements of an effective security program – strategy, operations, and policies. Leverage the work completed in this blueprint to provide context and address your immediate gaps while developing an overarching security strategy based on business requirements, risk tolerance, and overall security considerations. Security operations and policies are key to executing your overall security strategy and day to day incident management.
        • Update your backup strategy to account for ransomware attacks. Consider what your options would be today if your primary backups were infected? If those options aren't very good, your backup strategy needs a refresh.
        • Consider a zero-trust strategy. Zero trust reduces your reliance on perimeter security and moves controls to where the user accesses resources. However, it takes time to implement. Evaluate your readiness for this approach.
      2. As a team, discuss the merits of these strategies in your organization and identify potential initiatives. Depending on what you already have in place, the project may be to evaluate options (e.g. if you have not already initiated zero trust, assign a project to evaluate your options and readiness).

      Input

      • An understanding of your existing security practices and backup strategy.

      Output

      • Broader initiatives to improve ransomware readiness.

      Materials

      • Whiteboard or flip chart (or a shared screen if staff are remote)

      Participants

      • Security Incident Response Team (SIRT)

      Implement core elements of an effective security program

      There is no silver bullet. Ransomware readiness depends on foundational security best practices. Where budget allows, support that foundation with more advanced AI-based tools that identify abnormal behavior to detect an attack in progress.

      Leverage the following blueprints to implement the foundational elements of an effective security program:

      • Build an Information Security Strategy: Consider the full spectrum of information security, including people, processes, and technologies. Then base your security strategy on the risks facing your organization – not just on best practices – to ensure alignment with business goals and requirements.
      • Develop a Security Operations Strategy: Establish unified security operations that actively monitor security events and threat information, and turn that into appropriate security prevention, detection, analysis, and response processes.
      • Develop and Deploy Security Policies: Improve cybersecurity through effective policies, from acceptable use policies aimed at your end users to system configuration management policies aimed at your IT operations.

      Supplement foundational best practices with AI-based tools to counteract more sophisticated security attacks:

      • The evolution of ransomware gangs and ransomware as a service means the most sophisticated tools designed to bypass perimeter security and endpoint protection are available to a growing number of hackers.
      • Rather than activate the ransomware virus immediately, attackers will traverse the network using legitimate commands to infect as many systems as possible and exfiltrate data without generating alerts, then finally encrypt infected systems.
      • AI-based tools learn what is normal behavior and therefore can recognize unusual traffic (which could be an attack in progress) before it's too late. For example, a "user" accessing a server they've never accessed before.
      • Engage an Info-Tech analyst or consult SoftwareReviews to review products that will add this extra layer of AI-based security.

      Update your backup strategy to account for ransomware attacks

      Apply a defense-in-depth strategy. A daily disk backup that goes offsite once a week isn't good enough.

      In addition to applying your existing security practices to your backup solution (e.g. anti-malware, restricted access), consider:

      • Creating multiple restore points. Your most recent backup might be infected. Frequent backups allow you to be more granular when determining how far you need to roll back.
      • Having offsite backups and using different storage media. Reduce the risk of infected backups by using different storage media (e.g. disk, NAS, tape) and backup locations (e.g. offsite). If you can make the attackers jump through more hoops, you have a greater chance of detecting the attack before all backups are infected.
      • Investing in immutable backups. Most leading backup solutions offer options to ensure backups are immutable (cannot be altered after they are written).
      • Using the BIA you completed in Phase 2 to help decide where to prioritize investments. All the above strategies add to your backup costs and might not be feasible for all data. Use your BIA results to decide which data sets require higher levels of protection.

      This example strategy combines multiple restore points, offsite backup, different storage media, and immutable backups.

      This is an example of a backup strategy to account for ransomware attacks.

      Refer to Info-Tech's Establish an Effective Data Protection Plan blueprint for additional guidance.

      Explore zero-trust initiatives

      Zero trust is a set of principles, not a set of controls.

      Reduces reliance on perimeter security.

      Zero trust is a strategy that reduces reliance on perimeter security and moves controls to where your user accesses resources. It often consolidates security solutions, reduces operating costs, and enables business mobility.

      Zero trust must benefit the business first.

      IT security needs to determine how zero trust initiatives will affect core business processes. It's not a one-size-fits-all approach to IT security. Zero trust is the goal – but some organizations can only get so close to that ideal.

      For more information, see Build a Zero-Trust Roadmap.

      Info-Tech Insight

      A successful zero-trust strategy should evolve. Use an iterative and repeatable process to assess available zero-trust technologies and principles and secure the most relevant protect surfaces. Collaborate with stakeholders to develop a roadmap with targeted solutions and enforceable policies.

      Step 4.2

      Prioritize resilience initiatives

      Activities

      • 4.2.1 Prioritize initiatives based on factors such as effort, cost, and risk
      • 4.2.2 Review the dashboard to fine tune your roadmap

      This step will guide you through the following activities:

      • Prioritizing initiatives based on factors such as effort, cost, and risk.
      • Reviewing the dashboard to fine-tune your roadmap.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)

      Outcomes of this step

      • An executive-friendly project roadmap dashboard summarizing your initiatives.
      • A visual representation of the priority, effort, and timeline required for suggested initiatives.

      Review the Ransomware Resilience Assessment

      Tabs 2 and 3 list initiatives relevant to your ransomware readiness improvement efforts.

      • At this point in the project, the Ransomware Resilience Assessment should contain a number of initiatives to improve ransomware resilience.
      • Tab 2 is prepopulated with examples of gap closure actions to consider, which are categorized into initiatives listed on Tab 3.
      • Follow the instructions in the Ransomware Resilience Assessment to:
        • Categorize gap control actions into initiatives.
        • Prioritize initiatives based on cost, effort, and benefit.
        • Construct a roadmap for consideration.

      Download the Ransomware Resilience Assessment

      4.2.1 Prioritize initiatives based on factors such as effort, cost, and risk

      1 hour

      Prioritize initiatives in the Ransomware Resilience Assessment.

      1. The initiatives listed on Tab 3 Initiative List will be copied automatically on Tab 5 Prioritization.
      2. On Tab 1 Setup:
        1. Review the weight you want to assign to the cost and effort criteria.
        2. Update the default values for FTE and Roadmap Start as needed.
      3. Go back to Tab 5 Prioritization:
        1. Fill in the cost, effort, and benefit evaluation criteria for each initiative. Hide optional columns you don't plan to use, to avoid confusion.
        2. Use the cost and benefit scores to prioritize waves and schedule initiatives on Tab 6 Gantt Chart.

      Input

      • Gaps and initiatives identified in Step 4.1

      Output

      • Project roadmap dashboard

      Materials

      • Ransomware Resilience Assessment

      Participants

      • Security Incident Response Team (SIRT)

      4.2.2 Review the dashboard to fine-tune the roadmap

      1 hour

      Review and update the roadmap dashboard in your Ransomware Resilience Assessment.

      1. Review the Gantt chart to ensure:
        1. The timeline is realistic. Avoid scheduling many high-effort projects at the same time.
        2. Higher-priority items are scheduled sooner than low-priority items.
        3. Short-term projects include quick wins (e.g. high-priority, low-effort items).
        4. It supports the story you wish to communicate (e.g. a plan to address gaps, along with the required effort and timeline).
      2. Update the values on the 5 Prioritization and 6 Gantt Chart tabs based on your review.

      Input

      • Gaps and initiatives identified in Step 4.1

      Output

      • Project roadmap dashboard

      Materials

      • Ransomware Resilience Assessment

      Participants

      • Security Incident Response Team (SIRT)

      This is an image of a sample roadmap for the years 2022-2023

      Step 4.3

      Measure resilience metrics

      Activities

      4.3.1 Summarize status and next steps in an executive presentation

      This step will guide you through the following activities:

      • Summarizing status and next steps in an executive presentation.

      This step involves the following participants:

      • Security Incident Response Team (SIRT)

      Outcomes of this step

      • Gain stakeholder buy-in by communicating the risk of the status quo and achievable next steps to improve your organization's ransomware readiness.

      Improve ransomware resilience

      4.3.1 Summarize status and next steps in an executive presentation

      1 hour

      Gain stakeholder buy-in by communicating the risk of the status quo and recommendations to reduce that risk. Specifically, capture and present the following from this blueprint:

      • Phase 1: Maturity assessment results, indicating your organization's overall readiness as well as specific areas that need to improve.
      • Phase 2: Business impact results, which objectively quantify the potential impact of downtime and data loss.
      • Phase 3: Current incident response capabilities including steps, timeline, and gaps.
      • Phase 4: Recommended projects to close specific gaps and improve overall ransomware readiness.

      Overall key findings and next steps.

      Download the Ransomware Readiness Summary Presentation Template

      Input

      • Results of all activities in Phases 1-4

      Output

      • Executive presentation

      Materials

      • Ransomware Readiness Summary Presentation Template

      Participants

      • Security Incident Response Team (SIRT)

      This is a screenshot of level 2 of the ransomware readiness maturity tool.

      Revisit metrics

      Ransomware resilience metrics track your ability to disrupt a ransomware attack at each stage of its workflow.

      Revisit metrics as the project nears completion and compare them against your baseline to measure progress.

      Attack workflow Process Metric Target trend Current Goal
      GET IN Vulnerability Management % Critical patches applied Higher is better
      Vulnerability Management # of external exposures Fewer is better
      Security Awareness Training % of users tested for phishing Higher is better
      SPREAD Identity and Access Management Adm accounts / 1000 users Lower is better
      Identity and Access Management % of users enrolled for MFA Higher is better
      Security Incident Management Avg time to detect Lower is better
      PROFIT Security Incident Management Avg time to resolve Lower is better
      Backup and Disaster Recovery % critical assets with recovery test Higher is better
      Backup and Disaster Recovery % backup to immutable storage Higher is better

      Summary of accomplishments

      Project overview

      Project deliverables

      This blueprint helped you create a ransomware incident response plan for your organization, as well as identify ransomware prevention strategies and ransomware prevention best practices.

      • Ransomware Resilience Assessment: Measure your current readiness, then identify people, policy, and technology gaps to address.
      • Ransomware Response Workflow: An at-a-glance summary of the key incident response steps across all relevant stakeholders through each phase of incident management.
      • Ransomware Response Runbook: Includes your threat escalation protocol and detailed response steps to be executed by each stakeholder.
      • Ransomware Tabletop Planning : This deep dive into a ransomware scenario will help you develop a more accurate incident management workflow and runbook, as well as identify gaps to address.
      • Ransomware Project Roadmap: This prioritized list of initiatives will address specific gaps and improve overall ransomware readiness.
      • Ransomware Readiness Summary Presentation: Your executive presentation will communicate the risk of the status quo, present recommended next steps, and drive stakeholder buy-in.

      Project phases

      Phase 1: Assess ransomware resilience

      Phase 2: Protect and detect

      Phase 3: Respond and recover

      Phase 4: Improve ransomware resilience

      Related Info-Tech Research

      Tab 3. Initiative List in the Ransomware Resilience Assessment identifies relevant Info-Tech Research to support common ransomware resilience initiatives.

      Related security blueprints:

      Related disaster recovery blueprints:

      Research Contributors and Experts

      This is an image of Jimmy Tom

      Jimmy Tom
      AVP of Information Technology and Infrastructure
      Financial Horizons

      This is an image of Dan Reisig

      Dan Reisig
      Vice President of Technology
      UV&S

      This is an image of Samuel Sutto

      Samuel Sutton
      Computer Scientist (Retired)
      FBI

      This is an image of Ali Dehghantanha

      Ali Dehghantanha
      Canada Research Chair in Cybersecurity and Threat Intelligence,
      University of Guelph

      This is an image of Gary Rietz

      Gary Rietz
      CIO
      Blommer Chocolate Company

      This is an image of Mark Roman

      Mark Roman
      CIO
      Simon Fraser University

      This is an image of Derrick Whalen

      Derrick Whalen
      Director, IT Services
      Halifax Port Authority

      This is an image of Stuart Gaslonde

      Stuart Gaslonde
      Director of IT & Digital Services
      Falmouth-Exeter Plus

      This is an image of Deborah Curtis

      Deborah Curtis
      CISO
      Placer County

      This is an image of Deuce Sapp

      Deuce Sapp
      VP of IT
      ISCO Industries

      This is an image of Trevor Ward

      Trevor Ward
      Information Security Assurance Manager
      Falmouth-Exeter Plus

      This is an image of Brian Murphy

      Brian Murphy
      IT Manager
      Placer County

      This is an image of Arturo Montalvo

      Arturo Montalvo
      CISO
      Texas General Land Office and Veterans Land Board

      No Image Available

      Mduduzi Dlamini
      IT Systems Manager
      Eswatini Railway

      No Image Available

      Mike Hare
      System Administrator
      18th Circuit Florida Courts

      No Image Available

      Linda Barratt
      Director of Enterprise architecture, IT Security, and Data Analytics, Toronto Community Housing Corporation

      This is an image of Josh Lazar

      Josh Lazar
      CIO
      18th Circuit Florida Courts

      This is an image of Douglas Williamson

      Douglas Williamson
      Director of IT
      Jamaica Civil Aviation Authority

      This is an image of Ira Goldstein

      Ira Goldstein
      Chief Operating Officer
      Herjavec Group

      This is an image of Celine Gravelines

      Celine Gravelines
      Senior Cybersecurity Analyst
      Encryptics

      This is an image of Dan Mathieson

      Dan Mathieson
      Mayor
      City of Stratford

      This is an image of Jacopo Fumagalli

      Jacopo Fumagalli
      CISO
      Omya

      This is an image of Matthew Parker

      Matthew Parker
      Program Manager
      Utah Transit Authority

      Two Additional Anonymous Contributors

      Bibliography

      2019-Data-Breach-Investigations-Report.-Verizon,-May-2019.
      2019-Midyear-Security-Roundup:-Evasive-Threats,-Persistent-Effects.-Trend-Micro,-2019.
      Abrams,-Lawrence.-"Ryuk-Ransomware-Uses-Wake-on-Lan-to-Encrypt-Offline-Devices."-Bleeping-Computer,-14-Jan.-2020.
      Abrams,-Lawrence.-"Sodinokibi-Ransomware-Publishes-Stolen-Data-for-the-First-Time."-Bleeping-Computer,-11-Jan.-2020.
      Canadian-Center-for-Cyber-Security,-"Ransomware-Playbook,"-30-November-2021.-Accessed-21-May-2022.-
      Carnegie-Endowment-for-International-Peace.-"Ransomware:-Prevention-and-Protection."-Accessed-May-2022.-
      Cawthra,-Jennifer,-Michael-Ekstrom,-Lauren-Lusty,-Julian-Sexton,-John-Sweetnam.-Special-Publication-1800-26-Data-Integrity:-Detecting-and-Responding-to-Ransomware-and-Other-Destructive-Events.-NIST,-Jan.-2020.
      Cawthra,-Jennifer,-Michael-Ekstrom,-Lauren-Lusty,-Julian-Sexton,-John-Sweetnam.-Special-Publication-1800-25-Data-Integrity:-Identifying-and-Protecting-Assets-Against-Ransomware-and-Other-Destructive-Events.-NIST,-Jan.-2020.-
      Cichonski,-P.,-T.-Millar,-T.-Grance,-and-K.-Scarfone.-"Computer-Security-Incident-Handling-Guide."-SP-800-61-Rev.-2.-NIST,-Aug.-2012.
      Cimpanu,-Catalin.-"Company-shuts-down-because-of-ransomware,-leaves-300-without-jobs-just-before-holidays."-ZDNet,-3-Jan.-2020.
      Cimpanu,-Catalin.-"Ransomware-attack-hits-major-US-data-center-provider."-ZDNet,-5-Dec.-2019.
      CISA,-"Stop-Ransomware,"-Accessed-12-May-2022.
      "CMMI-Levels-of-Capability-and-Performance."-CMMI-Institute.-Accessed-May-2022.-
      Connolly,-Lena-Yuryna,-"An-empirical-study-of-ransomware-attacks-on-organizations:-an-assessment-of-severity-and-salient-factors-affecting-vulnerability."-Journal-of-Cybersecurity,-2020,.-1-18.
      "Definitions:-Backup-vs.-Disaster-Recovery-vs.-High-Availability."-CVM-IT-&-Cloud-Services,-12-Jan.-2017.
      "Don't-Become-a-Ransomware-Target-–-Secure-Your-RDP-Access-Responsibly."-Coveware,-2019.-
      Elementus,-"Rise-of-the-Ransomware-Cartels-"(2022).-YouTube.-Accessed-May-2022.-
      Global-Security-Attitude-Survey.-CrowdStrike,-2019.
      Graham,-Andrew.-"September-Cyberattack-cost-Woodstock-nearly-$670,00:-report."-
      Global-News,-10-Dec.-2019.
      Harris,-K.-"California-2016-Data-Breach-Report."-California-Department-of-Justice,-Feb.-2016.
      Hiscox-Cyber-Readiness-Report-2019.-Hiscox-UK,-2019.
      Cost-of-A-Data-Breach-(2022).-IBM.-Accessed-June-2022.--
      Ikeda,-Scott.-"LifeLabs-Data-Breach,-the-Largest-Ever-in-Canada,-May-Cost-the-Company-Over-$1-Billion-in-Class-Action-Lawsuit."-CPO-Magazine,-2020.
      Kessem,-Limor-and-Mitch-Mayne.-"Definitive-Guide-to-Ransomware."-IBM,-May-2022.
      Krebs,-Brian.-"Ransomware-Gangs-Now-Outing-Victim-Businesses-That-Don't-Pay-Up."-Krebson-Security,-16-Dec.-2019.
      Jaquith,-Andrew-and-Barnaby-Clarke,-"Security-metrics-to-help-protect-against-ransomware."-Panaseer,-July-29,-2021,-Accessed-3-June-2022.
      "LifeLabs-pays-ransom-after-cyberattack-exposes-information-of-15-million-customers-in-B.C.-and-Ontario."-CBC-News,-17-Dec.-2019.
      Matthews,-Lee.-"Louisiana-Suffers-Another-Major-Ransomware-Attack."-Forbes,-20-Nov.-2019.
      NISTIR-8374,-"Ransomware-Risk-Management:-A-Cybersecurity-Framework-Profile."-NIST-Computer-Security-Resource-Center.-February-2022.-Accessed-May-2022.-
      "Ransomware-attack-hits-school-district-twice-in-4-months."-Associated-Press,-10-Sept.-2019.
      "Ransomware-Costs-Double-in-Q4-as-Ryuk,-Sodinokibi-Proliferate."-Coveware,-2019.
      Ransomware-Payments-Rise-as-Public-Sector-is-Targeted,-New-Variants-Enter-the-Market."-Coveware,-2019.
      Rector,-Kevin.-"Baltimore-to-purchase-$20M-in-cyber-insurance-as-it-pays-off-contractors-who-helped-city-recover-from-ransomware."-The-Baltimore-Sun,-16-Oct.-2019.
      "Report:-Average-time-to-detect-and-contain-a-breach-is-287-days."-VentureBeat,-May-25,-2022.-Accessed-June-2022.-
      "Five-Lessons-Learned-from-over-600-Ransomware-Attacks."-Riskrecon.-Mar-2022.-Accessed-May-2022.-
      Rosenberg,-Matthew,-Nicole-Perlroth,-and-David-E.-Sanger.-"-'Chaos-is-the-Point':-Russian-Hackers-and-Trolls-Grow-Stealthier-in-2020."-The-New-York-Times,-10-Jan.-2020.
      Rouse,-Margaret.-"Data-Archiving."-TechTarget,-2018.
      Siegel,-Rachel.-"Florida-city-will-pay-hackers-$600,000-to-get-its-computer-systems-back."-The-Washington-Post,-20-June-2019.
      Sheridan,-Kelly.-"Global-Dwell-Time-Drops-as-Ransomware-Attacks-Accelerate."-DarkReading,-13-April-2021.-Accessed-May-2022.-
      Smith,-Elliot.-"British-Banks-hit-by-hacking-of-foreign-exchange-firm-Travelex."-CNBC,-9-Jan.-2020.
      "The-State-of-Ransomware-2022."-Sophos.-Feb-2022.-Accessed-May-2022.-
      "The-State-of-Ransomware-in-the-U.S.:-2019-Report-for-Q1-to-Q3."-Emsisoft-Malware-Lab,-1-Oct.2019.
      "The-State-of-Ransomware-in-the-U.S.:-Report-and-Statistics-2019."-Emsisoft-Lab,-12-Dec.-2019.
      "The-State-of-Ransomware-in-2020."-Black-Fog,-Dec.-2020.
      Toulas,-Bill.-"Ten-notorious-ransomware-strains-put-to-the-encryption-speed-test."-Bleeping-Computers,-23-Mar-2022.-Accessed-May-2022.
      Tung,-Liam-"This-is-how-long-hackers-will-hide-in-your-network-before-deploying-ransomware-or-being-spotted."-zdnet.-May-19,-2021.-Accessed-June-2022.-

      Initiate Your Service Management Program

      • Buy Link or Shortcode: {j2store}398|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Management
      • Parent Category Link: /service-management
      • IT organizations continue attempting to implement service management, often based on ITIL, with limited success and without visible value.
      • More than half of service management implementations have failed beyond simply implementing the service desk and the incident, change, and request management processes.
      • Organizational structure, goals, and cultural factors are not considered during service management implementation and improvement.
      • The business lacks engagement and understanding of service management.

      Our Advice

      Critical Insight

      • Service management is an organizational approach. Focus on producing successful and valuable services and service outcomes for the customers.
      • All areas of the organization are accountable for governing and executing service management. Ensure that you create a service management strategy that improves business outcomes and provides the value and quality expected.

      Impact and Result

      • Identified structure for how your service management model should be run and governed.
      • Identified forces that impact your ability to oversee and drive service management success.
      • Mitigation approach to restraining forces.

      Initiate Your Service Management Program Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to understand why service management implementations often fail and why you should establish governance for service management.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify the level of oversight you need

      Use Info-Tech’s methodology to establish an effective service management program with proper oversight.

      • Service Management Program Initiation Plan
      [infographic]

      Secure Your Hybrid Workforce

      • Buy Link or Shortcode: {j2store}271|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Secure Cloud & Network Architecture
      • Parent Category Link: /secure-cloud-network-architecture
      • Many IT and security leaders struggle to cope with the challenges associated with an hybrid workforce and how best to secure it.
      • Understanding the main principles of zero trust: never trust, always verify, assume breach, and verify explicitly.
      • How to go about achieving a zero trust framework.
      • Understanding the premise of SASE as it pertains to a hybrid workforce.

      Our Advice

      Critical Insight

      Securing your hybrid workforce should be an opportunity to get started on the zero trust journey. Realizing the core features needed to achieve this will assist you determine which of the options is a good fit for your organization.

      Impact and Result

      Every organization's strategy to secure their hybrid workforce should include introducing zero trust principles in certain areas. Our unique approach:

      • Assess the suitability of SASE/SSE and zero trust.
      • Present capabilities and feature benefits.
      • Procure SASE product and/or build a zero trust roadmap.

      Secure Your Hybrid Workforce Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Secure Your Hybrid Workforce Deck – The purpose of the storyboard is to provide a detailed description of the steps involved in securing your hybrid workforce with zero trust.

      The storyboard contains two easy-to-follow steps on securing your hybrid workforce with zero trust, from assessing the suitability of SASE/SSE to taking a step in building a zero trust roadmap.

      • Secure Your Hybrid Workforce – Phases 1-2

      2. Suitability Assessment Tool – A tool to identify whether SASE/SSE or a zero trust roadmap is a better fit for your organization.

      Use this tool to identify your next line of action in securing your hybrid workforce by assessing key components that conforms to the ideals and principles of Zero Trust.

      • Zero Trust - SASE Suitability Assessment Tool

      3. RFP Template – A document to guide you through requesting proposals from vendors.

      Use this document to request proposals from select vendors.

      • Request for Proposal (RFP) Template
      [infographic]

      Further reading

      Secure Your Hybrid Workforce

      SASE as a driver to zero trust.

      Analyst Perspective

      Consolidate your security and network.

      Remote connections like VPNs were not designed to be security tools or to have the capacity to handle a large hybrid workforce; hence, organizations are burdened with implementing controls that are perceived to be "security solutions." The COVID-19 pandemic forced a wave of remote work for employees that were not taken into consideration for most VPN implementations, and as a result, the understanding of the traditional network perimeter as we always knew it has shifted to include devices, applications, edges, and the internet. Additionally, remote work is here to stay as recruiting talent in the current market means you must make yourself attractive to potential hires.

      The shift in the network perimeter increases the risks associated with traditional VPN solutions as well as exposing the limitations of the solution. This is where zero trust as a principle introduces a more security-focused strategy that not only mitigates most (if not all) of the risks, but also eliminates limitations, which would enhance the business and improve customer/employee experience.

      There are several ways of achieving zero trust maturity, and one of those is SASE, which consolidates security and networking to better secure your hybrid workforce as implied trust is thrown out of the window and verification of everything becomes the new normal to defend the business.

      This is a picture of Victor Okorie

      Victor Okorie
      Senior Research Analyst, Security and Privacy
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      CISOs are looking to zero trust to fill the gaps associated with their traditional remote setup as well as to build an adaptable security strategy. Some challenges faced include:

      • Understanding the main principles of zero trust: never trust, always verify, assume breach, and verify explicitly.
      • Understanding how to achieve a zero trust framework.
      • Understanding the premise of SASE as it pertains to a hybrid workforce.

      Common Obstacles

      The zero trust journey may seem tedious because of a few obstacles like:

      • Knowing what the principle is all about and the components that align with it.
      • Knowing where to start. Due to the lack of a standardized path for the zero trust journey, going about the journey can be confusing.
      • Not having a uniform definition of what makes up a SASE solution as it is heavily dependent on vendors.

      Info-Tech's Approach

      Info-Tech provides a three-service approach to helping organizations better secure their hybrid workforce.

      • Understand your current, existing technological capabilities and challenges with your hybrid infrastructure, and prioritize those challenges.
      • Gain insight into zero trust and SASE as a mitigation/control/tool to those challenges.
      • Identify the SASE features that are relevant to your needs and a source guide for a SASE vendor.

      Info-Tech Insight

      Securing your hybrid workforce should be an opportunity to get started on the zero trust journey. Realizing the core features needed to achieve this will assist you in determining which of the options is a good fit for your organization.

      Turn your challenges into opportunities

      Hybrid workforce is the new normal

      The pandemic has shown there is no going back to full on-prem work, and as such, security should be looked at differently with various considerations in mind.

      Understand that current hybrid solutions are susceptible to various forms of attack as the threat attack surface area has now expanded with users, devices, applications, locations, and data. The traditional perimeter as we know it has expanded beyond just the corporate network, and as such, it needs a more mature security strategy.

      Onboarding and offboarding have been done remotely, and with some growth recorded, the size of companies has also increased, leading to a scaling issue.

      Employees are now demanding remote work capabilities as part of contract negotiation before accepting a job.

      Attacks have increased far more quickly during the pandemic, and all indications point to them increasing even more.

      Scarce available security personnel in the job market for hire.

      Reality Today

      This image is a circle graph and 67% of it is coloured with the number 67% in the middle of the graph

      The number of breach incidents by identity theft.
      Source: Security Magazine, 2022.

      This image is a circle graph and 78% of it is coloured with the number 78% in the middle of the graph

      IT security teams want to adopt zero trust.
      Source: Cybersecurity Insiders, 2019.

      Reduce the risks of remote work by using zero trust

      $1.07m

      $1.76m

      235

      Increase in breaches related to remote work

      Cost difference in a breach where zero trust is deployed

      Days to identify a breach

      The average cost of a data breach where remote work was a factor rose by $1.07 million in 2021. COVID-19 brought about rapid changes in organizations, and digital transformation changes curbed some of its excesses. Organizations that did not make any digital transformation changes reported a $750,000 higher costs compared to global average.

      The average cost of a breach in an organization with no zero trust deployed was $5.04 million in 2021 compared to the average cost of a breach in an organization with zero trust deployed of $3.28 million. With a difference of $1.76 million, zero trust makes a significant difference.

      Organizations with a remote work adoption rate of 50% took 235 days to identify a breach and 81 days to contain that breach – this is in comparison to the average of 212 days to identify a breach and 75 days to contain that breach.

      Source: IBM, 2021.

      Network + Security = SASE

      What exactly is a SASE product?

      The convergence and consolidation of security and network brought about the formation of secure access service edge (SASE – pronounced like "sassy"). Digital transformation, hybrid workforce, high demand of availability, uninterrupted access for employees, and a host of other factors influenced the need for this convergence that is delivered as a cloud service.

      The capabilities of a SASE solution being delivered are based on certain criteria, such as the identity of the entity (users, devices, applications, data, services, location), real-time context, continuous assessment and verification of risk and "trust" throughout the lifetime of a session, and the security and compliance policies of the organization.

      SASE continuously identifies users and devices, applies security based on policy, and provides secure access to the appropriate and requested application or data regardless of location.

      image contains a list of the SASE Network Features and Security Features. the network Features are: WAN optimization; SD WAN; CDN; Network-as-a-service. The Security Features are: CASB; IDPS; ZTNA/VPN; FWaaS; Browser isolation; DLP; UEBA; Secure web gateway; Sandboxing

      Current Approach

      The traditional perimeter security using the castle and moat approach is depicted in the image here. The security shields valuable resources from external attack; however, it isn't foolproof for all kinds of external attacks. Furthermore, it does not protect those valuable resources from insider threat.

      This security perimeter also allows for lateral movement when it has been breached. Access to these resources is now considered "trusted" solely because it is now behind the wall/perimeter.

      This approach is no longer feasible in our world today where both external and internal threats pose continuous risk and need to be contained.

      Determine the suitability of SASE and zero trust

      The Challenge:

      Complications facing traditional infrastructure

      • Increased hybrid workforce
      • Regulatory compliance
      • Limited Infosec personnel
      • Poor threat detection
      • Increased attack surface

      Common vulnerabilities in traditional infrastructure

      • MITM attack
      • XSS attack
      • Session hijacking
      • Trust-based model
      • IP spoofing
      • Brute force attack
      • Distributed denial of service
      • DNS hijacking
      • Latency issues
      • Lateral movement once connection is established

      TRADITIONAL INFRASTRUCTURE

      NETWORK

      SECURITY

      AUTHENTICATION

      IDENTITY

      ACCESS

      • MPLS
      • Corporate Network
      • Antivirus installed
      • Traditional Firewall
      • Intrusion Detection and Prevention System
      • Allow and Deny rules
      • Businesses must respond to consumer requests to:
      • LDAP
      • AAA
      • Immature password complexity
      • Trusted device with improperly managed endpoint protection.
      • Little or no DNS security
      • Web portal (captive)
      • VPN client

      Candidate Solutions

      Proposed benefits of SASE

      • Access is only granted to the requested resource
      • Consolidated network and security as a service
      • Micro-segmentation on application and gateway
      • Adopts a zero trust security posture for all access
      • Managed detection and response
      • Uniform enforcement of policy
      • Distributed denial of service shield

      SASE

      NETWORK

      SECURITY

      AUTHENTICATION

      IDENTITY

      ACCESS

      • Software defined – WAN
      • Content delivery network
      • WAN optimization
      • Network-as-a-service
      • Firewall-as-a-service/NGFW
      • Zero trust network access
      • Endpoint detection & response
      • Secure web gateway
      • Cloud access security broker
      • Data loss prevention
      • Remote browser isolation
      • Multifactor authentication
      • Context-based security policy for authentication
      • Authorization managed with situational awareness and real-time risk analytics
      • Continuous verification throughout an access request lifecycle
      • Zero trust identity on users, devices, applications, and data.
      • Strong password complexity enforced
      • Privilege access management
      • Secure internet access
      • SASE client

      ZERO TRUST

      TENETS OF ZERO TRUST

      ZERO TRUST PILLARS

      • Continuous, dynamic authentication and verification
      • Principle of least privilege
      • Always assume a breach
      • Implement the tenets of zero trust across the following domains of your environment:
        • IDENTITY
        • APPLICATION
        • NETWORK
        • DEVICES
        • DATA

      Proposed benefits of zero trust

      • Identify and protect critical and non-critical resources in accordance with business objectives.
      • Produce initiatives that conform to the ideals of zero trust and are aligned with the corresponding pillars above.
      • Formulate policies to protect resources and aid segmentation.

      Info-Tech Insight

      Securing your hybrid workforce should be an opportunity to get started on the zero trust journey. Realizing the core features needed to achieve this will help you determine which of the options is a good fit for your organization.

      Measure the value of using Info-Tech's approach

      IT and business value

      PHASE 1

      PHASE 2

      Assess the benefits of adopting SASE or zero trust

      Vendors will try to control the narrative in terms of what they can do for you, but it's time for you to control the narrative and identify pain points to IT and the business, and with that, to understand and define what the vendor solution can do for you.

      PHASE 2

      Assess the benefits of adopting SASE or zero trust

      Vendors will try to control the narrative in terms of what they can do for you, but it's time for you to control the narrative and identify pain points to IT and the business, and with that, to understand and define what the vendor solution can do for you.

      Short-term benefits

      • Gain awareness of your zero trust readiness.
      • Embed a zero trust mindset across your architecture.
      • Control the narrative of what SASE brings to your organization.

      Long-term benefits

      • Identified controls to mitigate risks with current architecture while on a zero trust journey.
      • Improved security posture that reduces risk by increasing visibility into threats and user connections.
      • Reduced CapEx and OpEx due to the scalability, low staffing requirements, and improved time to respond to threats using a SASE or SSE solution.

      Determine SASE cost factors

      IT and business value

      Info-Tech Insight

      IT leaders need to examine different areas of their budget and determine how the adoption of a SASE solution could influence several areas of their budget breakdown.

      Determining the SASE cost factors early could accelerate the justification the business needs to move forward in making an informed decision.

      01- Infrastructure

      • Physical security
      • Cabling
      • Power supply and HVAC
      • Hosting

      02- Administration

      • Human hours to analyze logs and threats
      • Human hours to secure infrastructure
      • Fees associated with maintenance

      03- Inbound

      • DPI
      • DDoS
      • Web application firewall
      • VPN concentrators

      04- Outbound

      • IDPS
      • DLP on-prem
      • QoS
      • Sandbox & URL filtering

      04- Data Protection

      • Real-time URL
        insights
      • Threat hunting
      • Data loss prevention

      06- Monitoring

      • Log storage
      • Logging engine
      • Dashboards
      • Managed detection
        and response

      Info-Tech's methodology for securing your hybrid workforce

      1. Current state and future mitigation

      2. Assess the benefits of moving to SASE/zero trust

      Phase Steps

      1.1 Limitations of legacy infrastructure

      1.2 Zero trust principle as a control

      1.3 SASE as a driver of zero trust

      2.1 Sourcing out a SASE/SSE vendor

      2.2 Build a zero trust roadmap

      Phase Outcomes

      Identify and prioritize risks of current infrastructure and several ways to mitigate them.

      RFP template and build a zero trust roadmap.

      Consider several factors needed to protect your growing hybrid workforce and assess your current resource capabilities, solutions, and desire for a more mature security program. The outcome should either address a quick pain point or a long-term roadmap.

      The internet is the new corporate network

      The internet is the new corporate network, which opens the organization up to more risks not protected by the current security stack. Using Info-Tech's methodology of zero trust adoption is a sure way to reduce the attack surface, and SASE is one useful tool to take you on the zero trust journey.

      Current-state risks and future mitigation

      Securing your hybrid workforce via zero trust will inevitably include (but is not limited to) technological products/solutions.

      SASE and SSE features sit as an overlay here as technological solutions that will help on the zero trust journey by aggregating all the disparate solutions required for you to meet zero trust requirements into a single interface. The knowledge and implementation of this helps put things into perspective of where and what our target state is.

      The right solution for the right problem

      It is critical to choose a solution that addresses the security problems you are actually trying to solve.

      Don't allow the solution provider to tell you what you need – rather, start by understanding your capability gaps and then go to market to find the right partner.

      Take advantage of the RFP template to source a SASE or SSE vendor. Additionally, build a zero trust roadmap to develop and strategize initiatives and tasks.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Zero Trust and SASE Suitability Tool
      Identify critical and vulnerable DAAS elements to protect and align them to business goals.

      Zero Trust Program Gap Analysis Tool
      Perform a gap analysis between current and target states to build a zero trust roadmap.

      Key deliverable:

      Secure Your Hybrid Workforce With Zero Trust Communication deck
      Present your zero trust strategy in a prepopulated document that summarizes the work you have completed as a part of this blueprint.

      Phase 1

      Current state and future mitigation

      Phase 1

      Phase 2

      1.1 Limitations of legacy infrastructure

      1.2 Zero trust principle as a control

      1.3 SASE as a driver of zero trust

      2.1 Sourcing out a SASE/SSE vendor

      2.2 Build a zero trust roadmap

      This phase will walk you through the following activities:

      • Introduction to the tool, how to use the input tabs to identify current challenges, technologies being used, and to prioritize the challenges. The prioritized list will highlight existing gaps and eventually be mapped to recommended mitigations in the following phase.

      This phase involves the following participants:

      • CIO
      • CISO
      • CSO
      • IT security team
      • IT network team

      Secure Your Hybrid Workforce

      1.1 Limitations of legacy infrastructure

      Traditional security & remote access solutions must be modernized

      Info-Tech Insight
      Traditional security is architected with a perimeter in mind and is poorly suited to the threats in hybrid or distributed environments.

      Ensure you minimize or eliminate weak points on all layers.

      • SECURITY
        • DDoS
        • DNS hijacking
        • Weak VPN protocols
      • IDENTITY
        • One-time verification allowing lateral movement
      • NETWORK
        • Risk perimeter stops at corporate network edge
        • Split tunneling
      • AUTHENTICATION
        • Weak authentication
        • Weak passwords
      • ACCESS
        • Man-in-the-middle attack
        • Cross-site scripting
        • Session hijacking

      1.1.1 For example: traditional VPNs are poorly suited to a hybrid workforce

      There are many limitations that make it difficult for traditional VPNs to adapt to an ever-growing hybrid workforce.

      The listed limitations are tied to associated risks of legacy infrastructure as well as security components that are almost non-existent in a VPN implementation today.

      Scaling

      VPNs were designed for small-scale remote access to corporate network. An increase in the remote workforce will require expensive hardware investment.

      Visibility

      Users and attackers are not restricted to specific network resources, and with an absence of activity logs, they can go undetected.

      Managed detection & response

      Due to the reduction in or lack of visibility, threat detections are poorly managed, and responses are already too late.

      Hardware

      Limited number of locations for VPN hardware to be situated as it can be expensive.

      Hybrid workforce

      The increase in the hybrid workforce requires the risk perimeter to be expanded from the corporate network to devices and applications. VPNs are built for privacy, not security.

      Info-Tech Insight

      Hybrid workforces are here to stay, and adopting a strategy that is adaptable, flexible, simple, and cost-effective is a recommended road to take on the journey to bettering your security and network.

      1.1 Identify risk from legacy infrastructure

      Estimated Time: 1-2 hours

      1. Ensure all vulnerabilities described on slide 17 are removed.
      2. Note any forecasted challenge you think you might have down the line with your current hybrid setup.
      3. Identify any trend that may be of interest to you with regards to your hybrid setup.

      This is a screenshot of the organizational profile table found in the Zero Trust - SASE Suitability Assessment Tool

      Download the Zero Trust - SASE Suitability Assessment Tool

      Input

      • List of key pain points and challenges
      • List of forecasted challenges and trends of interest

      Output

      • Prioritized list of pain points and/or challenges

      Materials

      • Excel tool
      • Whiteboard

      Participants

      • CISO
      • InfoSec team
      • IT manager
      • CIO
      • Infrastructure team

      1.2 Zero trust principle as a control

      A zero trust implementation comes with benefits/initiatives that mitigate the challenges identified in earlier activities.

      Info-Tech Insight

      Zero trust/"always verify" is applied to identity, workloads, devices, networks, and data to provide a greater control for risks associated with traditional network architecture.

      Improve IAM maturity

      Zero trust identity and access will lead to a mature IAM process in an organization with the removal of implicit trust.

      Secure your remote access

      With a zero trust network architecture (ZTNA), both the remote and on-prem network access are more secure than the traditional network deployment. The software-defined parameter ensures security on each network access.

      Reduce threat surface area

      With zero trust principle applied on identity, workload, devices, network, and data, the threat surface area which births some of the risks identified earlier will be significantly reduced.

      Improve hybrid workforce

      Scaling, visibility, network throughput, secure connection from anywhere, micro-segmentation, and a host of other benefits to improve your hybrid workforce.

      1.2 SASE as an overlay to zero trust

      Security and network initiatives of a zero trust roadmap converged into a single pane of glass.

      Info-Tech Insight

      Security and network converged into a single pane of glass giving you some of the benefits and initiatives of a zero trust implemented architecture in one package.

      Improve IAM maturity

      The identity-centric nature of SASE solutions helps to improve your IAM maturity as it applies the principle of least privilege. The removal of implicit trust and continuous verification helps foster this more.

      Secure your remote access

      With ZTNA, both the remote and on-prem network access are more secure than the traditional network deployment. The software defined parameter ensures security on each network access.

      Reduce threat surface area

      Secure web gateway, cloud access security broker, domain name system, next-generation firewall, data loss prevention, and ZTNA protect against data leaks, prevent lateral movement, and prevent malicious actors from coming in.

      Improve hybrid workforce

      Reduced costs and complexity of IT, faster user experience, and reduced risk as a result of the scalability, visibility, ease of IT administration, network throughput, secure connection from anywhere, micro-segmentation, and a host of other benefits will surely improve your hybrid workforce.

      Align SASE features to zero trust core capabilities

      Verify Identity

      • Authentication & verification are enforced for each app request or session.
      • Use of multifactor authentication.
      • RBAC/ABAC and principle of least privilege are applied on the identity regardless of user, device, or location.

      Verify Device

      • Device health is checked to ensure device is not compromised or vulnerable.
      • No admin permissions on user devices.
      • Device-based risk assessment is enforced as part of UEBA.

      Verify Access

      • Micro-segmentation built around network, user, device, location and roles.
      • Use of context and content-based policy enforced to the user, application, and device identity.
      • Network access only granted to specified application request and not to the entire network.

      Verify Services

      • Applications and services are checked before access is granted.
      • Connections to the application and services are inspected with the security controls built into the SASE solution.

      Info-Tech Insight

      These features of SASE and zero trust mitigate the risks associated with a traditional VPN and reduce the threat surface area. With security at the core, network optimization is not compromised.

      Security components of SASE

      Otherwise known as security service edge (SSE)

      Security service edge is the convergence of all security services typically found in SASE. At its core, SSE consists of three services which include:

      • Secure web gateway – secure access to the internet and web.
      • Cloud access security broker – secure access to SaaS and cloud applications.
      • Zero trust network access – secure remote access to private applications.

      SSE components are also mitigations or initiatives that make up a zero trust roadmap as they comply with the zero trust principle, and as a result, they sit up there with SASE as an overlay/driver of a zero trust implementation. SSE's benefits are identical to SASE's in that it provides zero trust access, risk reduction, low costs and complexity, and a better user experience. The difference is SSE's sole focus on security services and not the network component.

      SASE

      NETWORK FEATURES

      SECURITY FEATURES

      • WAN optimization
      • SD WAN
      • CDN
      • Network-as-a-service
      • CASB
      • IDPS
      • ZTNA/VPN
      • FWaaS
      • Browser isolation
      • DLP
      • UEBA
      • Secure web gateway
      • Sandboxing

      1.3 Pros & cons of zero trust and SASE

      Zero Trust

      SASE

      Pros

      Cons

      Pros

      Cons

      • Robust IAM process and technologies with role-based access control.
      • Strong and continuous verification of identity of user accounts, devices, data, location, and principle of least privilege applied.
      • Micro-segmentation applied around users, network, devices, roles, and applications to prevent lateral movement.
      • Threat attack surface eliminated, which reduces organizational risks.
      • Protection of data strengthened based on sensitivity and micro-segmentation.
      • Difficult to identify the scope of the zero trust initiative.
      • Requires continuous and ongoing update of access controls.
      • Zero trust journey/process could take years and is prone to being abandoned without commitment from executives.
      • Legacy systems can be hard to replace, which would require all stakeholders to prioritize resource allocation.
      • Can be expensive to implement.
      • Adopts a zero trust security posture for all access requests.
      • Converged and consolidated network and security delivered as a cloud service to the user rather than a single point of enforcement.
      • Centralized visibility of devices, data in transit and at rest, user activities, and threats.
      • Cheaper than a zero trust roadmap implementation.
      • Managed detection and response.
      • The limited knowledge of SASE.
      • No universally agreed upon SASE definition.
      • SASE products are still being developed and are open to vendors' interpretation.
      • Existing vendor relationships could be a hinderance to deployment.
      • Hard to manage MSSPs.

      Understand SASE and zero trust suitability for your needs

      Estimated Time: 1 hour

      Use the dashboard to understand the value assessment of adopting a SASE product or building a zero trust roadmap.

      This is an image of the SASE Suitability Assessment

      This is the image of the Zero Trust Suitability Assessment

      Info-Tech Insight

      This tool will help steer you on a path to take as a form of mitigation/control to some or all the identified challenges.

      Phase 2

      Make a decision and next steps

      Phase 1

      Phase 2

      1.1 Limitations of legacy infrastructure

      1.2 Zero trust principle as a control

      1.3 SASE as a driver of zero trust

      2.1 Sourcing out a SASE/SSE vendor

      2.2 Build a zero trust roadmap

      This phase will walk you through the following activities:

      • Introduction to the tool activity, how to use the input tabs and considerations to generate an output that could help understand the current state of your hybrid infrastructure and what direction is to be followed next to improve.

      This phase involves the following participants:

      • CIO
      • CISO
      • CSO
      • IT security
      • IT network team

      Secure Your Hybrid Workforce

      Step 2.1

      Sourcing out a SASE/SSE vendor

      Activities

      2.1.1 Use the RFP template to request proposal from vendors

      2.1.2 Use SoftwareReviews to compare vendors

      This step involves the following participants:

      • CIO, CISO, IT manager, Infosec team, executives.

      Outcomes of this step

      • Zero Trust Roadmap

      2.1.1 Use the RFP template to request proposal from vendors

      Estimated Time: 1-3 hours

      1. As a group, use the RFP Template to include technical capabilities of your desired SASE product and to request proposals from vendors.
      2. The features that are most important to your organization generated from phase one should be highlighted in the RFP.

      Input

      • List of SASE features
      • Technical capabilities

      Output

      • RFP

      Materials

      • RFP Template

      Participants

      • Security team
      • IT leadership

      Download the RFP Template

      2.1.2 Use SoftwareReviews to compare vendors

      SoftwareReviews

      • The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.
      • Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.
      • The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.
      • Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

      Step 2.2

      Zero trust readiness and roadmap

      Activities

      2.2.1 Assess the maturity of your current zero trust implementation

      2.2.2 Understand business needs and current security projects

      2.2.3 Set target maturity state with timeframe

      This step involves the following participants:

      CIO, CISO, IT manager, Infosec team, executives.

      Outcomes of this step

      Zero Trust Roadmap

      2.2.1 Assess the maturity of your current zero trust implementation

      Estimated Time: 1-3 hours

      • Realizing that zero trust is a journey helps create a better roadmap and implementation. Identify the current controls or solutions in your organization that align with the principle of zero trust.
      • Break down these controls or solutions into different silos (e.g. identity, security, network, data, device, applications, etc.).
      • Determine your zero trust readiness.

      Input

      • List of zero trust controls/solutions
      • Siloed list of zero trust controls/solutions
      • Current state of zero trust maturity

      Output

      • Zero trust readiness and current maturity state

      Materials

      • Zero Trust Security Benefit Assessment tool

      Participants

      • Security team
      • IT leadership

      Download the Zero Trust Security Benefit Assessment tool

      2.2.2 Understand business needs and current security projects

      Estimated Time: 1-3 hours

      1. Identify the business and IT executives, application owners, and board members whose vision aligns with the zero trust journey.
      2. Identify existing projects within security, IT, and the business and highlight interdependencies or how they fit with the zero trust journey.
      3. Build a rough sketch of the roadmap that fits the business needs, current projects and the zero trust journey.

      Input

      • Meetings with stakeholders
      • List of current and future projects

      Output

      • Sketch of zero trust roadmap

      Materials

      • Whiteboard activity

      Participants

      • Security team
      • IT leadership
      • IT ops team
      • Business executives
      • Board members

      Download Zero Trust Protect Surface Mapping Tool

      2.2.3 Set target maturity state with a given timeframe

      Estimated Time: 1-3 hours

      1. With the zero trust readiness, current business, IT and security projects, current maturity state, and sketch of the roadmap, setting a target maturity state within some timeframe is at the top of the list. The target maturity state will include a list of initiatives that could be siloed and confined to a timeframe.
      2. A Gantt chart or graph could be used to complete this task.

      Input

      • Results from previous activity slides

      Output

      • Current state and target state assessment for gap analysis
      • List of initiatives and timeframe

      Materials

      • Zero Trust Program Gap Analysis Tool

      Participants

      • Security team
      • IT leadership
      • IT ops team
      • Business executives
      • Board members

      Download the Zero Trust Program Gap Analysis Tool

      Summary of Accomplishment

      Insights Gained

      • Difference between zero trust as a principle and SASE as a framework
      • Difference between SASE and SSE platforms.
      • Assessment of which path to take in securing your hybrid workforce

      Deliverables Completed

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      Contact your account representative for more information

      workshops@infotech.com

      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      This is a screenshot from the Zero Trust - SASE Suitability Assessment Tool

      Zero Trust - SASE Suitability Assessment Tool

      Assess current security capabilities and build a roadmap of tasks and initiatives that close maturity gaps.

      Research Contributors

      • Aaron Shum, Vice President, Security & Privacy
      • Cameron Smith, Research Lead, Security & Privacy
      • Brad Mateski, Zones, Solutions Architect for CyberSecurity
      • Bob Smock, Info-Tech Research Group, Vice President of Consulting
      • Dr. Chase Cunningham, Ericom Software, Chief Strategy Officer
      • John Kindervag, ON2IT Cybersecurity, Senior Vice President, Cybersecurity Strategy and ON2IT Group Fellow
      • John Zhao, Fonterra, Enterprise Security Architect
      • Rongxing Lu, University of New Brunswick, Associate Professor
      • Sumanta Sarkar, University of Warwick, Assistant Professor
      • Tim Malone, J.B. Hunt Transport, Senior Director Information Security
      • Vana Matte, J.B. Hunt Transport, Senior Vice President of Technology Services

      Related Info-Tech Research

      This is a screenshot from Info-Tech's Security Strategy Model

      Build an Information Security Strategy

      Info-Tech has developed a highly effective approach to building an information security strategy – an approach that has been successfully tested and refined for over seven years with hundreds of organizations. This unique approach includes tools for ensuring alignment with business objectives, assessing organizational risk and stakeholder expectations, enabling a comprehensive current state assessment, prioritizing initiatives, and building out a security roadmap.

      This is a screenshot from Info-Tech's research: Determine Your Zero Trust Readiness

      Determine Your Zero Trust Readiness

      IT security was typified by perimeter security. However, the way the world does business has mandated a change to IT security. In response, zero trust is a set of principles that can add flexibility to planning your IT security strategy.

      Use this blueprint to determine your zero trust readiness and understand how zero trust can benefit both security and the business.

      This is a screenshot from Info-Tech's research: Mature Your Identity and Access Management Program

      Mature Your Identity and Access Management Program

      Many organizations are looking to improve their identity and access management (IAM) practices but struggle with where to start and whether all areas of IAM have been considered. This blueprint will help you improve the organization's IAM practices by following our three-phase methodology:

      • Assess identity and access requirements.
      • Identify initiatives using the identity lifecycle.
      • Prioritize initiatives and build a roadmap.

      Bibliography

      "2021 Data Breach Investigations Report." Verizon, 2021. Web.
      "Fortinet Brings Networking and Security to the Cloud" Fortinet, 2 Mar. 2021. Web.
      "A Zero Trust Strategy Has 3 Needs – Identify, Authenticate, and Monitor Users and Devices on and off the Network." Fortinet, 15 July 2021. Web.
      "Applying Zero Trust Principles to Enterprise Mobility." CISA, Mar. 2022. Web.
      "CISA Zero Trust Maturity Model." CISA, Cybersecurity Division, June 2021. Web.
      "Continuous Diagnostics and Mitigation Program Overview." CISA, Jan. 2022. Web.
      "Cost of a Data Breach Report 2021 | IBM." IBM, July 2021. Web.
      English, Melanie. "5 Stats That Show The Cost Saving Effect of Zero Trust." Teramind, 29 Sept. 2021. Web.
      Hunter, Steve. "The Five Business Benefits of a Zero Trust Approach to Security." Security Brief - Australia, 19 Aug. 2020. Web.
      "Improve Application Access and Security With Fortinet Zero Trust Network Access." Fortinet, 2 Mar. 2021. Web.
      "Incorporating zero trust Strategies for Secure Network and Application Access." Fortinet, 21 Jul. 2021. Web.
      Jakkal, Vasu. "Zero Trust Adoption Report: How Does Your Organization Compare?" Microsoft, 28 July 2021. Web.
      "Jericho Forum™ Commandments." The Open Group, Jericho Forum, May 2007. Web.
      Schulze, Holger. "2019 Zero Trust Adoption Report." Cybersecurity Insiders, 2019. Web.
      "67% of Organizations Had Identity-Related Data Breaches Last Year." Security Magazine, 22 Aug. 2022. Web.
      United States, Executive Office of the President Joseph R. Biden, Jr. "Executive Order on Improving the Nation's Cybersecurity." The White House, 12 May 2021. Web.

      Apply Design Thinking to Build Empathy With the Business

      • Buy Link or Shortcode: {j2store}89|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $20,772 Average $ Saved
      • member rating average days saved: 13 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Business satisfaction with IT is low.
      • IT and the business have independently evolving strategy, initiatives, and objectives.
      • IT often exceeds their predicted project costs and has difficulty meeting the business’ expectations of project quality and time-to-market.

      Our Advice

      Critical Insight

      • Business needs are unclear or ambiguous.
      • IT and the business do not know how to leverage each other’s talent and resources to meet their common goals.
      • Not enough steps are taken to fully understand and validate problems.
      • IT can’t pivot fast enough when the business’s needs change.

      Impact and Result

      Product, service, and process design should always start with an intimate understanding of what the business is trying to accomplish and why it is important.

      Apply Design Thinking to Build Empathy With the Business Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should apply experience design to partner with the business, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Research

      Identify goals and objectives for experience design, establish targeted stakeholders, and conduct discovery interviews.

      • Apply Design Thinking to Build Empathy With the Business – Phase 1: Research
      • Stakeholder Discovery Interview Template

      2. Map and iterate

      Create the journey map, design a research study to validate your hypotheses, and iterate and ideate around a refined, data-driven understanding of stakeholder problems.

      • Apply Design Thinking to Build Empathy With the Business – Phase 2: Map and Iterate
      • Journey Map Template
      • Research Study Log Tool
      [infographic]

      Workshop: Apply Design Thinking to Build Empathy With the Business

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Introduction to Journey Mapping

      The Purpose

      Understand the method and purpose of journey mapping.

      Key Benefits Achieved

      Initial understanding of the journey mapping process and the concept of end-user empathy.

      Activities

      1.1 Introduce team and discuss workshop motivations and goals.

      1.2 Discuss overview of journey mapping process.

      1.3 Perform journey mapping case study activity.

      Outputs

      Case Study Deliverables – Journey Map and Empathy Maps

      2 Persona Creation

      The Purpose

      Begin to understand the goals and motivations of your stakeholders using customer segmentation and an empathy mapping exercise.

      Key Benefits Achieved

      Understand the demographic and psychographic factors driving stakeholder behavior.

      Activities

      2.1 Discuss psychographic stakeholder segmentation.

      2.2 Create empathy maps for four segments.

      2.3 Generate problem statements.

      2.4 Identify target market.

      Outputs

      Stakeholder personas

      Target market of IT

      3 Interview Stakeholders and Start a Journey Map

      The Purpose

      Get first-hand knowledge of stakeholder needs and start to capture their perspective with a first-iteration journey map.

      Key Benefits Achieved

      Capture the process stakeholders use to solve problems and empathize with their perspectives, pains, and gains.

      Activities

      3.1 Review discovery interviewing techniques.

      3.2 Review and modify the discovery questionnaire

      3.3 Demonstrate stakeholder interview.

      3.4 Synthesize learnings and begin creating a journey map.

      Outputs

      Customized discovery interview template

      Results of discovery interviewing

      4 Complete the Journey Map and Create a Research Study

      The Purpose

      Hypothesize the stakeholder journey, identify assumptions, plan a research study to validate your understanding, and ideate around critical junctures in the journey.

      Key Benefits Achieved

      Understand the stakeholder journey and ideate solutions with the intention of improving their experience with IT.

      Activities

      4.1 Finish the journey map.

      4.2 Identify assumptions and create hypotheses.

      4.3 Discuss field research and hypothesis testing.

      4.4 Design the research study.

      4.5 Discuss concluding remarks and next steps.

      Outputs

      Completed journey map for one IT process, product, or service

      Research study design and action plan

      Info-Tech Quarterly Research Agenda Outcomes Q2-Q3 2023

      • Buy Link or Shortcode: {j2store}297|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy

      At Info-Tech, we take pride in our research and have established the most rigorous publication standards in the industry. However, we understand that engaging with all our analysts to gauge the future may not always be possible. Hence, we have curated some compelling recently published research along with forthcoming research insights to assist you in navigating the next quarter.

      Our Advice

      Critical Insight

      We offer a quarterly Research Agenda Outcomes deck that thoroughly summarizes our recently published research, supplying decision makers with valuable insights and best practices to make informed and effective decisions. Our research is supported by our team of seasoned analysts with decades of experience in the IT industry.

      By leveraging our research, you can stay updated with the latest trends and technologies, giving you an edge over the competition and ensuring the optimal performance of your IT department. This way, you can make confident decisions that lead to remarkable success and improved outcomes.

      Impact and Result

      • Enhance preparedness for future market trends and developments: Keep up to date with the newest trends and advancements in the IT sector to be better prepared for the future.
      • Enhance your decision making: Acquire valuable information and insights to make better-informed, confident decisions.
      • Promote innovation: Foster creativity, explore novel perspectives, drive innovation, and create new products or services.

      Info-Tech Quarterly Research Agenda Outcomes Q2/Q3 2023 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Info-Tech Quarterly Research Agenda Q3 2023 Deck – An overview of our Research Agenda Outcome for Q2 and Q3 of 2023.

      A guide to our top research published to date for 2023 (Q2/Q3).

      • Info-Tech Quarterly Research Agenda Outcomes for Q2/Q3 2023
      [infographic]

      Further reading

      Featured Research Projects 2023 (Q2/Q3)

      “Here are my selections for the top research projects of the last quarter.”

      Photo of Gord Harrison, Head of Research & Advisory, Info-Tech Research Group.

      Gord Harrison
      Head of Research & Advisory
      Info-Tech Research Group

      CIO

      01
      Build Your Generative AI Roadmap

      Generative AI is here, and it's time to find its best uses – systematically and responsibly.

      02
      CIO Priorities 2023

      Engage cross-functional leadership to seize opportunity while protecting the organization from volatility.

      03
      Build an IT Risk Taxonomy

      If integrated risk is your destination, your IT risk taxonomy is the road to get you there.

      04
      Navigate the Digital ID Ecosystem to Enhance Customer Experience

      Beyond the hype: How it can help you become more customer-focused?

      05
      Effective IT Communications

      Generative AI is here, and it's time to find its best uses – systematically and responsibly.

      06
      Develop a Targeted Flexible Work Program for IT

      Select flexible work options that balance organizational and employee needs to drive engagement and improve attraction and retention.

      07
      Effectively Manage CxO Relations

      Make relationship management a daily habit with a personalized action plan.

      08
      Establish High-Value IT Performance Dashboards and Metrics

      Spend less time struggling with visuals and more time communicating about what matters to your executives.

      Applications

      09
      Build Your Enterprise Application Implementation Playbook

      Your implementation doesn't start with technology but with an effective plan that the team can align on.

      10
      Develop Your Value-First Business Process Automation Strategy

      As you scale your business automations, focus on what matters most.

      11
      Manage Requirements in an Agile Environment

      Agile and requirements management are complementary, not competitors.

      Security

      12
      Assess Your Cybersecurity Insurance Policy

      Adapt to changes in the cyber insurance market.

      13
      Design and Implement a Business-Aligned Security Program

      Focus first on business value.

      Infrastructure & Operations

      14
      Automate IT Asset Data Collection

      Acquire and use discovery tools wisely to populate, update, and validate the data in your ITAM database.

      Industry | Retail

      15
      Leveraging AI to Create Meaningful Insights and Visibility in Retail

      AI prominence across the enterprise value chain.

      Industry | Education

      16
      Understand the Implications of Generative AI in Education

      Bans aren't the answer, but what is?

      Industry | Wholesale

      17
      Wholesale Industry Business Reference Architecture

      Business capability maps, value streams, and strategy maps for the wholesale industry.

      Industry | Retail Banking

      18
      Mainframe Modernization for Retail Banking

      A strategy for modernizing mainframe systems to meet the needs of modern retail banking.

      Industry | Utilities

      19
      Data Analytics Use Cases for Utilities

      Building upon the collective wisdom for the art of the possible.

      Build Your Generative AI Roadmap

      Generative AI is here, and it's time to find its best uses – systematically and responsibly.

      CIO
      Strategy & Governance

      Photo of Bill Wong, Principal Research Director, Info-Tech Research Group.

      Bill Wong
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Build Your Generative AI Roadmap' research.

      Sample of the 'Build Your Generative AI Roadmap' research.

      Logo for Info-Tech.

      CIO Priorities 2023

      Engage cross-functional leadership to seize opportunity while protecting the organization from volatility.

      CIO
      Strategy & Governance

      Photo of Brian Jackson, Principal Research Director, Info-Tech Research Group.

      Brian Jackson
      Principal Research Director

      Download this report or book an analyst call on this topic

      Sample of the 'CIO Priorities 2023' report.

      Sample of the 'CIO Priorities 2023' report.

      Logo for Info-Tech.

      Build an IT Risk Taxonomy

      If integrated risk is your destination, your IT risk taxonomy is the road to get you there.

      CIO
      Strategy & Governance

      Photo of Donna Bales, Principal Research Director, Info-Tech Research Group.

      Donna Bales
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Build an IT Risk Taxonomy' research.

      Sample of the 'Build an IT Risk Taxonomy' research.

      Logo for Info-Tech.

      Navigate the Digital ID Ecosystem to Enhance Customer Experience

      Beyond the hype: How it can help you become more customer-focused?

      CIO
      Strategy & Governance

      Photo of Manish Jain, Principal Research Director, Info-Tech Research Group.

      Manish Jain
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Navigate the Digital ID Ecosystem to Enhance Customer Experience' research.

      Sample of the 'Navigate the Digital ID Ecosystem to Enhance Customer Experience' research.

      Logo for Info-Tech.

      Effective IT Communications

      Empower IT employees to communicate well with any stakeholder across the organization.

      CIO
      People & Leadership

      Photo of Brittany Lutes, Research Director, Info-Tech Research Group.

      Brittany Lutes
      Research Director

      Photo of Diana MacPherson, Senior Research Analyst, Info-Tech Research Group.

      Diana MacPherson
      Senior Research Analyst

      Download this research or book an analyst call on this topic

      Effective IT Communications' research.

      Sample of the 'Effective IT Communications' research.

      Logo for Info-Tech.

      Develop a Targeted Flexible Work Program for IT

      Select flexible work options that balance organizational and employee needs to drive engagement and improve attraction and retention.

      CIO
      People & Leadership

      Photo of Jane Kouptsova, Research Director, Info-Tech Research Group.

      Jane Kouptsova
      Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Develop a Targeted Flexible Work Program for IT' research.

      Sample of the 'Develop a Targeted Flexible Work Program for IT' research.

      Logo for Info-Tech.

      Effectively Manage CxO Relations

      Make relationship management a daily habit with a personalized action plan.

      CIO
      Value & Performance

      Photo of Mike Tweedle, Practice Lead, Info-Tech Research Group.

      Mike Tweedle
      Practice Lead

      Download this research or book an analyst call on this topic

      Sample of the 'Effectively Manage CxO Relations' research.

      Sample of the 'Effectively Manage CxO Relations' research.

      Logo for Info-Tech.

      Establish High-Value IT Performance Dashboards and Metrics

      Spend less time struggling with visuals and more time communicating about what matters to your executives.

      CIO
      Value & Performance

      Photo of Diana MacPherson, Senior Research Analyst, Info-Tech Research Group.

      Diana MacPherson
      Senior Research Analyst

      Download this research or book an analyst call on this topic

      Sample of the 'Establish High-Value IT Performance Dashboards and Metrics' research.

      Sample of the 'Establish High-Value IT Performance Dashboards and Metrics' research.

      Logo for Info-Tech.

      Build Your Enterprise Application Implementation Playbook

      Your implementation doesn't start with technology but with an effective plan that the team can align on.

      Applications
      Business Processes

      Photo of Ricardo de Oliveira, Research Director, Info-Tech Research Group.

      Ricardo de Oliveira
      Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Build Your Enterprise Application Implementation Playbook' research.

      Sample of the 'Build Your Enterprise Application Implementation Playbook' research.

      Logo for Info-Tech.

      Develop Your Value-First Business Process Automation Strategy

      As you scale your business automations, focus on what matters most.

      Applications
      Business Processes

      Photo of Andrew Kum-Seun, Research Director, Info-Tech Research Group.

      Andrew Kum-Seun
      Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Develop Your Value-First Business Process Automation Strategy' research.

      Sample of the 'Develop Your Value-First Business Process Automation Strategy' research.

      Logo for Info-Tech.

      Manage Requirements in an Agile Environment

      Agile and requirements management are complementary, not competitors.

      Applications
      Application Development

      Photo of Vincent Mirabelli, Principal Research Director, Info-Tech Research Group.

      Vincent Mirabelli
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Manage Requirements in an Agile Environment' research.

      Sample of the 'Manage Requirements in an Agile Environment' research.

      Logo for Info-Tech.

      Assess Your Cybersecurity Insurance Policy

      Adapt to changes in the cyber insurance market.

      Security
      Security Risk, Strategy & Governance

      Photo of Logan Rohde, Senior Research Analyst, Info-Tech Research Group.

      Logan Rohde
      Senior Research Analyst

      Download this research or book an analyst call on this topic

      Sample of the 'Assess Your Cybersecurity Insurance Policy' research.

      Sample of the 'Assess Your Cybersecurity Insurance Policy' research.

      Logo for Info-Tech.

      Design and Implement a Business-Aligned Security Program

      Focus first on business value.

      Security
      Security Risk, Strategy & Governance

      Photo of Michel Hébert, Research Director, Info-Tech Research Group.

      Michel Hébert
      Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Design and Implement a Business-Aligned Security Program' research.

      Sample of the 'Design and Implement a Business-Aligned Security Program' research.

      Logo for Info-Tech.

      Automate IT Asset Data Collection

      Acquire and use discovery tools wisely to populate, update, and validate the data in your ITAM database.

      Infrastructure & Operations
      I&O Process Management

      Photo of Andrew Sharp, Research Director, Info-Tech Research Group.

      Andrew Sharp
      Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Automate IT Asset Data Collection' research.

      Sample of the 'Automate IT Asset Data Collection' research.

      Logo for Info-Tech.

      Leveraging AI to Create Meaningful Insights and Visibility in Retail

      AI prominence across the enterprise value chain.

      Industry Coverage
      Retail

      Photo of Rahul Jaiswal, Principal Research Director, Info-Tech Research Group.

      Rahul Jaiswal
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Leveraging AI to Create Meaningful Insights and Visibility in Retail' research.

      Sample of the 'Leveraging AI to Create Meaningful Insights and Visibility in Retail' research.

      Logo for Info-Tech.

      Understand the Implications of Generative AI in Education

      Bans aren't the answer, but what is?

      Industry Coverage
      Education

      Photo of Mark Maby, Research Director, Info-Tech Research Group.

      Mark Maby
      Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Understand the Implications of Generative AI in Education' research.

      Sample of the 'Understand the Implications of Generative AI in Education' research.

      Logo for Info-Tech.

      Wholesale Industry Business Reference Architecture

      Business capability maps, value streams, and strategy maps for the wholesale industry.

      Industry Coverage
      Wholesale

      Photo of Rahul Jaiswal, Principal Research Director, Info-Tech Research Group.

      Rahul Jaiswal
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Wholesale Industry Business Reference Architecture' research.

      Sample of the 'Wholesale Industry Business Reference Architecture' research.

      Logo for Info-Tech.

      Mainframe Modernization for Retail Banking

      A strategy for modernizing mainframe systems to meet the needs of modern retail banking.

      Industry Coverage
      Retail Banking

      Photo of David Tomljenovic, Principal Research Director, Info-Tech Research Group.

      David Tomljenovic
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Mainframe Modernization for Retail Banking' research.

      Sample of the 'Mainframe Modernization for Retail Banking' research.

      Logo for Info-Tech.

      Data Analytics Use Cases for Utilities

      Building upon the collective wisdom for the art of the possible.

      Industry Coverage
      Utilities

      Photo of Jing Wu, Principal Research Director, Info-Tech Research Group.

      Jing Wu
      Principal Research Director

      Download this research or book an analyst call on this topic

      Sample of the 'Data Analytics Use Cases for Utilities' research.

      Sample of the 'Data Analytics Use Cases for Utilities' research.

      Sneak Peaks: Research coming in next quarter!

      “Next quarter we have a big lineup of reports and some great new research!”

      Photo of Gord Harrison, Head of Research & Advisory, Info-Tech Research Group.

      Gord Harrison
      Head of Research & Advisory
      Info-Tech Research Group

      1. Build MLOps and Engineering for AI and ML

        Enabling you to develop your Engineering and ML Operations to support your current & planned use cases for AI and ML.
      2. Leverage Gen AI to Improve Your Test Automation Strategy

        Enabling you to embed Gen AI to assist your team during testing broader than Gen AI compiling code.
      3. Make Your IT Financial Data Accessible, Reliable, and Usable

        This project will provide a recipe for bringing IT's financial data to a usable state through a series of discovery, standardization, and policy-setting actions.
      4. Implement Integrated AI Governance

        Enabling you to implement best-practice governance principles when implementing Gen AI.
      5. Develop Exponential IT Capabilities

        Enabling you to understand and develop your strategic Exponential IT capabilities.
      6. Build Your AI Strategy and Roadmap

        This project will provide step-by-step guidance in development of your AI strategy with an AI strategy exemplar.
      7. Priorities for Data Leaders in 2024 and Beyond

        This report will detail the top five challenges expected in the upcoming year and how you as the CDAO can tackle them.
      8. Deploy AIOps More Effectively

        This research is designed to assess the process maturity of your IT operations and help identify pain pains and opportunities for AI deployment within your IT operations.
      9. Design Your Edge Computing Architecture

        This research will provide deployment guidelines and roadmap to address your edge computing needs.
      10. Manage Change in the AI-Enabled Enterprise

        Managing change is complex with the disruptive nature of emerging tech like AI. This research will assist you from an organizational change perspective.
      11. Assess the Security and Privacy Impacts of Your AI Vendors

        This research will allow you to enhance transparency, improve risk management, and ensure the security and privacy of data when working with AI vendors.
      12. Prepare Your Board for AI Disruption

        This research will arm you with tools to educate your board on the impact of Gen AI, addressing the potential risks and the potential benefits.

      Info-Tech Research Leadership Team

      “We have a world-class team of experts focused on providing practical, cutting-edge IT research and advice.”

      Photo of Gord Harrison, Head of Research & Advisory, Info-Tech Research Group.

      Gord Harrison
      Head of Research & Advisory
      Info-Tech Research Group

      Photo of Jack Hakimian, Senior Vice President, Research Development, Info-Tech Research Group.

      Jack Hakimian
      Senior Vice President
      Research Development

      Photo of Aaron Shum, Vice President, Security & Privacy Research, Info-Tech Research Group.

      Aaron Shum
      Vice President
      Security & Privacy Research

      Photo of Larry Fretz, Vice President, Industry Research, Info-Tech Research Group.

      Larry Fretz
      Vice President
      Industry Research

      Photo of Mark Tauschek, Vice President, Research Fellowships, Info-Tech Research Group.

      Mark Tauschek
      Vice President
      Research Fellowships

      Photo of Tom Zehren, Chief Product Officer, Info-Tech Research Group.

      Tom Zehren
      Chief Product Officer

      Photo of Rick Pittman, Vice President, Advisory Quality & Delivery, Info-Tech Research Group.

      Rick Pittman
      Vice President
      Advisory Quality & Delivery

      Photo of Nora Fisher, Vice President, Shared Services, Info-Tech Research Group.

      Nora Fisher
      Vice President
      Shared Services

      Photo of Becca Mackey, Vice President, Workshops, Info-Tech Research Group.

      Becca Mackey
      Vice President
      Workshops

      Photo of Geoff Nielson, Senior Vice President, Global Services & Delivery, Info-Tech Research Group.

      Geoff Nielson
      Senior Vice President
      Global Services & Delivery

      Photo of Brett Rugroden, Senior Vice President, Global Market Programs, Info-Tech Research Group.

      Brett Rugroden
      Senior Vice President
      Global Market Programs

      Photo of Hannes Scheidegger, Senior Vice President, Global Public Sector, Info-Tech Research Group.

      Hannes Scheidegger
      Senior Vice President
      Global Public Sector

      About Info-Tech Research Group

      Info-Tech Research Group produces unbiased and highly relevant research to help leaders make strategic, timely, and well-informed decisions. We partner closely with your teams to provide everything they need, from actionable tools to analyst guidance, ensuring they deliver measurable results for the organization.

      Sample of the IT Management & Governance Framework.

      Drive Measurable Results

      Our world-class leadership team is continually focused on building disruptive research and products that drive measurable results and save money.

      Info-Tech logo.

      Better Research Than Anyone

      Our team of experts is composed of the optimal mix of former CIOs, CISOs, PMOs, and other IT leaders and IT and management consultants as well as academic researchers and statisticians.

      Dramatically Outperform Your Peers

      Leverage Industry Best Practices

      We enable over 30,000 members to share their insights and best practices that you can use by having direct access to over 100 analysts as an extension of your team.

      Become an Info-Tech influencer:

      • Help shape our research by talking with our analysts.
      • Discuss the challenges, insights, and opportunities in your chosen areas.
      • Suggest new topic ideas for upcoming research cycles.

      Contact
      Jack Hakimian
      jhakimian@infotech.com

      We interview hundreds of experts and practitioners to help ensure our research is practical and focused on key member challenges.

      Why participate in expert interviews?

      • Discuss market trends and stay up to date.
      • Influence Info-Tech's research direction with your practical experience.
      • Preview our analysts' perspectives and preliminary research.
      • Build on your reputation as a thought leader and research contributor.
      • See your topic idea transformed into practical research.

      Thank you!

      Join us at our webinars to discuss more topics.

      For information on Info-Tech's products and services and to participate in our research process, please contact:

      Jack Hakimian
      jhakimian@infotech.com

      Take Action on Service Desk Customer Feedback

      • Buy Link or Shortcode: {j2store}494|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $27,500 Average $ Saved
      • member rating average days saved: 110 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • IT leaders lack information to help inform and prioritize where improvements are most needed.
      • The service desk relies only on traditional metrics such as time to respond or percentage of SLAs met, but no measures of customer satisfaction with the service they receive.
      • There are signs of dissatisfied users, but no mechanism in place to formally capture those perceptions in order to address them.
      • Even if transactional (ticket) surveys are in use, often nothing is done with the data collected or there is a low response rate, and no broader satisfaction survey is in place.

      Our Advice

      Critical Insight

      • If customer satisfaction is not being measured, it’s often because service desk leaders don’t know how to design customer satisfaction surveys, don’t have a mechanism in place to collect feedback, or lack the resources to take accountability for a customer feedback program.
      • If customer satisfaction surveys are in place, it can be difficult to get full value out of them if there is a low response rate due to poor survey design or administration, or if leadership doesn’t understand the value of / know how to analyze the data.
      • It can actually be worse to ask your customers for feedback and do nothing with it than not asking for feedback at all. Customers may end up more dissatisfied if they take the time to provide value then see nothing done with it.

      Impact and Result

      • Understand how to ask the right questions to avoid survey fatigue.
      • Design and implement two complementary satisfaction surveys: a transactional survey to capture satisfaction with individual ticket experiences and inform immediate improvements, and a relationship survey to capture broader satisfaction among the entire user base and inform longer-term improvements.
      • Build a plan and assign accountability for customer feedback management, including analyzing feedback, prioritizing customer satisfaction insights and using them to improve performance, and communicating the results back to your users and stakeholders.

      Take Action on Service Desk Customer Feedback Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Take Action on Service Desk Customer Feedback Deck – A step-by-step document that walks you through how to measure customer satisfaction, design and implement transactional and relationship surveys, and analyze and act on user feedback.

      Whether you have no Service Desk customer feedback program in place or you need to improve your existing process for gathering and responding to feedback, this deck will help you design your surveys and act on their results to improve CSAT scores.

      • Take Action on Service Desk Customer Feedback Storyboard

      2. Transactional Service Desk Survey Template – A template to design a ticket satisfaction survey.

      This template provides a sample transactional (ticket) satisfaction survey. If your ITSM tool or other survey mechanism allows you to design or write your own survey, use this template as a starting point.

      • Transactional Service Desk Survey Template

      3. Sample Size Calculator – A tool to calculate the sample size needed for your survey.

      Use the Sample Size Calculator to calculate your ideal sample size for your relationship surveys.

    • Desired confidence level
    • Acceptable margin of error
    • Company population size
    • Ideal sample size
      • Sample Size Calculator

      4. End-User Satisfaction Survey Review Workflows – Visio templates to map your review process for both transactional and relationship surveys

      This template will help you map out the step-by-step process to review collected feedback from your end-user satisfaction surveys, analyze the data, and act on it.

      • End-User Satisfaction Survey Review Workflows

      Infographic

      Further reading

      Take Action on Service Desk Customer Feedback

      Drive up CSAT scores by asking the right questions and effectively responding to user feedback.

      EXECUTIVE BRIEF

      Analyst Perspective

      Collecting feedback is only half the equation.

      The image contains a picture of Natalie Sansone.

      Natalie Sansone, PhD


      Research Director, Infrastructure & Operations

      Info-Tech Research Group

      Often when we ask service desk leaders where they need to improve and if they’re measuring customer satisfaction, they either aren’t measuring it at all, or their ticket surveys are turned on but they get very few responses (or only positive responses). They fail to see the value of collecting feedback when this is their experience with it.

      Feedback is important because traditional service desk metrics can only tell us so much. We often see what’s called the “watermelon effect”: metrics appear “green”, but under the surface they’re “red” because customers are in fact dissatisfied for reasons unmeasured by standard internal IT metrics. Customer satisfaction should always be the goal of service delivery, and directly measuring satisfaction in addition to traditional metrics will help you get a clearer picture of your strengths and weaknesses, and where to prioritize improvements.

      It’s not as simple as asking customers if they were satisfied with their ticket, however. There are two steps necessary for success. The first is collecting feedback, which should be done purposefully, with clear goals in mind in order to maximize the response rate and value of responses received. The second – and most critical – is acting on that feedback. Use it to inform improvements and communicate those improvements. Doing so will not only make your service desk better, increasing satisfaction through better service delivery, but also will make your customers feel heard and valued, which alone increases satisfaction.

      The image contains a picture of Emily Sugerman.

      Emily Sugerman, PhD


      Research Analyst, Infrastructure & Operations

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      • The service desk relies only on traditional metrics such as time to respond, or percentage of SLAs met, but not on measures of customer satisfaction with the service they receive.
      • There are signs of dissatisfied users (e.g. shadow IT, users avoid the service desk, go only to their favorite technician) but no mechanism in place to formally capture those perceptions.
      • Transactional ticket surveys were turned on when the ITSM tool was implemented, but either nobody responds to them, or nobody does anything with the data received.
      • IT leaders lack information to help inform and prioritize where improvements are most needed.
      • Service desk leaders don’t know how to design survey questions to ask their users for feedback and/or they don’t have a mechanism in place to survey users.
      • If customer satisfaction surveys are in place, nothing is done with the results because service desk leaders either don’t understand the value of analyzing the data or don’t know how to analyze the data.
      • Executives only want a single satisfaction number to track and don’t understand the value of collecting more detailed feedback.
      • IT lacks the resources to take accountability for the feedback program, or existing resources don’t have time to do anything with the feedback they receive.
      • Understand how to ask the right questions to avoid survey fatigue (where users get overwhelmed and stop responding).
      • Design and implement a transactional survey to capture satisfaction with individual ticket experiences and use the results to inform immediate improvements.
      • Design and implement a relationship survey to capture broader satisfaction among the entire user base and use the results to inform longer-term improvements.
      • Build a plan and assign accountability for analyzing feedback, using it to prioritize and make actionable improvements to address feedback, and communicating the results back to your users and stakeholders.

      Info-Tech Insight

      Asking your customers for feedback then doing nothing with it is worse than not asking for feedback at all. Your customers may end up more dissatisfied than they were before, if their opinion is sought out and then ignored. It’s valuable to collect feedback, but the true value for both IT and its customers comes from acting on that feedback and communicating those actions back to your users.

      Traditional service desk metrics can be misleading

      The watermelon effect

      When a service desk appears to hit all its targets according to the metrics it tracks, but service delivery is poor and customer satisfaction is low, this is known as the “watermelon effect”. Service metrics appear green on the outside, but under the surface (unmeasured), they’re red because customers are dissatisfied.

      Traditional SLAs and service desk metrics (such as time to respond, average resolution time, percentage of SLAs met) can help you understand service desk performance internally to prioritize your work and identify process improvements. However, they don’t tell you how customers perceive the service or how satisfied they are.

      Providing good service to your customers should be your end goal. Failing to measure, monitor, and act on customer feedback means you don’t have the whole picture of how your service desk is performing and whether or where improvements are needed to maximize satisfaction.

      There is a shift in ITSM to focus more on customer experience metrics over traditional ones

      The Service Desk Institute (SDI) suggests that customer satisfaction is the most important indicator of service desk success, and that traditional metrics around SLA targets – currently the most common way to measure service desk performance – may become less valuable or even obsolete in the future as customer experience-focused targets become more popular. (Service Desk Institute, 2021)

      SDI conducted a Customer Experience survey of service desk professionals from a range of organizations, both public and private, from January to March 2018. The majority of respondents said that customer experience is more important than other metrics such as speed of service or adherence to SLAs, and that customer satisfaction is more valuable than traditional metrics. (SDI, 2018).

      The image contains a screenshot of two pie graphs. The graph on the left is labelled: which of these is most important to your service desk? Customer experience is first with 54%. The graph on the right is labelled: Which measures do you find more value in? Customer satisfaction is first with 65%.

      However, many service desk leaders aren’t effectively measuring customer feedback

      Not only is it important to measure customer experience and satisfaction levels, but it’s equally important to act on that data and feed it into a service improvement program. However, many IT leaders are neglecting either one or both of those components.

      Obstacles to collecting feedback

      Obstacles to acting on collected feedback

      • Don’t understand the value of measuring customer feedback.
      • Don’t have a good mechanism in place to collect feedback.
      • Don’t think that users would respond to a survey (either generally unresponsive or already inundated with surveys).
      • Worried that results would be negative or misleading.
      • Don’t know what questions to ask or how to design a survey.
      • Don’t understand the importance of analyzing and acting on feedback collected.
      • Don’t know how to analyze survey data.
      • Lack of resources to take accountability over customer feedback (including analyzing data, monitoring trends, communicating results).
      • Executives or stakeholders only want a satisfaction score.

      A strong customer feedback program brings many benefits to IT and the business

      Insight into customer experience

      Gather insight into both the overall customer relationship with the service desk and individual transactions to get a holistic picture of the customer experience.

      Data to inform decisions

      Collect data to inform decisions about where to spend limited resources or time on improvement, rather than guessing or wasting effort on the wrong thing.

      Identification of areas for improvement

      Better understand your strengths and weaknesses from the customer’s point of view to help you identify gaps and priorities for improvement.

      Customers feel valued

      Make customers feel heard and valued; this will improve your relationship and their satisfaction.

      Ability to monitor trends over time

      Use the same annual relationship survey to be able to monitor trends and progress in making improvements by comparing data year over year.

      Foresight to prevent problems from occurring

      Understand where potential problems may occur so you can address and prevent them, or who is at risk of becoming a detractor so you can repair the relationship.

      IT staff coaching and engagement opportunities

      Turn negative survey feedback into coaching and improvement opportunities and use positive feedback to boost morale and engagement.

      Take Action on Service Desk Customer Feedback

      The image contains a screenshot of a Thought Model titled: Take Action on Service Desk Customer Feedback.

      Info-Tech’s methodology for measuring and acting on service desk customer feedback

      Phase

      1. Understand how to measure customer satisfaction

      2. Design and implement transactional surveys

      3. Design and implement relationship surveys

      4. Analyze and act on feedback

      Phase outcomes

      Understand the main types of customer satisfaction surveys, principles for survey design, and best practices for surveying your users.

      Learn why and how to design a simple survey to assess satisfaction with individual service desk transactions (tickets) and a methodology for survey delivery that will improve response rates.

      Understand why and how to design a survey to assess overall satisfaction with the service desk across your organization, or use Info-Tech’s diagnostic.

      Measure and analyze the results of both surveys and build a plan to act on both positive and negative feedback and communicate the results with the organization.

      Insight Summary

      Key Insight:

      Asking your customers for feedback then doing nothing with it is worse than not asking for feedback at all. Your customers may end up more dissatisfied than they were before if they’re asked for their opinion then see nothing done with it. It’s valuable to collect feedback, but the true value for both IT and its customers comes from acting on that feedback and communicating those actions back to your users.

      Additional insights:

      Insight 1

      Take the time to define the goals of your transactional survey program before launching it – it’s not as simple as just deploying the default survey of your ITSM tool out of the box. The objectives of the survey – including whether you want to keep a pulse on average satisfaction or immediately act on any negative experiences – will influence a range of key decisions about the survey configuration.

      Insight 2

      While transactional surveys provide useful indicators of customer satisfaction with specific tickets and interactions, they tend to have low response rates and can leave out many users who may rarely or never contact the service desk, but still have helpful feedback. Include a relationship survey in your customer feedback program to capture a more holistic picture of what your overall user base thinks about the service desk and where you most need to improve.

      Insight 3

      Satisfaction scores provide valuable data about how your customers feel, but don’t tell you why they feel that way. Don’t neglect the qualitative data you can gather from open-ended comments and questions in both types of satisfaction surveys. Take the time to read through these responses and categorize them in at least a basic way to gain deeper insight and determine where to prioritize your efforts.

      Understand how to measure customer satisfaction

      Phase 1

      Understand the main types of customer satisfaction surveys, principles for survey design, and best practices for surveying your users.

      Phase 1:

      Phase 2:

      Phase 3:

      Phase 4:

      Understand how to measure customer satisfaction

      Design and implement transactional surveys

      Design and implement relationship surveys

      Analyze and act on feedback

      Three methods of surveying your customers

      Transactional

      Relationship

      One-off

      Also known as

      Ticket surveys, incident follow-up surveys, on-going surveys

      Annual, semi-annual, periodic, comprehensive, relational

      One-time, single, targeted

      Definition

      • Survey that is tied to a specific customer interaction with the service desk (i.e. a ticket).
      • Assesses how satisfied customers are with how the ticket was handled and resolved.
      • Sent immediately after ticket is closed.
      • Short – usually 1 to 3 questions.
      • Survey that is sent periodically (i.e. semi-annually or annually) to the entire customer base to measure overall relationship with the service desk.
      • Assesses customer satisfaction with their overall service experience over a longer time period.
      • Longer – around 15-20 questions.
      • One-time survey sent at a specific, targeted point in time to either all customers or a subset.
      • Often event-driven or project-related.
      • Assesses satisfaction at one time point, or about a specific change that was implemented, or to inform a specific initiative that will be implemented.

      Pros and cons of the three methods

      Transactional

      Relationship

      One-off

      Pros

      • Immediate feedback
      • Actionable insights to immediately improve service or experience
      • Feeds into team coaching
      • Multiple touchpoints allow for trending and monitoring
      • Comprehensive insight from broad user base to improve overall satisfaction
      • Reach users who don’t contact the service desk often or respond to ticket surveys
      • Identify unhappy customers and reasons for dissatisfaction
      • Monitor broader trends over time
      • Targeted insights to measure the impact of a specific change or perception at a specific point of time

      Cons

      • Customer may become frustrated being asked to fill out too many surveys
      • Can lead to survey fatigue and low response rates
      • Tend to only see responses for very positive or negative experiences
      • High volume of data to analyze
      • Feedback is at a high-level
      • Covers the entire customer journey, not a specific interaction
      • Users may not remember past interactions accurately
      • A lot of detailed data to analyze and more difficult to turn into immediate action
      • Not as valuable without multiple surveys to see trends or change

      Which survey method should you choose?

      Only relying on one type of survey will leave gaps in your understanding of customer satisfaction. Include both transactional and relationship surveys to provide a holistic picture of customer satisfaction with the service desk.

      If you can only start with one type, choose the type that best aligns with your goals and priorities:

      If your priority is to identify larger improvement initiatives the service desk can take to improve overall customer satisfaction and trust in the service desk:

      If your priority is to provide customers with the opportunity to let you know when transactions do not go well so you can take immediate action to make improvements:

      Start with a relationship survey

      Start with a transactional survey

      The image contains a screenshot of a bar graph on SDI's 2018 Customer Experience in ITSM report.

      Info-Tech Insight

      One-off surveys can be useful to assess whether a specific change has impacted satisfaction, or to inform a planned change/initiative. However, as they aren’t typically part of an on-going customer feedback program, the focus of this research will be on transactional and relationship surveys.

      3 common customer satisfaction measures

      The three most utilized measures of customer satisfaction include CSAT, CES, and NPS.

      CSAT CES NPS
      Name Customer Satisfaction Customer Effort Score Net Promoter score
      What it measures Customer happiness Customer effort Customer loyalty
      Description Measures satisfaction with a company overall, or a specific offering or interaction Measures how much effort a customer feels they need to put forth in order to accomplish what they wanted Single question that asks consumers how likely they are to recommend your product, service, or company to other people
      Survey question How satisfied are/were you with [company/service/interaction/product]? How easy was it to [solve your problem/interact with company/handle my issue]? Or: The [company] made it easy for me to handle my issue How likely are you to recommend [company/service/product] to a friend?
      Scale 5, 7, or 10 pt scale, or using images/emojis 5, 7, or 10 pt scale 10-pt scale from highly unlikely to highly likely
      Scoring Result is usually expressed as a percentage of satisfaction Result usually expressed as an average Responses are divided into 3 groups where 0-6 are detractors, 7-8 are passives, 9-10 are promoters
      Pros
      • Well-suited for specific transactions
      • Simple and able to compare scores
      • Simple number, easy to analyze
      • Effort tends to predict future behavior
      • Actionable data
      • Simple to run and analyze
      • Widely used and can compare to other organizations
      • Allows for targeting customer segments
      Cons
      • Need high response rate to have representative numberEasy to ask the wrong questions
      • Not as useful without qualitative questions
      • Only measures a small aspect of the interaction
      • Only useful for transactions
      • Not useful for improvement without qualitative follow-up questions
      • Not as applicable to a service desk as it measures brand loyalty

      When to use each satisfaction measure

      The image contains a screenshot of a diagram that demonstrates which measure to use based off of what you would like to access, and which surveys it aligns with.

      How to choose which measure(s) to incorporate in your surveys

      The best measures are the ones that align with your specific goals for collecting feedback.

      • Most companies will use multiple satisfaction measures. For example, NPS can be tracked to monitor the overall customer sentiment, and CSAT used for more targeted feedback.
      • For internal-facing IT departments, CSAT is the most popular of the three methods, and NPS may not be as useful.
      • Choose your measure and survey types based on what you are trying to achieve and what kind of information you need to make improvements.
      • Remember that one measure alone isn’t going to give you actionable feedback; you’ll need to follow up with additional measures (especially for NPS and CES).
      • For CSAT surveys, customize the satisfaction measures in as many ways as you need to target the questions toward the areas you’re most interested in.
      • Don’t stick to just these three measures or types of surveys – there are other ways to collect feedback. Experiment to find what works for you.
      • If you’re designing your own survey, keep in mind the principles on the next slide.

      Info-Tech Insight

      While we focus mainly on traditional survey-based approaches to measuring customer satisfaction in this blueprint, there’s no need to limit yourselves to surveys as your only method. Consider multiple techniques to capture a wider audience, including:

      • Customer journey mapping
      • Focus groups with stakeholders
      • Lunch and learns or workshop sessions
      • Interviews – phone, chat, in-person
      • Kiosks

      Principles for survey design

      As you design your satisfaction survey – whether transactional or relational – follow these guidelines to ensure the survey delivers value and gets responses.

      1. Focus on your goal
      2. Don’t include unnecessary questions that won’t give you actionable information; it will only waste respondents’ time.

      3. Be brief
      4. Keep each question as short as possible and limit the total number of survey questions to avoid survey fatigue.

      5. Include open-ended questions
      6. Most of your measures will be close-ended, but include at least one comment box to allow for qualitative feedback.

      7. Keep questions clear and concise
      8. Ensure that question wording is clear and specific so that all respondents interpret it the same way.

      9. Avoid biased or leading questions
      10. You won’t get accurate results if your question leads respondents into thinking or answering a certain way.

      11. Avoid double-barreled questions
      12. Don’t ask about two different things in the same question – it will confuse respondents and make your data hard to interpret.

      13. Don’t restrict responses
      14. Response options should include all possible opinions (including “don’t know”) to avoid frustrating respondents.

      15. Make the survey easy to complete
      16. Pre-populate information where possible (e.g. name, department) and ensure the survey is responsive on mobile devices.

      17. Keep questions optional
      18. If every question is mandatory, respondents may leave the survey altogether if they can’t or don’t want to answer one question.

      19. Test your survey
      20. Test your survey with your target audience before launching, and incorporate feedback - they may catch issues you didn’t notice.

      Prevent survey fatigue to increase response rates

      If it takes too much time or effort to complete your survey – whether transactional or relational – your respondents won’t bother. Balance your need to collect relevant data with users’ needs for a simple and worthwhile task in order to get the most value out of your surveys.

      There are two types of survey fatigue:

      1. Survey response fatigue
      2. Occurs when users are overwhelmed by too many requests for feedback and stop responding.

      3. Survey taking fatigue
      4. Occurs when the survey is too long or irrelevant to users, so they grow tired and abandon the survey.

      Fight survey fatigue:

      • Make it as easy as possible to answer your survey:
        • Keep the survey as short as possible.
        • For transactional surveys, allow respondents to answer directly from email without having to click a separate link if possible.
        • Don’t make all questions mandatory or users may abandon it if they get to a difficult or unapplicable question.
        • Test the survey experience across devices for mobile users.
      • Communicate the survey’s value so users will be more likely to donate their time.
      • Act on feedback: follow up on both positive and negative responses so users see the value in responding.
      • Consider attaching an incentive to responding (e.g. name entered in a monthly draw).

      Design and implement transactional surveys

      Phase 2

      Learn why and how to design a simple survey to assess satisfaction with individual service desk transactions (tickets) and a methodology for survey delivery that will improve response rates.

      Phase 1:

      Phase 2:

      Phase 3:

      Phase 4:

      Understand how to measure customer satisfaction

      Design and implement transactional surveys

      Design and implement relationship surveys

      Analyze and act on feedback

      Use transactional surveys to collect immediate and actionable feedback

      Recall the definition of a transactional survey:

      • Survey that is tied to a specific customer interaction with the service desk (i.e. a ticket).
      • Assesses how satisfied customers are with how the ticket was handled and resolved.
      • Sent immediately after ticket is closed.
      • Short – usually 1 to 3 questions.

      Info-Tech Insight

      While feedback on transactional surveys is specific to a single transaction, even one negative experience can impact the overall perception of the service desk. Pair your transactional surveys with an annual relationship survey to capture broader sentiment toward the service desk.

      Transactional surveys serve several purposes:

      • Gives end users a mechanism to provide feedback when they want to.
      • Provides continual insight into customer satisfaction throughout the year to monitor for trends or issues in between broader surveys.
      • Provides IT leaders with actionable insights into areas for improvement in their processes, knowledge and skills, or customer service.
      • Gives the service desk the opportunity to address any negative experiences or perceptions with customers, to repair the relationship.
      • Feeds into individual or team coaching for service desk staff.

      Make key decisions ahead of launching your transactional surveys

      If you want to get the most of your surveys, you need to do more than just click a button to enable out-of-the-box surveys through your ITSM tool. Make these decisions ahead of time:

      Decision Considerations For more guidance, see
      What are the goals of your survey? Are you hoping to get an accurate pulse of customer sentiment (if so, you may want to randomly send surveys) or give customers the ability to provide feedback any time they have some (if so, send a survey after every ticket)? Slide 25
      How many questions will you ask? Keep the survey as short as possible – ideally only one mandatory question. Slide 26
      What questions will you ask? Do you want a measure of NPS, CES, or CSAT? Do you want to measure overall satisfaction with the interaction or something more specific about the interaction? Slide 27
      What will be the response options/scale? Keep it simple and think about how you will use the data after. Slide 28
      How often will you send the survey? Will it be sent after every ticket, every third ticket, or randomly to a select percentage of tickets, etc.? Slide 29
      What conditions would apply? For example, is there a subset of users who you never want to receive a survey or who you always want to receive a survey? Slide 30
      What mechanism/tool will you use to send the survey? Will your ITSM tool allow you to make all the configurations you need, or will you need to use a separate survey tool? If so, can it integrate to your ITSM solution? Slide 30

      Key decisions, continued

      Decision Considerations For more guidance, see
      What will trigger the survey? Typically, marking the ticket as either ‘resolved’ or ‘closed’ will trigger the survey. Slide 31
      How long after the ticket is closed will you send the survey? You’ll want to leave enough time for the user to respond if the ticket wasn’t resolved properly before completing a survey, but not so much time that they don’t remember the ticket. Slide 31
      Will the survey be sent in a separate email or as part of the ticket resolution email? A separate email might feel like too many emails for the user, but a link within the ticket closure email may be less noticeable. Slide 32
      Will the survey be embedded in email or accessed through a link? If the survey can be embedded into the email, users will be more likely to respond. Slide 32
      How long will the survey link remain active, and will you send any reminders? Leave enough time for the user to respond if they are busy or away, but not so much time that the data would be irrelevant. Balance the need to remind busy end users with the possibility of overwhelming them with survey fatigue. Slide 32
      What other text will be in the main body of the survey email and/or thank you page? Keep messaging short and straightforward and remind users of the benefit to them. Slide 33
      Where will completed surveys be sent/who will have access? Will the technician assigned to the ticket have access or only the manager? What email address/DL will surveys be sent to? Slide 33

      Define the goals of your transactional survey program

      Every survey should have a goal in mind to ensure only relevant and useful data is collected.

      • Your survey program must be backed by clear and actionable goals that will inform all decisions about the survey.
      • Survey questions should be structured around that goal, with every question serving a distinct purpose.
      • If you don’t have a clear plan for how you will action the data from a particular question, exclude it.
      • Don’t run a survey just for the sake of it; wait until you have a clear plan. If customers respond and then see nothing is done with the data, they will learn to avoid your surveys.

      Your survey objectives will also determine how often to send the survey:

      If your objective is:

      Keep a continual pulse on average customer satisfaction

      Gain the opportunity to act on negative feedback for any poor experience

      Then:

      Send survey randomly

      Send survey after every ticket

      Rationale:

      Sending a survey less often will help avoid survey fatigue and increase the chances of users responding whether they have good, bad, or neutral feedback

      Always having a survey available means users can provide feedback every time they want to, including for any poor experience – giving you the chance to act on it.

      Info-Tech Insight

      Service Managers often get caught up in running a transactional survey program because they think it’s standard practice, or they need to report a satisfaction metric. If that’s your only objective, you will fail to derive value from the data and will only turn customers away from responding.

      Design survey content and length

      As you design your survey, keep in mind the following principles:

      1. Keep it short. Your customers won’t bother responding if they see a survey with multiple questions or long questions that require a lot of reading, effort, or time.
      2. Make it simple. This not only makes it easier for your customers to complete, but easier for you to track and monitor.
      3. Tie your survey to your goals. Remember that every question should have a clear and actionable purpose.
      4. Don’t measure anything you can’t control. If you won’t be able to make changes based on the feedback, there’s no value asking about it.
      5. Include an (optional) open-ended question. This will allow customers to provide more detailed feedback or suggestions.

      Q: How many questions should the survey contain?

      A: Ideally, your survey will have only one mandatory question that captures overall satisfaction with the interaction.

      This question can be followed up with an optional open-ended question prompting the respondent for more details. This will provide a lot more context to the overall rating.

      If there are additional questions you need to ask based on your goals, clearly make these questions optional so they don’t deter respondents from completing the survey. For example, they can appear only after the respondent has submitted their overall satisfaction response (i.e. on a separate, thank you page).

      Additional (optional) measures may include:

      • Customer effort score (how easy or difficult was it to get your issue resolved?)
      • Customer service skills of the service desk
      • Technical skills/knowledge of the agents
      • Speed or response or resolution

      Design question wording

      Tips for writing survey questions:

      • Be clear and concise
      • Keep questions as short as possible
      • Cut out any unnecessary words or phrasing
      • Avoid biasing, or leading respondents to select a certain answer
      • Don’t attempt to measure multiple constructs in a single question.

      Sample question wording:

      How satisfied are you with this support experience?

      How would you rate your support experience?

      Please rate your overall satisfaction with the way your issue was handled.

      Instead of this….

      Ask this….

      “We strive to provide excellent service with every interaction. Please rate how satisfied you are with this interaction.”

      “How satisfied were you with this interaction?”

      “How satisfied were you with the customer service skills, knowledge, and responsiveness of the technicians?”

      Choose only one to ask about.

      “How much do you agree that the service you received was excellent?”

      “Please rate the service you received.”

      “On a scale of 1-10, thinking about your most recent experience, how satisfied would you say that you were overall with the way that your ticket was resolved?”

      “How satisfied were you with your ticket resolution?”

      Choose response options

      Once you’ve written your survey question, you need to design the response options for the question. Put careful thought into balancing ease of responding for the user with what will give you the actionable data you need to meet your goals. Keep the following in mind:

      When planning your response options, remember to keep the survey as easy to respond to as possible – this means allowing a one-click response and a scale that’s intuitive and simple to interpret.

      Think about how you will use the responses and interpret the data. If you choose a 10-point scale, for example, what would you classify as a negative vs positive response? Would a 5-point scale suffice to get the same data?

      Again, use your goals to inform your response options. If you need a satisfaction metric, you may need a numerical scale. If your goal is just to capture negative responses, you may only need two response options: good vs bad.

      Common response options:

      • Numerical scale (e.g. very dissatisfied to very satisfied on a 5-point scale)
      • Star rating (E.g. rate the experience out of 5 stars)
      • Smiley face scale
      • 2 response options: Good vs Bad (or Satisfied vs Dissatisfied)

      Investigate the capabilities of your ITSM tool. It may only allow one built-in response option style. But if you have the choice, choose the simplest option that aligns with your goals.

      Decide how often to send surveys

      There are two common choices for when to send ticket satisfaction surveys:

      After random tickets

      After every ticket

      Pros

      • May increase response rate by avoiding survey fatigue.
      • May be more likely to capture a range of responses that more accurately reflect sentiment (versus only negative).
      • Gives you the opportunity to receive feedback whenever users have it.
      • If your goal is to act on negative feedback whenever it arises, that’s only possible if you send a survey after every ticket.

      Cons

      • Overrepresents frequent service desk users and underrepresents infrequent users.
      • Users who have feedback to give may not get the chance to give it/service desk can’t act on it.
      • Customers who frequently contact the service desk will be overwhelmed by surveys and may stop responding.
      • Customers may only reply if they have very negative or positive feedback.

      SDI’s 2018 Customer Experience in ITSM survey of service desk professionals found:

      Almost two-thirds (65%) send surveys after every ticket.

      One-third (33%) send surveys after randomly selected tickets are closed.

      Info-Tech Recommendation:

      Send a survey after every ticket so that anyone who has feedback gets the opportunity to provide it – and you always get the chance to act on negative feedback. But, limit how often any one customer receives a ticket to avoid over-surveying them – restrict to anywhere between one survey a week to one per month per customer.

      Plan detailed survey logistics

      Decision #1

      Decision #2

      What tool will you use to deliver the survey?

      What (if any) conditions apply to your survey?

      Considerations

      • How much configuration does your ITSM tool allow? Will it allow you to configure the survey according to your decisions? Many ITSM tools, especially mid-market, do not allow you to change the response options or how often the survey is sent.
      • How does the survey look and act on mobile devices? If a customer receives the survey on their phone, they need to be able to easily respond from there or they won’t bother at all.
      • If you wish to use a different survey tool, does it integrate with your ITSM solution? Would agents have to manually send the survey? If so, how would they choose who to send the survey to, and when?

      Considerations

      Is there a subset of users who you never want to receive a survey (e.g. a specific department, location, role, or title)?

      Is there a subset of users who you always want to receive a survey, no matter how often they contact the service desk (e.g. VIP users, a department that scored low on the annual satisfaction survey, etc.)?

      Are there certain times of the year that you don’t want surveys to go out (e.g. fiscal year end, holidays)?

      Are there times of the day that you don’t want surveys to be sent (e.g. only during business hours; not at the end of the day)?

      Recommendations

      The built-in functionality of your ITSM tool’s surveys will be easiest to send and track; use it if possible. However, if your tool’s survey module is limited and won’t give you the value you need, consider a third-party solution or survey tool that integrates with your ITSM solution and won’t require significant manual effort to send or review the surveys.

      Recommendations

      If your survey module allows you to apply conditions, think about whether any are necessary to apply to either maximize your response rate (e.g. don’t send a survey on a holiday), avoid annoying certain users, or seek extra feedback from dissatisfied users.

      Plan detailed survey logistics

      Decision #2

      Decision #1

      What will trigger the survey?

      When will the survey be sent?

      Considerations

      • Usually a change of ticket status triggers the survey, but you may have the option to send it after the ticket is marked ‘resolved’ or ‘closed’. The risk of sending the survey after the ticket is ‘resolved’ is the issue may not actually be resolved yet, but waiting until it’s ‘closed’ means the user may be less likely to respond as more time has passed.
      • Some tools allow for a survey to be sent after every agent reply.
      • Some have the option to manually generate a survey, which may be useful in some cases; those cases would need to be well defined.

      Considerations

      • Once you’ve decided the trigger for the survey, decide how much time should pass after that trigger before the survey is sent.
      • The amount of time you choose will be highly dependent on the trigger you choose. For example, if you want the ‘resolved’ status to send a survey, you may want to wait 24h to send the survey in case the user responds that their issue hasn’t been properly resolved.
      • If you choose ‘closed’ as your trigger, you may want the survey to be sent immediately, as waiting any longer could further reduce the response rate.
      • Your average resolution time may also impact the survey wait time.

      Recommendations

      Only send the survey once you’re sure the issue has actually been resolved; you could further upset the customer if you ask them how happy they are with the resolution if resolution wasn’t achieved. This means sending the survey once the user confirms resolution (which closes ticket) or the agent closes the ticket.

      Recommendations

      If you are sending the survey upon ticket status moving to ‘resolved’, wait at least 24 hours before sending the survey in case the user responds that their issue wasn’t actually resolved. However, if you are sending the survey after the ticket has been verified resolved and closed, you can send the survey immediately while the experience is still fresh in their memory.

      Plan detailed survey logistics

      Decision #1

      Decision #2

      How will the survey appear in email?

      How long will the survey remain active?

      Considerations

      • If the survey link is included within the ticket resolution email, it’s one less email to fatigue users, but users may not notice there is a survey in the email.
      • If the survey link is included in its own separate email, it will be more noticeable to users, but could risk overwhelming users with too many emails.
      • Can users view the entire survey in the email and respond directly within the email, or do they need to click on a link and respond to the survey elsewhere?

      Considerations

      • Leaving the survey open at least a week will give users who are out of office or busy more time to respond.
      • However, if users respond to the survey too long after their ticket was resolved, they may not remember the interaction well enough to give any meaningful response.
      • Will you send any reminders to users to complete the survey? It may improve response rate, or may lead to survey fatigue from reaching out too often.

      Recommendations

      Send the survey separately from the ticket resolution email or users will never notice it. However, if possible, have the entire survey embedded within the email so users can click to respond directly from their email without having to open a separate link. Reduce effort, to make users more likely to respond.

      Recommendations

      Leave enough time for the user to respond if they are busy or away, but not so much time that the data will be irrelevant. Balance the need to remind busy end users, with the possibility of overwhelming them with survey fatigue. About a week is typical.

      Plan detailed survey logistics

      Decision #1

      Decision #2

      What will the body of the email/messaging say?

      Where will completed surveys be sent?

      Considerations

      • Communicate the value of responding to the survey.
      • Remember, the survey should be as short and concise as possible. A lengthy body of text before the actual survey can deter respondents.
      • Depending on your survey configuration, you may have a ‘thank you’ page that appears after respondents complete the survey. Think about what messaging you can save for that page and what needs to be up front.
      • Ensure there is a clear reference to which ticket the survey is referencing (with the subject of the ticket, not just ticket number).

      Considerations

      • Depending on the complexity of your ITSM tool, you may designate email addresses to receive completed surveys, or configure entire dashboards to display results.
      • Decide who needs to receive all completed surveys in order to take action.
      • Decide whether the agent who resolved the ticket will have access to the full survey response. Note that if they see negative feedback, it may affect morale.
      • Are there any other stakeholders who should receive the immediate completed surveys, or can they view summary reports and dashboards of the results?

      Recommendations

      Most users won’t read a long message, especially if they see it multiple times, so keep the email short and simple. Tell users you value their feedback, indicate which interaction you’re asking about, and say how long the survey should take. Thank them after they submit and tell them you will act on their feedback.

      Recommendations

      Survey results should be sent to the Service Manager, Customer Experience Lead, or whoever is the person responsible for managing the survey feedback. They can choose how to share feedback with specific agents and the service desk team.

      Response rates for transactional surveys are typically low…

      Most IT organizations see transactional survey response rates of less than 20%.

      The image contains a screenshot of a SDI survey taken to demonstrate customer satisfaction respond rate.

      Source: SDI, 2018

      SDI’s 2018 Customer Experience in ITSM survey of service desk professionals found that 69% of respondents had survey response rates of 20% or less. However, they did not distinguish between transactional and relationship surveys.

      Reasons for low response rates:

      • Users tend to only respond if they had a very positive or very negative experience worth writing about, but don’t typically respond for interactions that go as expected or were average.
      • Survey is too long or complicated.
      • Users receive too many requests for feedback.
      • Too much time has passed since the ticket was submitted/resolved and the user doesn’t remember the interaction.
      • Users think their responses disappear into a black hole or aren’t acted upon so they don’t see the value in taking the time to respond. Or, they don’t trust the confidentiality of their responses.

      “In my experience, single digits are a sign of a problem. And a downward trend in response rate is also a sign of a problem. World-class survey response rates for brands with highly engaged customers can be as high as 60%. But I’ve never seen it that high for internal support teams. In my experience, if you get a response rate of 15-20% from your internal customers then you’re doing okay. That’s not to say you should be content with the status quo, you should always be looking for ways to increase it.”

      – David O’Reardon, Founder & CEO of Silversix

      … but there are steps you can take to maximize your response rate

      It is still difficult to achieve high response rates to transactional surveys, but you can at least increase your response rate with these strategies:

      1. Reduce frequency
      2. Don’t over-survey any one user or they will start to ignore the surveys.

      3. Send immediately
      4. Ask for feedback soon after the ticket was resolved so it’s fresh in the user’s memory.

      5. Make it short and simple
      6. Keep the survey short, concise, and simple to respond to.

      7. Make it easy to complete
      8. Minimize effort involved as much as possible. Allow users to respond directly from email and from any device.

      9. Change email messaging
      10. Experiment with your subject line or email messaging to draw more attention.

      11. Respond to feedback
      12. Respond to customers who provide feedback – especially negative – so they know you’re listening.

      13. Act on feedback
      14. Demonstrate that you are acting on feedback so users see the value in responding.

      Use Info-Tech’s survey template as a starting point

      Once you’ve worked through all the decisions in this step, you’re ready to configure your transactional survey in your ITSM solution or survey tool.

      As a starting point, you can leverage Info-Tech’s Transactional Service Desk Survey Templatee to design your templates and wording.

      Make adjustments to match your decisions or your configuration limitations as needed.

      Refer to the key decisions tables on slides 24 and 25 to ensure you’ve made all the configurations necessary as you set up your survey.

      The image contains a screenshot of Info-Tech's survey templates.

      Design and implement relationship surveys

      Phase 3

      Understand why and how to design a survey to assess overall satisfaction with the service desk across your organization, or use Info-Tech’s diagnostic.

      Phase 1:

      Phase 2:

      Phase 3:

      Phase 4:

      Understand how to measure customer satisfaction

      Design and implement transactional surveys

      Design and implement relationship surveys

      Analyze and act on feedback

      How can we evaluate overall Service Desk service quality?

      Evaluating service quality in any industry is challenging for both those seeking feedback and those consuming the service: “service quality is more difficult for the consumer to evaluate than goods quality.”

      You are in the position of trying to measure something intangible: customer perception, which “result[s] from a comparison of consumer expectations with actual service performance,” which includes both the service outcome and also “the process of service delivery”

      (Source: Parasuraman et al, 1985, 42).

      Your mission is to design a relationship survey that is:

      • Comprehensive but not too long.
      • Easy to understand but complex enough to capture enough detail.
      • Able to capture satisfaction with both the outcome and the experience of receiving the service.

      Use relationship surveys to measure overall service desk service quality

      Recall the definition of a relationship survey:

      • Survey that is sent periodically (i.e. semi-annually or annually) to the entire customer base to measure the overall relationship with the service desk.
      • Shows you where your customer experience is doing well and where it needs improving.
      • Asks customers to rate you based on their overall experience rather than on a specific product or interaction.
      • Longer and more comprehensive than transactional surveys, covering multiple dimensions/ topics.

      Relationship surveys serve several purposes:

      • Gives end users an opportunity to provide overall feedback on a wider range of experiences with IT.
      • Gives IT the opportunity to respond to feedback and show users their voices are heard.
      • Provides insight into year-over-year trends and customer satisfaction.
      • Provides IT leaders the opportunity to segment the results by demographic (e.g. by department, location, or seniority) and target improvements where needed most.
      • Feeds into strategic planning and annual reports on user experience and satisfaction

      Info-Tech Insight

      Annual relationship surveys provide great value in the form of year-over-year internal benchmarking data, which you can use to track improvements and validate the impact of your service improvement efforts.

      Understand the gaps that decrease service quality

      The Service Quality Model (Parasuraman, Zeithaml and Berry, 1985) shows how perceived service quality is negatively impacted by the gap between expectations for quality service and the perceptions of actual service delivery:

      Gap 1: Consumer expectation – Management perception gap:

      Are there differences between your assumptions about what users want from a service and what those users expect?

      Gap 2: Management perception – Service quality specification gap:

      Do you have challenges translating user expectations for service into standardized processes and guidelines that can meet those expectations?

      Gap 3: Service quality specifications – Service delivery gap:

      Do staff members struggle to carry out the service quality processes when delivering service?

      Gap 4: Service delivery – External communications gap:

      Have users been led to expect more than you can deliver? Alternatively, are users unaware of how the organization ensures quality service, and therefore unable to appreciate the quality of service they receive?

      Gap 5: Expected service – Perceived service gap:

      Is there a discrepancy between users’ expectations and their perception of the service they received (regardless of any user misunderstanding)?

      The image contains a screenshot of the Service Quality Model to demonstrate the consumer and consumers.

      Your survey questions about service and support should provide insight into where these gaps exist in your organization

      Make key decisions ahead of launch

      Decision/step Considerations
      Align the relationship survey with your goals Align what is motivating you to launch the survey at this time and the outcomes it is intended to feed into.
      Identify what you’re measuring Clarify the purpose of the questions. Are you measuring feedback on your service desk, specifically? On all of IT? Are you trying to capture user effort? User satisfaction? These decisions will affect how you word your questions.
      Determine a framework for your survey Reporting on results and tracking year-over-year changes will be easier if you design a basic framework that your survey questions fall into. Consider drawing on an existing service quality framework to match best practices in other industries.
      Cover logistical details Designing a relationship survey requires attention to many details that may initially be overlooked: the survey’s length and timing, who it should be sent to and how, what demographic info you need to collect to slice and dice the results, and if it will be possible to conduct the survey anonymously.
      Design question wording It is important to keep questions clear and concise and to avoid overly lengthy surveys.
      Select answer scales The answer scales you select will depend on how you have worded the questions. There is a wide range of answer scales available to you; decide which ones will produce the most meaningful data.
      Test the survey Testing the survey before widely distributing it is key. When collecting feedback, conduct at least a few in person observations of someone taking the survey to get their unvarnished first impressions.
      Monitor and maximize your response rate Ensure success by staying on top of the survey during the period it is open.

      Align the relationship survey with your goals

      What is motivating you to launch the survey at this time?

      Is there a renewed focus on customer service satisfaction? If so, this survey will track the initiative’s success, so its questions must align with the sponsors’ expectations.

      Are you surveying customer satisfaction in order to comply with legislation, or directives to measure customer service quality?

      What objectives/outcomes will this survey feed into?

      What do you need to report on to your stakeholders? Have they communicated any expectations regarding the data they expect to see?

      Does the CIO want the annual survey to measure end-user satisfaction with all of IT?

      • Or do you only want to measure satisfaction with one set of processes (e.g. Service Desk)?
      • Are you seeking feedback on a project (e.g. implementation of new ERP)?
      • Are you seeking feedback on the application portfolio?

      In 1993 the U.S. president issued an Executive Order requiring executive agencies to “survey customers to determine the kind and quality of services they want and their level of satisfaction with existing services” and “post service standards and measure results against them.” (Clinton, 1993)

      Identify what you’re measuring

      Examples of Measures

      Clarify the purpose of the questions

      Each question should measure something specific you want to track and be phrased accordingly.

      Are you measuring feedback on the service desk?

      Service desk professionalism

      Are you measuring user satisfaction?

      Service desk timeliness

      Your customers’ happiness with aspects of IT’s service offerings and customer service

      Trust in agents’ knowledge

      Users’ preferred ticket intake channel (e.g. portal vs phone)

      Satisfaction with self-serve features

      Are you measuring user effort?

      Are you measuring feedback on IT overall?

      Satisfaction with IT’s ability to enable the business

      How much effort your customer needs to put forth to accomplish what they wanted/how much friction your service causes or alleviates

      Satisfaction with company-issued devices

      Satisfaction with network/Wi-Fi

      Satisfaction with applications

      Info-Tech Insight

      As you compose survey questions, decide whether they are intended to capture user satisfaction or effort: this will influence how the question is worded. Include a mix of both.

      Determine a framework for your survey

      If your relationship survey covers satisfaction with service support, ensure the questions cover the major aspects of service quality. You may wish to align your questions on support with existing frameworks: for example, the SERVQUAL service quality measurement instrument identifies 5 dimensions of service quality: Reliability, Assurance, Tangibles, Empathy, and Responsiveness (see below). As you design the survey, consider if the questions relate to these five dimensions. If you have overlooked any of the dimensions, consider if you need to revise or add questions.

      Service dimension

      Definition

      Sample questions

      Reliability

      “Ability to perform the promised service dependably and accurately”1

      • How satisfied are you with the effectiveness of Service Desk’s ability to resolve reported issues?

      Assurance

      “Knowledge and courtesy of employees and their ability to convey trust and confidence”2

      • How satisfied are you with the technical knowledge of the Service Desk staff?
      • When you have an IT issue, how likely are you to contact Service Desk by phone?

      Tangibles

      “Appearance of physical facilities, equipment, personnel, and communication materials”3

      • How satisfied are you that employees in your department have all the necessary technology to ensure optimal job performance?
      • How satisfied are you with IT’s ability to communicate to you regarding the information you need to perform your job effectively?

      Empathy

      “Caring, individualized attention the firm provides its customers”4

      • How satisfied are you that IT staff interact with end users in a respectful and professional manner?

      Responsiveness

      “Willingness to help customers and provide prompt service”5

      • How satisfied are you with the timeliness of Service Desk’s resolution to reported issues?
      1-5. Arlen, Chris,2022. Paraphrasing Zeithaml, Parasuraman, and Berry, 1990.

      Cover logistical details of the survey

      Identify who you will send it to

      Will you survey your entire user base or a specific subsection? For example, a higher education institution may choose to survey students separately from staff and faculty. If you are gathering data on customer satisfaction with a specific implementation, only survey the affected stakeholders.

      Determine timing

      Avoid sending out the survey during known periods of time pressure or absence (e.g. financial year-end, summer vacation).

      Decide upon its length

      Consider what survey length your users can tolerate. Configure the survey to show the respondents’ progression or their percentage complete.

      Clearly introduce the survey

      The survey should begin with an introduction that thanks users for completing the survey, indicates its length and anonymity status, and conveys how the data will be used, along with who the participants should contact with any questions about the survey.

      Decide upon incentives

      Will you incentivize participation (e.g. by entering the participants in a draw or rewarding highest-participating department)?

      Collect demographic information

      Ensure your data can be “sliced and diced” to give you more granular insights into the results. Ask respondents for information such as department, location, seniority, and tenure to help with your trend analysis later.

      Clarify if anonymous

      Users may be more comfortable participating if they can do so anonymously (Quantisoft, n.d.). If you promise anonymity, ensure your survey software/ partner can support this claim. Note the difference between anonymity (identity of participant is not collected) and confidentiality (identifying data is collected but removed from the reported results).

      Decide how to deliver the survey

      Will you be distributing the survey yourself through your own licensed software (e.g. through Microsoft Forms if you are an MS shop)? Or, will you be partnering with a third-party provider? Is the survey optimized for mobile? Some find up to 1/3 of participants use mobile devices for their surveys (O’Reardon, 2018).

      Use the Sample Size Calculator to determine your ideal sample size

      Use Info-Tech’s Sample Size Calculator to calculate the number of people you need to complete your survey to have statistically representative results.

      The image contains a screenshot of the Sample Size Calculator.

      In the example above, the service desk supports 1000 total users (and sent the survey to each one). To be 95% confident that the survey results fall within 5% of the true value (if every user responded), they would need 278 respondents to complete their survey. In other words, to have a sample that is representative of the whole population, they would need 278 completed surveys.

      Explanation of terms:

      Confidence Level: A measure of how reliable your survey is. It represents the probability that your sample accurately reflects the true population (e.g. your entire user base). The industry standard is typically 95%. This means that 95 times out of 100, the true data value that you would get if you surveyed the entire population would fall within the margin of error.

      Margin of Error: A measure of how accurate the data is, also known as the confidence interval. It represents the degree of error around the data point, or the range of values above and below the actual results from a survey. A typical margin of error is 5%. This means that if your survey sample had a score of 70%, the true value if you sampled the entire population would be between 65% and 75%. To narrow the margin of error, you would need a bigger sample size.

      Population Size: The total set of people you want to study with your survey. For example, the total number of users you support.

      Sample Size: The number of people who participate in your survey (i.e. complete the survey) out of the total population.

      Info-Tech’s End-User Satisfaction Diagnostics

      If you choose to leverage a third-party partner, an Info-Tech satisfaction survey may already be part of your membership. There are two options, depending on your needs:

      I need to measure and report customer satisfaction with all of IT:

      • IT’s ability to enable the organization to meet its existing goals, innovate, adapt to business needs, and provide the necessary technology.
      • IT’s ability to provide training, respond to feedback, and behave professionally.
      • Satisfaction with IT services and applications.

      Both products measure end-user satisfaction

      One is more general to IT

      One is more specific to service desk

      I need to measure and report more granularly on Service Desk customer satisfaction:

      • Efficacy and timeliness of resolutions
      • Technical and communication skills
      • Ease of contacting the service desk
      • Effectiveness of portal/ website
      • Ability to collect and apply user feedback

      Choose Info-Tech's End User Satisfaction Survey

      Choose Info-Tech’s Service Desk Satisfaction Survey

      Design question wording

      Write accessible questions:

      Instead of this….

      Ask this….

      48% of US adults meet or exceed PIACC literacy level 3 and thus able to deal with texts that are “often dense or lengthy.”

      52% of US adults meet level 2 or lower.

      Keep questions clear and concise. Avoid overly lengthy surveys.

      Source: Highlights of the 2017 U.S. PIAAC Results Web Report
      1. How satisfied are you with the response times of the service desk?
      2. How satisfied are you with the timeliness of the service desk?

      Users will have difficulty perceiving the difference between these two questions.

      1. How satisfied are you with the time we take to acknowledge receipt of your ticket?
      2. How satisfied are you with the time we take to completely resolve your ticket?

      Tips for writing survey questions:

      “How satisfied are you with the customer service skills, knowledge, and responsiveness of the technicians?”

      This question measures too many things and the data will not be useful.

      Choose only one to ask about.

      • Cut out any unnecessary words or phrasing. Highlight/bold key words or phrases.
      • Avoid biasing or leading respondents to select a certain answer.
      • Don’t attempt to measure multiple constructs in a single question.

      “On a scale of 1-10, thinking about the past year, how satisfied would you say that you were overall with the way that your tickets were resolved?”

      This question is too wordy.

      “How satisfied were you with your ticket resolution?”

      Choose answer scales that best fit your questions and reporting needs

      Likert scale

      Respondents select from a range of statements the position with which they most agree:

      E.g. How satisfied are you with how long it generally takes to resolve your issue completely?

      E.g. Very dissatisfied/Somewhat dissatisfied/ Neutral/ Somewhat satisfied/ Very satisfied/ NA

      Frequency scale

      How often does the respondent have to do something, or how often do they encounter something?

      E.g. How frequently do you need to re-open tickets that have been closed without being satisfactorily resolved?

      E.g. Never/ Rarely/ Sometimes/ Often/ Always/ NA

      Numeric scale

      By asking users to rate their satisfaction on a numeric scale (e.g., 1-5, 1-10), you can facilitate reporting on averages:

      E.g. How satisfied are you with IS’s ability to provide services to allow the organization to meet its goals?

      E.g. 1 – Not at all Satisfied to 10 – Fully Satisfied / NA

      Forced ranking

      Learn more about your users’ priorities by asking them to rank answers from most to least important, or selecting their top choices (Sauro, 2018):

      E.g. From the following list, drag and drop the 3 aspects of our service that are most important to you into the box on the right.

      Info-Tech Insight

      Always include an optional open-ended question, which allows customers to provide more feedback or suggestions.

      Test the survey before launching

      Review your questions for repetition and ask for feedback on your survey draft to discover if readers interpret the questions differently than you intended.

      Test the survey with different stakeholder groups:

      • IT staff: To discover overlooked topics.
      • Representatives of your end-user population: To discover whether they understand the intention of the questions.
      • Executives: To validate whether you are capturing the data they are interested in reporting on.

      Testing methodology:

      • Ask your test subjects to take the survey in your presence so you can monitor their experience as they take it.
      • Ask them to narrate their experience as they take the survey.
      • Watch for:
        • The time it takes to complete the survey.
        • Moments when they struggle or are uncertain with the survey’s wording.
        • Questions they find repetitive or pointless.

      Info-Tech Insight

      In the survey testing phase, try to capture at least a few real-time responses to the survey. If you collect survey feedback only once the test is over, you may miss some key insights into the user experience of navigating the survey.

      “Follow the golden rule: think of your audience and what they may or may not know. Think about what kinds of outside pressures they may bring to the work you’re giving them. What time constraints do they have?”

      – Sally Colwell, Project Officer, Government of Canada Pension Centre

      Monitor and maximize your response rate

      Ensure success by staying on top of the survey during the period it is open.

      • When will your users complete the survey? You know your own organization’s culture best, but SurveyMonkey found that weekday survey responses peaked at mid-morning and mid-afternoon (Wronski). Ensure you send the communication at a time it will not be overlooked. For example, some studies found Mondays to have higher response rates; however, the data is not consistent (Amaresan, 2021). Send the survey at a time you believe your users are least likely to be inundated with other notifications.
      • Have a trusted leader send out the first communication informing the end-user base of the survey. Ensure the recipient understands your motivation and how their responses will be used to benefit them (O’Reardon, 2016). Remind them that participating in the survey benefits them: since IT is taking actions based on their feedback, it’s their chance to improve their employee experience of the IT services and tools they use to do their job.
      • In the introductory communication, test different email subject lines and email body content to learn which versions increase respondents’ rates of opening the survey link, and “keep it short and clear” (O’Reardon, 2016).
      • If your users tend to mistrust emailed links due to security training, tell them how to confirm the legitimacy of the survey.

      “[Send] one reminder to those who haven’t completed the survey after a few days. Don’t use the word ‘reminder’ because that’ll go straight in the bin, better to say something like, ‘Another chance to provide your feedback’”

      – David O’Reardon, Founder & CEO of Silversix

      Analyze and act on feedback

      Phase 4

      Measure and analyze the results of both surveys and build a plan to act on both positive and negative feedback and communicate the results with the organization.

      Phase 1:

      Phase 2:

      Phase 3:

      Phase 4:

      Understand how to measure customer satisfaction

      Design and implement transactional surveys

      Design and implement relationship surveys

      Analyze and act on feedback

      Leverage the service recovery paradox to improve customer satisfaction

      The image contains a screenshot of a graph to demonstrate the service recovery paradox.

      A service failure or a poor experience isn’t what determines customer satisfaction – it’s how you respond to the issue and take steps to fix it that really matters.

      This means one poor experience with the service desk doesn’t necessarily lead to an unhappy user; if you quickly and effectively respond to negative feedback to repair the relationship, the customer may be even happier afterwards because you demonstrated that you value them.

      “Every complaint becomes an opportunity to turn a bad IT customer experience into a great one.”

      – David O’Reardon, Founder & CEO of Silversix

      Collecting feedback is only the first step in the customer feedback loop

      Closing the feedback loop is one of the most important yet forgotten steps in the process.

      1. Collect Feedback
      • Send transactional surveys after every ticket is resolved.
      • Send a broader annual relationship survey to all users.
    • Analyze Feedback
      • Calculate satisfaction scores.
      • Read open-ended comments.
      • Analyze for trends, categories, common issues and priorities.
    • Act on Feedback
      • Respond to users who provided feedback.
      • Make improvements based on feedback.
    • Communicate Results
      • Communicate feedback results and improvements made to respondents and to service desk staff.
      • Summarize results and actions to key stakeholders and business leaders.

      Act on feedback to get the true value of your satisfaction program

      • SDI (2018) survey data shows that the majority of service desk professionals are using their customer satisfaction data to feed into service improvements. However, 30% still aren’t doing anything with the feedback they collect.
      • Collecting feedback is only one half of a good customer feedback program. Acting on that feedback is critical to the success of the program.
      • Using feedback to make improvements not only benefits the service desk but shows users the value of responding and will increase future response rates.
      The image contains a screenshot of a bar graph that demonstrates SDI: What do service desk professionals do with customer satisfaction data?

      “Your IT service desk’s CSAT survey should be the means of improving your service (and the employee experience), and something that encourages people to provide even more feedback, not just the means for understanding how well it’s doing”

      – Joe the IT Guy, SysAid

      Assign responsibility for acting on feedback

      If collecting and analyzing customer feedback is something that happens off the side of your desk, it either won’t get done or won’t get done well.

      • Formalize the customer satisfaction program. It’s not a one-time task, but an ongoing initiative that requires significant time and dedication.
      • Be clear on who is accountable for the program and who is responsible for all the tasks involved for both transactional and relationship survey data collection, analysis, and communication.

      Assign accountability for the customer feedback program to one person (i.e. Service Desk Manager, Service Manager, Infrastructure & Operations Lead, IT Director), who may take on or assign responsibilities such as:

      • Designing surveys, including survey questions and response options.
      • Configuring survey(s) in ITSM or survey tool.
      • Sending relationship surveys and subsequent reminders to the organization.
      • Communicating results of both surveys to internal staff, business leaders, and end users.
      • Analyzing results.
      • Feeding results into improvement plans, coaching, and training.
      • Creating reports and dashboards to monitor scores and trends.

      Info-Tech Insight

      While feedback can feed into internal coaching and training, the goal should never be to place blame or use metrics to punish agents with poor results. The focus should always be on improving the experience for end users.

      Determine how and how often to analyze feedback data

      • Analyze and report scores from both transactional and relationship surveys to get a more holistic picture of satisfaction across the organization.
      • Determine how you will calculate and present satisfaction ratings/scores, both overall and for individual questions. See tips on the right for calculating and presenting NPS and CSAT scores.
      • A single satisfaction score doesn’t tell the full story; calculate satisfaction scores at multiple levels to determine where improvements are most needed.
        • For example, satisfaction by service desk tier, team or location, by business department or location, by customer group, etc.
      • Analyze survey data regularly to ensure you communicate and act on feedback promptly and avoid further alienating dissatisfied users. Transactional survey feedback should be reviewed at least weekly, but ideally in real time, as resources allow.

      Calculating NPS Scores

      Categorize respondents into 3 groups:

      • 9-10 = Promoters, 7-8 = Neutral, 1-6 = Detractors

      Calculate overall NPS score:

      • % Promoters - % Detractors

      Calculating CSAT Scores

      • CSAT is usually presented as a percentage representing the average score.
      • To calculate, take the total of all scores, divide by the maximum possible score, then multiply by 100. For example, a satisfaction rating of 80% means on average, users gave a rating of 4/5 or 8/10.
      • Note that some organizations present CSAT as the percentage of “satisfied” users, with satisfied being defined as either “yes” on a two-point scale or a score of 4 or 5 on a 5-point scale. Be clear how you are defining your satisfaction rating.

      Don’t neglect qualitative feedback

      While it may be more difficult and time-consuming to analyze, the reward is also greater in terms of value derived from the data.

      Why analyze qualitative data

      How to analyze qualitative data

      • Quantitative data (i.e. numerical satisfaction scores) tells you how many people are satisfied vs dissatisfied, but it doesn’t tell you why they feel that way.
      • If you limit your data analysis to only reporting numerical scores, you will miss out on key insights that can be derived from open-ended feedback.
      • Qualitative data from open-ended survey questions provides:
        • Explanations for the numbers
        • More detailed insight into why respondents feel a certain way
        • More honest and open feedback
        • Insight into areas you may not have thought to ask about
        • New ideas and recommendations

      Methods range in sophistication; choose a technique depending on your tools available and goals of your program.

      1. Manual 2. Semi-automated 3. AI & Analysis Tools
      • Read all comments.
      • Sort into positive vs negative groups.
      • Add tags to categorize comments (e.g. by theme, keyword, service).
      • Look for trends and priorities, differences across groups.
      • Run a script to search for specific keywords.
      • Use a word cloud generator to visualize the most commonly mentioned words (e.g. laptop, email).
      • Due to limitations, manual analysis will still be necessary.
      • Use a feedback analysis/text analysis tool to mine feedback.
      • Software will present reports and data visualizations of common themes.
      • AI-powered tools can automatically detect sentiment or emotion in comments or run a topic analysis.

      Define a process to respond to both negative and positive feedback

      Successful customer satisfaction programs respond effectively to both positive and negative outcomes. Late or lack of responses to negative comments may increase customer frustration, while not responding at all to the positive comments may give the perception of indifference.

      1. Define what qualifies as a positive vs negative score
      2. E.g. Scores of 1 to 2 out of 5 are negative, scores of 4 to 5 out of 5 are positive.

      3. Define process to respond to negative feedback
      • Negative responses should go directly to the Service Desk Manager or whoever is accountable for feedback.
      • Set an SLO for when the user will be contacted. It should be within 24h but ideally much sooner.
      • Investigate the issue to understand exactly what happened and get to the root cause.
      • Identify remediation steps to ensure the issue does not occur again.
      • Communicate to the customer the action you have taken to improve.
    • Define process to respond to positive feedback
      • Positive responses should also be reviewed by the person accountable for feedback, but the timeline to respond may be longer.
      • Show respondents that you value their time by thanking them for responding. Showing appreciate helps to build a long-term relationship with the user.
      • Share positive results with the team to improve morale, and as a coaching/training mechanism.
      • Consider how to use positive feedback as an incentive or reward.

      Build a plan to communicate results to various stakeholders

      Regular communication about your feedback results and action plan tied to those results is critical to the success of your feedback program. Build your communication plan around these questions:

      1. Who should receive communication?

      Each audience will require different messaging, so start by identifying who those audiences are. At a minimum, you should communicate to your end users who provided feedback, your service desk/IT team, and business leaders or stakeholders.

      2. What information do they need?

      End users: Thank them for providing feedback. Demonstrate what you will do with that feedback.

      IT team: Share results and what you need them to do differently as a result.

      Business leaders: Share results, highlight successes, share action plan for improvement.

      3. Who is responsible for communication?

      Typically, this will be the person who is accountable for the customer feedback program, but you may have different people responsible for communicating to different audiences.

      4. When will you communicate?

      Frequency of communication will depend on the survey type – relationship or transactional – as well as the audience, with internal communication being much more frequent than end-user communication.

      5. How will you communicate?

      Again, cater your approach to the audience and choose a method that will resonate with them. End users may view an email, an update on the portal, a video, or update in a company meeting; your internal IT team can view results on a dashboard and have regular meetings.

      Communication to your users impacts both response rates and satisfaction

      Based on the Customer Communication Cycle by David O’Reardon, 2018
      1. Ask users to provide feedback through transactional and relationship surveys.
      2. Thank them for completing the survey – show that you value their time, regardless of the type of feedback they submitted.
      3. Be transparent and summarize the results of the survey(s). Make it easy to digest with simple satisfaction scores and a summary of the main insights or priorities revealed.
      4. Before asking for feedback, explain how you will use feedback to improve the service. After collecting feedback, share your plan for making improvements based on what the data told you.
      5. After you’ve made changes, communicate again to share the results with respondents. Make it clear that their feedback had a direct result on the service they receive. Communicating this before running another survey will also increase the likelihood of respondents providing feedback again.

      Info-Tech Insight

      Focus your communications to users around them, not you. Demonstrate that you need feedback to improve their experience, not just for you to collect data.

      Translate feedback into actionable improvements

      Taking action on feedback is arguably the most important step of the whole customer feedback program.

      Prioritize improvements

      Prioritize improvements based on low scores and most commonly received feedback, then build into an action plan.

      Take immediate action on negative feedback

      Investigate the issue, diagnose the root cause, and repair both the relationship and issue – just like you would an incident.

      Apply lessons learned from positive feedback

      Don’t neglect actions you can take from positive feedback – identify how you can expand upon or leverage the things you’re doing well.

      Use feedback in coaching and training

      Share positive experiences with the team as lessons learned, and use negative feedback as an input to coaching and training.

      Make the change stick

      After making a change, train and communicate it to your team to ensure the change sticks and any negative experiences don’t happen again.

      “Without converting feedback into actions, surveys can become just a pointless exercise in number watching.”

      – David O’Reardon, Founder & CEO of Silversix

      Info-Tech Insight

      Outline exactly what you plan to do to address customer feedback in an action plan, and regularly review that action plan to select and prioritize initiatives and monitor progress.

      For more guidance on tracking and prioritizing ongoing improvement initiatives, see the blueprints Optimize the Service Desk with a Shift Left Strategy and Build a Continual Improvement Plan for the Service Desk.

      Leverage Info-Tech resources to guide your improvement efforts

      Map your identified improvements to the relevant resource that can help:

      Improve service desk processes:

      Improve end-user self-service options:

      Assess and optimize service desk staffing:

      Improve ease of contacting the service desk:

      Standardize the Service Desk Optimize the Service Desk With a Shift-Left Strategy Staff the Service Desk to Meet Demand Improve Service Desk Ticket Intake

      Improve service desk processes:

      Improve end-user self-service options:

      Assess and optimize service desk staffing:

      Improve ease of contacting the service desk::

      Improve Incident and Problem Management Improve Incident and Problem Management Deliver a Customer Service Training Program to Your IT Department Modernize and Transform Your End-User Computing Strategy

      Map process for acting on relationship survey feedback

      Use Info-Tech’s Relationship Satisfaction Survey Review Process workflow as a template to define your own process.

      The image contains a screenshot of the Relationship Satisfaction Survey Review Process.

      Map process for acting on transactional survey feedback

      Use Info-Tech’s Transactional Satisfaction Survey Review Process workflow as a template to define your own process.

      The image contains a screenshot of the Transactional Satisfaction Survey Review Process.

      Related Info-Tech Research

      Standardize the Service Desk

      This project will help you build and improve essential service desk processes, including incident management, request fulfillment, and knowledge management to create a sustainable service desk.

      Optimize the Service Desk With a Shift-Left Strategy

      This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.

      Build a Continual Improvement Plan

      This project will help you build a continual improvement plan for the service desk to review key processes and services and manage the progress of improvement initiatives.

      Deliver a Customer Service Training Program to Your IT Department

      This project will help you deliver a targeted customer service training program to your IT team to enhance their customer service skills when dealing with end users, improve overall service delivery and increase customer satisfaction.

      Sources Cited

      Amaresan, Swetha. “The best time to send a survey, according to 5 studies.” Hubspot. 15 Jun 2021. Accessed October 2022.
      Arlen, Chris. “The 5 Service Dimensions All Customers Care About.” Service Performance Inc. n.d. Accessed October 2022.
      Clinton, William Jefferson. “Setting Customer Service Standards.” (1993). Federal Register, 58(176).
      “Understanding Confidentiality and Anonymity.” The Evergreen State College. 2022. Accessed October 2022.
      "Highlights of the 2017 U.S. PIAAC Results Web Report" (NCES 2020-777). U.S. Department of Education. Institute of Education Sciences, National Center for Education Statistics.
      Joe the IT Guy. “Are IT Support’s Customer Satisfaction Surveys Their Own Worst Enemy?” Joe the IT Guy. 29 August 2018. Accessed October 2022.
      O’Reardon, David. “10 Ways to Get the Most out of your ITSM Ticket Surveys.” LinkedIn. 2 July 2019. Accessed October 2022.
      O'Reardon, David. "13 Ways to increase the response rate of your Service Desk surveys".LinkedIn. 8 June 2016. Accessed October 2022.
      O’Reardon, David. “IT Customer Feedback Management – A Why & How Q&A with an Expert.” LinkedIn. 13 March 2018. Accessed October 2022.
      Parasuraman, A., Zeithaml, V. A., & Berry, L. L. (1985). "A Conceptual Model of Service Quality and Its Implications for Future Research." Journal of Marketing, 49(4), 41–50.
      Quantisoft. "How to Increase IT Help Desk Customer Satisfaction and IT Help Desk Performance.“ Quantisoft. n.d. Accessed November 2022.
      Rumberg, Jeff. “Metric of the Month: Customer Effort.” HDI. 26 Mar 2020. Accessed September 2022.
      Sauro, Jeff. “15 Common Rating Scales Explained.” MeasuringU. 15 August 2018. Accessed October 2022.
      SDI. “Customer Experience in ITSM.” SDI. 2018. Accessed October 2022.
      SDI. “CX: Delivering Happiness – The Series, Part 1.” SDI. 12 January 2021. Accessed October 2022.
      Wronski, Laura. “Who responds to online surveys at each hour of the day?” SurveyMonkey. n.d. Accessed October 2022.

      Research contributors

      Sally Colwell

      Project Officer

      Government of Canada Pension Centre

      Become a Transformational CIO

      • Buy Link or Shortcode: {j2store}86|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Business transformations are happening, but CIOs are often involved only when it comes time to implement change. This makes it difficult for the CIO to be perceived as an organizational leader.
      • CIOs find it difficult to juggle operational activities, strategic initiatives, and involvement in business transformation.
      • CIOs don’t always have the IT organization structured and mobilized in a manner that facilitates the identification of transformation opportunities, and the planning for and the implementation of organization-wide change.

      Our Advice

      Critical Insight

      • Don’t take an ad hoc approach to transformation.
      • You’re not in it alone.
      • Your legacy matters

      Impact and Result

      • Elevate your stature as a business leader.
      • Empower the IT organization to act with a business mind first, and technology second.
      • Create a high-powered IT organization that is focused on driving lasting change, improving client experiences, and encouraging collaboration across the entire enterprise.
      • Generate opportunities for organizational growth, as manifested through revenue growth, profit growth, new market entry, new product development, etc.

      Become a Transformational CIO Research & Tools

      Start here – read the Executive Brief

      Read our Executive Brief to find out why you should undergo an evolution in your role as a business leader, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Are you ready to lead transformation?

      Determine whether you are ready to focus your attention on evolving your role.

      • Become a Transformational CIO – Phase 1: Are You Ready to Lead Transformation?

      2. Build business partnerships

      Create a plan to establish key business partnerships and position IT as a co-leader of transformation.

      • Become a Transformational CIO – Phase 2: Build Business Partnerships
      • Partnership Strategy Template

      3. Develop the capability to transform

      Mobilize the IT organization and prepare for the new mandate.

      • Become a Transformational CIO – Phase 3: Develop the Capability to Transform
      • Transformation Capability Assessment

      4. Shift IT’s focus to the customer

      Align IT with the business through a direct, concentrated focus on the customer.

      • Become a Transformational CIO – Phase 4: Shift IT’s Focus to the Customer
      • Transformational CIO Value Stream Map Template
      • Transformational CIO Business Capability Map Template

      5. Adopt a transformational approach to leadership

      Determine the key behaviors necessary for transformation success and delegate effectively to make room for new responsibilities.

      • Become a Transformational CIO – Phase 5: Adopt a Transformational Approach to Leadership
      • Office of the CIO Template

      6. Sustain the transformational capability

      Track the key success metrics that will help you manage transformation effectively.

      • Become a Transformational CIO – Phase 6: Sustain the Transformational Capability
      • Transformation Dashboard
      [infographic]

      Workshop: Become a Transformational CIO

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Determine Readiness to Become a Transformational CIO

      The Purpose

      Understand stakeholder and executive perception of the CIO’s performance and leadership.

      Determine whether the CIO is ready to lead transformation.

      Key Benefits Achieved

      Decision to evolve role or address areas of improvement as a pre-requisite to becoming a transformational CIO.

      Activities

      1.1 Select data collection techniques.

      1.2 Conduct diagnostic programs.

      1.3 Review results and define readiness.

      Outputs

      Select stakeholder and executive perception of the CIO

      Decision as to whether to proceed with the role evolution

      2 Build Business Partnerships

      The Purpose

      Identify potential business partners and create a plan to establish key partnerships.

      Key Benefits Achieved

      An actionable set of initiatives that will help the CIO create valuable partnerships with internal or external business stakeholders.

      Activities

      2.1 Identify potential business partners.

      2.2 Evaluate and prioritize list of potential partners.

      2.3 Create a plan to establish the target partnerships.

      Outputs

      Partnership strategy

      3 Establish IT’s Ability to Transform

      The Purpose

      Make the case and plan for the development of key capabilities that will enable the IT organization to handle transformation.

      Key Benefits Achieved

      A maturity assessment of critical capabilities.

      A plan to address maturity gaps in preparation for a transformational mandate.

      Activities

      3.1 Define transformation as a capability.

      3.2 Assess the current and target transformation capability maturity.

      3.3 Develop a roadmap to address gaps.

      Outputs

      Transformation capability assessment

      Roadmap to develop the transformation capability

      4 Shift IT’s Focus to the Customer

      The Purpose

      Gain an understanding of the end customer of the organization.

      Key Benefits Achieved

      A change in IT mindset away from a focus on operational activities or internal customers to external customers.

      A clear understanding of how the organization creates and delivers value to customers.

      Opportunities for business transformation.

      Activities

      4.1 Analyze value streams that impact the customer.

      4.2 Map business capabilities to value streams.

      Outputs

      Value stream maps

      Business capability map

      5 Establish Transformation Leadership and Sustain the Capability

      The Purpose

      Establish a formal process for empowering employees and developing new leaders.

      Create a culture of continuous improvement and a long-term focus.

      Key Benefits Achieved

      Increased ability to sustain momentum that is inherent to business transformations.

      Better strategic workforce planning and a clearer career path for individuals in IT.

      A system to measure IT’s contribution to business transformation.

      Activities

      5.1 Set the structure for the office of the CIO.

      5.2 Assess current leadership skills and needs.

      5.3 Spread a culture of self-discovery.

      5.4 Maintain the transformation capability.

      Outputs

      OCIO structure document

      Transformational leadership dashboard

      Minimize the Damage of IT Cost Cuts

      • Buy Link or Shortcode: {j2store}53|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Cost & Budget Management
      • Parent Category Link: /cost-and-budget-management
      • Average growth rates for Opex and Capex budgets are expected to continue to decline over the next fiscal year.
      • Common “quick-win” cost-cutting initiatives are not enough to satisfy the organization’s mandate.
      • Cost-cutting initiatives often take longer than expected, failing to provide cost savings before the organization’s deadline.
      • Cost-optimization projects often have unanticipated consequences that offset potential cost savings and result in business dissatisfaction.

      Our Advice

      Critical Insight

      • IT costs affect the entire business, not just IT. For this reason, IT must work with the business collaboratively to convey the full implications of IT cost cuts.
      • Avoid making all your cuts at once; phase your cuts by taking into account the magnitude and urgency of your cuts and avoid unintended consequences.
      • Don’t be afraid to completely cut a service if it should not be delivered in the first place.

      Impact and Result

      • Take a value-based approach to cost optimization.
      • Reduce IT spend while continuing to deliver the most important services.
      • Involve the business in the cost-cutting process.
      • Develop a plan for cost cutting that avoids unintended interruptions to the business.

      Minimize the Damage of IT Cost Cuts Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should take a value-based approach to cutting IT costs, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand the mandate and take immediate action

      Determine your approach for cutting costs.

      • Minimize the Damage of IT Cost Cuts – Phase 1: Understand the Mandate and Take Immediate Action
      • Cost-Cutting Plan
      • Cost-Cutting Planning Tool

      2. Select cost-cutting initiatives

      Identify the cost-cutting initiatives and design your roadmap.

      • Minimize the Damage of IT Cost Cuts – Phase 2: Select Cost-Cutting Initiatives

      3. Get approval for your cost-cutting plan and adopt change management best practices

      Communicate your roadmap to the business and attain approval.

      • Minimize the Damage of IT Cost Cuts – Phase 3: Get Approval for Your Cost-Cutting Plan and Adopt Change Management Best Practices
      • IT Personnel Engagement Plan
      • Stakeholder Communication Planning Tool
      [infographic]

      Workshop: Minimize the Damage of IT Cost Cuts

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand the Mandate and Take Immediate Action

      The Purpose

      Determine your cost-optimization stance.

      Build momentum with quick wins.

      Key Benefits Achieved

      Understand the internal and external drivers behind your cost-cutting mandate and the types of initiatives that align with it.

      Activities

      1.1 Develop SMART project metrics.

      1.2 Dissect the mandate.

      1.3 Identify your cost-cutting stance.

      1.4 Select and implement quick wins.

      1.5 Plan to report progress to Finance.

      Outputs

      Project metrics and mandate documentation

      List of quick-win initiatives

      2 Select Cost-Cutting Initiatives

      The Purpose

      Create the plan for your cost-cutting initiatives.

      Key Benefits Achieved

      Choose the correct initiatives for your roadmap.

      Create a sensible and intelligent roadmap for the cost-cutting initiatives.

      Activities

      2.1 Identify cost-cutting initiatives.

      2.2 Select initiatives.

      2.3 Build a roadmap.

      Outputs

      High-level cost-cutting initiatives

      Cost-cutting roadmap

      3 Get Approval for Your Cost-Cutting Plan and Adopt Change Management Best Practices

      The Purpose

      Finalize the cost-cutting plan and present it to the business.

      Key Benefits Achieved

      Attain engagement with key stakeholders.

      Activities

      3.1 Customize your cost-cutting plan.

      3.2 Create stakeholder engagement plans.

      3.3 Monitor cost savings.

      Outputs

      Cost-cutting plan

      Stakeholder engagement plan

      Cost-monitoring plan

      Identify and Manage Strategic Risk Impacts on Your Organization

      • Buy Link or Shortcode: {j2store}219|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      Moreso than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their strategic plans to accommodate risk on an unprecedented level.

      A new global change will impact your organizational strategy at any given time. So, make sure your plans are flexible enough to manage the inevitable consequences.

      Our Advice

      Critical Insight

      • Identifying and managing a vendor’s potential strategic impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes affect strategic plans.
      • Organizational leadership is often taken unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals.

      Impact and Result

      • Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Risk Impact Tool.

      Identify and Manage Strategic Risk Impacts on Your Organization Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and Manage Strategic Risk Impacts to Your Organization Deck – Use the research to better understand the negative impacts of vendor actions on your strategic plans.

      Use this research to identify and quantify the potential strategic impacts caused by vendors. Use Info-Tech’s approach to look at the strategic impact from various perspectives to better prepare for issues that may arise.

      • Identify and Manage Strategic Risk Impacts on Your Organization Storyboard

      2. What If Vendor Strategic Impact Tool – Use this tool to help identify and quantify the strategic impacts of negative vendor actions

      By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      • Strategic Risk Impact Tool
      [infographic]

      Further reading

      Identify and Manage Strategic Risk Impacts on Your Organization

      The world is in a perpetual state of change. Organizations need to build adaptive resiliency into their strategic plans to adjust to ever-changing market dynamics.

      Analyst perspective

      Organizations need to build flexible resiliency into their strategic plans to be able to adjust to ever-changing market dynamics.

      This is a picture of Frank Sewell, Research Director, Vendor Management at Info-Tech Research Group

      Like most people, organizations are poor at assessing the likelihood of risk. If the past few years have taught us anything, it is that the probability of a risk occurring is far more flexible in the formula Risk = Likelihood * Impact than we ever thought possible. The impacts of these risks have been catastrophic, and organizations need to be more adaptive in managing them to strengthen their strategic plans.

      Frank Sewell,
      Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Moreso than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their strategic plans to accommodate risk on an unprecedented level.

      A new global change will impact your organizational strategy at any given time. So, make sure your plans are flexible enough to manage the inevitable consequences.

      Common Obstacles

      Identifying and managing a vendor’s potential strategic impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes affect strategic plans.

      Organizational leadership is often taken unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals.

      Info-Tech’s Approach

      Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.

      Prioritize and classify your vendors with quantifiable, standardized rankings.

      Prioritize focus on your high-risk vendors.

      Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Impacts Tool.

      Info-Tech Insight

      Organizations must evolve their strategic risk assessments to be more adaptive to respond to global changes in the market. Ongoing monitoring of the market and the vendors tied to company strategies is imperative to achieving success.

      Info-Tech’s multi-blueprint series on vendor risk assessment

      There are many individual components of vendor risk beyond cybersecurity.

      This image depicts a cube divided into six different coloured sections. The sections are labeled: Financial; Reputational; Operational; Strategic; Security; Regulatory & Compliance.

      This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

      Out of Scope:

      This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

      Strategic risk impacts

      Potential losses to the organization due to risks to the strategic plan

      • In this blueprint, we’ll explore strategic risks (risks to the Strategic Plans of the organization) and their impacts.
      • Identify potentially disruptive events to assess the overall impact on organizations and implement adaptive measures to correct strategic plans.
      This image depicts a cube divided into six different coloured sections. The section labeled Strategic is highlighted.

      The world is constantly changing

      The IT market is constantly reacting to global influences. By anticipating changes, leaders can set expectations and work with their vendors to accommodate them.

      When the unexpected happens, being able to adapt quickly to new priorities ensures continued long-term business success.

      Below are some things no one expected to happen in the last few years:

      62%

      of IT professionals are more concerned about being a victim of ransomware than they were a year ago.

      82%

      of Microsoft’s non-essential employees shifted to working from home in 2020, joining the 18% already remote.

      89%

      of organizations invested in web conferencing technology to facilitate collaboration.

      Source: Info-Tech Tech Trends Survey 2022

      Strategic risks on a global scale

      Odds are at least one of these is currently affecting your strategic plans

      • Vendor Acquisitions
      • Global Pandemic
      • Global Shortages
      • Gas Prices
      • Poor Vendor Performance
      • Travel Bans
      • War
      • Natural Disasters
      • Supply Chain Disruptions
      • Security Incidents

      Make sure you have the right people at the table to identify and plan to manage impacts.

      Identify & manage strategic risks

      Global Pandemic

      Very few people could have predicted that a global pandemic would interrupt business on the scale experienced today. Organizations should look at their lessons learned and incorporate adaptable preparations into their strategic planning moving forward.

      Vendor Acquisitions

      The IT market is an ever-shifting environment. Larger companies often gobble up smaller ones to control their sectors. Incorporating plans to manage those shifts in ownership will be key to many strategic plans that depend on niche vendor solutions for success. Be sure to monitor the potentially affected markets on an ongoing cadence.

      Global Shortages

      Organizations need to accept that shortages will recur periodically and that preparing for them will significantly increase the success potential of long-term strategic plans. Understand what your business needs to stock for project needs and where those supplies are located, and plan how to rapidly access and distribute them as required if supply chain disruptions occur.

      What to look for in vendors

      Identify strategic risk impacts

      • A vendor acquires many smaller, seemingly irrelevant IT products. Suddenly their revenue model includes aggressive license compliance audits.
        • Ensure that your installed software meets license compliance requirements with good asset management practices.
        • Monitor the market for such acquisitions or news of audits hitting companies.
      • A vendor changes their primary business model from storage and hardware to becoming a self-proclaimed “professional services guru,” relying almost entirely on their name recognition to build their marketing.
        • Be wary of self-proclaimed experts and review their successes and failures with other organizations before adopting them into your business strategy.
        • Review the backgrounds their “experts” have and make sure they have the industry and technical skill sets to perform the services to the required level.

      Not preparing for your growth can delay your goals

      Why can’t I get a new laptop?

      For example:

      • An IT professional services organization plans to take advantage of the growing work-from-home trend to expand its staff by 30% over the coming year.
      • Logically, this should include a review of the necessary tasks involved, including onboarding.
        • Suppose the company does not order enough equipment in preparation to cover the new staff plus routine replacement. In that case, this will delay the output of the new team members immeasurably as they wait for their company equipment and will delay existing staff whose equipment breaks, preventing them from getting back to work efficiently.

      Sometimes an organization has the right mindset to take advantage of the changes in the market but can fail to plan for the particulars.

      When your strategic plan changes, you need to revisit all the steps in the processes to ensure a successful outcome.

      Strategic risks

      Poor or uninformed business decisions can lead to organizational strategic failures

      • Supply chain disruptions and global shortages
        • Geopolitical disruptions and natural disasters have caused unprecedented interruptions to business. Incorporate forecasting of product and ongoing business continuity planning into your strategic plans to adapt as events unfold.
      • Poor vendor performance
        • Consider the impact of a vendor that fails to perform midway through the implementation. Organizations need to be able to manage the impact of replacing that vendor and cutting their losses rather than continuing to throw good money away after bad performance.
      • Vendor acquisitions
        • A lot of acquisition is going on in the market today. Large companies are buying competitors and either imposing new terms on customers or removing the competing products from the market. Prepare options for any strategy tied to a niche product.

      It is important to identify potential risks to strategic plans to manage the risk and be agile enough in planning to adapt to the changing environments.

      Info-Tech Insight
      Few organizations are good at identifying risks to their strategic plan. As a result, almost none realistically plan to monitor, manage, and adapt their strategies to those risks.

      Prepare your strategic risk management for success

      Due diligence will enable successful outcomes

      1. Obtain top-level buy-in; it is critical to success.
      2. Build enterprise risk management (ERM) through incremental improvement.
      3. Focus initial efforts on the “big wins” to prove the process works.
      4. Use existing resources.
      5. Build on any risk management activities that already exist in the organization.
      6. Socialize ERM throughout the organization to gain additional buy‑in.
      7. Normalize the process long term with ongoing updates and continuing education for the organization.

      (Adapted from COSO)

      How to assess strategic risk

      1. Review Organizational Strategy
        Understand the organizational strategy to prepare for the “What If” game exercise.
      2. Identify & Understand Potential Strategic Risks
        Play the “What If” game with the right people at the table.
      3. Create a Risk Profile Packet for Leadership
        Pull all the information together in a presentation document.
      4. Validate the Risks
        Work with leadership to ensure that the proposed risks are in line with their thoughts.
      5. Plan to Manage the Risks
        Lower the overall risk potential by putting mitigations in place.
      6. Communicate the Plan
        It is important not only to have a plan but also to socialize it in the organization for awareness.
      7. Enact the Plan
        Once the plan is finalized and socialized, put it in place with continued monitoring for success.

      Insight summary

      Insight 1

      Organizations build portions of their strategies around chosen vendors and should protect those plans against the risks of unforeseen acquisitions in the market.
      Is your vendor solvent? Does it have enough staff to accommodate your needs? Has its long-term planning been affected by changes in the market? Is it unique in its space?

      Insight 2

      Organizations’ strategic plans need to be adaptable to avoid vendors’ negative actions causing an expedited shift in priorities.
      For example, Philip's recall of ventilators impacted its products and the availability of its competitor’s products as demand overwhelmed the market.

      Insight 3

      Organizations need to become better at risk assessment and actively manage the identified risks to their strategic plans.
      Few organizations are good at identifying risks to their strategic plan. As a result, almost none realistically plan to monitor, manage, and adapt their strategies to those risks.

      Strategic risk impacts are often unanticipated, causing unforeseen downstream effects. Anticipating the potential changes in the global IT market and continuously monitoring vendors’ risk levels can help organizations modify their strategic alignment with the new norms.

      Identifying strategic risk

      Who should be included in the discussion

      • While it is true that executive-level leadership defines the strategy for an organization, it is vital for those making decisions to make informed decisions.
      • Getting input from operational experts at your organization will enhance the long-term potential for success of your strategies.
      • Involving those who directly manage vendors and understand the market will aid operational experts in determining the forward path for relationships with your current vendors and identifying new emerging potential strategic partners.

      Review your strategic plans for new risks and evolving likelihood on a regular basis.

      Keep in mind Risk = Likelihood x Impact (R=L*I).

      Impact (I) tends to remain the same, while Likelihood (L) is a very flexible variable.

      See the blueprint Build an IT Risk Management Program

      Managing strategic risk impacts

      What can we realistically do about the risks?

      • Review business continuity plans and disaster recovery testing.
      • Institute proper contract lifecycle management.
      • Re-evaluate corporate policies frequently.
      • Develop IT governance and change control.
      • Ensure strategic alignment in contracts.
      • Introduce continual risk assessment to monitor the relevant vendor markets.
        • Regularly review your strategic plans for new risks and evolving likelihood.
        • Risk = Likelihood x Impact (R=L*I)
          • Impact (I) tends to remain the same and be well understood, while Likelihood (L) turns out to be highly variable.
      • Be adaptable and allow for innovations that arise from the current needs.
        • Capture lessons learned from prior incidents to improve over time, and adjust your strategy based on the lessons.

      Organizations need to be reviewing their strategic risk plans considering the likelihood of incidents in the global market.

      Pandemics, extreme weather, and wars that affect global supply chains are a current reality, not unlikely scenarios.

      Ongoing Improvement

      Incorporating lessons learned

      • Over time, despite everyone’s best observations and plans, incidents will catch us off guard.
      • When it happens, follow your incident response plans and act accordingly.
      • An essential step is to document what worked and what did not – collectively known as the “lessons learned.”
      • Use the lessons learned document to devise, incorporate, and enact a better risk management process.

      Sometimes disasters occur despite our best plans to manage them.

      When this happens, it is important to document the lessons learned and improve our plans going forward.

      The “what if” game

      1-3 hours

      Vendor management professionals are in an excellent position to help senior leadership identify and pull together resources across the organization to determine potential risks. By playing the "what if" game and asking probing questions to draw out – or eliminate – possible adverse outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      1. Break into smaller groups (or if too small, continue as a single group).
      2. Use the Strategic Risk Impact Tool to prompt discussion on potential risks. Keep this discussion flowing organically to explore all potentials but manage the overall process to keep the discussion pertinent and on track.
      3. Collect the outputs and ask the subject matter experts (SMEs) for management options for each one in order to present a comprehensive risk strategy. You will use this to educate senior leadership so that they can make an informed decision to accept or reject the solution.

      Download the Strategic Risk Impact Tool

      Input Output
      • List of identified potential risk scenarios scored by likelihood and financial impact
      • List of potential management of the scenarios to reduce the risk
      • Comprehensive strategic risk profile on the specific vendor solution
      Materials Participants
      • Whiteboard/flip charts
      • Strategic Risk Impact Tool to help drive discussion
      • Vendor Management – Coordinator
      • Organizational Leadership
      • Operations Experts (SMEs)
      • Legal/Compliance/Risk Manager

      Case Study

      Airline Industry Strategic Adaptation

      Industry: Airline

      Impact categories: Pandemic, Lockdowns, Travel Bans, Increased Fuel Prices

      • In 2019 the airline industry yielded record profits of $35.5 billion.
      • In 2020 the pandemic devastated the industry with losses around $371 billion.
      • The industry leaders engaged experts to conduct a study on how the pandemic impacted them and propose measures to ensure the survival of their industry in the future after the pandemic.
      • They determined that “[p]recise decision-making based on data analytics is essential and crucial for an effective Covid-19 airline recovery plan.”

      Results

      The pandemic prompted systemic change to the overall strategic planning of the airline industry.

      Summary

      Be vigilant and adaptable to change

      • Organizations need to learn how to assess the likelihood of potential risks in the changing global world.
      • Those organizations that incorporate adaptive risk management processes can prepare their strategic plans for greater success.
      • Bring the right people to the table to outline potential risks in the market.
      • Socialize the risk management process throughout the organization to heighten awareness and enable employees to help protect the strategic plan.
      • Incorporate lessons learned from incidents into your risk management process to build better plans for future issues.

      Organizations must evolve their strategic risk assessments to be more adaptive to respond to global changes in the market.

      Ongoing monitoring of the market and the vendors tied to company strategies is imperative to achieving success.

      Related Info-Tech Research

      Identify and Manage Financial Risk Impacts on Your Organization

      This image contains a screenshot from Info-Tech's Identify and Manage Financial Risk Impacts on Your Organization.
      • Vendor management practices educate organizations on the different potential financial impacts that vendors may incur and suggest systems to help manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool.

      Identify and Reduce Agile Contract Risk

      This image contains a screenshot from Info-Tech's Identify and Reduce Agile Contract Risk
      • Customer maturity levels with Agile are low, with 67% of organizations using Agile for less than five years.
      • Customer competency levels with Agile are also low, with 84% of organizations stating they are below a high level of competency.
      • Contract disputes are the number one or two types of disputes faced by organizations across all industries.

      Build an IT Risk Management Program

      This image contains a screenshot from Info-Tech's Build an IT Risk Management Program
      • Transform your ad hoc IT risk management processes into a formalized, ongoing program, and increase risk management success.
      • Take a proactive stance against IT threats and vulnerabilities by identifying and assessing IT’s greatest risks before they occur.
      • Involve key stakeholders including the business senior management team to gain buy-in and to focus on IT risks most critical to the organization.

      Bibliography

      Olaganathan, Rajee. “Impact of COVID-19 on airline industry and strategic plan for its recovery with special reference to data analytics technology.” Global Journal of Engineering and Technology Advances, vol 7, no 1, 2021, pp. 033-046.

      Tonello, Matteo. “Strategic Risk Management: A Primer for Directors.” Harvard Law School Forum on Corporate Governance, 23 Aug. 2012.

      Frigo, Mark L., and Richard J. Anderson. “Embracing Enterprise Risk Management: Practical Approaches for Getting Started.” COSO, 2011.

      Research Contributors and Experts

      • Frank Sewell
        Research Director, Info-Tech Research Group
      • Steven Jeffery
        Principal Research Director, Info-Tech Research Group
      • Scott Bickley
        Practice Lead, Info-Tech Research Group
      • Donna Glidden
        Research Director, Info-Tech Research Group
      • Phil Bode
        Principal Research Director, Info-Tech Research Group
      • David Espinosa
        Senior Director, Executive Services, Info-Tech Research Group
      • Rick Pittman
        Vice President, Research, Info-Tech Research Group
      • Patrick Philpot
        CISSP
      • Gaylon Stockman
        Vice President, Information Security
      • Jennifer Smith
        Senior Director

      Master M&A Cybersecurity Due Diligence

      • Buy Link or Shortcode: {j2store}261|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,399 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance

      This research is designed to help organizations who are preparing for a merger or acquisition and need help with:

      • Understanding the information security risks associated with the acquisition or merger.
      • Avoiding the unwanted possibility of acquiring or merging with an organization that is already compromised by cyberattackers.
      • Identifying best practices for information security integration post merger.

      Our Advice

      Critical Insight

      The goal of M&A cybersecurity due diligence is to assess security risks and the potential for compromise. To succeed, you need to look deeper.

      Impact and Result

      • A repeatable methodology to systematically conduct cybersecurity due diligence.
      • A structured framework to rapidly assess risks, conduct risk valuation, and identify red flags.
      • Look deeper by leveraging compromise diagnostics to increase confidence that you are not acquiring a compromised entity.

      Master M&A Cybersecurity Due Diligence Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to master M&A cyber security due diligence, review Info-Tech’s methodology, and understand how we can support you in completing this project.

      [infographic]

      Data Quality

      • Buy Link or Shortcode: {j2store}19|cart{/j2store}
      • Related Products: {j2store}19|crosssells{/j2store}
      • Teaser Video: Visit Website
      • Teaser Video Title: Big data after pandemic
      • member rating overall impact: 8.3/10
      • member rating average dollars saved: $5,100
      • member rating average days saved: 8
      • Parent Category Name: Data and Business Intelligence
      • Parent Category Link: /data-and-business-intelligence
      Restore trust in your data by aligning your data management approach to the business strategy

      Incident Management for Small Enterprise

      • Buy Link or Shortcode: {j2store}482|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $6,531 Average $ Saved
      • member rating average days saved: 3 Average Days Saved
      • Parent Category Name: Incident & Problem Management
      • Parent Category Link: /incident-and-problem-management
      • Technical debt and disparate systems are big constraints for most small enterprise (SE) organizations. What may have worked years ago is no longer fit for purpose or the business is growing faster than the current tools in place can handle.
      • Super specialization of knowledge is also a common factor in smaller teams caused by complex architectures. While helpful, if that knowledge isn’t documented it can walk out the door with the resource and the rest of the team is left scrambling.
      • Lessons learned may be gathered for critical incidents but often are not propagated, which impacts the ability to solve recurring incidents.
      • Over time, repeated incidents can have a negative impact on the customer’s perception that the service desk is a credible and essential service to the business.

      Our Advice

      Critical Insight

      • Go beyond the blind adoption of best-practice frameworks. No simple formula exists for improving incident management maturity. Identify the challenges in your incident lifecycle and draw on best-practice frameworks pragmatically to build a structured response to those challenges.
      • Track, analyze, and review results of incident response regularly. Without a comprehensive understanding of incident trends and patterns you can be susceptible to recurring incidents that increase in damage over time. Make the case for problem management, and successfully reduce the volume of unplanned work by scheduling it into regular IT activity.
      • Recurring incidents will happen; use runbooks for a consistent response each time. Save your organization response time and confusion by developing your own specific incident use cases. Incident response should follow a standard process, but each incident will have its own escalation process or call tree that identifies key participants.

      Impact and Result

      • Effective and efficient management of incidents involves a formal process of identifying, classifying, categorizing, responding, resolving, and closing of each incident. The key for smaller organizations, where technology or resources is a constraint, is to make the best practices usable for your unique environment.
      • Develop a plan that aligns with your organizational needs, and adapt best practices into light, sustainable processes, with the goal to improve time to resolve, cost to serve, and ultimately, end-user satisfaction.
      • Successful implementation of incident management will elevate the maturity of the service desk to a controlled state, preparing you for becoming proactive with problem management.

      Incident Management for Small Enterprise Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should implement incident management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and log incidents

      This phase will provide an overview of the incident lifecycle and an activity on how to classify the various types of incidents in your environment.

      • Service Desk Standard Operating Procedure
      • Incident Management Workflow Library (Visio)
      • Incident Management Workflow Library (PDF)

      2. Prioritize and define SLAs

      This phase will help you develop a categorization scheme for incident handling that ensures success and keeps it simple. It will also help you identify the most important runbooks necessary to create first.

      • Service Desk Ticket Categorization Schemes
      • IT Incident Runbook Prioritization Tool
      • IT Incident Management Runbook Blank Template

      3. Respond, recover, and close incidents

      This phase will help you identify how to use a knowledgebase to resolve incidents quicker. Identify what needs to be answered during a post-incident review and identify the criteria needed to invoke problem management.

      • Knowledgebase Article Template
      • Root-Cause Analysis Template
      • Post-Incident Review Questions Tracking Tool
      [infographic]

      Workshop: Incident Management for Small Enterprise

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess the Current State

      The Purpose

      Assess the current state of the incident management lifecycle within the organization.

      Key Benefits Achieved

      Understand the incident lifecycle and how to classify them in your environment.

      Identify the roles and responsibilities of the incident response team.

      Document the incident workflows to identify areas of opportunities.

      Activities

      1.1 Outline your incident lifecycle challenges.

      1.2 Identify and classify incidents.

      1.3 Identify roles and responsibilities for incident handling.

      1.4 Design normal and critical incident workflows for target state.

      Outputs

      List of incident challenges for each phase of the incident lifecycle

      Incident classification scheme mapped to resolution team

      RACI chart

      Incident Workflow Library

      2 Define the Target State

      The Purpose

      Design or improve upon current incident and ticket categorization schemes, priority, and impact.

      Key Benefits Achieved

      List of the most important runbooks necessary to create first and a usable template to go forward with

      Activities

      2.1 Improve incident categorization scheme.

      2.2 Prioritize and define SLAs.

      2.3 Understand the purpose of runbooks and prioritize development.

      2.4 Develop a runbook template.

      Outputs

      Revised ticket categorization scheme

      Prioritization matrix based on impact and urgency

      IT Incident Runbook Prioritization Tool

      Top priority incident runbook

      3 Bridge the Gap

      The Purpose

      Respond, recover, and close incidents with root-cause analysis, knowledgebase, and incident runbooks.

      Key Benefits Achieved

      This module will help you to identify how to use a knowledgebase to resolve quicker.

      Identify what needs to be answered during a post-incident review.

      Identify criteria to invoke problem management.

      Activities

      3.1 Build a targeted knowledgebase.

      3.2 Build a post-incident review process.

      3.3 Identify metrics to track success.

      3.4 Build an incident matching process.

      Outputs

      Working knowledgebase template

      Root-cause analysis template and post-incident review checklist

      List of metrics

      Develop criteria for problem management

      Mature and Scale Product Ownership

      • Buy Link or Shortcode: {j2store}145|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $21,919 Average $ Saved
      • member rating average days saved: 13 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Product owners must bridge the gap between the customers, operations, and delivery to ensure products continuously deliver increasing value.
      • Product owners are often assigned to projects or product delivery without proper support, guidance, or alignment.
      • In many organizations, the product owner role is not well-defined, serves as a proxy for stakeholder ownership, and lacks reinforcement of the key skills needed to be successful.

      Our Advice

      Critical Insight

      A product owner is the CEO for their product. Successful product management starts with empowerment and accountability. Product owners own the vision, roadmap, and value realization for their product or family aligned to enterprise goals and priorities.

      • Product and service ownership share the same foundation - underlying capabilities and best practices to own and improve a product or service are identical for both roles. Use the terms that make the most sense for your culture.
      • Product owners represent three primary perspectives: Business (externally facing), Technical (systems and tools), or Operational (manual processes). Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.
      • Product owners are operating under an incomplete understanding of the capabilities needed to succeed. Most product/service owners lack a complete picture of the needed capabilities, skills, and activities to successfully perform their roles.

      Impact and Result

      • Create a culture of product management trust and empowerment with product owners aligned to your operational structure and product needs.
      • Promote and develop true Agile skills among your product owners and family managers.
      • Implement Info-Tech’s product owner capability model to define the role expectations and provide a development path for product owners.

      Mature and Scale Product Ownership Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Mature and Scale Product Ownership Storyboard – Establish a culture of success for product management and mature product owner capabilities.

      Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

    • Establish a foundation for empowerment and success.
    • Assign and align product owners with products and stakeholders.
    • Mature product owner capabilities and skills.
      • Mature and Scale Product Ownership Storyboard

      2. Mature and Scale Product Ownership Readiness Assessment – Determine your readiness for a product-centric culture based on Info-Tech’s CLAIM+G model.

      Using Info-Tech’s CLAIM model, quickly determine your organization’s strengths and weaknesses preparing for a product culture. Use the heat map to identify key areas.

      • Mature and Scale Product Ownership Readiness Assessment

      3. Mature and Scale Product Ownership Playbook – Playbook for product owners and product managers.

      Use the blueprint exercises to build your personal product owner playbook. You can also use the workbook to capture exercise outcomes.

      • Mature and Scale Product Ownership Playbook

      4. Mature and Scale Product Ownership Workbook – Workbook for product owners and product managers.

      Use this workbook to capture exercise outcomes and transfer them to your Mature and Scale Product Ownership Playbook (optional).

      • Mature and Scale Product Ownership Workbook

      5. Mature and Scale Product Ownership Proficiency Assessment – Determine your current proficiency and improvement areas.

      Product owners need to improve their core capabilities and real Agile skills. The assessment radar will help identify current proficiency and growth opportunities.

      • Mature and Scale Product Ownership Proficiency Assessment
      [infographic]

      Workshop: Mature and Scale Product Ownership

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the foundation for product ownership

      The Purpose

      Establish the foundation for product ownership.

      Key Benefits Achieved

      Product owner playbook with role clarity and RACI.

      Activities

      1.1 Define enablers and blockers of product management.

      1.2 Define your product management roles and names.

      1.3 Assess your product management readiness.

      1.4 Identify your primary product owner perspective.

      1.5 Define your product owner RACI.

      Outputs

      Enablers and blockers

      Role definitions.

      Product culture readiness

      Product owner perspective mapping

      Product owner RACI

      2 Align product owners to products

      The Purpose

      Align product owners to products.

      Key Benefits Achieved

      Assignment of resources to open products.

      A stakeholder management strategy.

      Activities

      2.1 Assign resources to your products and families.

      2.2 Visualize relationships to identify key influencers.

      2.3 Group stakeholders into categories.

      2.4 Prioritize your stakeholders.

      Outputs

      Product resource assignment

      Stakeholder management strategy

      Stakeholder management strategy

      Stakeholder management strategy

      3 Mature product owner capabilities

      The Purpose

      Mature product owner capabilities.

      Key Benefits Achieved

      Assess your Agile product owner readiness

      Assess and mature product owner capabilities

      Activities

      3.1 Assess your real Agile skill proficiency.

      3.2 Assess your vison capability proficiency.

      3.3 Assess your leadership capability proficiency.

      3.4 Assess your PLM capability proficiency.

      3.5 Assess your value realization capability proficiency.

      3.6 Identify your business value drivers and sources of value.

      Outputs

      Real Agile skill proficiency assessment

      Info-Tech’s product owner capability model proficiency assessment

      Info-Tech’s product owner capability model proficiency assessment

      Info-Tech’s product owner capability model proficiency assessment

      Info-Tech’s product owner capability model proficiency assessment

      Business value drivers and sources of value

      Further reading

      Mature and Scale Product Ownership

      Strengthen the product owner’s role in your organization by focusing on core capabilities and proper alignment.

      Executive Brief

      Analyst Perspective

      Empower product owners throughout your organization.

      Hans Eckman

      Whether you manage a product or service, the fundamentals of good product ownership are the same. Organizations need to focus on three key elements of product ownership in order to be successful.

      • Create an environment of empowerment and service leadership to reinforce product owners and product family managers as the true owners of the vision, improvement, and realized the value of their products.
      • Align product and product family owner roles based on operational alignment and the groups defined when scaling product management.
      • Develop your product owners to improve the quality of roadmaps, alignment to enterprise goals, and profit and loss (P&L) for each product or service.

      By focusing the attention of the teammates serving in product owner or service owner roles, your organization will deliver value sooner and respond to change more effectively.

      Hans Eckman

      Principal Research Director – Application Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Product owners must bridge the gap between the customers, operations, and delivery to ensure products continuously deliver increasing value.

      Product owners are often assigned to projects or product delivery without proper support, guidance, or alignment.

      In many organizations the product owner role is not well-defined, serves as a proxy for stakeholder ownership, and lacks reinforcement of the key skills needed to be successful.

      Common Obstacles

      Organizations have poor alignment or missing product owners between lines of business, IT, and operations.

      Product owners are aligned to projects and demand management rather than long-term strategic product ownership.

      Product families are not properly defined, scaled, and supported within organizations.

      Individuals in product owner roles have an incomplete understanding of needed capabilities and lack a development path.

      Info-Tech's Approach

      Create a culture of product management trust and empowerment with product owners aligned to your operational structure and product needs.

      Promote and develop true Agile skills among your product owners and family managers.

      Implement Info-Tech’s product owner capability model to define the role expectations and provide a development path for product owners.

      Extend product management success using Deliver on Your Digital Product Vision and Deliver Digital Products at Scale.

      Info-Tech Insight

      There is no single correct approach to product ownership. Product ownership must be tuned and structured to meet the delivery needs of your organization and the teams it serves.

      Info-Tech’s Approach

      Product owners make the final decision

      • Establish a foundation for empowerment and success
      • Assign product owners and align with products and stakeholders
      • Mature product owner capabilities and skills
      Product Owner capabilities: Vision, Product Lifecycle Management, Leadership, Value Realization

      The Info-Tech difference

      1. Assign product owners where product decisions are needed, not to match org charts or delivery teams. The product owner has the final word on product decisions.
      2. Organize product owners into related teams to ensure product capabilities delivered are aligned to enterprise strategy and goals.
      3. Shared products and services must support the needs of many product owners with conflicting priorities. Shared service product owners must map and prioritize demand to align to enterprise priorities and goals.
      4. All product owners share the same capability model.

      Insight summary

      There is no single correct approach to product ownership

      Successful product management starts with empowerment and accountability. Product owners own the vision, roadmap, and value realization for their product or family aligned to enterprise goals and priorities.

      Phase 1 insight

      Product owners represent three primary perspectives: business (external-facing), technical (systems and tools), or operational (manual processes). Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.

      Phase 2 insight

      Start with your operational grouping of products and families, identifying where an owner is needed. Then, assign people to the products and families. The owner does not define the product or family.

      Phase 3 insight

      Product owners are operating under an incomplete understanding of the capabilities needed to succeed. Most product/service owners lack a complete picture of the needed capabilities, skills, and activities to successfully perform their roles.

      Product and service ownership share the same foundation

      The underlying capabilities and best practices to own and improve a product or service are identical for both roles. Use the terms that make the most sense for your culture.

      Map product owner roles to your existing job titles

      Identify where product management is needed and align expectations with existing roles. Successful product management does not require a dedicated job family.

      Projects can be a mechanism for funding product changes and improvements

      Projects can be a mechanism for funding product changes and improvements. Shows difference of value for project life-cycles, hybrid life-cycles, and product life-cycles.

      Projects within products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

      You go through a period or periods of project-like development to build a version of an application or product.

      You also have parallel services along with your project development, which encompass the more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

      Product and services owners share the same foundation and capabilities

      For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. The term “product” is used for consistency but would apply to services, as well.

      Product = Service

      Common foundations: Focus on continuous improvement, ROI, and value realization. Clear vision, goals, roadmap, and backlog.

      “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Recognize the product owner perspectives

      The 3 product owner perspectives. 1. Business: Customer-facing, value-generating. 2. Technical: IT systems and tools. 3. Operations: Keep-the-lights-on processes.

      Product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.

      Info-Tech Insight

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Match your product management role definitions to your product family levels

      Product ownership exists at the different operational tiers or levels in your product hierarchy. This does not imply a management relationship.

      Product portfolio

      Groups of product families within an overall value stream or capability grouping.

      Project portfolio manager

      Product family

      A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.

      Product family manager

      Product

      Single product composed of one or more applications and services.

      Product owner

      Info-Tech Insight

      Define the current roles that will perform the product management function or define consistent role names to product owners and managers.

      Align enterprise value through product families

      Product families are operational groups based on capabilities or business functions. Product family managers translate goals, priorities, and constraints so they are actionable at the next level. Product owners prioritize changes to enhance the capabilities that allow you to realize your product family. Enabling capabilities realize value and help reach your goals.

      Understand special circumstances

      In Deliver Digital Products at Scale, products were grouped into families using Info-Tech’s five scaling patterns. Assigning owners to Enterprise Applications and Shared Services requires special consideration.

      Value stream alignment

      • Business architecture
        • Value stream
        • Capability
        • Function
      • Market/customer segment
      • Line of business (LoB)
      • Example: Customer group > value stream > products

      Enterprise applications

      • Enabling capabilities
      • Enterprise platforms
      • Supporting apps
      • Example: HR > Workday/Peoplesoft > Modules Supporting: Job board, healthcare administrator

      Shared Services

      • Organization of related services into service family
      • Direct hierarchy does not necessarily exist within the family
      • Examples: End-user support and ticketing, workflow and collaboration tools

      Technical

      • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
      • Often used in combination with Shared Services grouping or LoB-specific apps
      • Examples: Java, .NET, low-code, database, network

      Organizational alignment

      • Used at higher levels of the organization where products are aligned under divisions
      • Separation of product managers from organizational structure is no longer needed because the management team owns the product management role

      Map sources of demand and influencers

      Use the stakeholder analysis to define the key stakeholders and sources of demand for enterprise applications and shared services. Extend your mapping to include their stakeholders and influencers to uncover additional sources of demand and prioritization.

      Map of key stakeholders for enterprise applications and shared services.

      Info-Tech Insight

      Your product owner map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support and operate your product directly.

      Combine your product owner map with your stakeholder map to create a comprehensive view of influencers.

      The primary value of the product owner is to fill the backlog with the highest ROI opportunities aligned with enterprise goals.

      Info-Tech Insight

      The product owner owns the direction of the product.

      • Roadmap - Where are we going?
      • Backlog - What changes are needed to get there?
      • Product review - Did we get close enough?

      Product delivery realizes value for your product family

      While planning and analysis are done at the family level, work and delivery are done at the individual product level.

      Product strategy includes: Vision, Goals, Roadmap, backlog and Release plan.

      Product family owners are more strategic

      When assigning resources, recognize that product family owners will need to be more strategic with their planning and alignment of child families and products.

      Product family owners are more strategic. They require a roadmap that is strategic, goal-based, high-level, and flexible.

      Info-Tech Insight

      Roadmaps for your product family are, by design, less detailed. This does not mean they aren’t actionable! Your product family roadmap should be able to communicate clear intentions around the future delivery of value in both the near and long term.

      Connecting your product family roadmaps to product roadmaps

      Your product and product family roadmaps should be connected at an artifact level that is common between both. Typically, this is done with capabilities, but it can be done at a more granular level if an understanding of capabilities isn’t available.

      Product family roadmap versus Product Roadmaps.

      Develop a product owner stakeholder strategy

      Stakeholder management, Product lifecycle, Project delivery, Operational support.

      Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner can accomplish.

      Product owners operate within a network of stakeholders who represent different perspectives within the organization.

      First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders.

      Without a stakeholder strategy, product owners will encounter obstacles, resistance, or unexpected changes.

      Create a stakeholder network map to product roadmaps and prioritization

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers, to uncover hidden stakeholders.

      Stakeholder network map defines the influence landscape your product operates. Connectors determine who may be influencing your direct stakeholders.

      Info-Tech Insight

      Your stakeholder map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support and operate your product directly.

      Use “connectors” to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.

      Being successful at Agile is more than about just doing Agile

      The following represents the hard skills needed to “Do Agile”:

      Being successful at Agile needs 4 hard skills: 1. Engineering skills, 2. Technician Skills, 3. Framework/Process skills, 4. Tools skills.
      • Engineering skills. These are the skills and competencies required for building brand-new valuable software.
      • Technician skills. These are the skills and competencies required for maintaining and operating the software delivered to stakeholders.
      • Framework/Process skills. These are the specific knowledge skills required to support engineering or technician skills.
      • Tools skills. This represents the software that helps you deliver other software.

      While these are important, they are not the whole story. To effectively deliver software, we believe in the importance of being Agile over simply doing Agile.

      Adapted from: “Doing Agile” Is Only Part of the Software Delivery Pie

      Why focus on core skills?

      They are the foundation to achieve business outcomes

      Skills, actions, output and outcomes

      The right skills development is only possible with proper assessment and alignment against outcomes.

      Focus on these real Agile skills

      Agile skills

      • Accountability
      • Collaboration
      • Comfort with ambiguity
      • Communication
      • Empathy
      • Facilitation
      • Functional decomposition
      • Initiative
      • Process discipline
      • Resilience

      Product capabilities deliver value

      As a product owner, you are responsible for managing these facets through your capabilities and activities.

      The core product and value stream consists of: Funding - Product management and governance, Business functionality - Stakeholder and relationship management, and Technology - Product delivery.

      Info-Tech Best Practice

      It is easy to lose sight of what matters when we look at a product from a single point of view. Despite what "The Agile Manifesto" says, working software is not valuable without the knowledge and support that people need in order to adopt, use, and maintain it. If you build it, they will not come. Product owners must consider the needs of all stakeholders when designing and building products.

      Recognize product owner knowledge gaps

      Pulse survey of product owners

      Pulse survey of product owners. Graph shows large percentage of respondents have alignment to common agile definition of product owners. Yet a significant perception gap in P&L, delivery, and analytics.

      Info-Tech Insight

      1. Less than 15% of respondents identified analytics or financial management as a key component of product ownership.
      2. Assess your product owner’s capabilities and understanding to develop a maturity plan.

      Source: Pulse Survey (N=18)

      Implement the Info-Tech product owner capability model

      Unfortunately, most product owners operate with incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization.

      Product Owner capabilities: Vision, Product Lifecycle Management, Leadership, Value Realization

      Vision

      • Market Analysis
      • Business Alignment
      • Product Roadmap

      Leadership

      • Soft Skills
      • Collaboration
      • Decision Making

      Product Lifecycle Management

      • Plan
      • Build
      • Run

      Value Realization

      • KPIs
      • Financial Management
      • Business Model

      Product owner capabilities provide support

      Vision predicts impact of Value realization. Value realization provides input to vision

      Your vision informs and aligns what goals and capabilities are needed to fulfill your product or product family vision and align with enterprise goals and priorities. Each item on your roadmap should have corresponding KPIs or OKRs to know how far you moved the value needle. Value realization measures how well you met your target, as well as the impacts on your business value canvas and cost model.

      Product lifecycle management builds trust with Leadership. Leadership improves quality of Product lifecycle management.

      Your leadership skills improve collaborations and decisions when working with your stakeholders and product delivery teams. This builds trust and improves continued improvements to the entire product lifecycle. A product owner’s focus should always be on finding ways to improve value delivery.

      Product owner capabilities provide support

      Leadership enhances Vision. Vision Guides Product Lifecycle Management. Product Lifecycle Management delivers Value Realization. Leadership enhances Value Realization

      Develop product owner capabilities

      Each capability: Vision, Product lifecycle management, Value realization and Leadership has 3 components needed for successful product ownership.

      Avoid common capability gaps

      Vision

      • Focusing solely on backlog grooming (tactical only)
      • Ignoring or failing to align product roadmap to enterprise goals
      • Operational support and execution
      • Basing decisions on opinion rather than market data
      • Ignoring or missing internal and external threats to your product

      Leadership

      • Failing to include feedback from all teams who interact with your product
      • Using a command-and-control approach
      • Viewing product owner as only a delivery role
      • Acting as a proxy for stakeholder decisions
      • Avoiding tough strategic decisions in favor of easier tactical choices

      Product lifecycle management

      • Focusing on delivery and not the full product lifecycle
      • Ignoring support, operations, and technical debt
      • Failing to build knowledge management into the lifecycle
      • Underestimating delivery capacity, capabilities, or commitment
      • Assuming delivery stops at implementation

      Value realization

      • Focusing exclusively on “on time/on budget” metrics
      • Failing to measure a 360-degree end-user view of the product
      • Skipping business plans and financial models
      • Limiting financial management to project/change budgets
      • Ignoring market analysis for growth, penetration, and threats

      Your product vision is your North Star

      It's ok to dream a little!

      Who is the target customer, what is the key benefit, what do they need, what is the differentiator

      Adapted from: Crossing the Chasm

      Info-Tech Best Practice

      A product vision shouldn’t be so far out that it doesn’t feel real or so short-term that it gets bogged down in minutiae and implementation details. Finding the right balance will take some trial and error and will be different for each organization.

      Leverage the product canvas to state and inform your product vision

      Leverage the product Canvas to state and inform your product vision. Includes: Product name, Tracking info, Vision, List of business objectives or goals, Metrics used to measure value realization, List of groups who consume the product/service, and List of key resources or stakeholders.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      Use a balanced value to establish a common definition of goals and value

      Value drivers are strategic priorities aligned to our enterprise strategy and translated through our product families. Each product and change has an impact on the value driver helping us reach our enterprise goals.

      Importance of the value driver multiplied by the Impact of value score is equal to the Value score.

      Info-Tech Insight

      Your value drivers and impact helps estimate the expected value of roadmap items, prioritize roadmap and backlog items, and identify KPIs and OKRs to measure value realization and actual impact.

      Use CLAIM to guide your journey

      Culture, Learning, Automation, Integrated teams, Metrics and governance.

      Value is best created by self-managing teams who deliver in frequent, short increments supported by leaders who coach them through challenges.

      Product-centric delivery and Agile are a radical change in how people work and think. Structured, facilitated learning is required throughout the transformation to help leaders and practitioners make the shift.

      Product management, Agile, and DevOps have inspired SDLC tools that have become a key part of delivery practices and work management.

      Self-organizing teams that cross business, delivery, and operations are essential to gain the full benefits of product-centric delivery.

      Successful implementations require the disciplined use of metrics that support developing better teams

      Communicate reasons for changes and how they will be implemented

      Five elements of communicating change: What is the change? Why are we doing it? How are we going to go about it? How long will it take us to do it? What will the role be for each department individual?

      Leaders of successful change spend considerable time developing a powerful change message; that is, a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

      The organizational change message should:

      • Explain why the change is needed.
      • Summarize what will stay the same.
      • Highlight what will be left behind.
      • Emphasize what is being changed.
      • Explain how the change will be implemented.
      • Address how change will affect various roles in the organization.
      • Discuss the staff’s role in making the change successful.

      Info-Tech’s methodology for mature and scale product ownership

      Phase steps

      1. Establish the foundation for product ownership

      Step 1.1 Establish an environment for product owner success

      Step 1.2 Establish your product ownership model

      2. Align product owners to products

      Step 2.1 Assign product owners to products

      Step 2.2 Manage stakeholder influence

      3. Mature product owner capabilities

      Step 3.1 Assess your Agile product owner readiness

      Step 3.2 Mature product owner capabilities

      Phase outcomes

      1.1.1 Define enablers and blockers of product management

      1.1.2 Define your product management roles and names

      1.2.1 Identify your primary product owner perspective

      1.2.2 Define your product owner RACI

      2.1.1 Assign resources to your products and families

      2.2.1 Visualize relationships to identify key influencers

      2.2.2 Group stakeholders into categories

      2.2.3 Prioritize your stakeholders

      3.1.1 Assess your real Agile skill proficiency

      3.2 Mature product owner capabilities

      3.2.1 Assess your vision capability proficiency

      3.2.2 Assess your leadership capability proficiency

      3.2.3 Assess your PLM capability proficiency

      3.2.4 Identify your business value drivers and sources of value

      3.2.5 Assess your value realization capability proficiency

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals.

      Key deliverable

      Mature and Scale Product Ownership Playbook

      Capture and organize the outcomes of the activities in the workbook.

      Mature and Scale Product Ownership Workbook

      The workbook helps organize and communicate the outcomes of each activity.

      Mature and Scale Product Ownership Readiness Assessment

      Determine your level of mastery of real Agile skills and product owner capabilities.


      Blueprint benefits

      IT benefits

      • Competent product owner who can support teams operating in any delivery methodology.
      • Representative viewpoint and input from the technical and operational product owner perspectives.
      • Products aligned to business needs and committed work are achievable.
      • Single point of contact with a business representative.
      • Acceptance of product owner role outside the Scrum teams.

      Business benefits

      • Better alignment to enterprise goals, vision, and outcomes.
      • Improved coordination with stakeholders.
      • Quantifiable value realization tied to vision.
      • Product decisions made at the right time and with the right input.
      • Product owner who has the appropriate business, operations, and technical knowledge.

      Measure the value of this blueprint

      Align product owner metrics to product delivery and value realization.

      Member outcome

      Suggested Metric

      Estimated impact

      Increase business application satisfaction Satisfaction of business applications (CIO BV Diagnostic) 20% increase within one year after implementation
      Increase effectiveness of application portfolio management Effectiveness of application portfolio management (M&G Diagnostic) 20% increase within one year after implementation
      Increase importance and effectiveness of application portfolio Importance and effectiveness to business (APA Diagnostic) 20% increase within one year after implementation
      Increase satisfaction of support of business operations Support to business (CIO BV Diagnostic) 20% increase within one year after implementation
      Successfully deliver committed work (productivity) Number of successful deliveries; burndown Reduction in project implementation overrun by 20%

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project"

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Establish the Foundation for Product Ownership

      Phase 2 Align Product Owners to Products

      Phase 3 Mature Product Owner Capabilities

      • Call #1:
        Scope objectives and your specific challenges
      • Call #2:
        Step 1.1 Establish an environment for product owner success
        Step 1.2 Establish your product ownership model
      • Call #3:
        Step 2.1 Assign product owners to products
      • Call #4:
        Step 2.2 Manage stakeholder influence
      • Call #5:
        Step 3.1 Assess your Agile product owner readiness
      • Call #6:
        Step 3.2 Mature product owner capabilities

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 and 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Phase 1

      Phase 2

      Phase 3

      Activities

      Establish the Foundation for Product Ownership

      Step 1.1 Establish an environment for product owner success

      1.1.1 Define enablers and blockers of product management

      1.1.2 Define your product management roles and names

      1.1.3 Assess your product management readiness

      Step 1.2 Establish your product ownership model

      1.2.1 Identify your primary product owner perspective

      1.2.2 Define your product owner RACI

      Align Product Owners to Products

      Step 2.1 Assign product owners to products

      2.1.1 Assign resources to your products and families

      Step 2.2 Manage stakeholder influence

      2.2.1 Visualize relationships to identify key influencers

      2.2.2 Group stakeholders into categories

      2.2.3 Prioritize your stakeholders

      Mature Product Owner Capabilities

      Step 3.1 Assess your Agile product owner readiness

      3.1.1 Assess your real Agile skill proficiency

      Step 3.2 Mature product owner capabilities=

      3.2.1 Assess your Vision capability proficiency

      3.2.2 Assess your Leadership capability proficiency

      3.2.3 Assess your PLM capability proficiency

      3.2.4 Identify your business value drivers and sources of value

      3.2.5 Assess your Value Realization capability proficiency

      Deliverables

      1. Enablers and blockers
      2. Role definitions
      3. Product culture readiness
      4. Product owner perspective mapping
      5. Product owner RACI
      1. Product resource assignment
      2. Stakeholder management strategy
      1. Real Agile skill proficiency assessment
      2. Info-Tech’s product owner capability model proficiency assessment
      3. Business value drivers and sources of value

      Related Info-Tech Research

      Product delivery

      Deliver on Your Digital Product Vision

      Build a product vision your organization can take from strategy through execution.

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      Build Your Agile Acceleration Roadmap

      Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.

      Develop Your Agile Approach for a Successful Transformation

      Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.

      Implement DevOps Practices That Work

      Streamline business value delivery through the strategic adoption of DevOps practices.

      Extend Agile Practices Beyond IT

      Further the benefits of Agile by extending a scaled Agile framework to the business.

      Build Your BizDevOps Playbook

      Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.

      Embed Security Into the DevOps Pipeline

      Shift security left to get into DevSecOps.

      Spread Best Practices With an Agile Center of Excellence

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Enable Organization-Wide Collaboration by Scaling Agile

      Execute a disciplined approach to rolling out Agile methods in the organization.

      Related Info-Tech Research

      Application portfolio management

      APM Research Center

      See an overview of the APM journey and how we can support the pieces in this journey.

      Application Portfolio Management Foundations

      Ensure your application portfolio delivers the best possible return on investment.

      Streamline Application Maintenance

      Effective maintenance ensures the long-term value of your applications.

      Streamline Application Management

      Move beyond maintenance to ensuring exceptional value from your apps.

      Build an Application Department Strategy

      Delivering value starts with embracing what your department can do.

      Embrace Business-Managed Applications

      Empower the business to implement its own applications with a trusted business-IT relationship.

      Optimize Applications Release Management

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Value, delivery metrics, estimation

      Build a Value Measurement Framework

      Focus product delivery on business value-driven outcomes.

      Select and Use SDLC Metrics Effectively

      Be careful what you ask for, because you will probably get it.

      Application Portfolio Assessment: End User Feedback

      Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Refine Your Estimation Practices With Top-Down Allocations

      Don’t let bad estimates ruin good work.

      Estimate Software Delivery With Confidence

      Commit to achievable software releases by grounding realistic expectations.

      Reduce Time to Consensus With an Accelerated Business Case

      Expand on the financial model to give your initiative momentum.

      Optimize Project Intake, Approval, and Prioritization

      Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.

      Enhance PPM Dashboards and Reports

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Organizational design and performance

      Redesign Your IT Organizational Structure

      Focus product delivery on business value-driven outcomes.

      Build a Strategic Workforce Plan

      Have the right people in the right place, at the right time.

      Implement a New Organizational Structure

      Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.

      Build an IT Employee Engagement Program

      Don’t just measure engagement, act on it.

      Set Meaningful Employee Performance Measures

      Set holistic measures to inspire employee performance.

      Phase 1

      Establish the Foundation for Product Ownership

      Phase 1: Establish an environment for product owner success, Establish your product ownership model

      Mature and Scale Product Ownership

      This phase will walk you through the following activities:

      1.1.1 Define enablers and blockers of product management

      1.1.2 Define your product management roles and names

      1.1.3 Assess your product management readiness

      1.2.1 Identify your primary product owner perspective

      1.2.2 Define your product owner RACI

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Step 1.1

      Establish an environment for product owner success

      Activities

      1.1.1 Define enablers and blockers of product management

      1.1.2 Define your product management roles and names

      1.1.3 Assess your product management readiness

      Establish the foundation for product ownership

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Enablers and blockers
      • Role definitions

      Empower product owners as the true owners of their product

      Product ownership requires decision-making authority and accountability for the value realization from those decisions. POs are more than a proxy for stakeholders, aggregators for changes, and the communication of someone else’s priorities.

      “A Product Owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The Product Owner is someone who really 'owns' the product.”

      – Robbin Schuurman,
      “Tips for Starting Technical Product Managers”

      Info-Tech Best Practice

      Implement Info-Tech’s Product Owner Capability Model to help empower and hold product owners accountable for the maturity and success of their product. The product owner must understand how their product fits into the organization’s mission and strategy in order to align to enterprise value.

      Product and service owners share the same foundation and capabilities

      For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. The term “product” is used for consistency but applies to services, as well.

      Product = Service

      Common foundations: Focus on continuous improvement, ROI, and value realization. Clear vision, goals, roadmap, and backlog.

      “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Define product ownership to match your culture and customers

      Characteristics of a discrete product:

      • Has end users or consumers
      • Delivers quantifiable value
      • Evolves or changes over time
      • Has predictable delivery
      • Has definable boundaries
      • Has a cost to produce and operate
      • Has a discrete backlog and roadmap of improvements

      What does not need a product owner?

      • Individual features
      • Transactions
      • Unstructured data
      • One-time solutions
      • Non-repeatable processes
      • Solutions that have no users or consumers
      • People or teams

      Info-Tech Insight

      • Products are long-term endeavors that don’t end after the project finishes.
      • Products mature and improve their ability to deliver value.
      • Products have a discrete backlog of changes to improve the product itself, separate from operational requests fulfilled by the product or service.

      Need help defining your products or services? Download our blueprint Deliver Digital Products at Scale.

      Connect roadmaps to value realization with KPIs

      Every roadmap item should have an expected realized value once it is implemented. The associate KPIs or OKRs determine if our goal was met. Any gap in value feedback back into the roadmap and backlog refinement.</p data-verified=

      " loading="lazy">

      Info-Tech Insight

      Every roadmap item should have an expected realized value once it is implemented. The associate KPIs or OKRs determine if our goal was met. Any gap in value feedback back into the roadmap and backlog refinement.

      Identify the differences between a project-centric and a product-centric organization

      Differences between Project centric and Product centric organizations in regards to: Funding, Prioritization, Accountability, Product management, Work allocation, and Capacity management.

      Info-Tech Insight

      Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.

      Projects can be a mechanism for funding product changes and improvements

      Projects lifecycle, hybrid lifecycle and product lifecycle. Period or periods of project development have parallel services that encompass a more product-based view.

      Projects withing products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

      You go through a period or periods of project-like development to build a version of an application or product.

      You also have parallel services along with your project development, which encompasses a more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

      Recognize common barriers to product management

      The transition to product ownership is a series of behavioral and cultural changes supported by processes and governance. It takes time and consistency to be successful.

      • Command and control structures
      • Lack of ownership and accountability
      • High instability in the market, demand, or organization
      • Lack of dedicated teams align to delivery, service, or product areas
      • Culture of one-off projects
      • Lack of identified and engaged stakeholders
      • Lack of customer exposure and knowledge

      Agile’s four core values

      “…while there is value in the items on the right, we value the items on the left more.”

      Source: “The Agile Manifesto”

      We value...

      We value being agile: Individuals and interactions, Working Software, Customer collaboration, Responding to change. Versus being prescriptive: Processes and tools, Comprehensive documentation, Contract negotiation, following a plan.

      Exercise 1.1.1 Define enablers and blockers of product management

      1 hour
      1. Identify and mitigate blockers of product management in your organization.
      2. What enablers will support strong product owners?
      3. What blockers will make the transition to product management harder?
      4. For each blocker, also define at least one mitigating step.
      Define enablers e.g. team culture. Define blockers and at least one mitigating step

      Output

      • Enablers and blockers

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Align enterprise value through product families

      Product families are operational groups based on capabilities or business functions. Product family managers translate goals, priorities, and constraints so they are actionable at the next level. Product owners prioritize changes to enhance the capabilities that allow you to realize your product family. Enabling capabilities realize value and help reach your goals.

      Effective product delivery requires thinking about more than just a single product

      Good application and product management begins with strengthening good practices for a single or small set of applications, products, and services.

      Product portfolio

      Groups of product families within an overall value stream or capability grouping.

      Project portfolio manager

      Product family

      A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.

      Product family manager

      Product

      Single product composed of one or more applications and services.

      Product owner

      Info-Tech Insight

      Define the current roles that will perform the product management function or define consistent role names to product owners and managers.

      Exercise 1.1.2 Define your product management roles and names

      1-2 hour
      1. Identify the roles in which product management activities will be owned.
      2. Define a common set of role names and describe the role.
      3. Map the level of accountability for each role: Product or Product Family
      4. Product owner perspectives will be defined in the next step.

      Define roles, description and level of product accountability.

      Output

      • Role definitions

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Use CLAIM to guide your journey

      Culture, Learning, Automation, Integrated teams, Metrics and governance.

      Value is best created by self-managing teams who deliver in frequent, short increments supported by leaders who coach them through challenges.

      Product-centric delivery and Agile are a radical change in how people work and think. Structured, facilitated learning is required throughout the transformation to help leaders and practitioners make the shift.

      Product management, Agile, and DevOps have inspired SDLC tools that have become a key part of delivery practices and work management.

      Self-organizing teams that cross business, delivery, and operations are essential to gain the full benefits of product-centric delivery.

      Successful implementations require the disciplined use of metrics that support developing better teams

      Exercise 1.1.3 Assess your product management readiness

      1 hour
      1. Open and complete the Mature and Scale Product Ownership Readiness Assessment in your Playbook or the provided Excel tool.
      2. Discuss high and low scores for each area to reach a consensus.
      3. Record your results in your Playbook.

      Assess your culture, learning, automation, Integrated teams, metrics and governance.

      Output

      • Assessment of product management readiness based on Info-Tech’s CLAIM+G model.

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Readiness Assessment.

      Communicate reasons for changes and how they will be implemented

      Five elements of communicating change: What is the change? Why are we doing it? How are we going to go about it? How long will it take us to do it? What will the role be for each department individual?

      Leaders of successful change spend considerable time developing a powerful change message; that is, a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

      The organizational change message should:

      Step 1.2

      Establish your product ownership model

      Activities

      1.2.1 Identify your primary product owner perspective

      1.2.2 Define your product owner RACI

      Establish the foundation for product ownership

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Product owner perspective mapping
      • Product owner RACI

      Recognize the product owner perspectives

      The 3 product owner perspectives. 1. Business: Customer-facing, value-generating. 2. Technical: IT systems and tools. 3. Operations: Keep-the-lights-on processes.

      Product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their primary perspective.

      Info-Tech Best Practice

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Identify and align to product owner perspectives to ensure product success

      Product owner perspectives

      The 3 product owner perspectives. 1. Business: Customer-facing, value-generating. 2. Technical: IT systems and tools. 3. Operations: Keep-the-lights-on processes.
      1. Each product owner perspective provides important feedback, demand, and support for the product.
      2. Where a perspective is represented by a distinct role, the perspective is managed with that product owner.
      3. If separate roles don’t exist, the product owner must evaluate their work using two or three perspectives.
      4. The ultimate success of a product, and therefore product owner, is meeting the end-user value of the business product owner, tool support of the technical product owner, and manual processing support of the operations product owner.

      Line of business (LOB) product owners

      LOB product owners focus on the products and services consumed by the organization’s external consumers and users. The role centers on the market needs, competitive landscape, and operational support to deliver products and services.

      Business perspective

      • Alignment to enterprise strategy and priorities
      • Growth: market penetration and/or revenue
      • Perception of product value
      • Quality, stability, and predictability
      • Improvement and innovation
      • P&L
      • Market threats and opportunities
      • Speed to market
      • Service alignment
      • Meet or exceed individual goals

      Relationship to Operations

      • Customer satisfaction
      • Speed of delivery and manual processing
      • Continuity

      Relationship to Technical

      • Enabler
      • Analysis and insight
      • Lower operating and support costs

      Technical product owners

      Technical product owners are responsible for the IT systems, tools, platforms, and services that support business operations. Often they are identified as application or platform managers.

      Technical perspective

      • Application, application suite, or group of applications
      • Core platforms and tools
      • Infrastructure and networking
      • Third-party technology services
      • Enable business operations
      • Direct-to-customer product or service
      • Highly interconnected
      • Need for continuous improvement
      • End-of-life management
      • Internal value proposition and users

      Relationship to Business

      • Direct consumers
      • End users
      • Source of funding

      Relationship to Operations

      • End users
      • Process enablement or automation
      • Support, continuity, and manual intervention

      Operations (service) product owners

      Operational product owners focus on the people, processes, and tools needed for manual processing and decisions when automation is not cost-effective. Operational product owners are typically called service owners due to the nature of their work.

      Operational perspective

      • Business enablement
      • Continuity
      • Problem, incident, issue resolution
      • Process efficiency
      • Throughput
      • Error/defect avoidance
      • Decision enablement
      • Waste reduction
      • Limit time in process
      • Disaster recovery

      Relationship to Business

      • Revenue enablement
      • Manual intervention and processing
      • End-user satisfaction

      Relationship to Technical

      • Process enabler
      • Performance enhancement
      • Threat of automation

      Exercise 1.2.1 Identify your primary product owner perspective

      1 hour
      1. Identify which product owner perspective represents your primary focus.
      2. Determine where the other perspectives need to be part of your product roadmap or if they are managed by other product owners.

      Identify product/service name, identify product owner perspective, determine if other perspectives need to be part of roadmap.

      Output

      • Identification of primary product owner perspective.

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Realign differences between project managers and product owners

      Differences between Project Manager and Product Owners in regards to: Funding, Prioritization, Accountability, Product management, Work allocation, and Capacity management.

      Manage and communicate key milestones

      Successful product owners understand and define the key milestones in their product delivery lifecycles. These need to be managed along with the product backlog and roadmap.

      Define key milestones and their product delivery life-cycles.

      Info-Tech Best Practice

      Product ownership isn’t just about managing the product backlog and development cycles. Teams need to manage key milestones such as learning milestones, test releases, product releases, phase gates, and other organizational checkpoints.

      Define who manages each key milestone

      Key milestones must be proactively managed. If a project manager is not available, those responsibilities need to be managed by the product owner or Scrum Master. Start with responsibility mapping to decide which role will be responsible.

      Example milestones and Project Manager, Product Owner and Team Facilitator.

      *Scrum Master, Delivery Manager, Team Lead

      Exercise 1.2.2 Define your product owner RACI

      60 minutes
      1. Review your product and project delivery methodologies to identify key milestones (including approvals, gates, reviews, compliance checks, etc.). List each milestone on a flip chart or whiteboard.
      2. For each milestone, define who is accountable for the completion.
      3. For each milestone, define who is responsible for executing the milestone activity. (Who does the work that allows the milestone to be completed?)
      4. Review any responsibility and accountability gaps and identify opportunities to better support and execute your operating model.
      5. If you previously completed Deliver Digital Products at Scale , review and update your RACI in the Mature and Scale Product Ownership Workbook .

      Define: Milestones, Project Manager, Product/service owner, Team Facilitator, and Other roles.

      Output

      • Product owner RACI

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Phase 2

      Align Product Owners to Products

      Phase 2: Assign product owners to products, Manage stakeholder influence

      Mature and Scale Product Ownership

      This phase will walk you through the following activities:

      2.1.1 Assign resources to your products and families

      2.2.1 Visualize relationships to identify key influencers

      2.2.2 Group stakeholders into categories

      2.2.3 Prioritize your stakeholders

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Step 2.1

      Assign product owners to products

      Activities

      2.1.1 Assign resources to your products and families

      Align product owners to products

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Product resource assignment

      Match your product management role definitions to your product family levels

      Using the role definitions, you created in Exercise 1.1.2, determine which roles correspond to which levels of your product families.

      Product portfolio

      Groups of product families within an overall value stream or capability grouping.

      Project portfolio manager

      Product family

      A collection of related products. Products can be grouped along architectural, functional, operational, or experiential patterns.

      Product family manager

      Product

      Single product composed of one or more applications and services.

      Product owner

      Info-Tech Insight

      Define the current roles that will perform the product management function or define consistent role names to product owners and managers.

      Assign resources throughout your product families

      Project families are owned by a product manager. Product owners own each product that has a distinct backlog.

      Info-Tech Insight

      • Start by assigning resources to each product or product family box.
      • A product owner can be responsible for more than one product.
      • Ownership of more than one product does not mean they share the same backlog.
      • For help organizing your product families, please download Deliver Digital Products at Scale.

      Understand special circumstances

      In Deliver Digital Products at Scale , products were grouped into families using Info-Tech’s five scaling patterns. Assigning owners to Enterprise Applications and Shared Services requires special consideration.

      Value stream alignment

      • Business architecture
        • Value stream
        • Capability
        • Function
      • Market/customer segment
      • Line of business (LoB)
      • Example: Customer group > value stream > products

      Enterprise applications

      • Enabling capabilities
      • Enterprise platforms
      • Supporting apps
      • Example: HR > Workday/Peoplesoft > Modules Supporting: Job board, healthcare administrator

      Shared Services

      • Organization of related services into service family
      • Direct hierarchy does not necessarily exist within the family
      • Examples: End-user support and ticketing, workflow and collaboration tools

      Technical

      • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
      • Often used in combination with Shared Services grouping or LoB-specific apps
      • Examples: Java, .NET, low-code, database, network

      Organizational alignment

      • Used at higher levels of the organization where products are aligned under divisions
      • Separation of product managers from organizational structure is no longer needed because the management team owns the product management role

      Map the source of demand to each product

      With enterprise applications and shared services, your demand comes from other product and service owners rather than end customers in a value stream.

      Enterprise applications

      • Primary demand comes from the operational teams and service groups using the platform.
      • Each group typically has processes and tools aligned to a module or portion of the overall platform.
      • Product owners determine end-user needs to assist with process improvement and automation.
      • Product family managers help align roadmap goals and capabilities across the modules and tools to ensure consistency and the alignment of changes.

      Shared services

      • Primary demand for shared services comes from other product owners and service managers whose solution or application is dependent on the shared service platform.
      • Families are grouped by related themes (e.g. workflow tools) to increase reusability, standard enterprise solutions, reduced redundancy, and consistent processes across multiple teams.
      • Product owners manage the individual applications or services within a family.

      Pattern: Enterprise applications

      A division or group delivers enabling capabilities and the team’s operational alignment maps directly to the modules/components of an enterprise application and other applications that support the specific business function.

      Workforce Management, Strategic HR, Talent Management, Core HR

      Example:

      • Human resources is one corporate function. Within HR, however, there are subfunctions that operate independently.
      • Each operational team is supported by one or more applications or modules within a primary HR system.
      • Even though the teams work independently, the information they manage is shared with, or ties into processes used by other teams. Coordination of efforts helps provide a higher level of service and consistency.

      For additional information about HRMS, please download Get the Most Out of Your HRMS.

      Assigning owners to enterprise applications

      Align your enterprise application owners to your operating teams that use the enterprise applications. Effectively, your service managers will align with your platform module owners to provide integrated awareness and planning.

      Family manager (top-level), Family managers (second-level) and Product owners.

      Pattern: Shared services

      Grouping by service type, knowledge area, or technology allows for specialization while families align service delivery to shared business capabilities.

      Grouping by service type, knowledge area, or technology allows for specialization while families align service delivery to shared business capabilities.

      Example:

      • Recommended for governance, risk, and compliance; infrastructure; security; end-user support; and shared platforms (workflow, collaboration, imaging/record retention). Direct hierarchies do not necessarily exist within the shared service family.
      • Service groupings are common for service owners (also known as support managers, operations managers, etc.).
      • End-user ticketing comes through a common request system, is routed to the team responsible for triage, and then is routed to a team for resolution.
      • Collaboration tools and workflow tools are enablers of other applications, and product families might support multiple apps or platforms delivering that shared capability.

      Assigning owners to shared services

      Assign owners by service type, knowledge area, or technology to provide alignment of shared business capabilities and common solutions.

      Family manager (top-level), Family managers (second-level) and Product owners.

      Map sources of demand and influencers

      Use the stakeholder analysis to define the key stakeholders and sources of demand for enterprise applications and shared services. Extend your mapping to include their stakeholders and influencers to uncover additional sources of demand and prioritization.

      Map of key stakeholders for enterprise applications and shared services.

      Info-Tech Insight

      Your product owner map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support, and operate your product directly.

      Combine your product owner map with your stakeholder map to create a comprehensive view of influencers.

      Exercise 2.1.1 Assign resources to your products and families

      1-4 hours
      1. Use the product families you completed in Deliver Digital Products at Scale to determine which products and product families need a resource assigned. Where the same resource fills more than one role, they are the product owner or manager for each independently.
      2. Product families that are being managed as products (one backlog for multiple products) should have one owner until the family is split into separate products later.
      3. For each product and family, define the following:
        • Who is the owner (role or person)?
        • Is ownership clearly defined?
        • Are there other stakeholders who make decisions for the product?
      4. Record the results in the Mature and Scale Product Ownership Workbook on the Product Owner Mapping worksheet.

      Output

      • Product owner and manager resource alignment.

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Step 2.2

      Manage stakeholder influence

      Activities

      2.2.1 Visualize relationships to identify key influencers

      2.2.2 Group stakeholders into categories

      2.2.3 Prioritize your stakeholders

      Align product owners to products

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Stakeholder management strategy

      Develop a product owner stakeholder strategy

      Stakeholder management, Product lifecycle, Project delivery, Operational support.

      Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner can accomplish.

      Product owners operate within a network of stakeholders who represent different perspectives within the organization.

      First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders.

      Without a stakeholder strategy, product owners will encounter obstacles, resistance, or unexpected changes.

      Create a stakeholder network map to product roadmaps and prioritization

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

      Create a stakeholder network map to product roadmaps and prioritization. Use connectors to determine who may be influencing your direct stakeholders.

      Info-Tech Insight

      Your stakeholder map defines the influence landscape your product operates. It is every bit as important as the teams who enhance, support, and operate your product directly.

      Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.

      Exercise 2.2.1 Visualize relationships to identify key influencers

      1 hour
      1. List direct stakeholders for your product.
      2. Determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
      3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
      4. Construct a diagram linking stakeholders and their influencers together.
        • Use black arrows to indicate the direction of professional influence.
        • Use dashed green arrows to indicate informal bidirectional influence relationships.
      5. Record the results in the Mature and Scale Product Ownership Workbook .

      Output

      • Relationships among stakeholders and influencers

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Categorize your stakeholders with a prioritization map

      A stakeholder prioritization map helps product owners categorize their stakeholders by their level of influence and ownership in the product and/or teams.

      Influence versus Ownership/Interest

      There are four areas on the map, and the stakeholders within each area should be treated differently.

      • Players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediments to the objectives.
      • Mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.
      • Noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively but have little ability to enact their wishes.
      • Spectators are generally apathetic and have little influence over or interest in the initiative.

      Exercise 2.2.2 Group stakeholders into categories

      1 hour
      1. Identify your stakeholders’ interest in and influence on your Agile implementation as high, medium, or low by rating the attributes below.
      2. Map your results to the model below to determine each stakeholder’s category.
      3. Record the results in the Mature and Scale Product Ownership Workbook .

      Influence versus Ownership/Interest with CMO, CIO and Product Manager in assigned areas.

      Output

      • Categorization of stakeholders and influencers

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Prioritize your stakeholders

      There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

      Stakeholder category versus level of support.

      Consider the three dimensions of stakeholder prioritization: influence, interest, and support. Support can be determined by rating the following question: How likely is it that your stakeholder would recommend your product? These parameters are used to prioritize which stakeholders are most important and should receive your focused attention. The table to the right indicates how stakeholders are ranked.

      Exercise 2.2.3 Prioritize your stakeholders

      1 hour
      1. Identify the level of support of each stakeholder by answering the following question: How likely is it that your stakeholder would endorse your product?
      2. Prioritize your stakeholders using the prioritization scheme on the previous slide.
      3. Record the results in the Mature and Scale Product Ownership Workbook .

      Stakeholder, Category, level of support, prioritization.

      Output

      • Stakeholder and influencer prioritization

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Capture in the Mature and Scale Product Ownership Playbook.

      Define strategies for engaging stakeholders by type

      Authority Vs. Ownership/Interest.

      Type

      Quadrant

      Actions

      Players

      High influence, high interest – actively engage Keep them updated on the progress of the project. Continuously involve players in the process and maintain their engagement and interest by demonstrating their value to its success.

      Mediators

      High influence, low interest – keep satisfied They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.

      Noisemakers

      Low influence, high interest – keep informed Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using mediators to help them.

      Spectators

      Low influence, low interest – monitor They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      Info-Tech Insight

      Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying your stakeholder groups, the product owner can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy spectators and noisemakers while ensuring the needs of mediators and players are met.

      Phase 3

      Mature Product Owner Capabilities

      Phase 3: Assess your Agile product owner readiness, Mature product owner capabilities.

      Mature and Scale Product Ownership

      This phase will walk you through the following activities:

      3.1.1 Assess your real Agile skill proficiency

      3.2.1 Assess your vision capability proficiency

      3.2.2 Assess your leadership capability proficiency

      3.2.3 Assess your PLM capability proficiency

      3.2.4 Identify your business value drivers and sources of value

      3.2.5 Assess your value realization capability proficiency

      This phase involves the following participants:

      • Product owners
      • Product managers

      Step 3.1

      Assess your Agile product owner readiness

      Activities

      3.1.1 Assess your real Agile skill proficiency

      Mature product owner capabilities

      This step involves the following participants:

      • Product owners
      • Product managers

      Outcomes of this step

      • Real Agile skill proficiency assessment

      Why focus on core skills?

      They are the foundation to achieve business outcomes

      Skills, actions, output and outcomes

      The right skills development is only possible with proper assessment and alignment against outcomes.

      Being successful at Agile is more than about just doing Agile

      The following represents the hard skills needed to “Do Agile”:

      Being successful at Agile needs 4 hard skills: 1. Engineering skills, 2. Technician Skills, 3. Framework/Process skills, 4. Tools skills.

      • Engineering skills. These are the skills and competencies required for building brand-new valuable software.
      • Technician skills. These are the skills and competencies required for maintaining and operating the software delivered to stakeholders.
      • Framework/Process skills. These are the specific knowledge skills required to support engineering or technician skills.
      • Tools skills. This represents the software that helps you deliver other software.

      While these are important, they are not the whole story. To effectively deliver software, we believe in the importance of being Agile over simply doing Agile.

      Adapted from: “Doing Agile” Is Only Part of the Software Delivery Pie

      Focus on these real Agile skills

      Agile skills

      • Accountability
      • Collaboration
      • Comfort with ambiguity
      • Communication
      • Empathy
      • Facilitation
      • Functional decomposition
      • Initiative
      • Process discipline
      • Resilience

      Info-Tech research shows these are the real Agile skills to get started with

      Skill Name

      Description

      Accountability

      Refers to the state of being accountable. In an Agile context, it implies transparency, dedication, acting responsibly, and doing what is necessary to get the job done.

      Collaboration

      Values diverse perspectives and working with others to achieve the best output possible. Effective at working toward individual, team, department, and organizational goals.

      Comfort with ambiguity

      Allows you to confidently take the next steps when presented with a problem without having all the necessary information present.

      Communication

      Uses different techniques to share information, concerns, or emotions when a situation arises, and it allows you to vary your approach depending on the current phase of development.

      Empathy

      Is the ability to understand and share the feelings of another to better serve your team and your stakeholders.

      Facilitation

      Refers to guiding and directing people through a set of conversations and events to learn and achieve a shared understanding.

      Functional decomposition

      Is being able to break down requirements into constituent epics and stories.

      Initiative

      Is being able to anticipate challenges and then act on opportunities that lead to better business outcomes.

      Process discipline

      Refers to the focus of following the right steps for a given activity at the right time to achieve the right outcomes.

      Resilience

      Refers to the behaviors, thoughts, and actions that allow a person to recover from stress and adversity.

      Accountability

      An accountable person:

      • Takes ownership of their own decisions and actions and is responsible for the quality of results.
      • Recognizes personal accountabilities to others, including customers.
      • Works well autonomously.
      • Ensures that the mutual expectations between themselves and others are clearly defined.
      • Takes the appropriate actions to ensure that obligations are met in a timely manner.
      • As a leader, takes responsibility for those being led.

      Accountability drives high performance in teams and organizations

      • The performance level of teams depends heavily on accountability and who demonstrates it:
        • In weak teams, there is no accountability.
        • In mediocre teams, supervisors demonstrate accountability.
        • In high-performance teams, peers manage most performance problems through joint accountability. (Grenny, 2014)
      • According to Bain & Company, accountability is the third most important attribute of high-performing companies. Some of the other key attributes include honest, performance-focused, collaborative, and innovative. (Mankins, 2013)

      All components of the employee empowerment driver have a strong, positive correlation with engagement.

      Employee empowerment and Correlation with engagement.

      Source: McLean & Company Engagement Database, 2018; N=71,794

      Accountability

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Alerts others to possible problems in a timely manner.
      • Seeks appropriate support to solve problems.
      • Actively contributes to the creation and evaluation of possible solutions.
      • Acts on solutions selected and decisions made as directed.
      • Makes effective decisions about how to complete work tasks.
      • Demonstrates the capability of breaking down concrete issues into parts and synthesizing information succinctly.
      • Collects and analyzes information from a variety of sources.
      • Seeks information and input to fully understand the cause of problems.
      • Takes action to address obstacles and problems before they impact performance and results.
      • Initiates the evaluation of possible solutions to problems.
      • Makes effective decisions about work task prioritization.
      • Appropriately assesses risks before deciding.
      • Effectively navigates through ambiguity, using multiple data points to analyze issues and identify trends.
      • Does not jump to conclusions.
      • Draws logical conclusions and provides opinions and recommendations with confidence.
      • Takes ownership over decisions and their consequences.
      • Demonstrates broad knowledge of information sources that can be used to assess problems and make decisions.
      • Invests time in planning, discovery, and reflection to drive better decisions.
      • Effectively leverages hard data as inputs to making decisions.
      • Garners insight from abstract data and makes appropriate decisions.
      • Coaches others in effective decision-making practices.
      • Has the authority to solve problems and make decisions.
      • Thinks several steps ahead in deciding the best course of action, anticipating likely outcomes, risks, or implications.
      • Establishes metrics to aid in decision-making, for self and teams
      • Prioritizes objective and ambiguous information and analyzes this when making decisions.
      • Solicits a diverse range of opinions and perspectives as inputs to decision making.
      • Applies frameworks to decision making, particularly in situations that have little base in prior experience.
      • Makes effective decisions about organizational priorities.
      • Holds others accountable for their decisions and consequences.
      • Creates a culture of empowerment and trust to facilitate effective problem solving and decision making.
      • Makes sound decisions that have organization-wide consequences and that influence future direction.

      Collaboration as a skill

      The principles and values of Agile revolve around collaboration.

      • Works well with others on specialized and cross-functional teams.
      • Can self-organize while part of a team.
      • Respects the commitments that others make.
      • Identifies and articulates dependencies.
      • Values diverse perspectives and works with others to achieve the best output possible.
      • Effective at working toward individual, team, department, and organizational goals.
      The principles and values of Agile revolve around collaboration. Doing what was done before (being prescriptive), going though the motions (doing Agile), living the principles (being Agile)

      Collaboration

      The Agile Manifesto has three principles that focus on collaboration:

      1. The business and developers must work together daily throughout the project.
      2. Build projects around motivated individuals. Give them the environment and support they need and trust them to get the job done.
      3. The most efficient and effective method of conveying information to and within a development team is face-to-face conversation.

      Effective collaboration supports Agile behaviors, including embracing change and the ability to work iteratively.

      Collaboration

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Understands role on the team and the associated responsibilities and accountabilities.
      • Treats team members with respect.
      • Contributes to team decisions and to the achievement of team goals and objectives.
      • Demonstrates a positive attitude.
      • Works cross-functionally to achieve common goals and to support the achievement of other team/department goals.
      • Values working in a diverse team and understands the importance of differing perspectives to develop unique solutions or ideas.
      • Fosters team camaraderie, collaboration, and cohesion.
      • Understands the impact of one's actions on the ability of team members to do their jobs.
      • Respects the differences other team members bring to the table by openly seeking others' opinions.
      • Helps the team accomplish goals and objectives by breaking down shared goals into smaller tasks.
      • Approaches challenging team situations with optimism and an open mind, focusing on coming to a respectful conclusion.
      • Makes suggestions to improve team engagement and effectiveness.
      • Supports implementation of team decisions.
      • Professionally gives and seeks feedback to achieve common goals.
      • Values working in a diverse team and understands the importance of differing perspectives to develop unique solutions or ideas.
      • Motivates the team toward achieving goals and exceeding expectations.
      • Reaches out to other teams and departments to build collaborative, cross-functional relationships.
      • Creates a culture of collaboration that leverages team members' strengths, even when the team is remote or virtual.
      • Participates and encourages others to participate in initiatives that improve team engagement and effectiveness.
      • Builds consensus to make and implement team decisions, often navigating through challenging task or interpersonal obstacles.
      • Values leading a diverse team and understands the importance of differing perspectives to develop unique solutions or ideas.
      • Creates a culture of collaboration among teams, departments, external business partners, and all employee levels.
      • Breaks down silos to achieve inter-departmental collaboration.
      • Demonstrates ownership and accountability for team/department/ organizational outcomes.
      • Uses an inclusive and consultative approach in setting team goals and objectives and making team decisions.
      • Coaches others on how to identify and proactively mitigate potential points of team conflict.
      • Recognizes and rewards teamwork throughout the organization.
      • Provides the tools and resources necessary for teams to succeed.
      • Values diverse teams and understands the importance of differing perspectives to develop unique solutions or ideas.

      Comfort with ambiguity

      Ability to handle ambiguity is a key factor in Agile success.

      • Implies the ability to maintain a level of effectiveness when all information is not present.
      • Able to confidently act when presented with a problem without all information present.
      • Risk and uncertainty can comfortably be handled.
      • As a result, can easily adapt and embrace change.
      • People comfortable with ambiguity demonstrate effective problem-solving skills.

      Relative importance of traits found in Agile teams

      1. Handles ambiguity
      2. Agreeable
      3. Conscientious

      Comfort with ambiguity

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Requires most information to be present before carrying out required activities.
      • Can operate with some information missing.
      • Comfortable asking people within their known circles for help.
      • Significant time is taken to reveal small pieces of information.
      • More adept at operating with information missing.
      • Willing to reach out to people outside of their regular circles for assistance and clarification.
      • Able to apply primary and secondary research methods to fill in the missing pieces.
      • Can operate essentially with a statement and a blank page.
      • Able to build a plan, drive others and themselves to obtain the right information to solve the problem.
      • Able to optimize only pulling what is necessary to answer the desired question and achieve the desired outcome.

      Communication

      Even though many organizations recognize its importance, communication is one of the root causes of project failure.

      Project success vs Communication effectiveness. Effective communications is associated with a 17% increase in finishing projects within budget.

      56%

      56% of the resources spent on a project are at risk due to ineffective communications.

      PMI, 2013.

      29%

      In 29% of projects started in the past 12 months, poor communication was identified as being one of the primary causes of failure.

      PMI, 2013.

      Why are communication skills important to the Agile team?

      It’s not about the volume, it’s about the method.

      • Effectively and appropriately interacts with others to build relationships and share ideas and information.
      • Uses tact and diplomacy to navigate difficult situations.
      • Relays key messages by creating a compelling story, targeted toward specific audiences.

      Communication effectiveness, Activity and Effort required.

      Adapted From: Agile Modeling

      Communication

      Your Score:____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Actively listens, learns through observation, and uses clear and precise language.
      • Possesses an open and approachable demeanor, with a positive and constructive tone.
      • Demonstrates interest in the thoughts and feelings of others.
      • Considers potential responses of others before speaking or acting.
      • Checks own understanding of others’ communication by repeating or paraphrasing.
      • Demonstrates self-control in stressful situations.
      • Provides clear, concise information to others via verbal or written communication.
      • Seeks to understand others' points of view, looking at verbal and non-verbal cues to encourage open and honest discussions.
      • Invites and encourages others to participate in discussions.
      • Projects a sincere and genuine tone.
      • Remains calm when dealing with others who are upset or angry.
      • Provides and seeks support to improve communication.
      • Does not jump to conclusions or act on assumptions.
      • Tailors messages to meet the different needs of different audiences.
      • Accurately interprets responses of others to their words and actions.
      • Provides feedback effectively and with empathy.
      • Is a role model for others on how to effectively communicate.
      • Ensures effective communication takes place at the departmental level.
      • Engages stakeholders using appropriate communication methods to achieve desired outcomes.
      • Creates opportunities and forums for discussion and idea sharing.
      • Demonstrates understanding of the feelings, motivations, and perspectives of others, while adapting communications to anticipated reactions.
      • Shares insights about their own strengths, weaknesses, successes, ad failures to show empathy and help others relate.
      • Discusses contentious issues without getting defensive and maintains a professional tone.
      • Coaches others on how to communicate effectively and craft targeted messages.
      • Sets and exemplifies standards for respectful and effective communications in the organization.
      • Comfortably delivers strategic messages supporting their function and the organization at the enterprise level.
      • Communicates with senior-level executives on complex organizational issues.
      • Promotes inter-departmental communication and transparency.
      • Achieves buy-in and consensus from people who share widely different views.
      • Shares complex messages in clear, understandable language.
      • Accurately interprets how they are perceived by others.
      • Rallies employees to communicate ideas and build upon differing perspectives to drive innovation.

      Empathy

      Empathy is the ability to understand and share the feelings of another in order to better serve your team and your stakeholders. There are three kinds:

      Cognitive

      Thought, understanding, intellect

      • Knowing how someone else feels and what they might be thinking.
      • Contributes to more effective communication.

      Emotional

      Feelings, physical sensation

      • You physically feel the emotions of the other person.
      • Helps build emotional connections with others.

      Compassionate

      Intellect, emotion with action

      • Along with understanding, you take action to help.

      How is empathy an Agile skill?

      Empathy enables you to serve your team, your customers, and your organization

      Serving the team

      • Primary types: Emotional and compassionate empathy.
      • The team is accountable for delivery.
      • By being able to empathize with the person you are talking to, complex issues can be addressed.
      • A lack of empathy leads to a lack of collaboration and being able to go forward on a common path.

      Serving your customers and stakeholders

      • Primary type: Cognitive empathy.
      • Agile enables the delivery of the right value at the right time to your stakeholders
      • Translating your stakeholders' needs requires an understanding of who they are as people. This is done through observations, interviews and conversations.
      • Leveraging empathy maps and user-story writing is an effective tool.

      Empathy

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Knowing how someone else feels and what they might be thinking.
      • Ability to build emotional connections with others.
      • Able to harness emotional connections to achieve tangible and experiential outcomes.
      • Demonstrates an awareness of different feelings and ways of thinking by both internal and external stakeholders.
      • Limited ability to make social connections with others outside of the immediate team.
      • Able to connect with similarly minded people to improve customer/stakeholder satisfaction. (Insights into action)
      • Able to interact and understand others with vastly different views.
      • Lack of agreement does not stop individual. from asking questions, understanding, and pushing the conversation forward

      Facilitation

      It’s not just your manager’s problem.

      “Facilitation is the skill of moderating discussions within a group in order to enable all participants to effectively articulate their views on a topic under discussion, and to ensure that participants in the discussion are able to recognize and appreciate the differing points of view that are articulated.” (IIBA, 2015)

      • Drives action through influence, often without authority.
      • Leads and impacts others' thinking, decisions, or behavior through inclusive practices and relationship building.
      • Encourages others to self-organize and hold themselves accountable.
      • Identifies blockers and constructively removes barriers to progress.

      Facilitation

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Drives action through influence, often without authority.
      • Leads and impacts others' thinking, decisions, or behavior through inclusive practices and relationship building.
      • Encourages others to self-organize and hold themselves accountable.
      • Identifies blockers and constructively removes barriers to progress.
      • Maps and executes processes effectively.
      • Uses facts and concrete examples to demonstrate a point and gain support from others.
      • Openly listens to the perspectives of others.
      • Builds relationships through honest and consistent behavior.
      • Understands the impact of their own actions and how others will perceive it.
      • Identifies impediments to progress.
      • Anticipates the effect of one's approach on the emotions and sensitivities of others.
      • Practices active listening while demonstrating positivity and openness.
      • Customizes discussion and presentations to include "what’s in it for me" for the audience.
      • Presents compelling information to emphasize the value of an idea.
      • Involves others in refining ideas or making decisions in order to drive buy-in and action.
      • Knows how to appropriately use influence to achieve outcomes without formal authority.
      • Seeks ways and the help of others to address barriers or blockers to progress.
      • Leverages a planned approach to influencing others by identifying stakeholder interests, common goals, and potential barriers.
      • Builds upon successes to gain acceptance for new ideas.
      • Facilitates connections between members of their network for the benefit of the organization or others.
      • Demonstrates the ability to draw on trusting relationships to garner support for ideas and action.
      • Encourages a culture that allows space for influence to drive action.
      • Adept at appropriately leveraging influence to achieve business unit outcomes.
      • Actively manages the removal of barriers and blockers for teams.

      Functional decomposition

      It’s not just a process, it’s a skill.

      “Functional decomposition helps manage complexity and reduce uncertainty by breaking down processes, systems, functional areas, or deliverables into their simpler constituent parts and allowing each part to be analyzed independently."

      (IIBA, 2015)

      Being able to break down requirements into constituent consumable items (example: epics and user stories).

      Start: Strategic Initiatives. 1: Epics. 2: Capabilities. 3: Features. End: Stories.

      Use artifact mapping to improve functional decomposition

      In our research, we refer to these items as epics, capabilities, features, and user stories. How you develop your guiding principles and structure your backlog should be based on the terminology and artifact types commonly used in your organization.

      Agile, Waterfall, Relationship, Decomposition skill most in demand, definition.

      Functional Decomposition

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Able to decompose items with assistance from other team members.
      • Able to decompose items independently, ensuring alignment with business value.
      • Able to decompose items independently and actively seeks out collaboration opportunities with relevant SME's during and after the refinement process to ensure completion.
      • Able to decompose items at a variety of granularity levels.
      • Able to teach and lead others in their decomposition efforts.
      • Able to quickly operate at different levels of the requirements stack.

      Initiative and self-organization

      A team that takes initiative can self-organize to solve critical problems.

      • "The best architectures, requirements, and designs emerge from self-organizing teams." (Agile Manifesto)
      • In a nutshell, the initiative represents the ability to anticipate challenges and act on opportunities that lead to better business outcomes.
      • Anticipates challenges and acts on opportunities that lead to better business outcomes.
      • Thinks critically and is motivated to use both specialist expertise and general knowledge.
      • Driven by the delivery of business value and better business outcomes.
      • Empowers others to act and is empowered and self-motivated.

      Initiative and self-organization

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Demonstrates awareness of an opportunity or issue which is presently occurring or is within the immediate work area.
      • Reports an opportunity or issue to the appropriate person.
      • Acts instead of waiting to be asked.
      • Willingly takes on challenges, even if they fall outside their area of expertise.
      • Is proactive in identifying issues and making recommendations to resolve them.
      • Within the scope of the work environment, takes action to improve processes or results, or to resolve problems.
      • Not deterred by obstacles.
      • Tackles challenges that require risk taking.
      • Procures the necessary resources, team and technical support to enable success.
      • Assists others to get the job done.
      • Demonstrates awareness of an opportunities or issues which are in the future or outside the immediate work area.
      • Typically exceeds the expectations of the job.
      • Learns new technology or skills outside their specialization so that they can be a more effective team member.
      • Recommends solutions to enhance results or prevent potential issues.
      • Drives implementation of new processes within the team to improve results.
      • Able to provide recommendations on plans and decisions that are strategic and future-oriented for the organization.
      • Identifies areas of high risk or of organizational level impact.
      • Able to empower significant recourses from the organization to enable success.
      • Leads long-term engagements that result in improved organizational capabilities and processes.

      Process discipline

      A common misconception is that Agile means no process and no discipline. Effective Agile teams require more adherence to the right processes to create a culture of self-improvement.

      • Refers to the focus of following the right steps for a given activity at the right time to achieve the right outcomes.
      • Focus on following the right steps for a given activity at the right time to achieve desired outcomes.
      Example: Scrum Ceremonies during a sprint (1 - 4 weeks/sprint). 1: Sprint planning, 2: Daily scrum, 3: Sprint review, 4: Sprint retrospective.

      Process discipline

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Demonstrates awareness of the key processes and steps that are needed in a given situation.
      • Limited consistency in following processes and limited understanding of the 'why' behind the processes.
      • Aware and follows through with key agile processes in a consistent manner.
      • Demonstrates not only the knowledge of processes but understands the 'why' behind their existence.
      • Aware and follows through with key agile processes in a consistent manner.
      • Demonstrates understanding of not only why specific processes exist but can suggest changes to improve efficiency, consistency, and outcomes.

      N/A -- Maximum level is '3

      Resilience

      If your team hits the wall, don’t let the wall hit them back.

      • Resilience is critical for an effective Agile transformation. A team that demonstrates resilience always exhibits:
      • Evolution over transformation – There is a recognition that changes happen over time.
      • Intensity and productivity – A race is not won by the ones who are the fastest, but by the ones who are the most consistent. Regardless of what comes up, the team can push through.
      • That organizational resistance is futile – Given that it is working on the right objectives, the team needs to demonstrate a consistency of approach and intensity regardless of what may stand in its way.
      • Refers to the behaviors, thoughts, and actions that allow a person to recover from stress and adversity.

      How resilience aligns with Agile

      A team is not “living the principles” without resilience.

      1. Purpose

        Aligns with: “Our highest priority is to satisfy the customer through early and continuous delivery of valuable software.” The vision or goals may not be clear in certain circumstances and can be difficult to relate to a single work item. Being able to intrinsically source and harness a sense of purpose becomes more important, especially as a self-organizing team.
      2. Perseverance

        Aligns with: “Agile processes harness change for the customer's competitive advantage.” Perseverance enables teams to continuously deliver at a steady pace, addressing impediments or setbacks and continuing to move forward.
      3. Composure

        Aligns with: “Agile processes promote sustainable development,” and “At regular intervals, the team reflects ... and adjusts its behavior accordingly.”
        When difficult situations arise, composure allows us to understand perspectives, empathize with customers, accept late changes, and sustain a steady pace.
      4. Self-Reliance

        Aligns with: “The best architectures, requirements, and designs emerge from self-organizing teams.” Knowing oneself, recognizing strengths, and drawing on past successes, can be a powerful aid in creating high-performing Agile teams
      5. Authenticity

        Aligns with: “At regular intervals, the team reflects … and adjusts its behavior accordingly,” and “Build projects around motivated individuals.”
        When difficult situations arise, authenticity is crucial. “For example, being able to openly disclose areas outside of your strengths in sprint planning or being able to contribute constructively toward self-organization.”

      Adapted from: Why Innovation, 2019.

      Resilience

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Easily distracted and stopped by moderately stressful and challenging situations.
      • Requires significant help from others to get back on track.
      • Not frequently able (or knows) how to ask for help
      • Handles typical stresses and challenges for the given role.
      • Able to get back on track with limited assistance.
      • Able to ask for help when they need it.
      • Quality of work unaffected by an increase in pressures and challenges.
      • Handles stresses and challenges what is deemed above and beyond their given role.
      • Able to provide advice to others on how to handle difficult and challenging situations.
      • Quality of work and outcomes is maintained and sometimes exceeded as pressure increases.
      • Team looks to this individual as being the gold standard on how to approach any given problem or situation.
      • Directly mentors others on approaches in situations regardless of the level of challenge.

      Exercise 1.2.1 Identify your primary product owner perspective

      1 hour
      1. Review each real Agile skill and determine your current proficiency.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Accountability, Collaboration, Comfort in Ambiguity, Communication, Empathy, Facilitation, Functional Decomposition, Initiative, Process Discipline, Resilience.

      Output

      • Agile skills assessment results.

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Determine your Agile skills proficiency: Edit chart data to plot your scores or add your data points and connect the lines.

      Step 3.2

      Mature product owner capabilities

      Activities

      3.2.1 Assess your vision capability proficiency

      3.2.2 Assess your leadership capability proficiency

      3.2.3 Assess your PLM capability proficiency

      3.2.4 Identify your business value drivers and sources of value

      3.2.5 Assess your value realization capability proficiency

      Mature product owner capabilities

      This step involves the following participants:

      • Product owners
      • Product managers

      Outcomes of this step

      • Info-Tech product owner capability model proficiency assessment

      Product capabilities deliver value

      As a product owner, you are responsible for managing these facets through your capabilities and activities.

      The core product and value stream consists of: Funding - Product management and governance, Business functionality - Stakeholder and relationship management, and Technology - Product delivery.

      Info-Tech Best Practice

      It is easy to lose sight of what matters when we look at a product from a single point of view . Despite what "The Agile Manifesto" says, working software is not valuable without the knowledge and support that people need in order to adopt, use, and maintain it. If you build it, they will not come. Product owners must consider the needs of all stakeholders when designing and building products.

      Recognize product owner knowledge gaps

      Pulse survey of product owners

      Pulse survey of product owners. Graph shows large percentage of respondents have alignment to common agile definition of product owners. Yet a significant perception gap in P&L, delivery, and analytics.

      Info-Tech Insight

      1. Less than 15% of respondents identified analytics or financial management as a key component of product ownership.
      2. Assess your product owner’s capabilities and understanding to develop a maturity plan.

      Source: Pulse Survey (N=18)

      Implement the Info-Tech product owner capability model

      Unfortunately, most product owners operate with incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization.

      Product Owner capabilities: Vision, Product Lifecycle Management, Leadership, Value Realization

      Vision

      • Market Analysis
      • Business Alignment
      • Product Roadmap

      Leadership

      • Soft Skills
      • Collaboration
      • Decision Making

      Product Lifecycle Management

      • Plan
      • Build
      • Run

      Value Realization

      • KPIs
      • Financial Management
      • Business Model

      Product owner capabilities provide support

      Vision predicts impact of Value realization. Value realization provides input to vision

      Your vision informs and aligns what goals and capabilities are needed to fulfill your product or product family vision and align with enterprise goals and priorities. Each item on your roadmap should have corresponding KPIs or OKRs to know how far you moved the value needle. Value realization measures how well you met your target, as well as the impacts on your business value canvas and cost model.

      Product lifecycle management builds trust with Leadership. Leadership improves quality of Product lifecycle management.

      Your leadership skills improve collaborations and decisions when working with your stakeholders and product delivery teams. This builds trust and improves continued improvements to the entire product lifecycle. A product owner’s focus should always be on finding ways to improve value delivery.

      Product owner capabilities provide support

      Leadership enhances Vision. Vision Guides Product Lifecycle Management. Product Lifecycle Management delivers Value Realization. Leadership enhances Value Realization

      Develop product owner capabilities

      Each capability: Vision, Product lifecycle management, Value realization and Leadership has 3 components needed for successful product ownership.

      Avoid common capability gaps

      Vision

      • Focusing solely on backlog grooming (tactical only)
      • Ignoring or failing to align product roadmap to enterprise goals
      • Operational support and execution
      • Basing decisions on opinion rather than market data
      • Ignoring or missing internal and external threats to your product

      Leadership

      • Failing to include feedback from all teams who interact with your product
      • Using a command-and-control approach
      • Viewing product owner as only a delivery role
      • Acting as a proxy for stakeholder decisions
      • Avoiding tough strategic decisions in favor of easier tactical choices

      Product lifecycle management

      • Focusing on delivery and not the full product lifecycle
      • Ignoring support, operations, and technical debt
      • Failing to build knowledge management into the lifecycle
      • Underestimating delivery capacity, capabilities, or commitment
      • Assuming delivery stops at implementation

      Value realization

      • Focusing exclusively on “on time/on budget” metrics
      • Failing to measure a 360-degree end-user view of the product
      • Skipping business plans and financial models
      • Limiting financial management to project/change budgets
      • Ignoring market analysis for growth, penetration, and threats

      Capabilities: Vision

      Market Analysis

      • Customer Empathy: Identify the target users and unique value your product provides that is not currently being met. Define the size of your user base, segmentation, and potential growth.
      • Customer Journey: Define the future path and capabilities your users will respond to.
      • Competitive analysis: Complete a SWOT analysis for your end-to-end product lifecycle. Use Info-Tech’s Business SWOT Analysis Template.

      Business Alignment

      • Enterprise alignment: Align to enterprise and product family goals, strategies, and constraints.
      • Delivery and release strategy: Develop a delivery strategy to achieve value quickly and adapt to internal and external changes. Value delivery is constrained by your delivery pipeline.
      • OCM and go-to-market strategy: Create organizational change management, communications, and a user implementation approach to improve adoption and satisfaction from changes.

      Product Roadmap

      • Roadmap strategy: Determine the duration, detail, and structure of your roadmap to accurately communicate your vision.
      • Value prioritization: Define criteria used to evaluate and sequence demand items.
      • Release and capacity planning: Build your roadmap with realistic goals and milestones based on your delivery pipeline and dependencies.

      “Customers are best heard through many ears.”

      – Thomas K. Connellan, Inside the Magic Kingdom

      Vision: Market Analysis, Business Alignment, and Product Roadmap.

      Info-Tech Insight

      Data comes from many places and may still not tell the complete story.

      Build your product strategy playbook

      Complete Deliver on Your Digital Product Vision to define your Vision, Goals, Roadmap approach, and Backlog quality filters.

      Digital Product Strategy Supporting Workbook

      Supporting workbook that captures the interim results from a number of exercises that will contribute to your overall digital product vision.

      Product Backlog Item Prioritization Tool

      An optional tool to help you capture your product backlog and prioritize based on your given criteria

      Product Roadmap Tool

      An optional tool to help you build out and visualize your first roadmap.

      Your Digital Product Vision Details Strategy

      Record the results from the exercises to help you define, detail, and make real your digital product vision.

      Your product vision is your North Star

      It's ok to dream a little!

      Who is the target customer, what is the key benefit, what do they need, what is the differentiator

      Adapted from: Geoffrey Moore, 2014.

      Info-Tech Best Practice

      A product vision shouldn’t be so far out that it doesn’t feel real or so short-term that it gets bogged down in minutiae and implementation details. Finding the right balance will take some trial and error and will be different for each organization.

      Use product roadmaps to guide delivery

      In Deliver on Your Digital Product Vision, we showed how the product roadmap is key to value realization. As a product owner, the product roadmap is your communicated path to align teams and changes to your defined goals, while aligning your product to enterprise goals and strategy.

      As a product owner, the product roadmap is your communicated path to align teams and changes to your defined goals, while aligning your product to enterprise goals and strategy

      Info-Tech Best Practice

      Info-Tech Best Practice Product delivery requires a comprehensive set of business and technical competencies to effectively roadmap, plan, deliver, support, and validate your product portfolio. Product delivery is a “multi-faceted, complex discipline that can be difficult to grasp and hard to master.” It will take time to learn and adopt methods and become a competent product manager or owner (“What Is Product Management?”, Pichler Consulting Limited).

      Match your roadmap and backlog to the needs of the product

      Ultimately, you want products to be able to respond faster to changes and deliver value sooner. The level of detail in the roadmap and backlog is a tool to help the product owner plan for change. The duration of your product roadmap is all directly related to the tier of product owner in the product family.

      The level of detail in the roadmap and backlog is a tool to help the product owner plan for change. The duration of your product roadmap is all directly related to the tier of product owner in the product family.

      Product delivery realizes value for your product family

      While planning and analysis are done at the family level, work and delivery are done at the individual product level.

      Product strategy includes: Vision, Goals, Roadmap, backlog and Release plan.

      Use artifact mapping to improve functional decomposition

      In our research, we refer to these items as epics, capabilities, features, and user stories. How you develop your guiding principles and structure your backlog should be based on the terminology and artifact types commonly used in your organization.

      Agile, Waterfall, Relationship, Decomposition skill most in demand, definition.

      Manage and communicate key milestones

      Successful product owners understand and define the key milestones in their product delivery lifecycles. These need to be managed along with the product backlog and roadmap.

      Define key milestones and their release dates.

      Info-Tech Best Practice

      Product ownership isn’t just about managing the product backlog and development cycles! Teams need to manage key milestones such as learning milestones, test releases, product releases, phase gates, and other organizational checkpoints!

      Milestones

      • Points in the timeline when the established set of artifacts is complete (feature-based), or checking status at a particular point in time (time-based).
      • Typically assigned a date and used to show the progress of development.
      • Plays an important role when sequencing different types of artifacts.

      Release dates

      • Releases mark the actual delivery of a set of artifacts packaged together in a new version of the product.
      • Release dates, firm or not, allow stakeholders to anticipate when this is coming.

      Leverage the product canvas to state and inform your product vision

      Leverage the product Canvas to state and inform your product vision. Includes: Product name, Tracking info, Vision, List of business objectives or goals, Metrics used to measure value realization, List of groups who consume the product/service, and List of key resources or stakeholders.

      Capability: Vision

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Product backlog.
      • Basic roadmap with milestones and releases.
      • Unprioritized stakeholder list.
      • Understanding of product’s purpose and value.
      • Customers and end-users defined with core needs identified.
      • Roadmap with goals and capabilities defined by themes and set to appropriate time horizons.
      • Documented stakeholder management plan with communication and collaboration aligned to the stakeholder strategy.
      • Value drivers traced to product families and enterprise goals.
      • Customer personas defined with pain relievers and value creators defined.
      • Fully-developed roadmap traced to family (and child) roadmaps.
      • Expected ROI for all current and next roadmap items.
      • KPIs/OKRs used to improve roadmap prioritization and sequencing.
      • Proactive stakeholder engagement and reviews.
      • Cross-functional engagement to align opportunities and drive enterprise value.
      • Formal metrics to assess customer needs and value realization.
      • Roadmaps managed in an enterprise system for full traceability, value realization reporting, and views for defined audiences.
      • Proactive stakeholder engagement with regular planning and review ceremonies tied to their roadmaps and goals.
      • Cross-functional innovation to find disruptive opportunities to drive enterprise value.
      • Omni-channel metrics and customer feedback mechanisms to proactively evaluate goals, capabilities, and value realization.

      Exercise 3.2.1 Assess your Vision capability proficiency

      1 hour
      1. Review the expectations for this capability and determine your current proficiency for each skill.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Capabilities: Leadership

      Soft Skills

      • Communication: Maintain consistent, concise, and appropriate communication using SMART guidelines (specific, measurable, attainable, relevant, and timely).
      • Integrity: Stick to your values, principles, and decision criteria for the product to build and maintain trust with your users and teams.
      • Influence: Manage stakeholders using influence and collaboration over contract negotiation.

      Collaboration

      • Stakeholder management: Build a communications strategy for each stakeholder group, tailored to individual stakeholders.
      • Relationship management: Use every interaction point to strengthen relationships, build trust, and empower teams.
      • Team development: Promote development through stretch goals and controlled risks to build team capabilities and performance.

      Decision Making

      • Prioritized criteria: Remove personal bias by basing decisions off data analysis and criteria.
      • Continuous improvement: Balance new features with the need to ensure quality and create an environment of continuous improvement.
      • Team empowerment/negotiation: Push decisions to teams closest to the problem and solution, using Delegation Poker to guide you.

      “Everything walks the walk. Everything talks the talk.”

      – Thomas K. Connellan, Inside the Magic Kingdom

      Leadership: Soft skills, collaboration, decision making.

      Info-Tech Insight

      Product owners cannot be just a proxy for stakeholder decisions. The product owner owns product decisions and management of all stakeholders.

      Capability: Leadership

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Activities are prioritized with minimal direction and/or assistance.
      • Progress self-monitoring against objectives with leadership apprised of deviations against plan.
      • Facilitated decisions from stakeholders or teams.
      • Informal feedback on performance and collaboration with teams.
      • Independently prioritized activities and provide direction or assistance to others as needed.
      • Managed issue resolution and provided guidance on goals, priorities, and constraints.
      • Product decision ownership with input from stakeholders, SMEs, and delivery teams.
      • Formal product management retrospectives with tracked and measured changes to improve performance.
      • Consulted in the most challenging situations to provide subject matter expertise on leading practices and industry standards.
      • Provide mentoring and coaching to your peers and/or teammates.
      • Use team empowerment, pushing decisions to the lowest appropriate level based on risk and complexity.
      • Mature and flexible communication.
      • Provide strategies and programs ensuring all individuals in the delivery organization obtain the level of coaching and supervision required for success in their position.
      • Provide leadership to the organization’s coaches ensuring delivery excellence across the organization.
      • Help develop strategic initiatives driving common approaches and utilizing information assets and processes across the enterprise.

      Exercise 3.2.2 Assess your Leadership capability proficiency

      1 hour
      1. Review the expectations for this capability and determine your current proficiency for each skill.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Capability: Product lifecycle management

      Plan

      • Product backlog: Follow a schedule for backlog intake, grooming, updates, and prioritization.
      • Journey map: Create an end-user journey map to guide adoption and loyalty.
      • Fit for purpose: Define expected value and intended use to ensure product meets your end user’s needs.

      Build

      • Capacity management: Work with operations and delivery teams to ensure consistent and stable outcomes.
      • Release strategy: Build learning, release, and critical milestones into a repeatable release plan.
      • Compliance: Build policy compliance into delivery practices to ensure alignment and reduce avoidable risk (privacy, security).

      Run

      • Adoption: Focus attention on end-user adoption and proficiency to accelerate value and maximize retention.
      • Support: Build operational support and business continuity into every team.
      • Measure: Measure KPIs and validate expected value to ensure product alignment to goals and consistent product quality.

      “Pay fantastic attention to detail. Reward, recognize, celebrate.”

      – Thomas K. Connellan, Inside the Magic Kingdom

      Product Lifecycle Management: Plan, Build, Run

      Info-Tech Insight

      Product owners must actively manage the full lifecycle of the product.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      A backlog stores and organizes PBIs at various stages of readiness

      A backlog stores and organizes PBIs at different levels of readiness. Stage 3 - Ideas are composed of raw, vague ideas that have yet to go through any formal valuation. Stage 2 - Qualified are researched and qualified PBIs awaiting refinement. Stage 1 - Ready are Discrete, refined RBIs that are read to be placed in your development team's sprint plans.

      A well-formed backlog can be thought of as a DEEP backlog:

      Detailed Appropriately: PBIs are broken down and refined, as necessary.

      Emergent: The backlog grows and evolves over time as PBIs are added and removed.

      Estimated: The effort a PBI requires is estimated at each tier.

      Prioritized: The PBI’s value and priority are determined at each tier.

      (Perforce, 2018)

      Distinguish your specific goals for refining in the product backlog vs. planning for a sprint itself

      Often backlog refinement is used interchangeably or considered a part of sprint planning. The reality is they are very similar, as the required participants and objectives are the same; however, there are some key differences.

      Backlog refinement versus Sprint planning. Differences in Objectives, Cadence and Participants

      Use quality filters to promote high value items into the delivery pipeline

      Product backlog has quality filters such as: Backlogged, Qualified and Ready. Sprint backlog has a backlog of accepted PBI's

      Basic scrum process

      The scrum process coordinates multiple stakeholders to deliver on business priorities.

      Prioritized Backlog, Sprint Backlog, Manage Delivery, Sprint Review, Product Release

      Capability: Product lifecycle management

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Informal or undocumented intake process.
      • Informal or undocumented delivery lifecycle.
      • Unstable or unpredictable throughput or quality.
      • Informal or undocumented testing and release processes.
      • Informal or undocumented organizational change management planning for each release.
      • Informal or undocumented compliance validation with every release.
      • Documented intake process with stakeholder prioritization of requests.
      • Consistent delivery lifecycle with stable and predictable throughput with an expected range of delivery variance.
      • Formal and documented testing and release processes.
      • Organizational change management planning for each major release.
      • Compliance validation with every major release.
      • Intake process using value drivers and prioritization criteria to sequence all items.
      • Consistent delivery lifecycle with stable and predictable throughput with little variance.
      • Risk-based and partially automated testing and release processes.
      • Organizational change management planning for all releases.
      • Automated compliance validation with every major release.
      • Intake process using enterprise value drivers and prioritization criteria to sequence all items.
      • Stable Agile DevOps with low variability and automation.
      • Risk-based automated and manual testing.
      • Multiple release channels based on risk. Automated build, validation, and rollback capabilities.
      • Cross-channel, integrated organizational change management for all releases.
      • Automated compliance validation with every change or release.

      Exercise 3.2.3 Assess your PLM capability proficiency

      1 hour
      1. Review the expectations for this capability and determine your current proficiency for each skill.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Capabilities: Value realization

      Key performance indicators (KPIs)

      • Usability and user satisfaction: Assess satisfaction through usage monitoring and end-user feedback.
      • Value validation: Directly measure performance against defined value proposition, goals, and predicted ROI.
      • Fit for purpose: Verify the product addresses the intended purpose better than other options.

      Financial management

      • P&L: Manage each product as if it were its own business with profit and loss statements.
      • Acquisition cost/market growth: Define the cost of acquiring a new consumer, onboarding internal users, and increasing product usage.
      • User retention/market share: Verify product usage continues after adoption and solution reaches new user groups to increase value.

      Business model

      • Defines value proposition: Dedicate your primary focus to understanding and defining the value your product will deliver.
      • Market strategy and goals: Define your acquisition, adoption, and retention plan for users.
      • Financial model: Build an end-to-end financial model and plan for the product and all related operational support.

      “The competition is anyone the customer compares you with.”

      – Thomas K. Connellan, Inside the Magic Kingdom

      Value Realization: KPIs, Financial management, Business model

      Info-Tech Insight

      Most organizations stop with on-time and on-budget. True financial alignment needs to define and manage the full lifecycle P&L.

      Use a balanced value to establish a common definition of goals and value

      Value drivers are strategic priorities aligned to our enterprise strategy and translated through our product families. Each product and change has an impact on the value driver helping us reach our enterprise goals.

      Importance of the value driver multiplied by the Impact of value score is equal to the Value score.

      Info-Tech Insight

      Your value drivers and impact helps estimate the expected value of roadmap items, prioritize roadmap and backlog items, and identify KPIs and OKRs to measure value realization and actual impact.

      Include balanced value as one criteria to guide better decisions

      Your balanced value is just one of many criteria needed to align your product goals and sequence roadmap items. Feasibility, delivery pipeline capacity, shared services, and other factors may impact the prioritization of backlog items.

      Build your balanced business value score by using four key value drivers.

      Determine your value drivers

      Competent organizations know that value cannot always be represented by revenue or reduced expenses. However, it is not always apparent how to envision the full spectrum of sources of value. Dissecting value by benefit type and the value source’s orientation allows you to see the many ways in which a product or service brings value to the organization.

      Business value matrix

      Graph with 4 quadrants representing Outward versus Inward, and Financial benefit versus Human benefit. The quadrants are Reach customers, Increase revenue/demonstrate value, Enhance services, Reduce costs.

      Financial benefits vs. improved capabilities

      Financial benefits refer to the degree to which the value source can be measured through monetary metrics and is often quite tangible.

      Human benefits refer to how a product or service can deliver value through a user’s experience.

      Inward vs. outward orientation

      Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations.

      Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.

      Exercise 3.2.4 Identify your business value drivers and sources of value

      1 hour
      1. Brainstorm the different types of business value that you produce on the sticky notes (one item per page). Draw from examples of products in your portfolio.
      2. Identify the most important value items for your organization (two to three per quadrant).
      3. Record the results in the Mature and Scale Product Ownership Workbook.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Ownership Workbook.

      My business value sources

      Graph with 4 quadrants representing Outward versus Inward, and Financial benefit versus Human benefit. The quadrants are Reach customers, Increase revenue/demonstrate value, Enhance services, Reduce costs.

      Capability: Value realization

      Your Score: ____

      1 - Foundational: Transitioning and Growing

      2 - Capable/Competent: Core Contributor

      3 - Influential: Gifted Improver

      4 - Transformational: Towering Strength

      • Product canvas or basic product positioning overview.
      • Simple budget or funding mechanism for changes.
      • Product demos and informal user feedback mechanisms.
      • Business value canvas or basic business model tied to roadmap funding.
      • Product funding tied to roadmap milestones and prioritization.
      • Defined KPIs /OKRs for roadmap delivery throughput and value realization measurement.
      • Business model with operating cost structures, revenue/value traceability, and market/user segments.
      • Scenario-based roadmap funding alignment.
      • Roadmap aligned KPIs /OKRs for delivery throughput and value realization measurement as a key factor in roadmap prioritization.
      • Business model tied to enterprise operating costs and value realization KPIs/OKRs.
      • P&L roadmap and cost accounting tied to value metrics.
      • Roadmap aligned enterprise and scenario-based KPIs /OKRs for delivery throughput and value realization measurement as a key factor in roadmap prioritization.

      Exercise 3.2.5 Assess your value realization capability proficiency

      1 hour
      1. Review the expectations for this capability and determine your current proficiency for each skill.
      2. Complete your assessment in the Mature and Scale Product Owner Proficiency Assessment tool.
      3. Record the results in the Mature and Scale Product Ownership Playbook.
      4. Review the skills map to identify strengths and areas of growth.

      Output

      • Product owner capability assessment

      Participants

      • Product owners
      • Product managers

      Capture in the Mature and Scale Product Owner Proficiency Assessment.

      Determine your product owner capability proficiency in regards to: Vision, Leadership, Product Lifecycle, and Value Realization

      Summary of Accomplishment

      Problem solved.

      Product ownership can be one of the most difficult challenges facing delivery and operations teams. By focusing on operational grouping and alignment of goals, organizations can improve their value realization at all levels in the organization.

      The foundation for delivering and enhancing products and services is rooted in the same capability model. Traditionally, product owners have focused on only a subset of skills and capabilities needed to properly manage and grow their products. The product owner capability model is a useful tool to ensure optimal performance from product owners and assess the right level of detail for each product within the product families.

      Congratulations. You’ve completed a significant step toward higher-value products and services.

      If you would like additional support, have our analysts guide you through other phases as apart of an Info-Tech workshop

      Contact your account representative for more information

      workshops@infotech.com
      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as apart of an Info-Tech workshop

      Contact your account representative for more information
      workshops@infotech.com 1-888-670-8889

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.1 Assess your real Agile skill proficiency

      Assess your skills and capabilities against the real Agile skills inventory

      2.2.3 Prioritize your stakeholders

      Build a stakeholder management strategy.

      Research Contributors and Experts

      Emily Archer

      Lead Business Analyst,
      Enterprise Consulting, authentic digital agency

      Emily Archer is a consultant currently working with Fortune 500 clients to ensure the delivery of successful projects, products, and processes. She helps increase the business value returned for organizations’ investments in designing and implementing enterprise content hubs and content operations, custom web applications, digital marketing, and e-commerce platforms.

      David Berg

      Founder & CTO
      Strainprint Technologies Inc.

      David Berg is a product commercialization expert who has spent the last 20 years delivering product management and business development services across a broad range of industries. Early in his career, David worked with product management and engineering teams to build core network infrastructure products that secure and power the internet we benefit from today. David’s experience also includes working with clean technologies in the area of clean power generation, agritech, and Internet of Things infrastructure. Over the last five years, David has been focused on his latest venture, Strainprint Technologies, a data and analytics company focused on the medical cannabis industry. Strainprint has built the largest longitudinal medical cannabis dataset in the world, with a goal to develop an understanding of treatment behavior, interactions, and chemical drivers to guide future product development.

      Research Contributors and Experts

      Kathy Borneman

      Digital Product Owner, SunTrust Bank

      Kathy Borneman is a senior product owner who helps people enjoy their jobs again by engaging others in end-to-end decision making to deliver software and operational solutions that enhance the client experience and allow people to think and act strategically.

      Charlie Campbell

      Product Owner, Merchant e-Solutions

      Charlie Campbell is an experienced problem solver with the ability to quickly dissect situations and recommend immediate actions to achieve resolution, liaise between technical and functional personnel to bridge the technology and communication gap, and work with diverse teams and resources to reach a common goal.

      Research Contributors and Experts

      Yarrow Diamond

      Sr. Director, Business Architecture
      Financial Services

      Yarrow Diamond is an experienced professional with expertise in enterprise strategy development, project portfolio management, and business process reengineering across financial services, healthcare and insurance, hospitality, and real estate environments. She has a master’s in Enterprise Architecture from Penn State University, LSSMBB, PMP, CSM, ITILv3.

      Cari J. Faanes-Blakey, CBAP, PMI-PBA

      Enterprise Business Systems Analyst,
      Vertex, Inc.

      Cari J. Faanes-Blakey has a history in software development and implementation as a Business Analyst and Project Manager for financial and taxation software vendors. Active in the International Institute of Business Analysis (IIBA), Cari participated on the writing team for the BA Body of Knowledge 3.0 and the certification exam.

      Research Contributors and Experts

      Kieran Gobey

      Senior Consultant Professional Services
      Blueprint Software Systems

      Kieran Gobey is an IT professional with 24 years of experience, focused on business, technology, and systems analysis. He has split his career between external and internal customer-facing roles, and this has resulted in a true understanding of what is required to be a Professional Services Consultant. His problem-solving skills and ability to mentor others have resulted in successful software implementations.

      Kieran’s specialties include deep system troubleshooting and analysis skills, facilitating communications to bring together participants effectively, mentoring, leadership, and organizational skills.

      Rupert Kainzbauer

      VP Product, Digital Wallets
      Paysafe Group

      Rupert Kainzbauer is an experienced senior leader with a passion for defining and delivering products that deliver real customer and commercial benefit. With a team of highly experienced and motivated product managers, he has successfully led highly complex, multi-stakeholder payments initiatives, from proposition development and solution design through to market delivery. Their domain experience is in building online payment products in high-risk and emerging markets, remittance, prepaid cards, and mobile applications.

      Research Contributors and Experts

      Saeed Khan

      Founder,
      Transformation Labs

      Saeed Khan has been working in high tech for 30 years in Canada and the US and has held several leadership roles in Product Management in that time. He speaks regularly at conferences and has been writing publicly about technology product management since 2005.

      Through Transformation Labs, Saeed helps companies accelerate product success by working with product teams to improve their skills, practices, and processes. He is a cofounder of ProductCamp Toronto and currently runs a Meetup group and global Slack community called Product Leaders; the only global community of senior level product executives.

      Hoi Kun Lo

      Product Owner
      Nielsen

      Hoi Kun Lo is an experienced change agent who can be found actively participating within the IIBA and WITI groups in Tampa, FL and a champion for Agile, architecture, diversity, and inclusion programs at Nielsen. She is currently a Product Owner in the Digital Strategy team within Nielsen Global Watch Technology.

      Research Contributors and Experts

      Abhishek Mathur

      Sr Director, Product Management
      Kasisto, Inc.

      Abhishek Mathur is a product management leader, an artificial intelligence practitioner, and an educator. He has led product management and engineering teams at Clarifai, IBM, and Kasisto to build a variety of artificial intelligence applications within the space of computer vision, natural language processing, and recommendation systems. Abhishek enjoys having deep conversations about the future of technology and helping aspiring product managers enter and accelerate their careers.

      Jeff Meister

      Technology Advisor and Product Leader

      Jeff Meister is a technology advisor and product leader. He has more than 20 years of experience building and operating software products and the teams that build them. He has built products across a wide range of industries and has built and led large engineering, design, and product organizations.

      Jeff most recently served as Senior Director of Product Management at Avanade, where he built and led the product management practice. This involved hiring and leading product managers, defining product management processes, solution shaping and engagement execution, and evangelizing the discipline through pitches, presentations, and speaking engagements.

      Jeff holds a Bachelor of Applied Science (Electrical Engineering) and a Bachelor of Arts from the University of Waterloo, an MBA from INSEAD (Strategy), and certifications in product management, project management, and design thinking.

      Research Contributors and Experts

      Vincent Mirabelli

      Principal,
      Global Project Synergy Group

      With over 10 years of experience in both the private and public sectors, Vincent Mirabelli possesses an impressive track record of improving, informing, and transforming business strategy and operations through process improvement, design and re-engineering, and the application of quality to business analysis, project management, and process improvement standards.

      Oz Nazili

      VP, Product & Growth
      TWG

      Oz Nazili is a product leader with a decade of experience in both building products and product teams. Having spent time at funded startups and large enterprises, he thinks often about the most effective way to deliver value to users. His core areas of interest include Lean MVP development and data-driven product growth.

      Research Contributors and Experts

      Mike Starkey

      Director of Engineering
      W.W. Grainger

      Mike Starkey is a Director of Engineering at W.W. Grainger, currently focusing on operating model development, digital architecture, and building enterprise software. Prior to joining W.W. Grainger, Mike held a variety of technology consulting roles throughout the system delivery lifecycle spanning multiple industries such as healthcare, retail, manufacturing, and utilities with Fortune 500 companies.

      Anant Tailor

      Cofounder and Head of Product
      Dream Payments Corp.

      Anant Tailor is a cofounder at Dream Payments where he currently serves as the COO and Head of Product, having responsibility for Product Strategy & Development, Client Delivery, Compliance, and Operations. He has 20+ years of experience building and operating organizations that deliver software products and solutions for consumers and businesses of varying sizes.

      Prior to founding Dream Payments, Anant was the COO and Director of Client Services at DonRiver Inc, a technology strategy and software consultancy that he helped to build and scale into a global company with 100+ employees operating in seven countries.

      Anant is a Professional Engineer with a Bachelor degree in Electrical Engineering from McMaster University and a certificate in Product Strategy & Management from the Kellogg School of Management at Northwestern University.

      Research Contributors and Experts

      Angela Weller

      Scrum Master, Businessolver

      Angela Weller is an experienced Agile business analyst who collaborates with key stakeholders to attain their goals and contributes to the achievement of the company’s strategic objectives to ensure a competitive advantage. She excels when mediating or facilitating teams.

      Related Info-Tech Research

      Product Delivery

      Deliver on Your Digital Product Vision

      Build a product vision your organization can take from strategy through execution.

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      Build Your Agile Acceleration Roadmap

      Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.

      Implement Agile Practices That Work

      Improve collaboration and transparency with the business to minimize project failure.

      Implement DevOps Practices That Work

      Streamline business value delivery through the strategic adoption of DevOps practices.

      Extend Agile Practices Beyond IT

      Further the benefits of Agile by extending a scaled Agile framework to the business.

      Build Your BizDevOps Playbook

      Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.

      Embed Security Into the DevOps Pipeline

      Shift security left to get into DevSecOps.

      Spread Best Practices With an Agile Center of Excellence

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Enable Organization-Wide Collaboration by Scaling Agile

      Execute a disciplined approach to rolling out Agile methods in the organization.

      Related Info-Tech Research

      Application Portfolio Management

      APM Research Center

      See an overview of the APM journey and how we can support the pieces in this journey.

      Application Portfolio Management Foundations

      Ensure your application portfolio delivers the best possible return on investment.

      Streamline Application Maintenance

      Effective maintenance ensures the long-term value of your applications.

      Streamline Application Management

      Move beyond maintenance to ensuring exceptional value from your apps.

      Build an Application Department Strategy

      Delivering value starts with embracing what your department can do.

      Embrace Business-Managed Applications

      Empower the business to implement their own applications with a trusted business-IT relationship

      Optimize Applications Release Management

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Value, Delivery Metrics, Estimation

      Build a Value Measurement Framework

      Focus product delivery on business value–driven outcomes.

      Select and Use SDLC Metrics Effectively

      Be careful what you ask for, because you will probably get it.

      Application Portfolio Assessment: End User Feedback

      Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Refine Your Estimation Practices With Top-Down Allocations

      Don’t let bad estimates ruin good work.

      Estimate Software Delivery With Confidence

      Commit to achievable software releases by grounding realistic expectations.

      Reduce Time to Consensus With an Accelerated Business Case

      Expand on the financial model to give your initiative momentum.

      Optimize Project Intake, Approval, and Prioritization

      Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.

      Enhance PPM Dashboards and Reports

      Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Organizational Design and Performance

      Redesign Your IT Organizational Structure

      Focus product delivery on business value-driven outcomes.

      Build a Strategic IT Workforce Plan

      Have the right people, in the right place, at the right time.

      Implement a New Organizational Structure

      Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.

      Build an IT Employee Engagement Program

      Don’t just measure engagement, act on it

      Set Meaningful Employee Performance Measures

      Set holistic measures to inspire employee performance.

      Bibliography (Product Management)

      “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.

      A, Karen. “20 Mental Models for Product Managers.” Product Management Insider, Medium, 2 Aug. 2018. Web.

      Adams, Paul. “Product Teams: How to Build & Structure Product Teams for Growth.” Inside Intercom, 30 Oct. 2019. Web.

      Aghina, Handscomb, Ludolph, West, and Abby Yip, “How to select and develop individuals for successful agile teams: A practical guide” McKinsey & Company 20 Dec. 2018. Web.

      Agile Alliance. “Product Owner.” Agile Alliance. n.d. Web.

      Ambler, Scott W. "Communication on Agile Software Teams“, Agile Modeling. 2001-2022. Web.

      Ambysoft. “2018 IT Project Success Rates Survey Results.” Ambysoft. 2018. Web.

      Banfield, Richard, et al. “On-Demand Webinar: Strategies for Scaling Your (Growing) Enterprise Product Team.” Pluralsight, 31 Jan. 2018. Web.

      Beck, Beedle, van Bennekum, Cockburn, Cunningham, Fowler, Grenning, Highsmith, Hunt, Jeffries, Kern, Marick, Martin, Mellor, Schwaber, Sutherland, Thomas, "Manifesto for Agile Software Development." agilemanifesto.org. 2001

      Berez, Steve, et al. “How to Plan and budget for Agile at Scale.” Bain & Company, 08 Oct 2019. Web

      Blueprint. “10 Ways Requirements Can Sabotage Your Projects Right From the Start.” Blueprint. 2012. Web.

      Breddels, Dajo, and Paul Kuijten. “Product Owner Value Game.” Agile2015 Conference, Agile Alliance 2015. Web.

      Cagan, Martin. “Behind Every Great Product.” Silicon Valley Product Group. 2005. Web.

      Cohn, Mike. “What Is a Product?” Mountain Goat Software. 6 Sept. 2016. Web.

      Connellan, Thomas K. Inside the Magic Kingdom, Bard Press, 1997.

      Curphey, Mark. “Product Definition.” SlideShare, 25 Feb. 2007. Web.

      “Delegation Poker Product Image.” Management 3.0, n.d. Web.

      Distel, Dominic, et al. “Finding the sweet spot in product-portfolio management.’ McKinsey, 4 Dec. 2020. Web

      Eringa, Ron. “Evolution of the Product Owner.” RonEringa.com, 12 June 2016. Web.

      Fernandes, Thaisa. “Spotify Squad Framework - Part I.” PM101, Medium, 6 Mar. 2017. Web.

      Galen, Robert. “Measuring Product Ownership – What Does ‘Good’ Look Like?” RGalen Consulting, 5 Aug. 2015. Web.

      Grenny, Joseph. “The Best Teams Hold Themselves Accountable.” Harvard Business Review, 30 May 2014. Web.

      Halisky, Merland, and Luke Lackrone. “The Product Owner’s Universe.” Agile2016 Conference, Agile Alliance, 2016. Web.

      Bibliography (Product Management)

      IIBA "A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) v3" IIBA. 15 APR 2015

      Kamer, Jurriaan. “How to Build Your Own ‘Spotify Model’.” The Ready, Medium, 9 Feb. 2018. Web.

      Kendis Team. “Exploring Key Elements of Spotify’s Agile Scaling Model.” Scaled Agile Framework, Medium, 23 Jul. 2018. Web.

      Lindstrom, Lowell. “7 Skills You Need to Be a Great Product Owner.” Scrum Alliance, n.d. Web.

      Lukassen, Chris. “The Five Belts Of The Product Owner.” Xebia.com, 20 Sept. 2016. Web.

      Mankins, Michael. “The Defining Elements of a Winning Culture.” Bain, 19 Dec. 2013. Web.

      McCloskey, Heather. “Scaling Product Management: Secrets to Defeating Common Challenges.” ProductPlan, 12 July 2019. Web.

      McCloskey, Heather. “When and How to Scale Your Product Team.” UserVoice, 21 Feb. 2017. Web. Mironov, Rich. “Scaling Up Product Manager/Owner Teams.” Rich Mironov's Product Bytes, Mironov Consulting, 12 Apr. 2014. Web.

      Moore, Geoffrey A. “Crossing the Chasm, 3rd Edition.” Collins Business Essentials, 28 Jan 2014

      Oh, Paul. “How Mastering Resilience Can Help Drive Agile Transformations.” Why Innovation!, 10 Oct. 2019.

      Overeem, Barry. “A Product Owner Self-Assessment.” Barry Overeem, 6 Mar. 2017. Web.

      Overeem, Barry. “Retrospective: Using the Team Radar.” Barry Overeem, 27 Feb. 2017. Web.

      Pichler, Roman. “How to Scale the Scrum Product Owner.” Roman Pichler, 28 June 2016 . Web.

      Pichler, Roman. “Product Management Framework.” Pichler Consulting Limited, 2014. Web.

      Pichler, Roman. “Sprint Planning Tips for Product Owners.” LinkedIn, 4 Sept. 2018. Web.

      Pichler, Roman. “What Is Product Management?” Pichler Consulting Limited, 26 Nov. 2014. Web.

      PMI "The high cost of low performance: the essential role of communications“. PMI Pulse of Profession, May 2013.

      Radigan,Dan. “Putting the ‘Flow' Back in Workflow With WIP Limits.” Atlassian, n.d. Web.

      Bibliography (Product Management)

      Rouse, Margaret. “Definition: product.” TechTarget, Sept. 2005. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on (Business) Value.” Scrum.org, 30 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Agile Product Management.” Scrum.org, 28 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Scrum.org, 5 Dec. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on the Product Vision.” Scrum.org, 29 Nov. 2017. Web.

      Schuurman, Robbin. “Tips for Starting Product Owners.” Scrum.org, 27 Nov. 2017. Web.

      Sharma, Rohit. “Scaling Product Teams the Structured Way.” Monetary Musings, 28 Nov. 2016. Web.

      Shirazi, Reza. “Betsy Stockdale of Seilevel: Product Managers Are Not Afraid To Be Wrong.” Austin Voice of Product, 2 Oct. 2018. Web.

      Spitz, Enid R. “The Three Kinds of Empathy: Emotional, Cognitive, Compassionate.” The Three Kinds of Empathy: Emotional, Cognitive, Compassionate. Heartmanity. Web.

      Steiner, Anne. “Start to Scale Your Product Management: Multiple Teams Working on Single Product.” Cprime, 6 Aug. 2019. Web.

      “The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2016. Web.

      “The Standish Group 2015 Chaos Report.” The Standish Group. 2015. Web.

      Theus, Andre. “When Should You Scale the Product Management Team?” ProductPlan, 7 May 2019. Web.

      Tolonen, Arto. “Scaling Product Management in a Single Product Company.” Smartly.io, 26 Apr. 2018. Web.

      Ulrich, Catherine. “The 6 Types of Product Managers. Which One Do You Need?” Medium, 19 Dec. 2017. Web.

      Verwijs, Christiaan. “Retrospective: Do The Team Radar.” The Liberators, Medium, 10 Feb. 2017. Web.

      Vlaanderen, Kevin. “Towards Agile Product and Portfolio Management”. Academia.edu. 2010. Web.

      Backlog

      2009 Business Analysis Benchmark Study.” IAG Consulting, 2009. Web.

      Armel, Kate. “Data-driven Estimation, Management Lead to High Quality.” Quantitative Software Management Inc, 2015. Web.

      Bradley, Marty. “Agile Estimation Guidance.” Leading Agile, 30 Aug. 2016. Web. Feb. 2019.

      CollabNet and VersionOne. “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.

      Craveiro, João. “Marty meets Martin: connecting the two triads of Product Management.” Product Coalition, 18 Nov. 2017. Accessed Feb. 2019.

      “Enablers.” Scaled Agile, n.d. Web.

      “Epic.” Scaled Agile, n.d. Web.

      Fischer, Christian. “Scrum Compact.” Itemis, n.d. Web. Feb. 2019.

      Hackshall, Robin. “Product Backlog Refinement.” Scrum Alliance, 9 Oct. 2014. Accessed Feb. 2019.

      Hartman, Bob. “New to agile? INVEST in good user stories.” Agile For All, 14 May 2009. Web.

      Huether, Derek. “Cheat Sheet for Product Backlog Refinement (Grooming).” Leading Agile, 2 Nov. 2013. Accessed Feb. 2019.

      Karlsson, Johan. “Backlog Grooming: Must-Know Tips for High-Value Products.” Perforce, 18 May 2018. Accessed Feb. 2019.

      Khan, Saeed. “Good Bye ‘Product Owner’, Hello ‘Backlog Manager.’” On Product Management, 27 June 2011. Accessed Feb. 2019.

      Khan, Saeed. “Let’s End the Confusion: A Product Owner is NOT a Product Manager.” On Product Management, 14 July 2017. Accessed Feb. 2019.

      Lawrence, Richard. “New Story Splitting Resource.” Agile For All. 27 Jan. 2012. Web. Feb. 2019.

      Leffingwell, Dean. “SAFe 4.0.” Scaled Agile Inc, 2017. Accessed Feb. 2019.

      Lucero, Mario. “Product Backlog – Deep Model.” Agilelucero, 8 Oct. 2014. Web.

      “PI Planning.” Scaled Agile, n.d. Web.

      Pichler, Roman. “The Product Roadmap and the Product Backlog.” Roman Pichler, 9 Sept. 2014. Accessed Feb. 2019.

      Rubin, Kenneth S. Essential Scrum: A Practical Guide to the Most Popular Agile Process. Pearson Education, 2012.

      Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Burozeven, 20 Nov. 2017. Accessed Feb. 2019.

      Srinivasan, Vibhu. “Product Backlog Management: Tips from a Seasoned Product Owner.” Agile Alliance, n.d. Accessed Feb. 2019.

      Todaro, Dave. “Splitting Epics and User Stories.” Ascendle, n.d. Accessed Feb. 2019.

      “What Characteristics Make Good Agile Acceptance Criteria?” Segue Technologies, 3 Sept. 2015. Web. Feb. 2019.

      Bibliography (Roadmap)

      Bastow, Janna. “Creating Agile Product roadmaps Everyone Understands.” ProdPad, 22 Mar. 2017. Accessed Sept. 2018.

      Bastow, Janna. “The Product Tree Game: Our Favorite Way To Prioritize Features.” ProdPad, 21 Feb. 2016. Accessed Sept. 2018.

      Chernak, Yuri. “Requirements Reuse: The State of the Practice.” 2012 IEEE International Conference, 12 June 2012, Herzliya, Israel. Web.

      Fowler, Martin. “Application Boundary.” MartinFowler.com, 11 Sept. 2003. Accessed 20 Nov. 2017.

      Harrin, Elizabeth. “Learn What a Project Milestone Is.” The Balance Careers, 10 May 2018. Accessed Sept. 2018.

      “How to create a product roadmap.” Roadmunk, n.d. Accessed Sept. 2018.

      Johnson, Steve. “How to Master the 3 Horizons of Product Strategy.” Aha!, 24 Sept. 2015. Accessed Sept. 2018.

      Johnson, Steve. “The Product Roadmap vs. the Technology Roadmap.” Aha!, 23 June 2016. Accessed Sept. 2018

      Juncal, Shaun. “How Should You Set Your Product Roadmap Timeframes?” ProductPlan, Web. Sept. 2018.

      Leffingwell, Dean. “SAFe 4.0.” Scaled Agile, 2017. Web.

      Maurya, Ash. “What is a Minimum Viable Product (MVP).” Leanstack, 12 June 2017. Accessed Sept. 2018.

      Pichler, Roman. “10 Tips for Creating an Agile Product Roadmap.” Roman Pichler, 20 July 2016. Accessed Sept. 2018.

      Pichler, Roman. Strategize: Product Strategy and Product Roadmap Practices for the Digital Age. Pichler Consulting, 2016.

      “Product Roadmap Contents: What Should You Include?” ProductPlan, n.d. Accessed 20 Nov. 2017.

      Saez, Andrea. “Why Your Roadmap Is Not a Release Plan.” ProdPad, 23 October 2015. Accessed Sept. 2018.

      Schuurman, Robbin. “Tips for Agile product roadmaps & product roadmap examples.” Scrum.org, 7 Dec. 2017. Accessed Sept. 2018.

      Bibliography (Vision and Canvas)

      Adams, Paul. “The Future Product Canvas.” Inside Intercom, 10 Jan. 2014. Web.

      “Aligning IT Funding Models to the Pace of Technology Change.” EDUCAUSE, 14 Dec. 2015. Web.

      Altman, Igor. “Metrics: Gone Bad.” OpenView, 10 Nov. 2009. Web.

      Barry, Richard. “The Product Vision Canvas – a Strategic Tool in Developing a Successful Business.” Polymorph, 2019. Web.

      “Business Canvas – Business Models & Value Propositions.” Strategyzer, 2019. Web.

      “Business Model Canvas.” Wikipedia: The Free Encyclopedia, 4 Aug. 2019. Web.

      Charak, Dinker. “Idea to Product: The Working Model.” ThoughtWorks, 13 July 2017. Web.

      Charak, Dinker. “Product Management Canvas - Product in a Snapshot.” Dinker Charak, 29 May 2017. Web.

      Chudley, James. “Practical Steps in Determining Your Product Vision (Product Tank Bristol, Oct. 2018).” LinkedIn SlideShare. Uploaded by cxpartners, 2 Nov. 2018. Web.

      Cowan, Alex. “The 20 Minute Business Plan: Business Model Canvas Made Easy.” COWAN+, 2019. Web.

      Craig, Desiree. “So You've Decided To Become A Product Manager.” Start it up, Medium, 2 June 2019. Web.

      “Create an Aha! Business Model Canvas Strategic Model.” Aha! Support, 2019. Web.

      Eick, Stephen. “Does Code Decay? Assessing the Evidence from Change Management Data.” IEEE Transactions on Software Engineering, vol. 27, no. 1, Jan. 2001, pp. 1-12. Web.

      Eriksson, Martin. “The next Product Canvas.” Mind the Product, 22 Nov. 2013. Web.

      “Experience Canvas: a Lean Approach: Atlassian Team Playbook.” Atlassian, 2019. Web.

      Freeman, James. “How to Make a Product Canvas – Visualize Your Product Plan.” Edraw, 23 Dec. 2019. Web.

      Fuchs, Danny. “Measure What Matters: 5 Best Practices from Performance Management Leaders.” OpenGov, 8 Aug. 2018. Web.

      Gorisse, Willem. “A Practical Guide to the Product Canvas.” Mendix, 28 Mar. 2017. Web.

      Gothelf, Jeff. “The Lean UX Canvas.” Jeff Gothelf, 15 Dec. 2016. Web.

      Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product: Getting Started.” EBG Consulting, 15 Jan. 2019. Web.

      Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product's Core Requirements.” EBG Consulting, 4 Feb. 2019. Web.

      Gray, Mark Krishan. “Should I Use the Business Model Canvas or the Lean Canvas?” Blog, Medium.com, 2019. Web.

      Bibliography (Vision and Canvas)

      Hanby, Jeff. "Software Maintenance: Understanding and Estimating Costs." LookFar, 21 Oct. 2016. Web.

      “How do you define a product?” Scrum.org, 4 Apr 2017, Web

      Juncal, Shaun. “How to Build a Product Roadmap Based on a Business Model Canvas.” ProductPlan, 19 June 2019. Web.

      “Lean Canvas Intro - Uber Example.” YouTube, uploaded by Railsware Product Academy, 12 Oct. 2018. Web.

      “Lesson 6: Product Canvas.” ProdPad Help Center, 2019. Web.

      Lucero, Mario. “The Product Canvas.” Agilelucero.com, 22 June 2015. Web.

      Maurya, Ash. “Create a New Lean Canvas.” Canvanizer, 2019. Web.

      Maurya, Ash. “Don't Write a Business Plan. Create a Lean Canvas Instead.” LEANSTACK, 2019. Web.

      Maurya, Ash. “Why Lean Canvas vs Business Model Canvas?” Medium, 27 Feb. 2012. Web.

      Mirabelli, Vincent. “The Project Value Canvas.” Vincent Mirabelli, 2019. Web.

      Mishra, LN. “Business Analysis Canvas – The Ultimate Enterprise Architecture.” BA Times, 19 June 2019. Web.

      Muller. Jerry Z. “Why performance metrics isn’t always the best way to judge performance.” Fast Company, 3 April 2019. Web.

      Perri, Melissa. “What Is Good Product Strategy?” Melissa Perri, 14 July 2016. Web.

      Pichler, Roman. “A Product Canvas for Agile Product Management, Lean UX, Lean Startup.” Roman Pichler, 16 July 2012. Web.

      Pichler, Roman. “Introducing the Product Canvas.” JAXenter, 15 Jan. 2013. Web.

      Pichler, Roman. “Roman's Product Canvas: Introduction.” YouTube, uploaded by Roman Pichler, 3 Mar. 2017. Web.

      Pichler, Roman. “The Agile Vision Board: Vision and Product Strategy.” Roman Pichler, 10 May 2011. Web.

      Pichler, Roman. “The Product Canvas – Template.” Roman Pichler, 11 Oct. 2016. Web.

      Pichler, Roman. “The Product Canvas Tutorial V1.0.” LinkedIn SlideShare. Uploaded by Roman Pichler, 14 Feb. 2013. Web.

      Pichler, Roman. “The Product Vision Board: Introduction.” YouTube uploaded by Roman Pichler, 3 Mar. 2017. Web.

      “Product Canvas PowerPoint Template.” SlideModel, 2019. Web.

      Bibliography (Vision and Canvas)

      “Product Canvas.” SketchBubble, 2019, Web.

      “Product Canvas.” YouTube, uploaded by Wojciech Szramowski, 18 May 2016. Web.

      “Product Roadmap Software to Help You Plan, Visualize, and Share Your Product Roadmap.” Productboard, 2019. Web.

      Roggero, Giulio. “Product Canvas Step-by-Step.” LinkedIn SlideShare, uploaded by Giulio Roggero, 18 May 2013. Web.

      Royce, Dr. Winston W. “Managing the Development of Large Software Systems.” Scf.usc.edu, 1970. Web.

      Ryan, Dustin. “The Product Canvas.” Qdivision, Medium, 20 June 2017. Web.

      Snow, Darryl. “Product Vision Board.” Medium, 6 May 2017. Web.

      Stanislav, Shymansky. “Lean Canvas – a Tool Your Startup Needs Instead of a Business Plan.” Railsware, 12 Oct. 2018. Web.

      Stanislav, Shymansky. “Lean Canvas Examples of Multi-Billion Startups.” Railsware, 20 Feb. 2019. Web.

      “The Product Vision Canvas.” YouTube, Uploaded by Tom Miskin, 20 May 2019. Web.

      Tranter, Leon. “Agile Metrics: the Ultimate Guide.” Extreme Uncertainty, n.d. Web.

      “Using Business Model Canvas to Launch a Technology Startup or Improve Established Operating Model.” AltexSoft, 27 July 2018. Web.

      Veyrat, Pierre. “Lean Business Model Canvas: Examples + 3 Pillars + MVP + Agile.” HEFLO BPM, 10 Mar. 2017. Web.

      “What Are Software Metrics and How Can You Track Them?” Stackify, 16 Sept. 2017. Web

      “What Is a Product Vision?” Aha!, 2019. Web.

      Supporting Research

      Transformation topics and supporting Info-Tech research to make the journey easier, with less rework.

      Supporting research and services

      Improving IT alignment

      Build a Business-Aligned IT Strategy

      Success depends on IT initiatives clearly aligned to business goals, IT excellence, and driving technology innovation.

      Includes a "Strategy on a page" template

      Make Your IT Governance Adaptable

      Governance isn't optional, so keep it simple and make it flexible.

      Create an IT View of the Service Catalog

      Unlock the full value of your service catalog with technical components.

      Application Portfolio Management Foundations

      Ensure your application portfolio delivers the best possible return on investment.

      Supporting research and services

      Shifting toward Agile DevOps

      Agile/DevOps Resource Center

      Tools and advice you need to be successful with Agile.

      Develop Your Agile Approach for a Successful Transformation

      Understand Agile fundamentals, principles, and practices so you can apply them effectively in your organization.

      Implement DevOps Practices That Work

      Streamline business value delivery through the strategic adoption of DevOps practices.

      Perform an Agile Skills Assessment

      Being Agile isn't about processes, it's about people.

      Define the Role of Project Management in Agile and Product-Centric Delivery

      Projects and products are not mutually exclusive.

      Supporting research and services

      Shifting toward product management

      Make the Case for Product Delivery

      Align your organization on the practices to deliver what matters most.

      Deliver on Your Digital Product Vision

      Build a product vision your organization can take from strategy through execution.

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      Build a Better Product Owner

      Strengthen the product owner's role in your organization by focusing on core capabilities and proper alignment.

      Supporting research and services

      Improving value and delivery metrics

      Build a Value Measurement Framework

      Focus product delivery on business value-driven outcomes.

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Select and Use SDLC Metrics Effectively

      Be careful what you ask for because you will probably get it.

      Reduce Time to Consensus With an Accelerated Business Case

      Expand on the financial model to give your initiative momentum.

      Supporting research and services

      Improving governance, prioritization, and value

      Make Your IT Governance Adaptable

      Governance isn't optional, so keep it simple and make it flexible.

      Maximize Business Value from IT Through Benefits Realization

      Embed benefits realization into your governance process to prioritize IT spending and confirm the value of IT.

      Drive Digital Transformation With Platform Strategies

      Innovate and transform your business models with digital platforms.

      Succeed With Digital Strategy Execution

      Building a digital strategy is only half the battle: create a systematic roadmap of technology initiatives to execute the strategy and drive digital transformation.

      Build a Value Measurement Framework

      Focus product delivery on business value-driven outcomes.

      Create a Holistic IT Dashboard

      Mature your IT department by measuring what matters.

      Supporting research and services

      Improving requirements management and quality assurance

      Requirements Gathering for Small Enterprises

      Right-size the guidelines of your requirements gathering process.

      Improve Requirements Gathering

      Back to basics: great products are built on great requirements.

      Build a Software Quality Assurance Program

      Build quality into every step of your SDLC.

      Automate Testing to Get More Done

      Drive software delivery throughput and quality confidence by extending your automation test coverage.

      Manage Your Technical Debt

      Make the case to manage technical debt in terms of business impact.

      Create a Business Process Management Strategy

      Avoid project failure by keeping the "B" in BPM.

      Build a Winning Business Process Automation Playbook

      Optimize and automate your business processes with a user-centric approach.

      Create a Winning BPI Playbook

      Don't waste your time focusing on the "as is." Focus on the improvements and the "to be."

      Supporting research and services

      Improving release management

      Optimize Applications Release Management

      Build trust by right-sizing your process using appropriate governance.

      Streamline Application Maintenance

      Effective maintenance ensures the long-term value of your applications.

      Streamline Application Management

      Move beyond maintenance to ensure exceptional value from your apps.

      Optimize Change Management

      Right-size your change management process.

      Manage Your Technical Debt

      Make the case to manage technical debt in terms of business impact.

      Improve Application Development Throughput

      Drive down your delivery time by eliminating development inefficiencies and bottlenecks while maintaining high quality.

      Supporting research and services

      Business relationship management

      Embed Business Relationship Management

      Leverage knowledge of the business to become a strategic IT partner.

      Improving security

      Build an Information Security Strategy

      Create value by aligning your strategy to business goals and business risks.

      Develop and Deploy Security Policies

      Enhance your overall security posture with a defensible and prescriptive policy suite.

      Simplify Identity and Access Management

      Leverage risk- and role-based access control to quantify and simplify the IAM process.

      Supporting research and services

      Improving and supporting business-managed applications

      Embrace Business-Managed Applications

      Empower the business to implement their own applications with a trusted business-IT relationship.

      Enhance Your Solution Architecture Practices

      Ensure your software systems solution is architected to reflect stakeholders’ short-and long-term needs.

      Satisfy Digital End Users With Low- and No-Code

      Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.

      Build Your First RPA Bot

      Support RPA delivery with strong collaboration and management foundations.

      Automate Work Faster and More Easily With Robotic Process Automation

      Embrace the symbiotic relationship between the human and digital workforce.

      Supporting research and services

      Improving business intelligence, analytics, and reporting

      Modernize Data Architecture for Measurable Business Results

      Enable the business to achieve operational excellence, client intimacy, and product leadership with an innovative, Agile, and fit-for-purpose data architecture practice.

      Build a Reporting and Analytics Strategy

      Deliver actionable business insights by creating a business-aligned reporting and analytics strategy.

      Build Your Data Quality Program

      Quality data drives quality business decisions.

      Design Data-as-a-Service

      Journey to the data marketplace ecosystems.

      Build a Robust and Comprehensive Data Strategy

      Key to building and fostering a data-driven culture.

      Build an Application Integration Strategy

      Level the table before assembling the application integration puzzle or risk losing pieces.

      Appendix

      Pulse survey results

      Pulse survey (N=18): What are the key components of product/service ownership?

      Pulse survey results: What are the key components of product/service ownership? Table shows answer options and responses in percentage.

      Pulse Survey (N=18): What are the key individual skills for a product/service owner?

      What are the key individual skills for a product/service owner? Table shows answer options and responses in percentage

      Other choices entered by respondents:

      • Anticipating client needs, being able to support delivery in all phases of the product lifecycle, adaptability, and ensuring a healthy backlog (at least two sprints’ worth of work).
      • Requirements elicitation and prioritization.
      • The key skill is being product-focused to ensure it provides value for competitive advantage.

      Pulse Survey (N=18): What are three things an outstanding product/service owner does that an average one doesn’t?

      What are three things an outstanding product/service owner does that an average one doesn't? Table shows results.

      Establish Data Governance – APAC Edition

      • Buy Link or Shortcode: {j2store}348|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $172,999 Average $ Saved
      • member rating average days saved: 63 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Organisations are faced with challenges associated with changing data landscapes, evolving business models, industry disruptions, regulatory and compliance obligations, and changing and maturing user landscapes and demands for data.
      • Although the need for a data governance program is often evident, organisations miss the mark when their data governance efforts are not directly aligned to delivering measurable business value by supporting key strategic initiatives, value streams, and their underlying business capabilities.

      Our Advice

      Critical Insight

      • Your organisation’s value streams and the associated business capabilities require effectively governed data. Without this, you face the impact of elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.
      • Ensure your data governance program delivers measurable business value by aligning the associated data governance initiatives with the business architecture.
      • Data governance must continuously align with the organisation’s enterprise governance function. It should not be perceived as an IT pet project, but rather as a business-driven initiative.

      Impact and Result

      Info-Tech’s approach to establishing and sustaining effective data governance is anchored in the strong alignment of organisational value streams and their business capabilities with key data governance dimensions and initiatives.

      • Align with enterprise governance, business strategy and organizational value streams to ensure the program delivers measurable business value.
      • Understand your current data governance capabilities and build out a future state that is right sized and relevant.
      • Define data governance leadership, accountability, and responsibility, supported by an operating model that effectively manages change and communication and fosters a culture of data excellence.

      Establish Data Governance – APAC Edition Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Data Governance Research – A step-by-step document to ensure that the people handling the data are involved in the decisions surrounding data usage, data quality, business processes, and change implementation.

      Data governance is a strategic program that will help your organisation control data by managing the people, processes, and information technology needed to ensure that accurate and consistent data policies exist across varying lines of the business, enabling data-driven insight. This research will provide an overview of data governance and its importance to your organization, assist in making the case and securing buy-in for data governance, identify data governance best practices and the challenges associated with them, and provide guidance on how to implement data governance best practices for a successful launch.

      • Establish Data Governance – Phases 1-3 – APAC

      2. Data Governance Planning and Roadmapping Workbook – A structured tool to assist with establishing effective data governance practices.

      This workbook will help your organisation understand the business and user context by leveraging your business capability map and value streams, developing data use cases using Info-Tech's framework for building data use cases, and gauging the current state of your organisation's data culture.

      • Data Governance Planning and Roadmapping Workbook – APAC

      3. Data Use Case Framework Template – An exemplar template to highlight and create relevant use cases around the organisation’s data-related problems and opportunities.

      This business needs gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organisation. This template provides a framework for data requirements and a mapping methodology for creating use cases.

      • Data Use Case Framework Template – APAC

      4. Data Governance Initiative Planning and Roadmap Tool – A visual roadmapping tool to assist with establishing effective data governance practices.

      This tool will help your organisation plan the sequence of activities, capture start dates and expected completion dates, and create a roadmap that can be effectively communicated to the organisation.

      • Data Governance Initiative Planning and Roadmap Tool – APAC

      5. Business Data Catalogue – A comprehensive template to help you to document the key data assets that are to be governed based on in-depth business unit interviews, data risk/value assessments, and a data flow diagram for the organisation.

      Use this template to document information about key data assets such as data definition, source system, possible values, data sensitivity, data steward, and usage of the data.

      • Business Data Catalogue – APAC

      6. Data Governance Program Charter Template – A program charter template to sell the importance of data governance to senior executives.

      This template will help get the backing required to get a data governance project rolling. The program charter will help communicate the project purpose, define the scope, and identify the project team, roles, and responsibilities.

      • Data Governance Program Charter Template – APAC

      7. Data Policies – A set of policy templates to support the data governance framework for the organisation.

      This set of policies supports the organisation's use and management of data to ensure that it efficiently and effectively serves the needs of the organisation.

      • Data Governance Policy – APAC
      • Data Classification Policy, Standard, and Procedure – APAC
      • Data Quality Policy, Standard, and Procedure – APAC
      • Data Management Definitions – APAC
      • Metadata Management Policy, Standard, and Procedure – APAC
      • Data Retention Policy and Procedure – APAC
      [infographic]

      Workshop: Establish Data Governance – APAC Edition

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish Business Context and Value

      The Purpose

      Identify key business data assets that need to be governed.

      Create a unifying vision for the data governance program.

      Key Benefits Achieved

      Understand the value of data governance and how it can help the organisation better leverage its data.

      Gain knowledge of how data governance can benefit both IT and the business.

      Activities

      1.1 Establish business context, value, and scope of data governance at the organisation.

      1.2 Introduction to Info-Tech’s data governance framework.

      1.3 Discuss vision and mission for data governance.

      1.4 Understand your business architecture, including your business capability map and value streams.

      1.5 Build use cases aligned to core business capabilities.

      Outputs

      Sample use cases (tied to the business capability map) and a repeatable use case framework

      Vision and mission for data governance

      2 Understand Current Data Governance Capabilities and Plot Target-State Levels

      The Purpose

      Assess which data contains value and/or risk and determine metrics that will determine how valuable the data is to the organisation.

      Assess where the organisation currently stands in data governance initiatives.

      Determine gaps between the current and future states of the data governance program.

      Key Benefits Achieved

      Gain a holistic understanding of organisational data and how it flows through business units and systems.

      Identify which data should fall under the governance umbrella.

      Determine a practical starting point for the program.

      Activities

      2.1 Understand your current data governance capabilities and maturity.

      2.2 Set target-state data governance capabilities.

      Outputs

      Current state of data governance maturity

      Definition of target state

      3 Build Data Domain to Data Governance Role Mapping

      The Purpose

      Determine strategic initiatives and create a roadmap outlining key steps required to get the organisation to start enabling data-driven insights.

      Determine timing of the initiatives.

      Key Benefits Achieved

      Establish clear direction for the data governance program.

      Step-by-step outline of how to create effective data governance, with true business-IT collaboration.

      Activities

      3.1 Evaluate and prioritise performance gaps.

      3.2 Develop and consolidate data governance target-state initiatives.

      3.3 Define the role of data governance: data domain to data governance role mapping.

      Outputs

      Target-state data governance initiatives

      Data domain to data governance role mapping

      4 Formulate a Plan to Get to Your Target State

      The Purpose

      Consolidate the roadmap and other strategies to determine the plan of action from day one.

      Create the required policies, procedures, and positions for data governance to be sustainable and effective.

      Key Benefits Achieved

      Prioritised initiatives with dependencies mapped out.

      A clearly communicated plan for data governance that will have full business backing.

      Activities

      4.1 Identify and prioritise next steps.

      4.2 Define roles and responsibilities and complete a high-level RACI.

      4.3 Wrap-up and discuss next steps and post-workshop support.

      Outputs

      Initialised roadmap

      Initialised RACI

      Further reading

      Establish Data Governance

      Deliver measurable business value.

      Analyst Perspective

      Establish a data governance program that brings value to your organisation.

      Picture of analyst

      Data governance does not sit as an island on its own in the organisation – it must align with and be driven by your enterprise governance. As you build out data governance in your organisation, it's important to keep in mind that this program is meant to be an enabling framework of oversight and accountabilities for managing, handling, and protecting your company's data assets. It should never be perceived as bureaucratic or inhibiting to your data users. It should deliver agreed-upon models that are conducive to your organisation's operating culture, offering clarity on who can do what with the data and via what means. Data governance is the key enabler for bringing high-quality, trusted, secure, and discoverable data to the right users across your organisation. Promote and drive the responsible and ethical use of data while helping to build and foster an organisational culture of data excellence.

      Crystal Singh

      Director, Research & Advisory, Data & Analytics Practice

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      The amount of data within organisations is growing at an exponential rate, creating a need to adopt a formal approach to governing data. However, many organisations remain uninformed on how to effectively govern their data. Comprehensive data governance should define leadership, accountability, and responsibility related to data use and handling and be supported by a well-oiled operating model and relevant policies and procedures. This will help ensure the right data gets to the right people at the right time, using the right mechanisms.

      Common Obstacles

      Organisations are faced with challenges associated with changing data landscapes, evolving business models, industry disruptions, regulatory and compliance obligations, and changing and maturing user landscape and demand for data. Although the need for a data governance program is often evident, organisations miss the mark when their data governance efforts are not directly aligned to delivering measurable business value. Initiatives should support key strategic initiatives, as well as value streams and their underlying business capabilities.

      Info-Tech's Approach

      Info-Tech's approach to establishing and sustaining effective data governance is anchored in the strong alignment of organisational value streams and their business capabilities with key data governance dimensions and initiatives. Organisations should:

      • Align their data governance with enterprise governance, business strategy and value streams to ensure the program delivers measurable business value.
      • Understand their current data governance capabilities so as to build out a future state that is right-sized and relevant.
      • Define data leadership, accountability, and responsibility. Support these with an operating model that effectively manages change and communication and fosters a culture of data excellence.

      Info-Tech Insight

      Your organisation's value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operating costs, missed opportunities, eroded stakeholder satisfaction, and increased business risk.

      Your challenge

      This research is designed to help organisations build and sustain an effective data governance program.

      • Your organisation has recognised the need to treat data as a corporate asset for generating business value and/or managing and mitigating risk.
      • This has brought data governance to the forefront and highlighted the need to build a performance-driven enterprise program for delivering quality, trusted, and readily consumable data to users.
      • An effective data governance program is one that defines leadership, accountability. and responsibility related to data use and handling. It's supported by a well-oiled operating model and relevant policies and procedures, all of which help build and foster a culture of data excellence where the right users get access to the right data at the right time via the right mechanisms.

      As you embark on establishing data governance in your organisation, it's vital to ensure from the get-go that you define the drivers and business context for the program. Data governance should never be attempted without direction on how the program will yield measurable business value.

      'Data processing and cleanup can consume more than half of an analytics team's time, including that of highly paid data scientists, which limits scalability and frustrates employees.' – Petzold, et al., 2020

      Image is a circle graph and 30% of it is coloured with the number 30% in the middle of the graph

      'The productivity of employees across the organisation can suffer.' – Petzold, et al., 2020

      Respondents to McKinsey's 2019 Global Data Transformation Survey reported that an average of 30% of their total enterprise time was spent on non-value-added tasks because of poor data quality and availability. – Petzold, et al., 2020

      Common obstacles

      Some of the barriers that make data governance difficult to address for many organisations include:

      • Gaps in communicating the strategic value of data and data governance to the organisation. This is vital for securing senior leadership buy-in and support, which, in turn, is crucial for sustained success of the data governance program.
      • Misinterpretation or a lack of understanding about data governance, including what it means for the organisation and the individual data user.
      • A perception that data governance is inhibiting or an added layer of bureaucracy or complication rather than an enabling and empowering framework for stakeholders in their use and handling of data.
      • Embarking on data governance without firmly substantiating and understanding the organisational drivers for doing so. How is data governance going to support the organisation's value streams and their various business capabilities?
      • Neglecting to define and measure success and performance. Just as in any other enterprise initiative, you have to be able to demonstrate an ROI for time, resources and funding. These metrics must demonstrate the measurable business value that data governance brings to the organisation.
      • Failure to align data governance with enterprise governance.
      Image is a circle graph and 78% of it is coloured with the number 78% in the middle of the graph

      78% of companies (and 92% of top-tier companies) have a corporate initiative to become more data-driven. – Alation, 2020.

      Image is a circle graph and 58% of it is coloured with the number 58% in the middle of the graph

      But despite these ambitions, there appears to be a 'data culture disconnect' – 58% of leaders overestimate the current data culture of their enterprises, giving a grade higher than the one produced by the study. – Fregoni, 2020.

      The strategic value of data

      Power intelligent and transformative organisational performance through leveraging data.

      Respond to industry disruptors

      Optimise the way you serve your stakeholders and customers

      Develop products and services to meet ever-evolving needs

      Manage operations and mitigate risk

      Harness the value of your data

      The journey to being data-driven

      The journey to declaring that you are a data-driven organisation requires a pit stop at data enablement.

      The Data Economy

      Data Disengaged

      You have a low appetite for data and rarely use data for decision making.

      Data Enabled

      Technology, data architecture, and people and processes are optimised and supported by data governance.

      Data Driven

      You are differentiating and competing on data and analytics; described as a 'data first' organisation. You're collaborating through data. Data is an asset.

      Data governance is essential for any organisation that makes decisions about how it uses its data.

      Data governance is an enabling framework of decision rights, responsibilities, and accountabilities for data assets across the enterprise.

      Data governance is:

      • Executed according to agreed-upon models that describe who can take what actions with what information, when, and using what methods (Olavsrud, 2021).
      • True business-IT collaboration that will lead to increased consistency and confidence in data to support decision making. This, in turn, helps fuel innovation and growth.

      If done correctly, data governance is not:

      • An annoying, finger-waving roadblock in the way of getting things done.
      • Meant to solve all data-related business or IT problems in an organisation.
      • An inhibitor or impediment to using and sharing data.

      Info-Tech's Data Governance Framework

      An image of Info-Tech's Data Governance Framework

      Create impactful data governance by embedding it within enterprise governance

      A model is depicted to show the relationship between enterprise governance and data governance.

      Organisational drivers for data governance

      Data governance personas:

      Conformance: Establishing data governance to meet regulations and compliance requirements.

      Performance: Establishing data governance to fuel data-driven decision making for driving business value and managing and mitigating business risk.

      Two images are depicted that show the difference between conformance and performance.

      Data Governance is not a one-person show

      • Data governance needs a leader and a home. Define who is going to be leading, driving, and steering data governance in your organisation.
      • Senior executive leaders play a crucial role in championing and bringing visibility to the value of data and data governance. This is vital for building and fostering a culture of data excellence.
      • Effective data governance comes with business and IT alignment, collaboration, and formally defined roles around data leadership, ownership, and stewardship.
      Four circles are depicted. There is one person in the circle on the left and is labelled: Data Governance Leadership. The circle beside it has two people in it and labelled: Organisational Champions. The circle beside it has three people in it and labelled: Data Owners, Stewards & Custodians. The last circle has four people in it and labelled: The Organisation & Data Storytellers.

      Traditional data governance organisational structure

      A traditional structure includes committees and roles that span across strategic, tactical, and operational duties. There is no one-size-fits-all data governance structure. However, most organisations follow a similar pattern when establishing committees, councils, and cross-functional groups. Most organisations strive to identify roles and responsibilities at a strategic and operational level. Several factors will influence the structure of the program, such as the focus of the data governance project and the maturity and size of the organisation.

      A triangular model is depicted and is split into three tiers to show the traditional data governance organisational structure.

      A healthy data culture is key to amplifying the power of your data.

      'Albert Einstein is said to have remarked, "The world cannot be changed without changing our thinking." What is clear is that the greatest barrier to data success today is business culture, not lagging technology.' – Randy Bean, 2020

      What does it look like?

      • Everybody knows the data.
      • Everybody trusts the data.
      • Everybody talks about the data.

      'It is not enough for companies to embrace modern data architectures, agile methodologies, and integrated business-data teams, or to establish centres of excellence to accelerate data initiatives, when only about 1 in 4 executives reported that their organisation has successfully forged a data culture.'– Randy Bean, 2020

      Data literacy is an essential part of a data-driven culture

      • In a data-driven culture, decisions are made based on data evidence, not on gut instinct.
      • Data often has untapped potential. A data-driven culture builds tools and skills, builds users' trust in the condition and sources of data, and raises the data skills and understanding among their people on the front lines.
      • Building a data culture takes an ongoing investment of time, effort, and money. This investment will not achieve the transformation you want without data literacy at the grassroots level.

      Data-driven culture = 'data matters to our company'

      Despite investments in data initiative, organisations are carrying high levels of data debt

      Data debt is 'the accumulated cost that is associated with the sub-optimal governance of data assets in an enterprise, like technical debt.'

      Data debt is a problem for 78% of organisations.

      40% of organisations say individuals within the business do not trust data insights.

      66% of organisations say a backlog of data debt is impacting new data management initiatives.

      33% of organisations are not able to get value from a new system or technology investment.

      30% of organisations are unable to become data-driven.

      Source: Experian, 2020

      Absent or sub-optimal data governance leads to data debt

      Only 3% of companies' data meets basic quality standards. (Source: Nagle, et al., 2017)

      Organisations suspect 28% of their customer and prospect data is inaccurate in some way. (Source: Experian, 2020)

      Only 51% of organisations consider the current state of their CRM or ERP data to be clean, allowing them to fully leverage it. (Source: Experian, 2020)

      35% of organisations say they're not able to see a ROI for data management initiatives. (Source: Experian, 2020)

      Embrace the technology

      Make the available data governance tools and technology work for you:

      • Data catalogue
      • Business data glossary
      • Data lineage
      • Metadata management

      While data governance tools and technologies are no panacea, leverage their automated and AI-enabled capabilities to augment your data governance program.

      Logos of data governance tools and technology.

      Measure success to demonstrate tangible business value

      Put data governance into the context of the business:

      • Tie the value of data governance and its initiatives back to the business capabilities that are enabled.
      • Leverage the KPIs of those business capabilities to demonstrate tangible and measurable value. Use terms and language that will resonate with senior leadership.

      Don't let measurement be an afterthought:

      Start substantiating early on how you are going to measure success as your data governance program evolves.

      Build a right-sized roadmap

      Formulate an actionable roadmap that is right-sized to deliver value in your organisation.

      Key considerations:

      • When building your data governance roadmap, ensure you do so through an enterprise lens. Be cognizant of other initiatives that might be coming down the pipeline that may require you to align your data governance milestones accordingly.
      • Apart from doing your planning with consideration for other big projects or launches that might be in-flight and require the time and attention of your data governance partners, also be mindful of the more routine yet still demanding initiatives.
      • When doing your roadmapping, consider factors like the organisation's fiscal cycle, typical or potential year-end demands, and monthly/quarterly reporting periods and audits. Initiatives such as these are likely to monopolise the time and focus of personnel key to delivering on your data governance milestones.

      Sample milestones:

      Data Governance Leadership & Org Structure Definition

      Define the home for data governance and other key roles around ownership and stewardship, as approved by senior leadership.

      Data Governance Charter and Policies

      Create a charter for your program and build/refresh associated policies.

      Data Culture Diagnostic

      Understand the organisation's current data culture, perception of data, value of data, and knowledge gaps.

      Use Case Build and Prioritisation

      Build a use case that is tied to business capabilities. Prioritise accordingly.

      Business Data Glossary

      Build and/or refresh the business' glossary for addressing data definitions and standardisation issues.

      Tools & Technology

      Explore the tools and technology offering in the data governance space that would serve as an enabler to the program. (e.g. RFI, RFP).

      Key takeaways for effective business-driven data governance

      Data governance leadership and sponsorship is key.

      Ensure strategic business alignment.

      Build and foster a culture of data excellence.

      Evolve along the data journey.

      Make data governance an enabler, not a hindrance.

      Insight summary

      Overarching insight

      Your organisation's value streams and the associated business capabilities require effectively governed data. Without this, you face the impact of elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.

      Insight 1

      Data governance should not sit as an island in your organisation. It must continuously align with the organisation's enterprise governance function. It shouldn't be perceived as a pet project of IT, but rather as an enterprise-wide, business-driven initiative.

      Insight 2

      Ensure your data governance program delivers measurable business value by aligning the associated data governance initiatives with the business architecture. Leverage the measures of success or KPIs of the underlying business capabilities to demonstrate the value data governance has yielded for the organisation.

      Insight 3

      Data governance remains the foundation of all forms of reporting and analytics. Advanced capabilities such as AI and machine learning require effectively governed data to fuel their success.

      Tactical insight

      Tailor your data literacy program to meet your organisation's needs, filling your range of knowledge gaps and catering to your different levels of stakeholders. When it comes to rolling out a data literacy program, there is no one-size-fits-all solution. Your data literacy program is intended to fill the knowledge gaps about data, as they exist in your organisation. It should be targeted across the board – from your executive leadership and management through to the subject matter experts across different lines of the business in your organisation.

      Info-Tech's methodology for establishing data governance

      1. Build Business and User Context 2. Understand Your Current Data Governance Capabilities 3. Build a Target State Roadmap and Plan
      Phase Steps
      1. Substantiate Business Drivers
      2. Build High-Value Use Cases for Data Governance
      1. Understand the Key Components of Data Governance
      2. Gauge Your Organisation's Current Data Culture
      1. Formulate an Actionable Roadmap and Right-Sized Plan
      Phase Outcomes
      • Your organisation's business capabilities and value streams
      • A business capability map for your organisation
      • Categorisation of your organisation's key capabilities
      • A strategy map tied to data governance
      • High-value use cases for data governance
      • An understanding of the core components of an effective data governance program
      • An understanding your organisation's current data culture
      • A data governance roadmap and target-state plan comprising of prioritised initiatives

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Screenshot of Info-Tech's Data Governance Planning and Roadmapping Workbook data-verified=

      Data Governance Planning and Roadmapping Workbook

      Use the Data Governance Planning and Roadmapping Workbook as you plan, build, roll out, and scale data governance in your organisation.

      Screenshot of Info-Tech's Data Use Case Framework Template

      Data Use Case Framework Template

      This template takes you through a business needs gathering activity to highlight and create relevant use cases around the organisation's data-related problems and opportunities.

      Screenshot of Info-Tech's Business Data Glossary data-verified=

      Business Data Glossary

      Use this template to document the key data assets that are to be governed and create a data flow diagram for your organisation.

      Screenshot of Info-Tech's Data Culture Diagnostic and Scorecard data-verified=

      Data Culture Diagnostic and Scorecard

      Leverage Info-Tech's Data Culture Diagnostic to understand how your organisation scores across 10 areas relating to data culture.

      Key deliverable:

      Data Governance Planning and Roadmapping Workbook

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Data Governance Initiative Planning and Roadmap Tool

      Leverage this tool to assess your current data governance capabilities and plot your target state accordingly.

      This tool will help you plan the sequence of activities, capture start dates and expected completion dates, and create a roadmap that can be effectively communicated to the organisation.

      Data Governance Program Charter Template

      This template will help get the backing required to get a data governance project rolling. The program charter will help communicate the project purpose, define the scope, and identify the project team, roles, and responsibilities.

      Data Governance Policy

      This policy establishes uniformed data governance standards and identifies the shared responsibilities for assuring the integrity of the data and that it efficiently and effectively serves the needs of your organisation

      Other Deliverables:

      • Data Governance Initiative Planning and Roadmap Tool
      • Data Governance Program Charter Template
      • Data Governance Policy

      Blueprint benefits

      Defined data accountability & responsibility

      Shared knowledge & common understanding of data assets

      Elevated trust & confidence in traceable data

      Improved data ROI & reduced data debt

      Support for ethical use and handling of data in a culture of excellence

      Measure the value of this blueprint

      Leverage this blueprint's approach to ensure your data governance initiatives align and support your key value streams and their business capabilities.

      • Aligning your data governance program and its initiatives to your organisation's business capabilities is vital for tracing and demonstrating measurable business value for the program.
      • This alignment of data governance with value streams and business capabilities enables you to use business-defined KPIs and demonstrate tangible value.
      Screenshot from this blueprint on the Measurable Business Value

      In phases 1 and 2 of this blueprint, we will help you establish the business context, define your business drivers and KPIs, and understand your current data governance capabilities and strengths.

      In phase 3, we will help you develop a plan and a roadmap for addressing any gaps and improving the relevant data governance capabilities so that data is well positioned to deliver on those defined business metrics.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      'Our team, has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.'

      Guided Implementation

      'Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keeps us on track.'

      Workshop

      'We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.'

      Consulting

      'Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.'

      Diagnostics and consistent frameworks are used throughout all four options.

      Establish Data Governance project overview

      Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

      1. Build Business and User context2. Understand Your Current Data Governance Capabilities3. Build a Target State Roadmap and Plan
      Best-Practice Toolkit
      1. Substantiate Business Drivers
      2. Build High-Value Use Cases for Data Governance
      1. Understand the Key Components of Data Governance
      2. Gauge Your Organisation's Current Data Culture
      1. Formulate an Actionable Roadmap and Right-Sized Plan
      Guided Implementation
      • Call 1
      • Call 2
      • Call 3
      • Call 4
      • Call 5
      • Call 6
      • Call 7
      • Call 8
      • Call 9
      Phase Outcomes
      • Your organisation's business capabilities and value streams
      • A business capability map for your organisation
      • Categorisation of your organisation's key capabilities
      • A strategy map tied to data governance
      • High-value use cases for data governance
      • An understanding of the core components of an effective data governance program
      • An understanding your organisation's current data culture
      • A data governance roadmap and target-state plan comprising of prioritised initiatives

      Guided Implementation

      What does a typical GI on this topic look like?

      An outline of what guided implementation looks like.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organisation. A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

      Workshop overview

      Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4
      Establish Business Context and Value Understand Current Data Governance Capabilities and Plot Target-State Levels Build Data Domain to Data Governance Role Mapping Formulate a Plan to Get to Your Target State
      Activities
      • Establish business context, value, and scope of data governance at the organisation
      • Introduction to Info-Tech's data governance framework
      • Discuss vision and mission for data governance
      • Understand your business architecture, including your business capability map and value streams
      • Build use cases aligned to core business capabilities
      • Understand your current data governance capabilities and maturity
      • Set target state data governance capabilities
      • Evaluate and prioritise performance gaps
      • Develop and consolidate data governance target-state initiatives
      • Define the role of data governance: data domain to data governance role mapping
      • Identify and prioritise next steps
      • Define roles and responsibilities and complete a high-level RACI
      • Wrap-up and discuss next steps and post-workshop support
      Deliverables
      1. Sample use cases (tied to the business capability map) and a repeatable use case framework
      2. Vision and mission for data governance
      1. Current state of data governance maturity
      2. Definition of target state
      1. Target-state data governance initiatives
      2. Data domain to data governance role mapping
      1. Initialised roadmap
      2. Initialised RACI
      3. Completed Business Data Glossary (BDG)

      Phase 1

      Build Business and User Context

      Three circles are in the image that list the three phases and the main steps. Phase 1 is highlighted.

      'When business users are invited to participate in the conversation around data with data users and IT, it adds a fundamental dimension — business context. Without a real understanding of how data ties back to the business, the value of analysis and insights can get lost.' – Jason Lim, Alation

      This phase will guide you through the following activities:

      • Identify Your Business Capabilities
      • Define your Organisation's Key Business Capabilities
      • Develop a Strategy Map that Aligns Business Capabilities to Your Strategic Focus

      This phase involves the following participants:

      • Data Governance Leader/Data Leader (CDO)
      • Senior Business Leaders
      • Business SMEs
      • Data Leadership, Data Owners, Data Stewards and Custodians

      Step 1.1

      Substantiate Business Drivers

      Activities

      1.1.1 Identify Your Business Capabilities

      1.1.2 Categorise Your Organisation's Key Business Capabilities

      1.1.3 Develop a Strategy Map Tied to Data Governance

      This step will guide you through the following activities:

      • Leverage your organisation's existing business capability map or initiate the formulation of a business capability map, guided by Info-Tech's approach
      • Determine which business capabilities are considered high priority by your organisation
      • Map your organisation's strategic objectives to value streams and capabilities to communicate how objectives are realised with the support of data

      Outcomes of this step

      • A foundation for data governance initiative planning that's aligned with the organisation's business architecture: value streams, business capability map, and strategy map

      Info-Tech Insight

      Gaining a sound understanding of your business architecture (value streams and business capabilities) is a critical foundation for establishing and sustaining a data governance program that delivers measurable business value.

      1.1.1 Identify Your Business Capabilities

      Confirm your organisation's existing business capability map or initiate the formulation of a business capability map:

      1. If you have an existing business capability map, meet with the relevant business owners/stakeholders to confirm that the content is accurate and up to date. Confirm the value streams (how your organisation creates and captures value) and their business capabilities are reflective of the organisation's current business environment.
      2. If you do not have an existing business capability map, follow this activity to initiate the formulation of a map (value streams and related business capabilities):
        1. Define the organisation's value streams. Meet with senior leadership and other key business stakeholders to define how your organisation creates and captures value.
        2. Define the relevant business capabilities. Meet with senior leadership and other key business stakeholders to define the business capabilities.

      Note: A business capability defines what a business does to enable value creation. Business capabilities are business terms defined using descriptive nouns such as 'Marketing' or 'Research and Development.' They represent stable business functions, are unique and independent of each other, and typically will have a defined business outcome.

      Input

      • List of confirmed value streams and their related business capabilities

      Output

      • Business capability map with value streams for your organisation

      Materials

      • Your existing business capability map or the template provided in the Data Governance Planning and Roadmapping Workbook accompanying this blueprint

      Participants

      • Key business stakeholders
      • Data stewards
      • Data custodians
      • Data Governance Working Group

      For more information, refer to Info-Tech's Document Your Business Architecture.

      Define or validate the organisation's value streams

      Value streams connect business goals to the organisation's value realisation activities. These value realisation activities, in turn, depend on data.

      If the organisation does not have a business architecture function to conduct and guide Activity 1.1.1, you can leverage the following approach:

      • Meet with key stakeholders regarding this topic, then discuss and document your findings.
      • When trying to identify the right stakeholders, consider: Who are the decision makers and key influencers? Who will impact this piece of business architecture related work? Who has the relevant skills, competencies, experience, and knowledge about the organisation?
      • Engage with these stakeholders to define and validate how the organisation creates value.
      • Consider:
        • Who are your main stakeholders? This will depend on the industry in which you operate. For example, customers, residents, citizens, constituents, students, patients.
        • What are your stakeholders looking to accomplish?
        • How does your organisation's products and/or services help them accomplish that?
        • What are the benefits your organisation delivers to them and how does your organisation deliver those benefits?
        • How do your stakeholders receive those benefits?

      Align data governance to the organisation's value realisation activities.

      Value streams enable the organisation to create or capture value in the market in which it operates by engaging in a set of interconnected activities.

      Info-Tech Insight

      Your organisation's value streams and the associated business capabilities require effectively governed data. Without this, you face the possibilities of elevated operational costs, missed opportunities, eroded stakeholder satisfaction, negative impact to reputation and brand, and/or increased exposure to business risk.

      Example of value streams – Retail Banking

      Value streams connect business goals to the organisation's value realisation activities.

      Example value stream descriptions for: Retail Banking

      Value streams enable the organisation to create or capture value in the market in which it operates by engaging in a set of interconnected activities.

      Model example of value streams for retail banking.

      For this value stream, download Info-Tech's Info-Tech's Industry Reference Architecture for Retail Banking.

      Example of value streams – Higher Education

      Value streams connect business goals to the organisation's value realisation activities.

      Example value stream descriptions for: Higher Education

      Value streams enable the organisation to create or capture value in the market in which it operates by engaging in a set of interconnected activities.

      Model example of value streams for higher education

      For this value stream, download Info-Tech's Industry Reference Architecture for Higher Education.

      Example of value streams – Local Government

      Value streams connect business goals to the organisation's value realisation activities.

      Example value stream descriptions for: Local Government

      Value streams enable the organisation to create or capture value in the market in which it operates by engaging in a set of interconnected activities.

      Model example of value streams for local government

      For this value stream, download Info-Tech's Industry Reference Architecture for Local Government.

      Example of value streams – Manufacturing

      Value streams connect business goals to the organisation's value realisation activities.

      Example value stream descriptions for: Manufacturing

      Value streams enable the organisation to create or capture value in the market in which it operates by engaging in a set of interconnected activities.

      Model example of value streams for manufacturing

      For this value stream, download Info-Tech's Industry Reference Architecture for Manufacturing.

      Example of value streams – Retail

      Value streams connect business goals to the organisation's value realisation activities.

      Example value stream descriptions for: Retail

      Model example of value streams for retail

      Value streams enable the organisation to create or capture value in the market in which it operates by engaging in a set of interconnected activities.

      For this value stream, download Info-Tech's Industry Reference Architecture for Retail.

      Define the organisation's business capabilities in a business capability map

      A business capability defines what a business does to enable value creation. Business capabilities represent stable business functions and typically will have a defined business outcome.

      Business capabilities can be thought of as business terms defined using descriptive nouns such as 'Marketing' or 'Research and Development.'

      If your organisation doesn't already have a business capability map, you can leverage the following approach to build one. This initiative requires a good understanding of the business. By working with the right stakeholders, you can develop a business capability map that speaks a common language and accurately depicts your business.

      Working with the stakeholders as described above:

      • Analyse the value streams to identify and describe the organisation's capabilities that support them.
      • Consider: What is the objective of your value stream? (This can highlight which capabilities support which value stream.)
      • As you initiate your engagement with your stakeholders, don't start a blank page. Leverage the examples on the next slides as a starting point for your business capability map.
      • When using these examples, consider: What are the activities that make up your particular business? Keep the ones that apply to your organisation, remove the ones that don't, and add any needed.

      Align data governance to the organisation's value realisation activities.

      Info-Tech Insight

      A business capability map can be thought of as a visual representation of your organisation's business capabilities and hence represents a view of what your data governance program must support.

      For more information, refer to Info-Tech's Document Your Business Architecture.

      Example business capability map – Retail Banking

      A business capability map can be thought of as a visual representation of your organisation's business capabilities and hence represents a view of what your data governance program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Info-Tech Tip:

      Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realisation capabilities under discussion. This will help to build awareness and visibility of the data governance program.

      Example business capability map for: Retail Banking

      Model example business capability map for retail banking

      For this business capability map, download Info-Tech's Industry Reference Architecture for Retail Banking.

      Example business capability map – Higher Education

      A business capability map can be thought of as a visual representation of your organisation's business capabilities and hence represents a view of what your data governance program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Info-Tech Tip:

      Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realisation capabilities under discussion. This will help to build awareness and visibility of the data governance program.

      Example business capability map for: Higher Education

      Model example business capability map for higher education

      For this business capability map, download Info-Tech's Industry Reference Architecture for Higher Education.

      Example business capability map – Local Government

      A business capability map can be thought of as a visual representation of your organisation's business capabilities and hence represents a view of what your data governance program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Info-Tech Tip:

      Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realisation capabilities under discussion. This will help to build awareness and visibility of the data governance program.

      Example business capability map for: Local Government

      Model example business capability map for local government

      For this business capability map, download Info-Tech's Industry Reference Architecture for Local Government.

      Example business capability map – Manufacturing

      A business capability map can be thought of as a visual representation of your organisation's business capabilities and hence represents a view of what your data governance program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Info-Tech Tip:

      Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realisation capabilities under discussion. This will help to build awareness and visibility of the data governance program.

      Example business capability map for: Manufacturing

      Model example business capability map for manufacturing

      For this business capability map, download Info-Tech's Industry Reference Architecture for Manufacturing.

      Example business capability map - Retail

      A business capability map can be thought of as a visual representation of your organisation's business capabilities and hence represents a view of what your data governance program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Info-Tech Tip:

      Leverage your business capability map verification session with these key stakeholders as a prime opportunity to share and explain the role of data and data governance in supporting the very value realisation capabilities under discussion. This will help to build awareness and visibility of the data governance program.

      Example business capability map for: Retail

      Model example business capability map for retail

      For this business capability map, download Info-Tech's Industry Reference Architecture for Retail.

      1.1.2 Categorise Your Organisation's Key Capabilities

      Determine which capabilities are considered high priority in your organisation.

      1. Categorise or heatmap the organisation's key capabilities. Consult with senior and other key business stakeholders to categorise and prioritise the business' capabilities. This will aid in ensuring your data governance future state planning is aligned with the mandate of the business. One approach to prioritising capabilities with business stakeholders is to examine them through the lens of cost advantage creators, competitive advantage differentiators, and/or by high value/high risk.
      2. Identify cost advantage creators. Focus on capabilities that drive a cost advantage for your organisation. Highlight these capabilities and prioritise programs that support them.
      3. Identify competitive advantage differentiators. Focus on capabilities that give your organisation an edge over rivals or other players in your industry.

      This categorisation/prioritisation exercise helps highlight prime areas of opportunity for building use cases, determining prioritisation, and the overall optimisation of data and data governance.

      Input

      • Strategic insight from senior business stakeholders on the business capabilities that drive value for the organisation

      Output

      • Business capabilities categorised and prioritised (e.g. cost advantage creators, competitive advantage differentiators, high value/high risk)

      Materials

      • Your existing business capability map or the business capability map derived in the previous activity

      Participants

      • Key business stakeholders
      • Data stewards
      • Data custodians
      • Data Governance Working Group

      For more information, refer to Info-Tech's Document Your Business Architecture.

      Example of business capabilities categorisation or heatmapping – Retail

      This exercise is useful in ensuring the data governance program is focused and aligned to support the priorities and direction of the business.

      • Depending on the mandate from the business, priority may be on developing cost advantage. Hence the capabilities that deliver efficiency gains are the ones considered to be cost advantage creators.
      • The business' priority may be on maintaining or gaining a competitive advantage over its industry counterparts. Differentiation might be achieved in delivering unique or enhanced products, services, and/or experiences, and the focus will tend to be on the capabilities that are more end-stakeholder-facing (e.g. customer-, student-, patient,- and/or constituent-facing). These are the organisation's competitive advantage creators.

      Example: Retail

      Example of business capabilities categorisation or heatmapping – Retail

      For this business capability map, download Info-Tech's Industry Reference Architecture for Retail.

      1.1.3 Develop a Strategy Map Tied to Data Governance

      Identify the strategic objectives for the business. Knowing the key strategic objectives will drive business-data governance alignment. It's important to make sure the right strategic objectives of the organisation have been identified and are well understood.

      1. Meet with senior business leaders and other relevant stakeholders to help identify and document the key strategic objectives for the business.
      2. Leverage their knowledge of the organisation's business strategy and strategic priorities to visually represent how these map to value streams, business capabilities, and, ultimately, to data and data governance needs and initiatives. Tip: Your map is one way to visually communicate and link the business strategy to other levels of the organisation.
      3. Confirm the strategy mapping with other relevant stakeholders.

      Guide to creating your map: Starting with strategic objectives, map the value streams that will ultimately drive them. Next, link the key capabilities that enable each value stream. Then map the data and data governance to initiatives that support those capabilities. This is one approach to help you prioritise the data initiatives that deliver the most value to the organisation.

      Input

      • Strategic objectives as outlined by the organisation's business strategy and confirmed by senior leaders

      Output

      • A strategy map that maps your organisational strategic objectives to value streams, business capabilities, and, ultimately, to data program

      Materials

      Participants

      • Key business stakeholders
      • Data stewards
      • Data custodians
      • Data Governance Working Group

      Download Info-Tech's Data Governance Planning and Roadmapping Workbook

      Example of a strategy map tied to data governance

      • Strategic objectives are the outcomes that the organisation is looking to achieve.
      • Value streams enable an organisation to create and capture value in the market through interconnected activities that support strategic objectives.
      • Business capabilities define what a business does to enable value creation in value streams.
      • Data capabilities and initiatives are descriptions of action items on the data and data governance roadmap and which will enable one or multiple business capabilities in its desired target state.

      Info-Tech Tip:

      Start with the strategic objectives, then map the value streams that will ultimately drive them. Next, link the key capabilities that enable each value stream. Then map the data and data governance initiatives that support those capabilities. This process will help you prioritise the data initiatives that deliver the most value to the organisation.

      Example: Retail

      Example of a strategy map tied to data governance for retail

      For this strategy map, download Info-Tech's Industry Reference Architecture for Retail.

      Step 1.2

      Build High-Value Use Cases for Data Governance

      Activities

      1.2.1 Build High-Value Use Cases

      This step will guide you through the following activities:

      • Leveraging your categorised business capability map to conduct deep-dive sessions with key business stakeholders for creating high-value uses cases
      • Discussing current challenges, risks, and opportunities associated with the use of data across the lines of business
      • Exploring which other business capabilities, stakeholder groups, and business units will be impacted

      Outcomes of this step

      • Relevant use cases that articulate the data-related challenges, needs, or opportunities that are clear and contained and, if addressed ,will deliver value to the organisation

      Info-Tech Tip

      One of the most important aspects when building use cases is to ensure you include KPIs or measures of success. You have to be able to demonstrate how the use case ties back to the organisational priorities or delivers measurable business value. Leverage the KPIs and success factors of the business capabilities tied to each particular use case.

      1.2.1 Build High-Value Use Cases

      This business needs-gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organisation.

      1. Bring together key business stakeholders (data owner, stewards, SMEs) from a particular line of business as well as the relevant data custodian(s) to build cases for their units. Leverage the business capability map you created for facilitating this act.
      2. Leverage Info-Tech's framework for data requirements and methodology for creating use cases, as outlined in the Data Use Case Framework Template and seen on the next slide.
      3. Have the stakeholders move through each breakout session outlined in the Use Case Worksheet. Use flip charts or a whiteboard to brainstorm and document their thoughts.
      4. Debrief and document results in the Data Use Case Framework Template.
      5. Repeat this exercise with as many lines of the business as possible, leveraging your business capability map to guide your progress and align with business value.

      Tip: Don't conclude these use case discussions without substantiating what measures of success will be used to demonstrate the business value of the effort to produce the desired future state, as relevant to each particular use case.

      This business needs-gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organisation.

      1. Bring together key business stakeholders (data owner, stewards, SMEs) from a particular line of business as well the relevant data custodian(s) to build cases for their units. Leverage the business capability map you created for facilitating this act.
      2. Leverage Info-Tech's framework for data requirements and methodology for creating use cases, as outlined in the Data Use Case Framework Template and seen on the next slide.
      3. Have the stakeholders move through each breakout session outlined in the Use Case Worksheet. Use flip charts or a whiteboard to brainstorm and document their thoughts.
      4. Debrief and document results in the Data Use Case Framework Template
      5. Repeat this exercise with as many lines of the business as possible, leveraging your business capability map to guide your progress and align with business value.

      Tip: Don't conclude these use case discussions without substantiating what measures of success will be used to demonstrate the business value of the effort to produce the desired future state, as relevant to each particular use case.

      Input

      • Value streams and business capabilities as defined by business leaders
      • Business stakeholders' subject area expertise
      • Data custodian systems, integration, and data knowledge

      Output

      • Use cases that articulate data-related challenges, needs or opportunities that are tied to defined business capabilities and hence if addressed will deliver measurable value to the organisation.

      Materials

      • Your business capability map from activity 1.1.1
      • Info-Tech's Data Use Case Framework Template
      • Whiteboard or flip charts (or shared screen if working remotely)
      • Markers/pens

      Participants

      • Key business stakeholders
      • Data stewards and business SMEs
      • Data custodians
      • Data Governance Working Group

      Download Info-Tech's Data Use Case Framework Template

      Info-Tech's Framework for Building Use Cases

      Objective: This business needs-gathering activity will highlight and create relevant use cases around data-related problems or opportunities that are clear and contained and, if addressed, will deliver value to the organisation.

      Leveraging your business capability map, build use cases that align with the organisation's key business capabilities.

      Consider:

      • Is the business capability a cost advantage creator or an industry differentiator?
      • Is the business capability currently underserved by data?
      • Does this need to be addressed? If so, is this risk- or value-driven?

      Info-Tech's Data Requirements and Mapping Methodology for Creating Use Cases

      1. What business capability (or capabilities) is this use case tied to for your business area(s)?
      2. What are your data-related challenges in performing this today?
      3. What are the steps in this process/activity today?
      4. What are the applications/systems used at each step today?
      5. What data domains are involved, created, used, and/or transformed at each step today?
      6. What does an ideal or improved state look like?
      7. What other business units, business capabilities, activities, and/or processes will be impacted or improved if this issue was solved?
      8. Who are the stakeholders impacted by these changes? Who needs to be consulted?
      9. What are the risks to the organisation (business capability, revenue, reputation, customer loyalty, etc.) if this is not addressed?
      10. What compliance, regulatory, and/or policy concerns do we need to consider in any solution?
      11. What measures of success or change should we use to prove the value of the effort (such as KPIs, ROI)? What is the measurable business value of doing this?

      The resulting use cases are to be prioritised and leveraged for informing the business case and the data governance capabilities optimisation plan.

      Taken from Info-Tech's Data Use Case Framework Template

      Phase 2

      Understand Your Current Data Governance Capabilities

      Three circles are in the image that list the three phases and the main steps. Phase 2 is highlighted.

      This phase will guide you through the following activities:

      • Understand the Key Components of Data Governance
      • Gauge Your Organisation's Current Data Culture

      This phase involves the following participants:

      • Data Leadership
      • Data Ownership & Stewardship
      • Policies & Procedures
      • Data Literacy & Culture
      • Operating Model
      • Data Management
      • Data Privacy & Security
      • Enterprise Projects & Services

      Step 2.1

      Understand the Key Components of Data Governance

      This step will guide you through the following activities:

      • Understanding the core components of an effective data governance program and determining your organisation's current capabilities in these areas:
        • Data Leadership
        • Data Ownership & Stewardship
        • Policies & Procedures
        • Data Literacy & Culture
        • Operating Model
        • Data Management
        • Data Privacy & Security
        • Enterprise Projects & Services

      Outcomes of this step

      • An understanding of the core components of an effective data governance program
      • An understanding your organisation's current data governance capabilities

      Leverage Info-Tech's: Data Governance Initiative Planning and Roadmap Tool to assess your current data governance capabilities and plot your target state accordingly.

      This tool will help your organisation plan the sequence of activities, capture start dates and expected completion dates, and create a roadmap that can be effectively communicated to the organisation.

      Review: Info-Tech's Data Governance Framework

      An image of Info-Tech's Data Governance Framework

      Key components of data governance

      A well-defined data governance program will deliver:

      • Defined accountability and responsibility for data.
      • Improved knowledge and common understanding of the organisation's data assets.
      • Elevated trust and confidence in traceable data.
      • Improved data ROI and reduced data debt.
      • An enabling framework for supporting the ethical use and handling of data.
      • A foundation for building and fostering a data-driven and data-literate organisational culture.

      The key components of establishing sustainable enterprise data governance, taken from Info-Tech's Data Governance Framework:

      • Data Leadership
      • Data Ownership & Stewardship
      • Operating Model
      • Policies & Procedures
      • Data Literacy & Culture
      • Data Management
      • Data Privacy & Security
      • Enterprise Projects & Services

      Data Leadership

      • Data governance needs a dedicated head or leader to steer the organisation's data governance program.
      • For organisations that do have a chief data officer (CDO), their office is the ideal and effective home for data governance.
      • Heads of data governance also have titles such as director of data governance, director of data quality, and director of analytics.
      • The head of your data governance program works with all stakeholders and partners to ensure there is continuous enterprise governance alignment and oversight and to drive the program's direction.
      • While key stakeholders from the business and IT will play vital data governance roles, the head of data governance steers the various components, stakeholders, and initiatives, and provides oversight of the overall program.
      • Vital data governance roles include: data owners, data stewards, data custodians, data governance steering committee (or your organisation's equivalent), and any data governance working group(s).

      The role of the CDO: the voice of data

      The office of the chief data officer (CDO):

      • Has a cross-organisational vision and strategy for data.
      • Owns and drives the data strategy; ensures it supports the overall organisational strategic direction and business goals.
      • Leads the organisational data initiatives, including data governance
      • Is accountable for the policy, strategy, data standards, and data literacy necessary for the organisation to operate effectively.
      • Educates users and leaders about what it means to be 'data-driven.'
      • Builds and fosters a culture of data excellence.

      'Compared to most of their C-suite colleagues, the CDO is faced with a unique set of problems. The role is still being defined. The chief data officer is bringing a new dimension and focus to the organisation: "data." '
      – Carruthers and Jackson, 2020

      Who does the CDO report to?

      Example reporting structure.
      • The CDO should be a true C- level executive.
      • Where the organisation places the CDO role in the structure sends an important signal to the business about how much it values data.

      'The title matters. In my opinion, you can't have a CDO without executive authority. Otherwise no one will listen.'

      – Anonymous European CDO

      'The reporting structure depends on who's the 'glue' that ties together all these uniquely skilled individuals.'

      – John Kemp, Senior Director, Executive Services, Info-Tech Research Group

      Data Ownership & Stewardship

      Who are best suited to be data owners?

      • Wherever they may sit in your organisation, data owners will typically have the highest stake in that data.
      • Data owners needs to be suitably senior and have the necessary decision-making power.
      • They have the highest interest in the related business data domain, whether they are the head of a business unit or the head of a line of business that produces data or consumes data (or both).
      • If they are neither of these, it's unlikely they will have the interest in the data (in terms of its quality, protection, ethical use, and handling, for instance) necessary to undertake and adopt the role effectively.

      Data owners are typically senior business leaders with the following characteristics:

      • Positioned to accept accountability for their data domain.
      • Hold authority and influence to affect change, including across business processes and systems, needed to improve data quality, use, handling, integration, etc.
      • Have access to a budget and resources for data initiatives such as resolving data quality issues, data cleansing initiatives, business data catalogue build, related tools and technology, policy management, etc.
      • Hold the influence needed to drive change in behaviour and culture.
      • Act as ambassadors of data and its value as an organisational strategic asset.

      Right-size your data governance organisational structure

      • Most organisations strive to identify roles and responsibilities at a strategic, and operational level. Several factors will influence the structure of the program such as the focus of the data governance project as well as the maturity and size of the organisation.
      • Your data governance structure has to work for your organisation, and it has to evolve as the organisation evolves.
      • Formulate your blend of data governance roles, committees, councils, and cross-functional groups, that make sense for your organisation.
      • Your data governance organisational structure should not add complexity or bureaucracy to your organisation's data landscape; it should support and enable your principle of treating data as an asset.

      There is no one-size-fits-all data governance organisational structure.

      Example of a Data Governance Organisational Structure

      Critical roles and responsibilities for data governance

      Data Governance Working Groups

      Data governance working groups:

      • Are cross-functional teams
      • Deliver on data governance projects, initiatives, and ad hoc review committees.

      Data Stewards

      Traditionally, data stewards:

      • Serve on an operational level addressing issues related to adherence to standards/procedures, monitoring data quality, raising issues identified, etc.
      • Are responsible for managing access, quality, escalating issues, etc.

      Data Custodians

      • Traditionally, data custodians:
      • Serve on an operational level addressing issues related to data and database administration.
      • Support the management of access, data quality, escalating issues, etc.
      • Are SMEs from IT and database administration.

      Example: Business capabilities to data owner and data stewards mapping for a selected data domain

      Info-Tech Insight

      Your organisation's value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.

      Enabling business capabilities with data governance role definitions

      Example: Business capabilities to data owner and data stewards mapping for a selected data domain

      Operating Model

      Your operating model is the key to designing and operationalizing a form of data governance that delivers measurable business value to your organisation.

      'Generate excitement for data: When people are excited and committed to the vision of data enablement, they're more likely to help ensure that data is high quality and safe.' – Petzold, et al., 2020

      Operating Model

      Defining your data governance operating model will help create a well-oiled program that sustainably delivers value to the organisation and manages risks while building and fostering a culture of data excellence along the way. Some organisations are able to establish a formal data governance office, whether independent or attached to the office of the chief data officer. Regardless of how you are organised, data governance requires a home, a leader, and an operating model to ensure its sustainability and evolution.

      Examples of focus areas for your operating model:

      • Delivery: While there are core tenets to every data governance program, there is a level of variability in the implementation of data governance programs across organisations, sectors, and industries. Every organisation has its own particular drivers and mandates, so the level and rigour applied will also vary.
      • The key is to determine what style will work best in your organisation, taking into consideration your organisational culture, executive leadership support (present and ongoing), catalysts such as other enterprise-wide transformative and modernisation initiatives, and/or regulatory and compliances drivers.

      • Communication: Communication is vital across all levels and stakeholder groups. For instance, there needs to be communication from the data governance office up to senior leadership, as well as communication within the data governance organisation, which is typically made up of the data governance steering committee, data governance council, executive sponsor/champion, data stewards, and data custodians and working groups.
      • Furthermore, communication with the wider organisation of data producers, users, and consumers is one of the core elements of the overall data governance communications plan.

      Communication is vital for ensuring acceptance of new processes, rules, guidelines, and technologies by all data producers and users as well as for sharing success stories of the program.

      Operating Model

      Tie the value of data governance and its initiatives back to the business capabilities that are enabled.

      'Leading organisations invest in change management to build data supporters and convert the sceptics. This can be the most difficult part of the program, as it requires motivating employees to use data and encouraging producers to share it (and ideally improve its quality at the source)[.]' – Petzold, et al., 2020

      Operating Model

      Examples of focus areas for your operating model (continued):

      • Change management and issue resolution: Data governance initiatives will very likely bring about a level of organisational disruption, with governance recommendations and future state requiring potentially significant business change. This may include a redesign of a substantial number of data processes affecting various business units, which will require tweaking the organisation's culture, thought processes, and procedures surrounding its data.
      • Preparing people for change well in advance will allow them to take the steps necessary to adapt and reduce potential confrontation. By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.

        Attempting to implement change without an effective communications plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.

      • Performance measuring, monitoring and reporting: Measuring and reporting on performance, successes, and realisation of tangible business value are a must for sustaining, growing, and scaling your data governance program.
      • Aligning your data governance to the organisation's value realisation activities enables you to leverage the KPIs of those business capabilities to demonstrate tangible and measurable value. Use terms and language that will resonate with your senior business leadership.

      Info-Tech Tip:

      Launching a data governance program will bring with it a level of disruption to the culture of the organisation. That disruption doesn't have to be detrimental if you are prepared to manage the change proactively and effectively.

      Policies, Procedures & Standards

      'Data standards are the rules by which data are described and recorded. In order to share, exchange, and understand data, we must standardise the format as well as the meaning.' – U.S. Geological Survey

      Policies, Procedures & Standards

      • When defining, updating, or refreshing your data policies, procedures, and standards, ensure they are relevant, serve a purpose, and/or support the use of data in the organisation.
      • Avoid the common pitfall of building out a host of policies, procedures, and standards that are never used or followed by users and therefore don't bring value or serve to mitigate risk for the organisation.
      • Data policies can be thought of as formal statements and are typically created, approved, and updated by the organisation's data decision-making body (such as a data governance steering committee).
      • Data standards and procedures function as actions, or rules, that support the policies and their statements.
      • Standards and procedures are designed to standardise the processes during the overall data lifecycle. Procedures are instructions to achieve the objectives of the policies. The procedures are iterative and will be updated with approval from your data governance committee as needed.
      • Your organisation's data policies, standards, and procedures should not bog down or inhibit users; rather, they should enable confident data use and handling across the overall data lifecycle. They should support more effective and seamless data capture, integration, aggregation, sharing, and retention of data in the organisation.

      Examples of data policies:

      • Data Classification Policy
      • Data Retention Policy
      • Data Entry Policy
      • Data Backup Policy
      • Data Provenance Policy
      • Data Management Policy

      See Info-Tech's Data Governance Policy Template: This policy establishes uniformed data governance standards and identifies the shared responsibilities for assuring the integrity of the data and that it efficiently and effectively serves the needs of your organisation.

      Data Domain Documentation

      Select the correct granularity for your business need

      Diagram of data domain documentation
      Sources: Dataversity; Atlan; Analytics8

      Data Domain Documentation Examples

      Data Domain Documentation Examples

      Data Culture

      'Organisational culture can accelerate the application of analytics, amplify its power, and steer companies away from risky outcomes.' – Petzold, et al., 2020

      A healthy data culture is key to amplifying the power of your data and to building and sustaining an effective data governance program.

      What does a healthy data culture look like?

      • Everybody knows the data.
      • Everybody trusts the data.
      • Everybody talks about the data.

      Building a culture of data excellence.

      Leverage Info-Tech's Data Culture Diagnostic to understand your organisation's culture around data.

      Screenshot of Data Culture Scorecard

      Contact your Info-Tech Account Representative for more information on the Data Culture Diagnostic

      Cultivating a data-driven culture is not easy

      'People are at the heart of every culture, and one of the biggest challenges to creating a data culture is bringing everyone into the fold.' – Lim, Alation

      It cannot be purchased or manufactured,

      It must be nurtured and developed,

      And it must evolve as the business, user, and data landscapes evolve.

      'Companies that have succeeded in their data-driven efforts understand that forging a data culture is a relentless pursuit, and magic bullets and bromides do not deliver results.' – Randy Bean, 2020

      Hallmarks of a data-driven culture

      There is a trusted, single source of data the whole company can draw from.

      There's a business glossary and data catalogue and users know what the data fields mean.

      Users have access to data and analytics tools. Employees can leverage data immediately to resolve a situation, perform an activity, or make a decision – including frontline workers.

      Data literacy, the ability to collect, manage, evaluate, and apply data in a critical manner, is high.

      Data is used for decision making. The company encourages decisions based on objective data and the intelligent application of it.

      A data-driven culture requires a number of elements:

      • High-quality data
      • Broad access and data literacy
      • Data-driven decision-making processes
      • Effective communication

      Data Literacy

      Data literacy is an essential part of a data-driven culture.

      • Building a data-driven culture takes an ongoing investment of time, effort, and money.
      • This investment will not realise its full return without building up the organisation's data literacy.
      • Data literacy is about filling data knowledge gaps across all levels of the organisation.
      • It's about ensuring all users – senior leadership right through to core users – are equipped with appropriate levels of training, skills, understanding, and awareness around the organisation's data and the use of associated tools and technologies. Data literacy ensures users have the data they need and they know how to interpret and leverage it.
      • Data literacy drives the appetite, demand, and consumption for data.
      • A data-literate culture is one where the users feel confident and skilled in their use of data, leveraging it for making informed or evidence-based decisions and generating insights for the organisation.

      Data Management

      • Data governance serves as an enabler to all of the core components that make up data management:
        • Data quality management
        • Data architecture management
        • Data platform
        • Data integration
        • Data operations management
        • Data risk management
        • Reference and master data management (MDM)
        • Document and content management
        • Metadata management
        • Business intelligence (BI), reporting, analytics and advanced analytics, artificial intelligence (AI), machine learning (ML)
      • Key tools such as the business data glossary and data catalogue are vital for operationalizing data governance and in supporting data management disciplines such as data quality management, metadata management, and MDM as well as BI, reporting, and analytics.

      Enterprise Projects & Services

      • Data governance serves as an enabler to enterprise projects and services that require, use, share, sell, and/or rely on data for their viability and, ultimately, their success.
      • Folding or embedding data governance into the organisation's project management function or project management office (PMO) serves to ensure that, for any initiative, suitable consideration is given to how data is treated.
      • This may include defining parameters, following standards and procedures around bringing in new sources of data, integrating that data into the organisation's data ecosystem, using and sharing that data, and retaining that data post-project completion.
      • The data governance function helps to identify and manage any ethical issues, whether at the start of the project and/or throughout.
      • It provides a foundation for asking relevant questions as it relates to the use or incorporation of data in delivering the specific project or service. Do we know where the data obtained from? Do we have rights to use that data? Are there legislations, policies, or regulations that guide or dictate how that data can be used? What are the positive effects, negative impacts, and/or risks associated with our intended use of that data? Are we positioned to mitigate those risks?
      • Mature data governance creates organisations where the above considerations around data management and the ethical use and handling of data is routinely implemented across the business and in the rollout and delivery of projects and services.

      Data Privacy & Security

      • Data governance supports the organisation's data privacy and security functions.
      • Key tools include the data classification policy and standards and defined roles around data ownership and data stewardship. These are vital for operationalizing data governance and supporting data privacy, security, and the ethical use and handling of data.
      • While some organisations may have a dedicated data security and privacy group, data governance provides an added level of oversight in this regard.
      • Some of the typical checks and balances include ensuring:
        • There are policies and procedures in place to restrict and monitor staff's access to data (one common way this is done is according to job descriptions and responsibilities) and that these comply with relevant laws and regulations.
        • There's a data classification scheme in place where data has been classified on a hierarchy of sensitivity (e.g. top secret, confidential, internal, limited, public).
        • The organisation has a comprehensive data security framework, including administrative, physical, and technical procedures for addressing data security issues (e.g. password management and regular training).
        • Risk assessments are conducted, including an evaluation of risks and vulnerabilities related to intentional and unintentional misuse of data.
        • Policies and procedures are in place to mitigate the risks associated with incidents such as data breaches.
        • The organisation regularly audits and monitors its data security.

      Ethical Use & Handling of Data

      Data governance will support your organisation's ethical use and handling of data by facilitating definition around important factors, such as:

      • What are the various data assets in the organisation and what purpose(s) can they be used for? Are there any limitations?
      • Who is the related data owner? Who holds accountability for that data? Who will be answerable?
      • Where was the data obtained from? What is the intended use of that data? Do you have rights to use that data? Are there legislations, policies, or regulations that guide or dictate how that data can be used?
      • What are the positive effects, negative impacts, and/or risks associated with the use of that data?

      Ethical Use & Handling of Data

      • Data governance serves as an enabler to the ethical use and handling of an organisation's data.
      • The Open Data Institute (ODI) defines data ethics as: 'A branch of ethics that evaluates data practices with the potential to adversely impact on people and society – in data collection, sharing and use.'
      • Data ethics relates to good practice around how data is collected, used and shared. It's especially relevant when data activities have the potential to impact people and society, whether directly or indirectly (Open Data Institute, 2019).
      • A failure to handle and use data ethically can negatively impact an organisation's direct stakeholders and/or the public at large, lead to a loss of trust and confidence in the organisation's products and services, lead to financial loss, and impact the organisation's brand, reputation, and legal standing.
      • Data governance plays a vital role is building and managing your data assets, knowing what data you have, and knowing the limitations of that data. Data ownership, data stewardship, and your data governance decision-making body are key tenets and foundational components of your data governance. They enable an organisation to define, categorise, and confidently make decisions about its data.

      Step 2.2

      Gauge Your Organisation's Current Data Culture

      Activities

      2.2.1 Gauge Your Organisation's Current Data Culture

      This step will guide you through the following activities:

      • Conduct a data culture survey or leverage Info-Tech's Data Culture Diagnostic to increase your understanding of your organisation's data culture

      Outcomes of this step

      • An understanding of your organisational data culture

      2.2.1 Gauge Your Organisation's Current Data Culture

      Conduct a Data Culture Survey or Diagnostic

      The objectives of conducting a data culture survey are to increase the understanding of the organisation's data culture, your users' appetite for data, and their appreciation for data in terms of governance, quality, accessibility, ownership, and stewardship. To perform a data culture survey:

      1. Identify members of the data user base, data consumers, and other key stakeholders for surveying.
      2. Conduct an information session to introduce Info-Tech's Data Culture Diagnostic survey. Explain the objective and importance of the survey and its role in helping to understand the organisation's current data culture and inform the improvement of that culture.
      3. Roll out the Info-Tech Data Culture Diagnostic survey to the identified users and stakeholders.
      4. Debrief and document the results and scorecard in the Data Strategy Stakeholder Interview Guide and Findings document.

      Input

      • Email addresses of participants in your organisation who should receive the survey

      Output

      • Your organisation's Data Culture Scorecard for understanding current data culture as it relates to the use and consumption of data
      • An understanding of whether data is currently perceived to be an asset to the organisation

      Materials

      Screenshot of Data Culture Scorecard

      Participants

      • Participants include those at the senior leadership level through to middle management, as well as other business stakeholders at varying levels across the organisation
      • Data owners, stewards, and custodians
      • Core data users and consumers

      Contact your Info-Tech Account Representative for details on launching a Data Culture Diagnostic.

      Phase 3

      Build a Target State Roadmap and Plan

      Three circles are in the image that list the three phases and the main steps. Phase 3 is highlighted.

      'Achieving data success is a journey, not a sprint. Companies that set a clear course, with reasonable expectations and phased results over a period of time, get to the destination faster.' – Randy Bean, 2020

      This phase will guide you through the following activities:

      • Build your Data Governance Roadmap
      • Develop a target state plan comprising of prioritised initiatives

      This phase involves the following participants:

      • Data Governance Leadership
      • Data Owners/Data Stewards
      • Data Custodians
      • Data Governance Working Group(s)

      Step 3.1

      Formulate an Actionable Roadmap and Right-Sized Plan

      This step will guide you through the following activities:

      • Build your data governance roadmap
      • Develop a target state plan comprising of prioritised initiatives

      Download Info-Tech's Data Governance Planning and Roadmapping Workbook

      See Info-Tech's Data Governance Program Charter Template: A program charter template to sell the importance of data governance to senior executives.

      This template will help get the backing required to get a data governance project rolling. The program charter will help communicate the project purpose, define the scope, and identify the project team, roles, and responsibilities.

      Outcomes of this step

      • A foundation for data governance initiative planning that's aligned with the organisation's business architecture: value streams, business capability map, and strategy map

      Build a right-sized roadmap

      Formulate an actionable roadmap that is right sized to deliver value in your organisation.

      Key considerations:

      • When building your data governance roadmap, ensure you do so through an enterprise lens. Be cognizant of other initiatives that might be coming down the pipeline that may require you to align your data governance milestones accordingly.
      • Apart from doing your planning with consideration for other big projects or launches that might be in-flight and require the time and attention of your data governance partners, also be mindful of the more routine yet still demanding initiatives.
      • When doing your roadmapping, consider factors like the organisation's fiscal cycle, typical or potential year-end demands, and monthly/quarterly reporting periods and audits. Initiatives such as these are likely to monopolise the time and focus of personnel key to delivering on your data governance milestones.

      Sample milestones:

      Data Governance Leadership & Org Structure Definition

      Define the home for data governance and other key roles around ownership and stewardship, as approved by senior leadership.

      Data Governance Charter and Policies

      Create a charter for your program and build/refresh associated policies.

      Data Culture Diagnostic

      Understand the organisation's current data culture, perception of data, value of data, and knowledge gaps.

      Use Case Build and Prioritisation

      Build a use case that is tied to business capabilities. Prioritise accordingly.

      Business Data Glossary/catalogue

      Build and/or refresh the business' glossary for addressing data definitions and standardisation issues.

      Tools & Technology

      Explore the tools and technology offering in the data governance space that would serve as an enabler to the program. (e.g. RFI, RFP).

      Recall: Info-Tech's Data Governance Framework

      An image of Info-Tech's Data Governance Framework

      Build an actionable roadmap

      Data Governance Leadership & Org Structure Division

      Define key roles for getting started.

      Use Case Build & Prioritisation

      Start small and then scale – deliver early wins.

      Literacy Program

      Start understanding data knowledge gaps, building the program, and delivering.

      Tools & Technology

      Make the available data governance tools and technology work for you.

      Key components of your data governance roadmap

      Data Governance Program Charter Template – A program charter template to sell the importance of data governance to senior executives.

      This template will help get the backing required to get a data governance project rolling. The program charter will help communicate the project purpose, define the scope, and identify the project team, roles, and responsibilities.

      By now, you have assessed current data governance environment and capabilities. Use this assessment, coupled with the driving needs of your business, to plot your data Governance roadmap accordingly.

      Sample data governance roadmap milestones:

      • Define data governance leadership.
      • Define and formalise data ownership and stewardship (as well as the role IT/data management will play as data custodians).
      • Build/confirm your business capability map and data domains.
      • Build business data use cases specific to business capabilities.
      • Define business measures/KPIs for the data governance program (i.e. metrics by use case that are relevant to business capabilities).
      • Data management:
        • Build your data glossary or catalogue starting with identified and prioritised terms.
        • Define data domains.
      • Design and define the data governance operating model (oversight model definition, communication plan, internal marketing such as townhalls, formulate change management plan, RFP of data governance tool and technology options for supporting data governance and its administration).
      • Data policies and procedures:
        • Formulate, update, refresh, consolidate, rationalise, and/or retire data policies and procedures.
        • Define policy management and administration framework (i.e. roll-out, maintenance, updates, adherence, system to be used).
      • Conduct Info-Tech's Data Culture Diagnostic or survey (across all levels of the organisation).
      • Define and formalise the data literacy program (build modules, incorporate into LMS, plan lunch and learn sessions).
      • Data privacy and security: build data classification policy, define classification standards.
      • Enterprise projects and services: embed data governance in the organisation's PMO, conduct 'Data Governance 101' for the PMO.

      Defining data governance roles and organisational structure at Organisation

      The approach employed for defining the data governance roles and supporting organisational structure for .

      Key Considerations:

      • The data owner and data steward roles are formally defined and documented within the organisation. Their involvement is clear, well-defined, and repeatable.
      • There are data owners and data stewards for each data domain within the organisation. The data steward role is given to someone with a high degree of subject matter expertise.
      • Data owners and data stewards are effective in their roles by ensuring that their data domain is clean and free of errors and that they protect the organisation against data loss.
      • Data owners and data stewards have the authority to make final decisions on data definitions, formats, and standard processes that apply to their respective data sets. Data owners and data stewards have authority regarding who has access to certain data.
      • Data owners and data stewards are not from the IT side of the organisation. They understand the lifecycle of the data (how it is created, curated, retrieved, used, archived, and destroyed) and they are well-versed in any compliance requirements as it relates to their data.
      • The data custodian role is formally defined and is given to the relevant IT expert. This is an individual with technical administrative and/or operational responsibility over data (e.g. a DBA).
      • A data governance steering committee exists and is comprised of well-defined roles, responsibilities, executive sponsors, business representatives, and IT experts.
      • The data governance steering committee works to provide oversight and enforce policies, procedures, and standards for governing data.
      • The data governance working group has cross-functional representation. This comprises business and IT representation, as well as project management and change management where applicable: data stewards, data custodians, business subject matter experts, PM, etc.).
      • Data governance meetings are coordinated and communicated about. The meeting agenda is always clear and concise, and meetings review pressing data-related issues. Meeting minutes are consistently documented and communicated.

      Sample: Business capabilities to data owner and data stewards mapping for a selected data domain

      Info-Tech Insight

      Your organisation's value streams and the associated business capabilities require effectively governed data. Without this, you face elevated operational costs, missed opportunities, eroded stakeholder satisfaction, and exposure to increased business risk.

      Enable business capabilities with data governance role definitions.

      Sample: Business capabilities to data owner and data stewards mapping for a selected data domain

      Consider your technology options:

      Make the available data governance tools and technology work for you:

      • Data catalogue
      • Business data glossary
      • Data lineage
      • Metadata management

      Logos of data governance tools and technology.

      These are some of the data governance tools and technology players. Check out SoftwareReviews for help making better software decisions.

      Make the data steward the catalyst for organisational change and driving data culture

      The data steward must be empowered and backed politically with decision-making authority, or the role becomes stale and powerless.

      Ensuring compliance can be difficult. Data stewards may experience pushback from stakeholders who must deliver on the policies, procedures, and processes that the data steward enforces.

      Because the data steward must enforce data processes and liaise with so many different people and departments within the organisation, the data steward role should be their primary full-time job function – where possible.

      However, in circumstances where budget doesn't allow a full-time data steward role, develop these skills within the organisation by adding data steward responsibilities to individuals who are already managing data sets for their department or line of business.

      Info-Tech Tip

      A stewardship role is generally more about managing the cultural change that data governance brings. This requires the steward to have exceptional interpersonal skills that will assist in building relationships across departmental boundaries and ensuring that all stakeholders within the organisation believe in the initiative, understand the anticipated outcomes, and take some level of responsibility for its success.

      Changes to organisational data processes are inevitable; have a communication plan in place to manage change

      Create awareness of your data governance program. Use knowledge transfer to get as many people on board as possible.

      Data governance initiatives must contain a strong organisational disruption component. A clear and concise communication strategy that conveys milestones and success stories will address the various concerns that business unit stakeholders may have.

      By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.

      Governance recommendations will require significant business change. The redesign of a substantial number of data processes affecting various business units will require an overhaul of the organisation's culture, thought processes, and procedures surrounding its data. Preparing people for change well in advance will allow them to take the necessary steps to adapt and reduce potential confrontation.

      Because a data governance initiative will involve data-driven business units across the organisation, the governance team must present a compelling case for data governance to ensure acceptance of new processes, rules, guidelines, and technologies by all data producers and users.

      Attempting to implement change without an effective communication plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.

      Info-Tech Insight

      Launching a data governance initiative is guaranteed to disrupt the culture of the organisation. That disruption doesn't have to be detrimental if you are prepared to manage the change proactively and effectively.

      Create a common data governance vision that is consistently communicated to the organisation

      A data governance program should be an enterprise-wide initiative.

      To create a strong vision for data governance, there must be participation from the business and IT. A common vision will articulate the state the organisation wishes to achieve and how it will reach that state. Visioning helps to develop long-term goals and direction.

      Once the vision is established, it must be effectively communicated to everyone, especially those who are involved in creating, managing, disposing, or archiving data.

      The data governance program should be periodically refined. This will ensure the organisation continues to incorporate best methods and practices as the organisation grows and data needs evolve.

      Info-Tech Tips

      • Use information from the stakeholder interviews to derive business goals and objectives.
      • Work to integrate different opinions and perspectives into the overall vision for data governance.
      • Brainstorm guiding principles for data and understand the overall value to the organisation.

      Develop a compelling data governance communications plan to get all departmental lines of business on board

      A data governance program will impact all data-driven business units within the organisation.

      A successful data governance communications plan involves making the initiative visible and promoting staff awareness. Educate the team on how data is collected, distributed, and used, what internal processes use data, and how that data is used across departmental boundaries.

      By demonstrating how data governance will affect staff directly, you create a deeper level of understanding across lines of business, and ultimately, a higher level of acceptance for new processes, rules, and guidelines.

      A clear and concise communications strategy will raise the profile of data governance within the organisation, and staff will understand how the program will benefit them and how they can share in the success of the initiative. This will end up providing support for the initiative across the board.

      A proactive communications plan will:

      • Assist in overcoming issues with data control, stalemates between stakeholder units, and staff resistance.
      • Provide a formalised process for implementing new policies, rules, guidelines, and technologies, and managing organisational data.
      • Detail data ownership and accountability for decision making, and identify and resolve data issues throughout the organisation.
      • Encourage acceptance and support of the initiative.

      Info-Tech Tip

      Focus on literacy and communication: include training in the communication plan. Providing training for data users on the correct procedures for updating and verifying the accuracy of data, data quality, and standardised data policies will help validate how data governance will benefit them and the organisation.

      Leverage the data governance program to communicate and promote the value of data within the organisation

      The data governance program is responsible for continuously promoting the value of data to the organisation. The data governance program should seek a variety of ways to educate the organisation and data stakeholders on the benefit of data management.

      Even if data policies and procedures are created, they will be highly ineffective if they are not properly communicated to the data producers and users alike.

      There needs to be a communication plan that highlights how the data producer and user will be affected, what their new responsibilities are, and the value of that change.

      To learn how to manage organisational change, refer to Info-Tech's Master Organisational Change Management Practices.

      Understand what makes for an effective policy for data governance

      It can be difficult to understand what a policy is, and what it is not. Start by identifying the differences between a policy and standards, guidelines, and procedures.

      Diagram of an effective policy for data governance

      The following are key elements of a good policy:

      Heading Descriptions
      Purpose Describes the factors or circumstances that mandate the existence of the policy. Also states the policy's basic objectives and what the policy is meant to achieve.
      Scope Defines to whom and to what systems this policy applies. Lists the employees required to comply or simply indicates 'all' if all must comply. Also indicates any exclusions or exceptions, i.e. those people, elements, or situations that are not covered by this policy or where special consideration may be made.
      Definitions Define any key terms, acronyms, or concepts that will be used in the policy. A standard glossary approach is sufficient.
      Policy Statements Describe the rules that comprise the policy. This typically takes the form of a series of short prescriptive and proscriptive statements. Sub-dividing this section into sub-sections may be required depending on the length or complexity of the policy.
      Non-Compliance Clearly describe consequences (legal and/or disciplinary) for employee non-compliance with the policy. It may be pertinent to describe the escalation process for repeated non-compliance.
      Agreement Confirms understanding of the policy and provides a designated space to attest to the document.

      Leverage myPolicies, Info-Tech's web-based application for managing your policies and procedures

      Most organisations have problems with policy management. These include:

      1. Policies are absent or out of date
      2. Employees largely unaware of policies in effect
      3. Policies are unmonitored and unenforced
      4. Policies are in multiple locations
      5. Multiple versions of the same policy exist
      6. Policies managed inconsistently across different silos
      7. Policies are written poorly by untrained authors
      8. Inadequate policy training program
      9. Draft policies stall and lose momentum
      10. Weak policy support from senior management

      Technology should be used as a means to solve these problems and effectively monitor, enforce, and communicate policies.

      Product Overview

      myPolicies is a web-based solution to create, distribute, and manage corporate policies, procedures, and forms. Our solution provides policy managers with the tools they need to mitigate the risk of sanctions and reduce the administrative burden of policy management. It also enables employees to find the documents relevant to them and build a culture of compliance.

      Some key success factors for policy management include:

      • Store policies in a central location that is well known and easy to find and access. A key way that technology can help communicate policies is by having them published on a centralised website.
      • Link this repository to other policies' taxonomies of your organisation. E.g. HR policies to provide a single interface for employees to access guidance across the organisation.
      • Reassess policies annually at a minimum. myPolicies can remind you to update the organisation's policies at the appropriate time.
      • Make the repository searchable and easily navigable.
      • myPolicies helps you do all this and more.
      myPolicies logo myPolicies

      Enforce data policies to promote consistency of business processes

      Data policies are short statements that seek to manage the creation, acquisition, integrity, security, compliance, and quality of data. These policies vary amongst organisations, depending on your specific data needs.

      • Policies describe what to do, while standards and procedures describe how to do something.
      • There should be few data policies, and they should be brief and direct. Policies are living documents and should be continuously updated to respond to the organisation's data needs.
      • The data policies should highlight who is responsible for the data under various scenarios and rules around how to manage it effectively.

      Examples of Data Policies

      Trust

      • Data Cleansing and Quality Policy
      • Data Entry Policy

      Availability

      • Acceptable Use Policy
      • Data Backup Policy

      Security

      • Data Security Policy
      • Password Policy Template
      • User Authorisation, Identification, and Authentication Policy Template
      • Data Protection Policy

      Compliance

      • Archiving Policy
      • Data Classification Policy
      • Data Retention Policy

      Leverage data management-related policies to standardise your data management practices

      Info-Tech's Data Management Policy:

      This policy establishes uniform data management standards and identifies the shared responsibilities for assuring the integrity of the data and that it efficiently and effectively serves the needs of the organisation. This policy applies to all critical data and to all staff who may be creators and/or users of such data.

      Info-Tech's Data Entry Policy:

      The integrity and quality of data and evidence used to inform decision making is central to both the short-term and long-term health of an organisation. It is essential that required data be sourced appropriately and entered into databases and applications in an accurate and complete manner to ensure the reliability and validity of the data and decisions made based on the data.

      Info-Tech's Data Provenance Policy:

      Create policies to keep your data's value, such as:

      • Only allow entry of data from reliable sources.
      • Employees entering and accessing data must observe requirements for capturing/maintaining provenance metadata.
      • Provenance metadata will be used to track the lifecycle of data from creation through to disposal.

      Info-Tech's Data Integration and Virtualisation Policy:

      This policy aims to assure the organisation, staff, and other interested parties that data integration, replication, and virtualisation risks are taken seriously. Staff must use the policy (and supporting guidelines) when deciding whether to integrate, replicate, or virtualise data sets.

      Select the right mix of metrics to successfully supervise data policies and processes

      Policies are only as good as your level of compliance. Ensure supervision controls exist to oversee adherence to policies and procedures.

      Although they can be highly subjective, metrics are extremely important to data governance success.

      • Establishing metrics that measure the performance of a specific process or data set will:
        • Create a greater degree of ownership from data stewards and data owners.
        • Help identify underperforming individuals.
        • Allow the steering committee to easily communicate tailored objectives to individual data stewards and owners.
      • Be cautious when establishing metrics. The wrong metrics can have negative repercussions.
        • They will likely draw attention to an aspect of the process that doesn't align with the initial strategy.
        • Employees will work hard and grow frustrated as their successes aren't accurately captured.

      Policies are great to have from a legal perspective, but unless they are followed, they will not benefit the organisation.

      • One of the most useful metrics for policies is currency. This tracks how up to date the policy is and how often employees are informed about the policy. Often, a policy will be introduced and then ignored. Policies must be continuously reviewed by management and employees.
      • Some other metrics include adherence (including performance in tests for adherence) and impacts from non-adherence.

      Review metrics on an ongoing basis with those data owners/stewards who are accountable, the data governance steering committee, and the executive sponsors.

      Establish data standards and procedures for use across all organisational lines of business

      A data governance program will impact all data-driven business units within the organisation.

      • Data management procedures are the methods, techniques, and steps to accomplish a specific data objective. Creating standard data definitions should be one of the first tasks for a data governance steering committee.
      • Data moves across all departmental boundaries and lines of business within the organisation. These definitions must be developed as a common set of standards that can be accepted and used enterprise wide.
      • Consistent data standards and definitions will improve data flow across departmental boundaries and between lines of business.
      • Ensure these standards and definitions are used uniformly throughout the organisation to maintain reliable and useful data.

      Data standards and procedural guidelines will vary from company to company.

      Examples include:

      • Data modelling and architecture standards.
      • Metadata integration and usage procedures.
      • Data security standards and procedures.
      • Business intelligence standards and procedures.

      Info-Tech Tip

      Have a fundamental data definition model for the entire business to adhere to. Those in the positions that generate and produce data must follow the common set of standards developed by the steering committee and be accountable for the creation of valid, clean data.

      Changes to organisational data processes are inevitable; have a communications plan in place to manage change

      Create awareness of your data governance program, using knowledge transfer to get as many people on board as possible.

      By planning for and efficiently communicating any changes that a data governance initiative may bring, many initial issues can be resolved from the outset.

      Governance recommendations will require significant business change. The redesign of a substantial number of data processes affecting various business units will require an overhaul of the organisation's culture, thought processes, and procedures surrounding its data. Preparing people for change well in advance will allow them to take the necessary steps to adapt and reduce potential confrontation.

      Because a data governance initiative will involve data-driven business units across the organisation, the governance team must present a compelling case for data governance to ensure acceptance of new processes, rules, guidelines, and technologies by all data producers and users.

      Attempting to implement change without an effective communications plan can result in disagreements over data control and stalemates between stakeholder units. The recommendations of the governance group must reflect the needs of all stakeholders or there will be pushback.

      Data governance initiatives will very likely bring about a level of organisational disruption. A clear and concise communications strategy that conveys milestones and success stories will address the various concerns that business unit stakeholders may have.

      Info-Tech Tip

      Launching a data governance program will bring with it a level of disruption to the culture of the organisation. That disruption doesn't have to be detrimental if you are prepared to manage the change proactively and effectively.

      Other Deliverables:

      The list of supporting deliverables will help to kick start on some of the Data Governance initiatives

      • Data Classification Policy, Standard, and Procedure
      • Data Quality Policy, Standard, and Procedure
      • Metadata Management Policy, Standard, and Procedure
      • Data Retention Policy and Procurement

      Screenshot from Data Classification Policy, Standard, and Procedure

      Data Classification Policy, Standard, and Procedure

      Screenshot from Data Retention Policy and Procedure

      Data Retention Policy and Procedure

      Screenshot from Metadata Management Policy, Standard, and Procedure

      Metadata Management Policy, Standard, and Procedure

      Screenshot from Data Quality Policy, Standard, and Procedure

      Data Quality Policy, Standard, and Procedure

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      Picture of analyst

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team. Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      Screenshot of example data governance strategy map.

      Build Your Business and User Context

      Work with your core team of stakeholders to build out your data governance strategy map, aligning data governance initiatives with business capabilities, value streams, and, ultimately, your strategic priorities.

      Screenshot of Data governance roadmap

      Formulate a Plan to Get to Your Target State

      Develop a data governance future state roadmap and plan based on an understanding of your current data governance capabilities, your operating environment, and the driving needs of your business.

      Related Info-Tech Research

      Build a Robust and Comprehensive Data Strategy

      Key to building and fostering a data-driven culture.

      Create a Data Management Roadmap

      Streamline your data management program with our simplified framework.

      The First 100 Days as CDO

      Be the voice of data in a time of transformation.

      Research Contributors

      Name Position Company
      David N. Weber Executive Director - Planning, Research and Effectiveness Palm Beach State College
      Izabela Edmunds Information Architect Mott MacDonald
      Andy Neill Practice Lead, Data & Analytics Info-Tech Research Group
      Dirk Coetsee Research Director, Data & Analytics Info-Tech Research Group
      Graham Price Executive Advisor, Advisory Executive Services Info-Tech Research Group
      Igor Ikonnikov Research Director, Data & Analytics Info-Tech Research Group
      Jean Bujold Senior Workshop Delivery Director Info-Tech Research Group
      Rajesh Parab Research Director, Data & Analytics Info-Tech Research Group
      Reddy Doddipalli Senior Workshop Director Info-Tech Research Group
      Valence Howden Principal Research Director, CIO Info-Tech Research Group

      Bibliography

      Alation. “The Alation State of Data Culture Report – Q3 2020.” Alation, 2020. Accessed 25 June 2021.

      Allott, Joseph, et al. “Data: The Next Wave in Forestry Productivity.” McKinsey & Company, 27 Oct. 2020. Accessed 25 June 2021.

      Bean, Randy. “Why Culture Is the Greatest Barrier to Data Success.” MIT Sloan Management Review, 30 Sept. 2020. Accessed 25 June 2021.

      Brence, Thomas. “Overcoming the Operationalization Challenge With Data Governance at New York Life.” Informatica, 18 March 2020. Accessed 25 June 2021.

      Bullmore, Simon, and Stuart Coleman. “ODI Inside Business – A Checklist for Leaders.” Open Data Institute, 19 Oct. 2020. Accessed 25 June 2021.

      Canadian Institute for Health Information. “Developing and Implementing Accurate National Standards for Canadian Health Care Information.” Canadian Institute for Health Information. Accessed 25 June 2021.

      Carruthers, Caroline, and Peter Jackson. “The Secret Ingredients of the Successful CDO.” IRM UK Connects, 23 Feb. 2017.

      Dashboards. “Useful KPIs for Healthy Hospital Quality Management.” Dashboards. Accessed 25 June 2021.

      Dashboards. “Why (and How) You Should Improve Data Literacy in Your Organization Today.” Dashboards. Accessed 25 June 2021.

      Datapine. “Healthcare Key Performance Indicators and Metrics.” Datapine. Accessed 25 June 2021.

      Datapine. “KPI Examples & Templates: Measure what matters the most and really impacts your success.” Datapine. Accessed 25 June 2021.

      Diaz, Alejandro, et al. “Why Data Culture Matters.” McKinsey Quarterly, Sept. 2018. Accessed 25 June 2021.

      Everett, Dan. “Chief Data Officer (CDO): One Job, Four Roles.” Informatica, 9 Sept. 2020. Accessed 25 June 2021.

      Experian. “10 Signs You Are Sitting On A Pile Of Data Debt.” Experian. Accessed 25 June 2021.

      Fregoni, Silvia. “New Research Reveals Why Some Business Leaders Still Ignore the Data.” Silicon Angle, 1 Oct. 2020

      Informatica. Holistic Data Governance: A Framework for Competitive Advantage. Informatica, 2017. Accessed 25 June 2021.

      Knight, Michelle. “What Is a Data Catalog?” Dataversity, 28 Dec. 2017. Web.

      Lim, Jason. “Alation 2020.3: Getting Business Users in the Game.” Alation, 2020. Accessed 25 June 2021.

      McDonagh, Mariann. “Automating Data Governance.” Erwin, 29 Oct. 2020. Accessed 25 June 2021.

      NewVantage Partners. Data-Driven Business Transformation: Connecting Data/AI Investment to Business Outcomes. NewVantage Partners, 2020. Accessed 25 June 2021.

      Olavsrud, Thor. “What Is Data Governance? A Best Practices Framework For Managing Data Assets.” CIO.com, 18 March 2021. Accessed 25 June 2021.

      Open Data Institute. “Introduction to Data Ethics and the Data Ethics Canvas.” Open Data Institute, 2020. Accessed 25 June 2021.

      Open Data Institute. “The UK National Data Strategy 2020: Doing Data Ethically.” Open Data Institute, 17 Nov. 2020. Accessed 25 June 2021.

      Open Data Institute. “What Is the Data Ethics Canvas?” Open Data Institute, 3 July 2019. Accessed 25 June 2021.

      Pathak, Rahul. “Becoming a Data-Driven Enterprise: Meeting the Challenges, Changing the Culture.” MIT Sloan Management Review, 28 Sept. 2020. Accessed 25 June 2021.

      Petzold, Bryan, et al. “Designing Data Governance That Delivers Value.” McKinsey & Company, 26 June 2020. Accessed 25 June 2021.

      Redman, Thomas, et al. “Only 3% of Companies’ Data Meets Basic Quality Standards.” Harvard Business Review. 11 Sept 2017.

      Smaje, Kate. “How Six Companies Are Using Technology and Data To Transform Themselves.” McKinsey & Company, 12 Aug. 2020. Accessed 25 June 2021.

      Talend. “The Definitive Guide to Data Governance.” Talend. Accessed 25 June 2021.

      “The Powerfully Simple Modern Data Catalog.” Atlan, 2021. Web.

      U.S. Geological Survey. “Data Management: Data Standards.” U.S. Geological Survey. Accessed 25 June 2021.

      Waller, David. “10 Steps to Creating a Data-Driven Culture.” Harvard Business Review, 6 Feb. 2020. Accessed 25 June 2021.

      “What Is the Difference Between A Business Glossary, A Data Dictionary, and A Data Catalog, and How Do They Play A Role In Modern Data Management?” Analytics8, 23 June 2021. Web.

      Wikipedia. “RFM (Market Research).” Wikipedia. Accessed 25 June 2021.

      Windheuser, Christoph, and Nina Wainwright. “Data in a Modern Digital Business.” Thoughtworks, 12 May 2020. Accessed 25 June 2021.

      Wright, Tom. “Digital Marketing KPIs - The 12 Key Metrics You Should Be Tracking.” Cascade, 3 March 2021. Accessed 25 June 2021.

      Adopt Generative AI in Solution Delivery

      • Buy Link or Shortcode: {j2store}146|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Delivery teams are under continuous pressure to deliver high value and quality solutions with limited capacity in complex business and technical environments. Common challenges experienced by these teams include:
        • Attracting and retaining talent
        • Maximizing the return on technology
        • Confidently shifting to digital
        • Addressing competing priorities
        • Fostering a collaborative culture
        • Creating high-throughput teams
      • Gen AI offers a unique opportunity to address many of these challenges.

      Our Advice

      Critical Insight

      • Your stakeholders' understanding of Gen AI, its value, and its application can be driven by hype and misinterpretation. This confusion can lead to unrealistic expectations and set the wrong precedent for the role Gen AI is intended to play.
      • Your SDLC is not well documented and is often executed inconsistently. An immature practice will not yield the benefits stakeholders expect.
      • The Gen AI marketplace is broad and diverse. Selecting the appropriate tools and partners is confusing and overwhelming.
      • There is a skills gap for what is needed to configure, adopt, and operate Gen AI.

      Impact and Result

      • Ground your Gen AI expectations. Set realistic and achievable goals centered on driving business value and efficiency across the entire SDLC by enabling Gen AI in key tasks and activities. Propose the SDLC as the ideal pilot for Gen AI.
      • Select the right Gen AI opportunities. Discuss how proven Gen AI capabilities can be applied to your solution delivery practice to achieve the outcomes and priorities stakeholders expect. Lessons learned sow the foundation for future Gen AI scaling.
      • Assess your Gen AI readiness in your solution delivery teams. Clarify the roles, processes, and tools needed for the implementation, use, and maintenance of Gen AI.

      Adopt Generative AI in Solution Delivery Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Adopt Generative AI in Solution Delivery Storyboard – A step-by-step guide that helps you assess whether Gen AI is right for your solution delivery practices.

      Gain an understanding of the potential opportunities that Gen AI can provide your solution delivery practices and answer the question "What should I do next?"

      • Adopt Generative AI in Solution Delivery Storyboard

      2. Gen AI Solution Delivery Readiness Assessment Tool – A tool to help you understand if your solution delivery practice is ready for Gen AI.

      Assess the readiness of your solution delivery team for Gen AI. This tool will ask several questions relating to your people, process, and technology, and recommend whether or not the team is ready to adopt Gen AI practices.

      • Gen AI Solution Delivery Readiness Assessment Tool
      [infographic]

      Further reading

      Adopt Generative AI in Solution Delivery

      Drive solution quality and team productivity with the right generative AI capabilities.

      Analyst Perspective

      Build the case for Gen AI with the right opportunities.

      Generative AI (Gen AI) presents unique opportunities to address many solution delivery challenges. Code generation can increase productivity, synthetic data generation can produce usable test data, and scanning tools can identify issues before they occur. To be successful, teams must be prepared to embrace the changes that Gen AI brings. Stakeholders must also give teams the opportunity to optimize their own processes and gauge the fit of Gen AI.

      Start small with the intent to learn. The right pilot initiative helps you learn the new technology and how it benefits your team without the headache of complex setups and lengthy training and onboarding. Look at your existing solution delivery tools to see what Gen AI capabilities are available and prioritize the use cases where Gen AI can be used out of the box.

      This is a picture of Andrew Kum-Seun

      Andrew Kum-Seun
      Research Director,
      Application Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Delivery teams are under continuous pressure to deliver high-value, high-quality solutions with limited capacity in complex business and technical environments. Common challenges experienced by these teams include:

      • Attracting and retaining talent
      • Maximizing the return on technology
      • Confidently shifting to digital
      • Addressing competing priorities
      • Fostering a collaborative culture
      • Creating high-throughput teams

      Generative AI (Gen AI) offers a unique opportunity to address many of these challenges.

      Common Obstacles

      • Your stakeholders' understanding of what is Gen AI, its value and its application, can be driven by hype and misinterpretation. This confusion can lead to unrealistic expectations and set the wrong precedent for the role Gen AI is intended to play.
      • Your solution delivery process is not well documented and is often executed inconsistently. An immature practice will not yield the benefits stakeholders expect.
      • The Gen AI marketplace is very broad and diverse. Selecting the appropriate tools and partners is confusing and overwhelming.
      • There is a skills gap for what is needed to configure, adopt, and operate Gen AI.

      Info-Tech's Approach

      • Ground your Gen AI expectations. Set realistic and achievable goals centered on driving business value and efficiency across the entire solution delivery process by enabling Gen AI in key tasks and activities. Propose this process as the ideal pilot for Gen AI.
      • Select the right Gen AI opportunities. Discuss how proven Gen AI capabilities can be applied to your solution delivery practice and achieve the outcomes and priorities stakeholders expect. Lessons learned sow the foundation for future Gen AI scaling.
      • Assess your Gen AI readiness in your solution delivery teams. Clarify the roles, processes, and tools needed for the implementation, use, and maintenance of Gen AI.

      Info-Tech Insight

      Position Gen AI as a tooling opportunity to enhance the productivity and depth of your solution delivery practice. Current Gen AI tools are unable to address the various technical and human complexities that commonly occur in solution delivery. Assess the fit of Gen AI by augmenting low-risk, out-of-the-box tools in key areas of your solution delivery process and teams.

      Insight Summary

      Overarching Info-Tech Insight

      Position Gen AI is a tooling opportunity to enhance the productivity and depth of your solution delivery practice. However, current Gen AI tools are unable to address the various technical and human complexities that commonly occur in solution delivery. Assess the fit of Gen AI by augmenting low-risk, out-of-the-box tools in key areas of your solution delivery process and teams.

      Understand and optimize first, automate with Gen AI later.
      Gen AI magnifies solution delivery inefficiencies and constraints. Adopt a user-centric perspective to understand your solution delivery teams' interactions with solution delivery tools and technologies to better replicate how they complete their tasks and overcome challenges.

      Enable before buy. Buy before build.
      Your solution delivery vendors see AI as a strategic priority in their product and service offering. Look into your existing toolset and see if you already have the capabilities. Otherwise, prioritize using off-the-shelf solutions with pre-trained Gen AI capabilities and templates.

      Innovate but don't experiment.
      Do not reinvent the wheel and lower your risk of success. Stick to the proven use cases to understand the value and fit of Gen AI tools and how your teams can transform the way they work. Use your lessons learned to discover scaling opportunities.

      Blueprint benefits

      IT benefits

      Business benefits

      • Select the Gen AI tools and capabilities that meet both the solution delivery practice and team goals, such as:
      • Improved team productivity and throughput.
      • Increased solution quality and value.
      • Greater team satisfaction.
      • Motivate stakeholder buy-in for the investment in solution delivery practice improvements.
      • Validate the fit and opportunities with Gen AI for future adoption in other IT departments.
      • Increase IT satisfaction by improving the throughput and speed of solution delivery.
      • Reduce the delivery and operational costs of enterprise products and services.
      • Use a pilot to demonstrate the fit and value of Gen AI capabilities and supporting practices across business and IT units.

      What is Gen AI?

      An image showing where Gen AI sits within the artificial intelligence.  It consists of four concentric circles.  They are labeled from outer-to-inner circle in the following order: Artificial Intelligence; Machine Learning; Deep Learning; Gen AI

      Generative AI (Gen AI)
      A form of ML whereby, in response to prompts, a Gen AI platform can generate new output based on the data it has been trained on. Depending on its foundational model, a Gen AI platform will provide different modalities and use case applications.

      Machine Learning (ML)
      The AI system is instructed to search for patterns in a data set and then make predictions based on that set. In this way, the system learns to provide accurate content over time. This requires a supervised intervention if the data is inaccurate. Deep learning is self-supervised and does not require intervention.

      Artificial Intelligence (AI)
      A field of computer science that focuses on building systems to imitate human behavior. Not all AI systems have learning behavior; many systems (such as customer service chatbots) operate on preset rules.

      Info-Tech Insight

      Many vendors have jumped on Gen AI as the latest marketing buzzword. When vendors claim to offer Gen AI functionality, pin down what exactly is generative about it. The solution must be able to induce new outputs from inputted data via self-supervision – not trained to produce certain outputs based on certain inputs.

      Augment your solution delivery teams with Gen AI

      Position Gen AI as a tooling opportunity to enhance the productivity and depth of your solution delivery practice. Current Gen AI tools are unable to address the various technical and human complexities that commonly occur in solution delivery; assess the fit of Gen AI by augmenting low-risk, out-of-the-box tools in key areas of your solution delivery process and teams.

      Solution Delivery Team

      Humans

      Gen AI Bots

      Product owner and decision maker
      Is accountable for the promised delivery of value to the organization.

      Business analyst and architect
      Articulates the requirements and aligns the team to the business and technical needs.

      Integrator and builder
      Implements the required solution.

      Collaborator
      Consults and supports the delivery.

      Administrator
      Performs common administrative tasks to ensure smooth running of the delivery toolchain and end-solutions.

      Designer and content creator
      Provides design and content support for common scenarios and approaches.

      Paired developer and tester
      Acts as a foil for existing developer or tester to ensure high quality output.

      System monitor and support
      Monitors and recommends remediation steps for operational issues that occur.

      Research deliverable

      This research is accompanied by a supporting deliverable to help you accomplish your goals.

      Gen AI Solution Delivery Readiness Assessment Tool

      Assess the readiness of your solution delivery team for Gen AI. This tool will ask several questions relating to your people, process, and technology, and recommend whether the team is ready to adopt Gen AI practices.

      This is a series of three screenshots from the Gen AI Solution Delivery Readiness Assessment Tool

      Step 1.1

      Set the context

      Activities

      1.1.1 Understand the challenges of your solution delivery teams.

      1.1.2 Outline the value you expect to gain from Gen AI.

      This step involves the following participants:

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Outcomes of this step

      • SWOT Analysis to help articulate the challenges facing your teams.
      • A Gen AI Canvas that will articulate the value you expect to gain.

      IT struggles to deliver solutions effectively

      • Lack of skills and resources
        Forty-six percent of respondents stated that it was very or somewhat difficult to attract, hire, and retain developers (GitLab, 2023; N=5,010).
      • Delayed software delivery
        Code development (37%), monitoring/observability (30%), deploying to non-production environments (30%), and testing (28%) were the top areas where software delivery teams or organizations encountered the most delays (GitLab, 2023, N=5,010).
      • Low solution quality and satisfaction
        Only 64% of applications were identified as effective by end users. Effective applications are identified as at least highly important and have high feature and usability satisfaction (Application Portfolio Assessment, August 2021 to July 2022; N=315).
      • Burnt out teams
        While workplace flexibility comes with many benefits, longer work hours jeopardize wellbeing. Sixty-two percent of organizations reported increased working hours, while 80% reported an increase in flexibility ("2022 HR Trends Report," McLean & Company, 2022; N=394) .

      Creating high-throughput teams is an organizational priority.

      CXOs ranked "optimize IT service delivery" as the second highest priority. "Achieve IT business" was ranked first.

      (CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568)

      1.1.1 Understand the challenges of your solution delivery teams

      1-3 hours

      1. Complete a SWOT analysis of your solution delivery team to discover areas where Gen AI can be applied.
      2. Record this information in the Gen AI Solution Delivery Readiness Assessment Tool.

      Strengths

      Internal characteristics that are favorable as they relate to solution delivery

      Weaknesses

      Internal characteristics that are unfavorable or need improvement

      Opportunities

      External characteristics that you may use to your advantage

      Threats

      External characteristics that may be potential sources of failure or risk

      Record the results in the Gen AI Solution Delivery Readiness Assessment Tool

      Output

      • SWOT analysis of current state of solution delivery practice

      Participants

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Gen AI can help solve your solution delivery challenges

      Why is software delivery an ideal pilot candidate for Gen AI?

      • Many software delivery practices are repeatable and standardized.
      • Software delivery roles that are using and implementing Gen AI are technically savvy.
      • Automation is a staple in many commonly used tools.
      • Change will likely not impact business operations.

      Improved productivity

      Gen AI jumpstarts the most laborious and mundane parts of software delivery. Delivery teams saved 22 hours (avg) per software use case when using AI in 2022, compared to last year when AI was not used ("Generative AI Speeds Up Software Development," PRNewswire, 2023).

      Fungible resources

      Teams are transferrable across different frameworks, platforms, and products. Gen AI provides the structure and guidance needed to work across a wider range of projects ("Game changer: The startling power generative AI is bringing to software development," KPMG, 2023).

      Improved solution quality

      Solution delivery artifacts (e.g. code) are automatically scanned to quickly identify bugs and defects based on recent activities and trends and validate against current system performance and capacity.

      Business empowerment

      AI enhances the application functionalities workers can build with low- and no-code platforms. In fact, "AI high performers are 1.6 times more likely than other organizations to engage non-technical employees in creating AI applications" ("The state of AI in 2022 — and a half decade in review." McKinsey, 2022, N=1,492).

      However, various fears, uncertainties, and doubts challenge Gen AI adoption

      Black Box

      Little transparency is provided on the tool's rationale behind content creation, decision making, and the use and storage of training data, creating risks for legal, security, intellectual property, and other areas.

      Role Replacement

      Some workers have job security concerns despite Gen AI being bound to their rule-based logic framework, the quality of their training data, and patterns of consistent behavior.

      Skills Gaps

      Teams need to gain expertise in AI/ML techniques, training data preparation, and continuous tooling improvements to support effective Gen AI adoption across the delivery practice and ensure reliable operations.

      Data Inaccuracy

      Significant good quality data is needed to build trust in the applicability and reliability of Gen AI recommendations and outputs. Teams must be able to combine Gen AI insights with human judgment to generate the right outcome.

      Slow Delivery of AI Solution

      Timelines are sensitive to organizational maturity, experience with Gen AI, and investments in good data management practices. 65% of organizations said it took more than three months to deploy an enterprise-ready AIOps solution (OpsRamp, 2022).

      Define the value you want Gen AI to deliver

      Well-optimized Gen AI instills stakeholder confidence in ongoing business value delivery and ensures stakeholder buy-in, provided proper expectations are set and met. However, business value is not interpreted or prioritized the same across the organization. Come to a common business value definition to drive change in the right direction by balancing the needs of the individual, team, and organization.

      Business value cannot always be represented by revenue or reduced expenses. Dissecting value by the benefit type and the value source's orientation allows you to see the many ways in which Gen AI brings value to the organization.

      Financial benefits vs. intrinsic needs

      • Financial benefits refers to the degree to which the value source can be measured through monetary metrics, such as revenue generation and cost saving.
      • Intrinsic needs refers to how a product, service, or business capability enhanced with Gen AI meets functional, user experience, and existential needs.

      Inward vs. outward orientation

      • Inward refers to value sources that are internally impacted by Gen AI and improve your employees' and teams' effectiveness in performing their responsibilities.
      • Outward refers to value sources that come from your interaction with external stakeholders and customers and were improved from using Gen AI.

      See our Build a Value Measurement Framework blueprint for more information about business value definition.

      An image of the Business Value Matrix for Gen AI

      Measure success with the right metrics

      Establishing and monitoring metrics are powerful ways to drive behavior and strategic changes in your organization. Determine the right measures that demonstrate the value of your Gen AI implementation by aligning them with your Gen AI objectives, business value drivers, and non-functional requirements.

      Select metrics with different views

      1. Solution delivery practice effectiveness
        The ability of your practice to deliver, support, and operate solutions with Gen AI
        Examples: Solution quality and throughput, delivery and operational costs, number of defects and issues, and system quality
      2. Solution quality and value
        The outcome of your solutions delivered with Gen AI tools
        Examples: Time and money saved, utilization of products and services, speed of process execution, number of errors, and compliance with standards
      3. Gen AI journey goals and milestones
        Your organization's position in your Gen AI journey
        Examples: Maturity score, scope of Gen AI adoption, comfort and
        confidence with Gen AI capabilities, and complexity of Gen AI use cases

      Leverage Info-Tech's Diagnostics

      IT Management & Governance

      • Improvement to application development quality and throughput effectiveness
      • Increased importance of application delivery and maintenance capabilities across the IT organization
      • Delegation of delivery accountability across more IT roles

      CIO Business Vision

      • Improvements to IT satisfaction and value from delivered solutions
      • Changes to the value and importance of IT core services enabled with Gen AI
      • The state of business and IT relationships
      • Capability to deliver and support Gen AI effectively

      1.1.2 Outline the value you expect to gain from Gen AI

      1-3 hours

      1. Complete the following fields to build your Gen AI canvas:
        1. Problem that Gen AI is intending to solve
        2. List of stakeholders
        3. Desired business and IT outcomes
        4. In-scope solution delivery teams, systems, and capabilities.
      2. Record this information in the Gen AI Solution Delivery Readiness Assessment Tool.

      Output

      • Gen AI Canvas

      Participants

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Record the results in the Gen AI Solution Delivery Readiness Assessment Tool

      1.1.2 Example

      Example of an outline of the value you expect to gain from Gen AI

      Problem statements

      • Manual testing procedures hinder pace and quality of delivery.
      • Inaccurate requirement documentation leads to constant redesigning.

      Business and IT outcomes

      • Improve code quality and performance.
      • Expedite solution delivery cycle.
      • Improve collaboration between teams and reduce friction.

      List of stakeholders

      • Testing team
      • Application director
      • CIO
      • Design team
      • Project manager
      • Business analysts

      In-scope solution delivery teams, system, and capabilities

      • Web
      • Development
      • App development
      • Testing
      • Quality assurance
      • Business analysts
      • UI/UX design

      Align your objectives to the broader AI strategy

      Why is an organizational AI strategy important for Gen AI?

      • All Gen AI tactics and capabilities are designed, delivered, and managed to support a consistent interpretation of the broader AI vision and goals.
      • An organizational strategy gives clear understanding of the sprawl, criticality, and risks of Gen AI solutions and applications to other IT capabilities dependent on AI.
      • Gen AI initiatives are planned, prioritized, and coordinated alongside other software delivery practice optimizations and technology modernization initiatives.
      • Resources, skills, and capacities are strategically allocated to meet the needs of Gen AI considering other commitments in the software delivery optimization backlog and roadmap.
      • Gen AI expectations and practices uphold the persona, values, and principles of the software delivery team.

      What is an AI strategy?

      An AI strategy details the direction, activities, and tactics to deliver on the promise of your AI portfolio. It often includes:

      • AI vision and goals
      • Application, automation, and process portfolio involved or impacted by AI
      • Values and principles
      • Health of your AI portfolio
      • Risks and constraints
      • Strategic roadmap

      Step 1.2

      Evaluate opportunities for Gen AI

      Activities

      1.2.1 Align Gen AI opportunities with teams and capabilities.

      This step involves the following participants:

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Outcomes of this step

      • Understand the Gen AI opportunities for your solution delivery practice.

      Learn how Gen AI is employed in solution delivery

      Gen AI opportunity Common Gen AI tools and vendors Teams than can benefit How can teams leverage this? Case study
      Synthetic data generation
      • Testing
      • Data Analysts
      • Privacy and Security
      • Create test datasets
      • Replace sensitive personal data

      How Unity Leverages Synthetic Data

      Code generation
      • Development
      • Testing
      • Code Templates & Boilerplate
      • Code Refactoring

      How CI&T accelerated development by 11%

      Defect forecasting and debugging
      • Project Manager & Quality Assurance
      • Development
      • Testing
      • Identify root cause
      • Static and dynamic code analysis
      • Debugging assistance

      Altran Uses Microsoft Code Defect AI Solution

      Requirements documentation and elicitation
      • Business Analysts
      • Development
      • Document functional requirements
      • Writing test cases

      Google collaborates with Replit to reduce time to bring new products to market by 30%

      UI design and prototyping
      • UI/UX Design
      • Development
      • Deployment
      • Rapid prototyping
      • Design assistance

      How Spotify is Upleveling Their Entire Design Team

      Other common AI opportunities solutions include test case generation, code translation, use case creation, document generation, and automated testing.

      Opportunity 1: Synthetic data generation

      Create artificial data that mimics the structure of real-life data.

      What are the expected benefits?

      • Availability of test data: Creation of large volumes of data compatible for testing multiple systems within the organization.
      • Improved privacy: Substituting real data with artificial leads to reduced data leaks.
      • Quicker data provisioning: Automated generation of workable datasets aligned to company policies.

      What are the notable risks and challenges?

      • Generalization and misrepresentations: Data models used in synthetic data generation may not be an accurate representation of production data because of potentially conflicting definitions, omission of dependencies, and multiple sources of truth.
      • Lack of accurate representation: It is difficult for synthetic data to fully capture real-world data nuances.
      • Legal complexities: Data to build and train the Gen AI tool does not comply with data residency and management standards and regulations.

      How should teams prepare for synthetic data generation?

      It can be used:

      • To train machine learning models when there is not enough real data, or the existing data does not meet specific needs.
      • To improve quality of test by using data that closely resembles production without the risk of leveraging sensitive and private information.

      "We can simply say that the total addressable market of synthetic data and the total addressable market of data will converge,"
      Ofir Zuk, CEO, Datagen (Forbes, 2022)

      Opportunity 2: Code generation

      Learn patterns and automatically generate code.

      What are the expected benefits?

      • Increased productivity: It allows developers to generate more code quickly.
      • Improved code consistency: Code is generated using a standardized model and lessons learnt from successful projects.
      • Rapid prototyping: Expedite development of a working prototype to be verified and validated.

      What are the notable risks and challenges?

      • Limited contextual understanding: AI may lack domain-specific knowledge or understanding of requirements.
      • Dependency: Overreliance on AI generated codes can affect developers' creativity.
      • Quality concerns: Generated code is untested and its alignment to coding and quality standards is unclear.

      How should teams prepare for code generation?

      It can be used to:

      • Build solutions without the technical expertise of traditional development.
      • Discover different solutions to address coding challenges.
      • Kickstart new development projects with prebuilt code.

      According to a survey conducted by Microsoft's GitHub, a staggering 92% of programmers were reported as using AI tools in their workflow (GitHub, 2023).

      Opportunity 3: Defect forecasting & debugging

      Predict and proactively address defects before they occur.

      What are the expected benefits?

      • Reduced maintenance cost: Find defects earlier in the delivery process, when it's cheaper to fix them.
      • Increased efficiency: Testing efforts can remain focused on critical and complex areas of solution.
      • Reduced risk: Find critical defects before the product is deployed to production.

      What are the notable risks and challenges?

      • False positives and negatives: Incorrect interpretation and scope of defect due to inadequate training of the Gen AI model.
      • Inadequate training: Training data does not reflect the complexity of the solutions code.
      • Not incorporating feedback: Gen AI models are not retrained in concert with solution changes.

      How should teams prepare for defect forecasting and debugging?

      It can be used to:

      • Perform static and dynamic code analysis to find vulnerabilities in the solution source code.
      • Forecast potential issues of a solution based on previous projects and industry trends.
      • Find root cause and suggest solutions to address found defects.

      Using AI technologies, developers can reduce the time taken to debug and test code by up to 70%, allowing them to finish projects faster and with greater accuracy (Aloa, 2023).

      Opportunity 4: Requirements documentation & elicitation

      Capturing, documenting, and analyzing function and nonfunctional requirements.

      What are the expected benefits?

      • Improve quality of requirements: Obtain different perspectives and contexts for the problem at hand and help identify ambiguities and misinterpretation of risks and stakeholder expectation.
      • Increased savings: Fewer resources are consumed in requirements elicitation activities.
      • Increased delivery confidence: Provide sufficient information for the solution delivery team to confidently estimate and commit to the delivery of the requirement.

      What are the notable risks and challenges?

      • Conflicting bias: Gen AI models may interpret the problem differently than how the stakeholders perceive it.
      • Organization-specific interpretation: Inability of the Gen AI models to accommodate unique interpretation of terminologies, standards, trends and scenarios.
      • Validation and review: Interpreting extracted insights requires human validation.

      How should teams prepare for requirements documentation & elicitation?

      It can be used to:

      • Document requirements in a clear and concise manner that is usable to the solution delivery team.
      • Analyze and test requirements against various user, business, and technical scenarios.

      91% of top businesses surveyed report having an ongoing investment in AI (NewVantage Partners, 2021).

      Opportunity 5: UI design and prototyping

      Analyze existing patterns and principles to generate design, layouts, and working solutions.

      What are the expected benefits?

      • Increased experimentation: Explore different approaches and tactics to solve a solution delivery problem.
      • Improved collaboration: Provide quick design layouts that can be reshaped based on stakeholder feedback.
      • Ensure design consistency: Enforce a UI/UX design standard for all solutions.

      What are the notable risks and challenges?

      • Misinterpretation of UX Requirements: Gen AI model incorrectly assumes a specific interpretation of user needs, behaviors, and problem.
      • Incorrect or missing requirements: Lead to extensive redesigns and iterations, adding to costs while hampering user experience.
      • Design creativity: May lack originality and specific brand aesthetics if not augmented well with human customizability and creativity.

      How should teams prepare for UI design and prototyping?

      It can be used to:

      • Visualize the solution through different views and perspectives such as process flows and use-case diagrams.
      • Create working prototypes that can be verified and validated by stakeholders and end users.

      A study by McKinsey & Company found that companies that invest in AI-driven design outperform their peers in revenue growth and customer experience metrics. They were found to achieve up to two times higher revenue growth than industry peers and up to 10% higher net promoter score (McKinsey & Company, 2018).

      Determine the importance of your opportunities by answering these questions

      Realizing the complete potential of Gen AI relies on effectively fostering its adoption and resulting changes throughout the entire solution delivery process.

      What are the challenges faced by your delivery teams that could be addressed by Gen AI?

      • Recognize the precise pain points, bottlenecks, or inefficiencies faced by delivery teams.
      • Include all stakeholders' perspectives during problem discovery and root cause analysis.

      What's holding back Gen AI adoption in the organization?

      • Apart from technical barriers, address cultural and organizational challenges and discuss how organizational change management strategies can mitigate Gen AI adoption risk.

      Are your objectives aligned with Gen AI capabilities?

      • Identify areas where processes can be modernized and streamlined with automation.
      • Evaluate the current capabilities and resources available within the organization to leverage Gen AI technologies effectively.

      How can Gen AI improve the entire solution delivery process?

      • Investigate and evaluate the improvements Gen AI can reasonably deliver, such as increased accuracy, quickened delivery cycles, improved code quality, or enhanced cross-functional collaboration.

      1.2.1 Align Gen AI opportunities to teams and capabilities

      1-3 hours

      1. Associate the Gen AI opportunities that can be linked to your system capabilities. These opportunities refer to the potential applications of generative AI techniques, such as code generation or synthetic data, to address specific challenges.
        1. Start by analyzing your system's requirements, constraints, and areas where Gen AI techniques can bring value. Identify the potential benefits of integrating Gen AI, such as increased productivity, or enhanced creativity.
        2. Next, discern potential risks or challenges, such as dependency or quality concerns, associated with the opportunity implementation.
      2. Record this information in the Gen AI Solution Delivery Readiness Assessment Tool.

      Output

      • Gen AI opportunity selection

      Participants

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Record the results in the Gen AI Solution Delivery Readiness Assessment Tool

      Keep an eye out for red flags

      Not all Gen AI opportunities are delivered and adopted the same. Some present a bigger risk than others.

      • Establishing vague targets and success criteria
      • Defining Gen AI as substitution of human capital
      • Open-source software not widely adopted or validated
      • High level of dependency on automation
      • Unadaptable cross-functional training across organization
      • Overlooking privacy, security, legal, and ethical implications
      • Lack of Gen AI expertise and understanding of good practices

      Step 1.3

      Assess your readiness for Gen AI

      Activities

      1.3.1 Assess your readiness for Gen AI.

      This step involves the following participants:

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Outcomes of this step

      • A completed Gen AI Readiness Assessment to confirm how prepared you are to embrace Gen AI in your solution delivery team.

      Prepare your SDLC* to leverage Gen AI

      As organizations evolve and adopt more tools and technology, their solution delivery processes become more complex. Process improvement is needed to simplify complex and undocumented software delivery activities and artifacts and prepare it for Gen AI. Gen AI scales process throughput and output quantity, but it multiplies the negative impact of problems the process already has.

      When is your process ready for Gen AI?

      • Solution value Ensures the accuracy and alignment of the committed feature and change requests to what the stakeholder truly expects and receives.
      • ThroughputDelivers new products, enhancements, and changes at a pace and frequency satisfactory to stakeholder expectations and meets delivery commitments.
      • Process governance Has clear ownership and appropriate standardization. The roles, activities, tasks, and technologies are documented and defined. At each stage of the process someone is responsible and accountable.
      • Process management Follows a set of development frameworks, good practices, and standards to ensure the solution and relevant artifacts are built, tested, and delivered consistently and repeatably.
      • Technical quality assurance – Accommodates committed non-functional requirements within the stage's outputs to ensure products meet technical excellence expectations.

      *software development lifecycle

      To learn more, visit Info-Tech's Modernize Your SDLC blueprint.

      To learn more, visit Info-Tech's Build a Winning Business Process Automation Playbook

      Assess the impacts from Gen AI changes

      Ensure that no stone is left unturned as you evaluate the fit of Gen AI and prepare your adoption and support plans.

      By shining a light on considerations that might have otherwise escaped planners and decision makers, an impact analysis is an essential component to Gen AI success. This analysis should answer the following questions on the impact to your solution delivery teams.

      1. Will the change impact how our clients/customers receive, consume, or engage with our products/services?
      2. Will there be an increase in operational costs, and a change to compensation and/or rewards?
      3. Will this change increase the workload and alter staffing levels?
      4. Will the vision or mission of the team change?
      5. Will a new or different set of skills be needed?
      6. Will the change span multiple locations/time zones?
      7. Are multiple products/services impacted by this change?
      8. Will the workflow and approvals be changed, and will there be a substantial change to scheduling and logistics?
      9. Will the tools of the team be substantially different?
      10. Will there be a change in reporting relationships?

      See our Master Organizational Change Management Practices blueprint for more information.

      Brace for impact

      A thorough analysis of change impacts will help your software delivery teams and change leaders:

      • Bypass avoidable problems.
      • Remove non-fixed barriers to success.
      • Acknowledge and minimize the impact of unavoidable barriers.
      • Identify and leverage potential benefits.
      • Measure the success of the change.

      Many key IT capabilities are required to successfully leverage Gen AI

      Portfolio Management

      An accurate and rationalized inventory of all Gen AI tools verifies they support the goals and abide to the usage policies of the broader delivery practice. This becomes critical when tooling is updated frequently and licenses and open- source community principles drastically change (e.g. after an acquisition).

      Quality Assurance

      Gen AI tools are routinely verified and validated to ensure outcomes are accurate, complete, and aligned to solution delivery quality standards. Models are retrained using lessons learned, new use cases, and updated training data.

      Security & Access Management

      Externally developed and trained Gen AI models may not include the measures, controls, and tactics you need to prevent vulnerabilities and protect against threats that are critical in your security frameworks, policies, and standards.

      Data Management & Governance

      All solution delivery data and artifacts can be transformed and consumed in various ways as they transit through solution delivery and Gen AI tools. Data integrations, structures, and definitions must be well-defined, governed, and monitored.

      OPERATIONAL SUPPORT

      Resources are available to support the ongoing operations of the Gen AI tool, including infrastructure, preparing training data, and managing integration with other tools. They are also prepared to recover backups, roll back, and execute recovery plans at a moment's notice.

      Apply Gen AI good practices in your solution delivery practice

      1. Keep the human in the loop.
        Gen AI models cannot produce high-quality content with 100% confidence. Keeping the human in the loop allows people to directly give feedback to the model to improve output quality.
      2. Strengthen prompt and query engineering.
        The value of the outcome is dependent on what is being asked. Good prompts and queries focus on creating the optimal input by selecting and phrasing the appropriate words, sentence structures, and punctuation to illustrate the focus, scope, problem, and boundaries.
      3. Thoughtfully prepare your training data.
        Externally hosted Gen AI tools may store your training data in their systems or use it to train their other models. Intellectual property and sensitive data can leak into third-party systems and AI models if it is not properly masked and sanitized.
      4. Build guardrails into your Gen AI models.
        Guardrails can limit the variability of any misleading Gen AI responses by defining the scope and bounds of the response, enforcing the policies of its use, and clarifying the context of its response.
      5. Monitor your operational costs.
        The cost breakdown will vary among the types of Gen AI solution and the vendor offerings. Cost per query, consultant fees, infrastructure hosting, and licensing costs are just a few cost factors. Open source can be an attractive cost-saving option, but you must be willing to invest in the roles to assume traditional vendor accountabilities.
      6. Check the licenses of your Gen AI tool.
        Each platform has licenses and agreements on how their solution can or cannot be used. They limit your ability to use the tool for commercial purposes or reproductions or may require you to purchase and maintain a specific license to use their solution and materials.

      See Build Your Generative AI Roadmap for more information.

      Assess your Gen AI readiness

      • Solution delivery team
        The team is educated on Gen AI, its use cases, and the tools that enable it. They have the skills and capacity to implement, create, and manage Gen AI.
      • Solution delivery process and tools
        The solution delivery process is documented, repeatable, and optimized to use Gen AI effectively. Delivery tools are configured to enable, leverage and manage Gen AI assets to improve their performance and efficiency.
      • Solution delivery artifacts
        Delivery artifacts (e.g. code, scripts, documents) that will be used to train and be leveraged by Gen AI tools are discoverable, accurate, complete, standardized, of sufficient quantity, optimized for Gen AI use, and stored in an accessible shared central repository.
      • Governance
        Defined policies, role definitions, guidelines, and processes that guide the implementation, development, operations, and management of Gen AI.
      • Vision and executive support
        Clear alignment of Gen AI direction, ambition, and objectives with broader business and IT priorities. Stakeholders support the Gen AI initiative and allocate human and financial resources for its implementation within the solution delivery team.
      • Operational support
        The capabilities to manage the Gen AI tools and ensure they support the growing needs of the solution delivery practice, such as security management, hosting infrastructure, risk and change management, and data and application integration.

      1.3.1 Assess your readiness for Gen AI

      1-3 hours

      1. Review the current state of your solution delivery teams including their capacity, skills and knowledge, delivery practices, and tools and technologies.
      2. Determine the readiness of your team to adopt Gen AI.
      3. Discuss the gaps that need to be filled to be successful with Gen AI.
      4. Record this information in the Gen AI Solution Delivery Readiness Assessment Tool.

      Record the results in the Gen AI Solution Delivery Readiness Assessment Tool

      Output

      • Gen AI Solution Delivery Readiness Assessment

      Participants

      • Applications VP
      • Applications Director
      • Solution Delivery Manager
      • Solution Delivery Team

      Recognize that Gen AI does not require a fully optimized solution delivery process

      1. Consideration; 2. Exploration; 3. Incorporation; 4. Proliferation; 5. Optimization.  Steps 3-5 are Recommended maturity levels to properly embrace Gen AI.

      To learn more, visit Info-Tech's Develop Your Value-First Business Process Automation (BPA) Strategy.

      Be prepared to take the next steps

      Deliver Gen AI to your solution delivery teams

      Modernize Your SDLC
      Efficient and effective SDLC practices are vital, as products need to readily adjust to evolving and changing business needs and technologies.

      Adopt Generative AI in Solution Delivery
      Generative AI can drive productivity and solution quality gains to your solution delivery teams. Level set expectations with the right use case to demonstrate its value potential.

      Select Your AI Vendor & Implementation Partner
      The right vendor and partner are critical for success. Build the selection criteria to shortlist the products and services that best meets the current and future needs of your teams.

      Drive Business Value With Off-the-Shelf AI
      Build a framework that will guide your teams through the selection of an off-the-shelf AI tool with a clear definition of the business case and preparations for successful adoption.

      Build Your Enterprise Application Implementation Playbook
      Your Gen AI implementation doesn't start with technology, but with an effective plan that your team supports and is aligned to broader stakeholder and sponsor priorities and goals.

      Build your Gen AI practice

      • Get Started With AI
      • AI Strategy & Generative AI Roadmap
      • AI Governance

      Related Info-Tech Research

      Build a Winning Business Process Automation Playbook
      Optimize and automate your business processes with a user-centric approach.

      Embrace Business Managed Applications
      Empower the business to implement their own applications with a trusted business-IT relationship.

      Application Portfolio Management Foundations
      Ensure your application portfolio delivers the best possible return on investment.

      Maximize the Benefits from Enterprise Applications with a Center of Excellence
      Optimize your organization's enterprise application capabilities with a refined and scalable methodology.

      Create an Architecture for AI
      Build your target state architecture from predefined best-practice building blocks.

      Deliver on Your Digital Product Vision
      Build a product vision your organization can take from strategy through execution.

      Enhance Your Solution Architecture Practices
      Ensure your software systems solution is architected to reflect stakeholders' short- and long-term needs.

      Apply Design Thinking to Build Empathy With the Business
      Use design thinking and journey mapping to make IT the business' go-to problem solver.

      Modernize Your SDLC
      Deliver quality software faster with new tools and practices.

      Drive Business Value With Off-the-Shelf AI
      A practical guide to ensure return on your off-the-shelf AI investment.

      Bibliography

      "Altran Helps Developers Write Better Code Faster with Azure AI." Microsoft, 2020.
      "Apply Design Thinking to Complex Teams, Problems, and Organizations." IBM, 2021.
      Bianca. "Unleashing the Power of AI in Code Generation: 10 Applications You Need to Know — AITechTrend." AITechTrend, 16 May 2023.
      Biggs, John. "Deep Code Cleans Your Code with the Power of AI." TechCrunch, 26 Apr 2018.
      "Chat GPT as a Tool for Business Analysis — the Brazilian BA." The Brazilian BA, 24 Jan 2023.
      Davenport, Thomas, and Randy Bean. "Big Data and AI Executive Survey 2019." New Vantage Partners, 2019.
      Davenport, Thomas, and Randy Bean. "Big Data and AI Executive Survey 2021." New Vantage Partners, 2021.
      Das, Tamal. "9 Best AI-Powered Code Completion for Productive Development." Geek flare, 5 Apr 2023.
      Gondrezick, Ilya. "Council Post: How AI Can Transform the Software Engineering Process." Forbes, 24 Apr 2020.
      "Generative AI Speeds up Software Development: Compass UOL Study." PR Newswire, 29 Mar 2023.
      "GitLab 2023 Global Develops Report Series." Gitlab, 2023.
      "Game Changer: The Startling Power Generative AI Is Bringing to Software Development." KPMG, 30 Jan 2023.
      "How AI Can Help with Requirements Analysis Tools." TechTarget, 28 July 2020.
      Indra lingam, Ashanta. "How Spotify Is Upleveling Their Entire Design Team." Framer, 2019.
      Ingle, Prathamesh. "Top Artificial Intelligence (AI) Tools That Can Generate Code to Help Programmers." Matchcoat, 1 Jan 2023.
      Kaur, Jagreet . "AI in Requirements Management | Benefits and Its Processes." Xenon Stack, 13 June 2023.
      Lange, Danny. "Game On: How Unity Is Extending the Power of Synthetic Data beyond the Gaming Industry." CIO, 17 Dec 2020.
      Lin, Ying. "10 Artificial Intelligence Statistics You Need to Know in 2020." OBERLO, 17 Mar. 2023.
      Mauran, Cecily. "Whoops, Samsung Workers Accidentally Leaked Trade Secrets via ChatGPT." Mashable, 6 Apr 2023.

      Modernize the Network

      • Buy Link or Shortcode: {j2store}501|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $16,499 Average $ Saved
      • member rating average days saved: 8 Average Days Saved
      • Parent Category Name: Network Management
      • Parent Category Link: /network-management
      • Business units, functions, and processes are inextricably intertwined with less and less tolerance for downtime.
      • Business demands change rapidly but the refresh horizon for infrastructure remains 5-7 years.
      • The number of endpoint devices the network is expected to support is growing geometrically but historic capacity planning grew linearly.
      • The business is unable to clearly define requirements, paralyzing planning.

      Our Advice

      Critical Insight

      • Build for your needs. Don’t fall into the trap of assuming what works for your neighbor, your peer, or your competitor will work for you.
      • Deliver on what your business knows it needs as well as what it doesn’t yet know it needs. Business leaders have business vision, but this vision won’t directly demand the required network capabilities to enable the business. This is where you come in.
      • Modern technologies are hampered by vintage processes. New technologies demand new ways of accomplishing old tasks.

      Impact and Result

      • Use a systematic approach to document all stakeholder needs and rely on the network technical staff to translate those needs into design constraints, use cases, features, and management practices.
      • Spend only on those emerging technologies that deliver features offering direct benefits to specific business goals and IT needs.
      • Solidify the business case for your network modernization project by demonstrating and quantifying the hard dollar value it provides to the business.

      Modernize the Network Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should modernize the enterprise network, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess the network

      Identify and prioritize stakeholder and IT/networking concerns.

      • Modernize the Network – Phase 1: Assess the Network
      • Network Modernization Workbook

      2. Envision the network of the future

      Learn about emerging technologies and identify essential features of a modernized network solution.

      • Modernize the Network – Phase 2: Envision Your Future Network
      • Network Modernization Technology Assessment Tool

      3. Communicate and execute the plan

      Compose a presentation for stakeholders and prepare the RFP for vendors.

      • Modernize the Network – Phase 3: Communicate and Execute the Plan
      • Network Modernization Roadmap
      • Network Modernization Executive Presentation Template
      • Network Modernization RFP Template
      [infographic]

      Workshop: Modernize the Network

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess the Network

      The Purpose

      Understand current stakeholder and IT needs pertaining to the network.

      Key Benefits Achieved

      Prioritized lists of stakeholder and IT needs.

      Activities

      1.1 Assess and prioritize stakeholder concerns.

      1.2 Assess and prioritize design considerations.

      1.3 Assess and prioritize use cases.

      1.4 Assess and prioritize network infrastructure concerns.

      1.5 Assess and prioritize care and control concerns.

      Outputs

      Current State Register

      2 Analyze Emerging Technologies and Identify Features

      The Purpose

      Analyze emerging technologies to determine whether or not to include them in the network modernization.

      Identify and shortlist networking features that will be part of the network modernization.

      Key Benefits Achieved

      An understanding of what emerging technologies are suitable for including in your network modernization.

      A prioritized list of features, aligned with business needs, that your modernized network must or should have.

      Activities

      2.1 Analyze emerging technologies.

      2.2 Identify features to support drivers, practices, and pain points.

      Outputs

      Emerging technology assessment

      Prioritize lists of modernized network features

      3 Plan for Future Capacity

      The Purpose

      Estimate future port, bandwidth, and latency requirements for all sites on the network.

      Key Benefits Achieved

      Planning for capacity ensures the network is capable of delivering until the next refresh cycle and beyond.

      Activities

      3.1 Estimate port, bandwidth, and latency requirements.

      3.2 Group sites according to capacity requirements.

      3.3 Create standardized capacity plans for each group.

      Outputs

      A summary of capacity requirements for each site in the network

      4 Communicate and Execute the Plan

      The Purpose

      Create a presentation to pitch the project to executives.

      Compose key elements of RFP.

      Key Benefits Achieved

      Communication to executives, summarizing the elements of the modernization project that business decision makers will want to know, in order to gain approval.

      Communication to vendors detailing the network solution requirements so that proposed solutions are aligned to business and IT needs.

      Activities

      4.1 Build the executive presentation.

      4.2 Compose the scope of work.

      4.3 Compose technical requirements.

      Outputs

      Executive Presentation

      Request for Proposal/Quotation

      Embed Privacy and Security Culture Within Your Organization

      • Buy Link or Shortcode: {j2store}379|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: 10 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance

      Engagement with privacy and security within organizations has not kept pace with the increasing demands from regulations. As a result, organizations often find themselves saying they support privacy and security engagement but struggling to create behavioral changes in their staff.

      However, with new privacy and security requirements proliferating globally, we can’t help but wonder how much longer we can carry on with this approach.

      Our Advice

      Critical Insight

      To truly take hold, privacy and security engagement must be supported by senior leadership, aligned with business objectives, and embedded within each of the organization’s operating groups and teams.

      Impact and Result

      • Develop a defined structure for privacy and security in the context of your organization, your obligations, and your objectives.
      • Align your business goals and strategy with privacy and security to obtain support from your senior leadership team.
      • Identify and implement a set of metrics to monitor the success of each of the six engagement enablers amongst your team.

      Embed Privacy and Security Culture Within Your Organization Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop a culture of privacy and security at your organization, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define privacy and security in the context of the organization

      Use the charter template to document the primary outcomes and objectives for the privacy and security engagement program within the organization and map the organizational structure to each of the respective roles to help develop a culture of privacy and security.

      • Privacy and Security Engagement Charter

      2. Map your privacy and security enablers

      This tool maps business objectives and key strategic goals to privacy and security objectives and attributes identified as a part of the overall engagement program. Leverage the alignment tool to ensure your organizational groups are mapped to their corresponding enablers and supporting metrics.

      • Privacy and Security Business Alignment Tool

      3. Identify and track your engagement indicators

      This document maps out the organization’s continued efforts in ensuring employees are engaged with privacy and security principles, promoting a strong culture of privacy and security. Use the playbook to document and present the organization’s custom plan for privacy and security culture.

      • Privacy and Security Engagement Playbook

      Infographic

      Workshop: Embed Privacy and Security Culture Within Your Organization

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Determine Drivers and Engagement Objectives

      The Purpose

      Understand the current privacy and security landscape in the organization.

      Key Benefits Achieved

      Targeted set of drivers from both a privacy and security perspective

      Activities

      1.1 Discuss key drivers for a privacy and security engagement program.

      1.2 Identify privacy requirements and objectives.

      1.3 Identify security requirements and objectives.

      1.4 Review the business context.

      Outputs

      Understanding of the role and requirements of privacy and security in the organization

      Privacy drivers and objectives

      Security drivers and objectives

      Privacy and security engagement program objectives

      2 Align Privacy and Security With the Business

      The Purpose

      Ensure that your privacy and security engagement program is positioned to obtain the buy-in it needs through business alignment.

      Key Benefits Achieved

      Direct mappings between a culture of privacy and security and the organization’s strategic and business objectives

      Activities

      2.1 Review the IT/InfoSec strategy with IT and the InfoSec team and map to business objectives.

      2.2 Review the privacy program and privacy strategic direction with the Privacy/Legal/Compliance team and map to business objectives.

      2.3 Define the four organizational groupings and map to the organization’s structure.

      Outputs

      Privacy and security objectives mapped to business strategic goals

      Mapped organizational structure to Info-Tech’s organizational groups

      Framework for privacy and security engagement program

      Initial mapping assessment within Privacy and Security Business Alignment Tool

      3 Map Privacy and Security Enablers to Organizational Groups

      The Purpose

      Make your engagement plan tactical with a set of enablers mapped to each of the organizational groups and privacy and security objectives.

      Key Benefits Achieved

      Measurable indicators through the use of targeted enablers that customize the organization’s approach to privacy and security culture

      Activities

      3.1 Define the privacy enablers.

      3.2 Define the security enablers.

      3.3 Map the privacy and security enablers to organizational structure.

      3.4 Revise and complete Privacy and Security Business Alignment Tool inputs.

      Outputs

      Completed Privacy and Security Engagement Charter.

      Completed Privacy and Security Business Alignment Tool.

      4 Identify and Select KPIs and Metrics

      The Purpose

      Ensure that metrics are established to report on what the business wants to see and what security and privacy teams have planned for.

      Key Benefits Achieved

      End-to-end, comprehensive program that ensures continued employee engagement with privacy and security at all levels of the organization.

      Activities

      4.1 Segment KPIs and metrics based on categories or business, technical, and behavioral.

      4.2 Select KPIs and metrics for tracking privacy and security engagement.

      4.3 Assign ownership over KPI and metric tracking and monitoring.

      4.4 Determine reporting cadence and monitoring.

      Outputs

      KPIs and metrics identified at a business, technical, and behavioral level for employees for continued growth

      Completed Privacy and Security Engagement Playbook

      Recruit IT Talent

      • Buy Link or Shortcode: {j2store}574|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $17,565 Average $ Saved
      • member rating average days saved: 8 Average Days Saved
      • Parent Category Name: Attract & Select
      • Parent Category Link: /attract-and-select
      • Changing workforce dynamics and increased transparency have shifted the power from employers to job seekers, stiffening the competition for talent.
      • Candidate expectations match high consumer expectations and affect the employer brand, the consumer brand, and overall organizational reputation. Delivering a positive candidate experience (CX2) is no longer optional.

      Our Advice

      Critical Insight

      • Think about your candidates as consumers. Truly understanding their needs will attract great talent and build positive brand perceptions.
      • The CX2 starts sooner than you think. It encompasses all candidate interactions with an organization and begins before the formal application process.
      • Don’t try to emulate competitors. By differentiating your CX2, you build a competitive advantage.

      Impact and Result

      • Design a candidate-centric talent acquisition process that addresses candidate feedback from both unsuccessful and successful candidates.
      • Use design-thinking principles to focus your redesign on moments that matter to candidates to reduce unnecessary work or ad-hoc initiatives that don’t matter to candidates.

      Recruit IT Talent Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should redesign your CX2, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Establish your current process and set redesign goals

      Map the organization’s current state for CX2 and set high-level objectives and metrics.

      • Win the War for Talent With a Killer Candidate Experience – Phase 1: Establish Your Current Process and Set Redesign Goals
      • Candidate Experience Project Charter
      • Talent Metrics Library
      • Candidate Experience Process Mapping Template
      • Candidate Experience Assessment Tool

      2. Use design thinking to assess the candidate experience

      Strengthen the candidate lifecycle by improving upon pain points through design thinking methods and assessing the competitive landscape.

      • Win the War for Talent With a Killer Candidate Experience – Phase 2: Use Design Thinking to Assess the Candidate Experience
      • Design Thinking Primer
      • Empathy Map Template
      • Journey Map Guide

      3. Redesign the candidate experience

      Create action, communications, and training plans to establish the redesigned CX2 with hiring process stakeholders.

      • Win the War for Talent With a Killer Candidate Experience – Phase 3: Redesign the Candidate Experience
      • Candidate Experience Best Practices Action Guide
      • Candidate Experience Action and Communication Plan
      • Candidate Experience Service Level Agreement Template

      4. Appendix

      Leverage data collection and workshop activities.

      • Win the War for Talent With a Killer Candidate Experience – Appendix: Data Collection and Workshop Activities
      • Candidate Experience Phase One Data Collection Guide
      [infographic]

      Workshop: Recruit IT Talent

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish Your Current Process and Set Redesign Goals

      The Purpose

      Assess the organization’s current state for CX2.

      Set baseline metrics for comparison with new initiatives.

      Establish goals to strengthen the CX2.

      Key Benefits Achieved

      Gained understanding of where the organization is currently.

      Established where the organization would like to be and goals to achieve the new state.

      Activities

      1.1 Review process map of current candidate lifecycle.

      1.2 Analyze qualitative and quantitative data gathered.

      1.3 Set organizational objectives and project goals.

      1.4 Set metrics to measure progress on high-level goals.

      Outputs

      Process map

      CX2 data analyzed

      Candidate Experience Project Charter

      2 Use Design Thinking to Assess the Candidate Experience

      The Purpose

      Apply design thinking methods to identify pain points in your candidate lifecycle.

      Assess the competition and analyze results.

      Empathize with candidates and their journey.

      Key Benefits Achieved

      Segments with pain points have been identified.

      Competitor offering and differentiation has been analyzed.

      Candidate thoughts and feelings have been synthesized.

      Activities

      2.1 Identify extreme users.

      2.2 Conduct an immersive empathy session or go through the process as if you were a target candidate.

      2.3 Identify talent competitors.

      2.4 Analyze competitive landscape.

      2.5 Synthesize research findings and create empathy map.

      2.6 Journey map the CX2.

      Outputs

      Extreme users identified

      Known and unknown talent competitor’s CX2 analyzed

      Empathy map created

      Journey map created

      3 Redesign the Candidate Experience

      The Purpose

      Create a communications and action plan and set metrics to measure success.

      Set expectations with hiring managers and talent acquisition specialists through a service level agreement.

      Key Benefits Achieved

      Action plan created.

      Metrics set to track progress and assess improvement.

      Service level agreement completed and expectations collaboratively set.

      Activities

      3.1 Assess each stage of the lifecycle.

      3.2 Set success metrics for priority lifecycle stages.

      3.3 Select actions from the Candidate Experience Best Practices Action Guide.

      3.4 Brainstorm other potential (organization-specific) solutions.

      3.5 Set action timeline and assign accountabilities.

      3.6 Customize service level agreement guidelines.

      Outputs

      CX2 lifecycle stages prioritized

      Metrics to measure progress set

      CX2 best practices selected

      Candidate Experience Assessment Tool

      Candidate Experience Action and Communication Plan

      Service level agreement guidelines.

      Develop and Implement a Security Incident Management Program

      • Buy Link or Shortcode: {j2store}316|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $105,346 Average $ Saved
      • member rating average days saved: 39 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Tracked incidents are often classified into ready-made responses that are not necessarily applicable to the organization. With so many classifications, tracking becomes inefficient and indigestible, allowing major incidents to fall through the cracks.
      • Outcomes of incident response tactics are not formally tracked or communicated, resulting in a lack of comprehensive understanding of trends and patterns regarding incidents, leading to being re-victimized by the same vector.
      • Having a formal incident response document to meet compliance requirements is not useful if no one is adhering to it.

      Our Advice

      Critical Insight

      • You will experience incidents. Don’t rely on ready-made responses. They’re too broad and easy to ignore. Save your organization response time and confusion by developing your own specific incident use cases.
      • Analyze, track, and review results of incident response regularly. Without a comprehensive understanding of incident trends and patterns, you can be re-victimized by the same attack vector.
      • Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and exchange information with other organizations to stay ahead of incoming threats.

      Impact and Result

      • Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident activities.
      • This blueprint will walk through the steps of developing a scalable and systematic incident response program relevant to your organization.

      Develop and Implement a Security Incident Management Program Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop and implement a security incident management program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare

      Equip your organization for incident response with formal documentation of policies and processes.

      • Develop and Implement a Security Incident Management Program – Phase 1: Prepare
      • Security Incident Management Maturity Checklist ‒ Preliminary
      • Information Security Requirements Gathering Tool
      • Incident Response Maturity Assessment Tool
      • Security Incident Management Charter Template
      • Security Incident Management Policy Template
      • Security Incident Management RACI Tool

      2. Operate

      Act with efficiency and effectiveness as new incidents are handled.

      • Develop and Implement a Security Incident Management Program – Phase 2: Operate
      • Security Incident Management Plan
      • Security Incident Runbook Prioritization Tool
      • Security Incident Management Runbook: Credential Compromise
      • Security Incident Management Workflow: Credential Compromise (Visio)
      • Security Incident Management Workflow: Credential Compromise (PDF)
      • Security Incident Management Runbook: Distributed Denial of Service
      • Security Incident Management Workflow: Distributed Denial of Service (Visio)
      • Security Incident Management Workflow: Distributed Denial of Service (PDF)
      • Security Incident Management Runbook: Malware
      • Security Incident Management Workflow: Malware (Visio)
      • Security Incident Management Workflow: Malware (PDF)
      • Security Incident Management Runbook: Malicious Email
      • Security Incident Management Workflow: Malicious Email (Visio)
      • Security Incident Management Workflow: Malicious Email (PDF)
      • Security Incident Management Runbook: Ransomware
      • Security Incident Management Workflow: Ransomware (Visio)
      • Security Incident Management Workflow: Ransomware (PDF)
      • Security Incident Management Runbook: Data Breach
      • Security Incident Management Workflow: Data Breach (Visio)
      • Security Incident Management Workflow: Data Breach (PDF)
      • Data Breach Reporting Requirements Summary
      • Security Incident Management Runbook: Third-Party Incident
      • Security Incident Management Workflow: Third-Party Incident (Visio)
      • Security Incident Management Workflow: Third-Party Incident (PDF)
      • Security Incident Management Runbook: Blank Template

      3. Maintain and optimize

      Manage and improve the incident management process by tracking metrics, testing capabilities, and leveraging best practices.

      • Develop and Implement a Security Incident Management Program – Phase 3: Maintain and Optimize
      • Security Incident Metrics Tool
      • Post-Incident Review Questions Tracking Tool
      • Root-Cause Analysis Template
      • Security Incident Report Template
      [infographic]

      Workshop: Develop and Implement a Security Incident Management Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Prepare Your Incident Response Program

      The Purpose

      Understand the purpose of incident response.

      Formalize the program.

      Identify key players and escalation points.

      Key Benefits Achieved

      Common understanding of the importance of incident response.

      Various business units becoming aware of their roles in the incident management program.

      Formalized documentation.

      Activities

      1.1 Assess the current process, obligations, scope, and boundaries of the incident management program.

      1.2 Identify key players for the response team and for escalation points.

      1.3 Formalize documentation.

      1.4 Prioritize incidents requiring preparation.

      Outputs

      Understanding of the incident landscape

      An identified incident response team

      A security incident management charter

      A security incident management policy

      A list of top-priority incidents

      A general security incident management plan

      A security incident response RACI chart

      2 Develop Incident-Specific Runbooks

      The Purpose

      Document the clear response procedures for top-priority incidents.

      Key Benefits Achieved

      As incidents occur, clear response procedures are documented for efficient and effective recovery.

      Activities

      2.1 For each top-priority incident, document the workflow from detection through analysis, containment, eradication, recovery, and post-incident analysis.

      Outputs

      Up to five incident-specific runbooks

      3 Maintain and Optimize the Program

      The Purpose

      Ensure the response procedures are realistic and effective.

      Identify key metrics to measure the success of the program.

      Key Benefits Achieved

      Real-time run-through of security incidents to ensure roles and responsibilities are known.

      Understanding of how to measure the success of the program.

      Activities

      3.1 Limited scope tabletop exercise.

      3.2 Discuss key metrics.

      Outputs

      Completed tabletop exercise

      Key success metrics identified

      Further reading

      Develop and Implement a Security Incident Management Program

      Create a scalable incident response program without breaking the bank.

      ANALYST PERSPECTIVE

      Security incidents are going to happen whether you’re prepared or not. Ransomware and data breaches are just a few top-of-mind threats that all organizations deal with. Taking time upfront to formalize response plans can save you significantly more time and effort down the road. When an incident strikes, don’t waste time deciding how to remediate. Rather, proactively identify your response team, optimize your response procedures, and track metrics so you can be prepared to jump to action.

      Céline Gravelines,
      Senior Research Analyst
      Security, Risk & Compliance Info-Tech Research Group

      Picture of Céline Gravelines

      Céline Gravelines,
      Senior Research Analyst
      Security, Risk & Compliance Info-Tech Research Group

      Our understanding of the problem

      This Research is Designed For

      • A CISO who is dealing with the following:
        • Inefficient use of time and money when retroactively responding to incidents, negatively affecting business revenue and workflow.
        • Resistance from management to adequately develop a formal incident response plan.
        • Lack of closure of incidents, resulting in being re-victimized by the same vector.

      This Research Will Help You

      • Develop a consistent, scalable, and usable incident response program that is not resource intensive.
      • Track and communicate incident response in a formal manner.
      • Reduce the overall impact of incidents over time.
      • Learn from past incidents to improve future response processes.

      This Research Will Also Assist

      • Business stakeholders who are responsible for the following:
      • Improving workflow and managing operations in the event of security incidents to reduce any adverse business impacts.
      • Ensuring that incident response compliance requirements are being adhered to.

      This Research Will Help Them

      • Efficiently allocate resources to improve incident response in terms of incident frequency, response time, and cost.
      • Effectively communicate expectations and responsibilities to users.

      Executive Summary

      Situation

      • Security incidents are inevitable, but how they’re dealt with can make or break an organization. Poor incident response negatively affects business practices, including workflow, revenue generation, and public image.
      • The incident response of most organizations is ad hoc at best. A formal management plan is rarely developed or adhered to, resulting in ineffective firefighting responses and inefficient allocation of resources.

      Complication

      • Tracked incidents are often classified into ready-made responses that are not necessarily applicable to the organization. With so many classifications, tracking becomes inefficient and indigestible, allowing major incidents to fall through the cracks.
      • Outcomes of incident response tactics are not formally tracked or communicated, resulting in a lack of comprehensive understanding of trends and patterns regarding incidents, leading to being revictimized by the same vector.
      • Having a formal incident response document to meet compliance requirements is not useful if no one is adhering to it.

      Resolution

      • Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident activities.
      • This blueprint will walk through the steps of developing a scalable and systematic incident response program relevant to your organization.

      Info-Tech Insight

      • You will experience incidents. Don’t rely on ready-made responses. They’re too broad and easy to ignore. Save your organization response time and confusion by developing your own specific incident use cases.
      • Analyze, track, and review results of incident response regularly. Without a comprehensive understanding of incident trends and patterns, you can be re-victimized by the same attack vector.
      • Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and exchange information with other organizations to stay ahead of incoming threats.

      Data breaches are resulting in major costs across industries

      Per capita cost by industry classification of benchmarked companies (measured in USD)

      This is a bar graph showing the per capita cost by industry classification of benchmarked companies(measured in USD). the companies are, in decreasing order of cost: Health; Financial; Services; Pharmaceutical; Technology; Energy; Education; Industrial; Entertainment; Consumer; Media; Transportation; Hospitality; Retail; Research; Public

      Average data breach costs per compromised record hit an all-time high of $148 (in 2018).
      (Source: IBM, “2018 Cost of Data Breach Study)”

      % of systems impacted by a data breach
      1%
      No Impact
      19%
      1-10% impacted
      41%
      11-30% impacted
      24%
      31-50% impacted
      15%
      > 50% impacted
      % of customers lost from a data breach
      61% Lost
      < 20%
      21% Lost 20-40% 8% Lost
      40-60%
      6% Lost
      60-80%
      4% Lost
      80-100%
      % of customers lost from a data breach
      58% Lost
      <20%
      25% Lost
      20-40%
      9% Lost
      40-60%
      5% Lost
      60-80%
      4% Lost
      80-100%

      Source: Cisco, “Cisco 2017 Annual Cybersecurity Report”

      Defining what is security incident management

      IT Incident

      Any event not a part of the standard operation of a service which causes, or may cause, the interruption to, or a reduction in, the quality of that service.

      Security Event:

      A security event is anything that happens that could potentially have information security implications.

      • A spam email is a security event because it may contain links to malware.
      • Organizations may be hit with thousands or perhaps millions of identifiable security events each day.
      • These are typically handled by automated tools or are simply logged.

      Security Incident:

      A security incident is a security event that results in damage such as lost data.

      • Incidents can also include events that don't involve damage but are viable risks.
      • For example, an employee clicking on a link in a spam email that made it through filters may be viewed as an incident.

      It’s not a matter of if you have a security incident, but when

      The increasing complexity and prevalence of threats have finally caught the attention of corporate leaders. Prepare for the inevitable with an incident response program.

      1. A formalized incident response program reduced the average cost of a data breach (per capita) from $148 to $134, while third-party involvement increased costs by $13.40.
      2. US organizations lost an average of $7.91 million per data breach as a result of increased customer attrition and diminished goodwill. Canada and the UK follow suit at $1.57 and $1.39 million, respectively.
      3. 73% of breaches are perpetrated by outsiders, 50% are the work of criminal groups, and 28% involve internal actors.
      4. 55% of companies have to manage fallout, such as reputational damage after a data breach.
      5. The average cost of a data breach increases by $1 million if left undetected for > 100 days.

      (Sources: IBM, “2018 Cost of Data Breach Study”; Verizon, “2017 Data Breach Investigations Report”; Cisco, “Cisco 2018 Annual Cybersecurity Report”)

      Threat Actor Examples

      The proliferation of hacking techniques and commoditization of hacking tools has enabled more people to become threat actors. Examples include:
      • Organized Crime Groups
      • Lone Cyber Criminals
      • Competitors
      • Nation States
      • Hacktivists
      • Terrorists
      • Former Employees
      • Domestic Intelligence Services
      • Current Employees (malicious and accidental)

      Benefits of an incident management program

      Effective incident management will help you do the following:

      Improve efficacy
      Develop structured processes to increase process consistency across the incident response team and the program as a whole. Expose operational weak points and transition teams from firefighting to innovating.

      Improve threat detection, prevention, analysis, and response
      Enhance your pressure posture through a structured and intelligence-driven incident handling and remediation framework.

      Improve visibility and information sharing
      Promote both internal and external information sharing to enable good decision making.

      Create and clarify accountability and responsibility
      Establish a clear level of accountability throughout the incident response program, and ensure role responsibility for all tasks and processes involved in service delivery.

      Control security costs
      Effective incident management operations will provide visibility into your remediation processes, enabling cost savings from misdiagnosed issues and incident reduction.

      Identify opportunities for continuous improvement
      Increase visibility into current performance levels and accurately identify opportunities for continuous improvement with a holistic measurement program.

      Impact

      Short term:
      • Streamlined security incident management program.
      • Formalized and structured response process.
      • Comprehensive list of operational gaps and initiatives.
      • Detailed response runbooks that predefine necessary operational protocol.
      • Compliance and audit adherence.
      Long term:
      • Reduced incident costs and remediation time.
      • Increased operational collaboration between prevention, detection, analysis, and response efforts.
      • Enhanced security pressure posture.
      • Improved communication with executives about relevant security risks to the business.
      • Preserved reputation and brand equity.

      Incident management is essential for organizations of any size

      Your incidents may differ, but a standard response ensures practical security.

      Certain regulations and laws require incident response to be a mandatory process in organizations.

      Compliance Standard Examples Description
      Federal Information Security Modernization Act (FISMA)
      • Organizations must have “procedures for detecting, reporting, and responding to security incidents” (2002).
      • They must also “inform operators of agency information systems about current and potential information security threats and vulnerabilities.”
      Federal Information Processing Standards (FIPS)
      • “Organizations must: (i) establish an operational incident handling capability for organizational information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities.”
      Payment Card Industry Data Security Standard (PCI DSS v3)
      • 12.5.3: “Establish, document, and distribute security incident response and escalation procedures to ensure timely and effective handling of all situations.”
      Health Insurance Portability and Accountability Act (HIPAA)
      • 164.308: Response and Reporting – “Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity; and document security incidents and their outcomes.”

      Security incident management is applicable to all verticals

      Examples:
      • Finance
      • Insurance
      • Healthcare
      • Public administration
      • Education services
      • Professional services
      • Scientific and technical services

      Maintain a holistic security operations program

      Legacy security operations centers (SOCs) fail to address gaps between data sources, network controls, and human capital. There is limited visibility and collaboration between departments, resulting in siloed decisions that do not support the best interests of the organization.

      Security operations is part of what Info-Tech calls a threat collaboration environment, where members must actively collaborate to address cyberthreats affecting the organization’s brand, business operation, and technology infrastructure on a daily basis.

      Prevent: Defense in depth is the best approach to protect against unknown and unpredictable attacks. Diligent patching and vulnerability management, endpoint protection, and strong human-centric security (amongst other tactics) are essential. Detect: There are two types of companies – those who have been breached and know it, and those who have been breached and don’t know it. Ensure that monitoring, logging, and event detection tools are in place and appropriate to your organizational needs.
      Analyze: Raw data without interpretation cannot improve security and is a waste of time, money, and effort. Establish a tiered operational process that not only enriches data but also provides visibility into your threat landscape. Respond: Organizations can’t rely on an ad hoc response anymore – don’t wait until a state of panic. Formalize your response processes in a detailed incident runbook to reduce incident remediation time and effort.

      Info-Tech’s incident response blueprint is one of four security operations initiatives

      Design and Implement a Vulnerability Management Program Vulnerability Management
      Vulnerability management revolves around the identification, prioritization, and remediation of vulnerabilities. Vulnerability management teams hunt to identify which vulnerabilities need patching and remediating.
      • Vulnerability Tracking Tool
      • Vulnerability Scanning Tool RFP Template
      • Penetration Test RFP Template
      • Vulnerability Mitigation Process Template
      Integrate Threat Intelligence Into Your Security Operations Vulnerability Management
      Vulnerability management revolves around the identification, prioritization, and remediation of vulnerabilities. Vulnerability management teams hunt to identify which vulnerabilities need patching and remediating.
      • Threat Intelligence Maturity Assessment Tool
      • Threat Intelligence RACI Tool
      • Threat Intelligence Management Plan Template
      • Threat Intelligence Policy Template
      • Threat Intelligence Alert Template
      • Threat Intelligence Alert and Briefing Cadence Schedule Template
      Develop Foundational Security Operations Processes Operations
      Security operations include the real-time monitoring and analysis of events based on the correlation of internal and external data sources. This also includes incident escalation based on impact. These analysts are constantly tuning and tweaking rules and reporting thresholds to further help identify which indicators are most impactful during the analysis phase of operations.
      • Security Operations Maturity Assessment Tool
      • Security Operations Event Prioritization Tool
      • Security Operations Efficiency Calculator
      • Security Operations Policy
      • In-House vs. Outsourcing Decision-Making Tool
      • Seccrimewareurity Operations RACI Tool
      • Security Operations TCO & ROI Comparison Calculator
      Develop and Implement a Security Incident Management Program Incident Response (IR)
      Effective and efficient management of incidents involves a formal process of analysis, containment, eradication, recovery, and post-incident activities. Incident response teams coordinate root cause and incident gathering while facilitating post-incident lessons learned. Incident response can provide valuable threat data that ties specific indicators to threat actors or campaigns.
      Security Incident Management Policy
      • Security Incident Management Plan
      • Incident Response Maturity Assessment Tool
      • Security Incident Runbook Prioritization Tool
      • Security Incident Management RACI Tool
      • Various Incident Management Runbooks

      Understand how incident response ties into related processes

      Info-Tech Resources:
      Business Continuity Plan Develop a Business Continuity Plan
      Disaster Recovery Plan Create a Right-Sized Disaster Recovery Plan
      Security Incident Management Develop and Implement a Security Incident Management Program
      Incident Management Incident and Problem Management
      Service Desk Standardize the Service Desk

      Develop and Implement a Security Incident Management Program – project overview

      1. Prepare 2. Operate 3. Maintain and Optimize
      Best-Practice Toolkit 1.1 Establish the Drivers, Challenges, and Benefits.

      1.2 Examine the Security Incident Landscape and Trends.

      1.3 Understand Your Security Obligations, Scope, and Boundaries.

      1.4 Gauge Your Current Process to Identify Gaps.

      1.5 Formalize the Security Incident Management Charter.

      1.6 Identify Key Players and Develop a Call Escalation Tree.

      1.7 Develop a Security Incident Management Policy.

      2.1 Understand the Incident Response Framework.

      2.2 Understand the Purpose of Runbooks.

      2.3 Prioritize the Development of Incident-Specific Runbooks.

      2.4 Develop Top-Priority Runbooks.

      2.5 Fill Out the Root-Cause Analysis Template.

      2.6 Customize the Post-Incident Review Questions Tracking Tool to Standardize Useful Questions for Lessons-Learned Meetings.

      2.7 Complete the Security Incident Report Template.

      3.1 Conduct Tabletop Exercises.

      3.2 Initialize a Security Incident Management Metrics Program.

      3.3 Leverage Best Practices for Continuous Improvement.

      Guided Implementations Understand the incident response process, and define your security obligations, scope, and boundaries.

      Formalize the incident management charter, RACI, and incident management policy.
      Use the framework to develop a general incident management plan.

      Prioritize and develop top-priority runbooks.
      Develop and facilitate tabletop exercises.

      Create an incident management metrics program, and assess the success of the incident management program.
      Onsite Workshop Module 1:
      Prepare for Incident Response
      Module 2:
      Handle Incidents
      Module 3:
      Review and Communicate Security Incidents
      Phase 1 Outcome:
    • Formalized stakeholder support
    • Security Incident Management Policy
    • Security Incident Management Charter
    • Call Escalation Tree
    • Phase 2 Outcome:
      • A generalized incident management plan
      • A prioritized list of incidents
      • Detailed runbooks for top-priority incidents
      Phase 3 Outcome:
      • A formalized tracking system for benchmarking security incident metrics.
      • Recommendations for optimizing your security incident management processes.

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities
      • Kick off and introductions.
      • High-level overview of weekly activities and outcomes.
      • Understand the benefits of security incident response management.
      • Formalize stakeholder support.
      • Assess your current process, obligations, and scope.
      • Develop RACI chart.
      • Define impact and scope.
      • Identify key players for the threat escalation protocol.
      • Develop a security incident response policy.
      • Develop a general security incident response plan.
      • Prioritize incident-specific runbook development.
      • Understand the incident response process.
      • Develop general and incident-specific call escalation trees.
      • Develop specific runbooks for your top-priority incidents (e.g. ransomware).
        • Detect the incident.
        • Analyze the incident.
        • Contain the incident.
        • Eradicate the root cause.
        • Recover from the incident.
        • Conduct post-incident analysis and communication.
      • Develop specific runbooks for your next top-priority incidents:
        • Detect the incident.
        • Analyze the incident.
        • Contain the incident.
        • Eradicate the root cause.
        • Recover from the incident.
        • Conduct post-incident analysis and communication.
      • Determine key metrics to track and report.
      • Develop post-incident activity documentation.
      • Understand best practices for both internal and external communication.
      • Finalize key deliverables created during the workshop.
      • Present the security incident response program to key stakeholders.
      • Workshop executive presentation and debrief.
      • Finalize main deliverables.
      • Schedule subsequent Analyst Calls.
      • Schedule feedback call.
      Deliverables
      • Security Incident Management Maturity Checklist ‒ Preliminary
      • Security Incident Management RACI Tool
      • Security Incident Management Policy
      • General incident management plan
      • Security Incident Management Runbook
      • Development prioritization
      • Prioritized list of runbooks
      • Understanding of incident handling process
      • Incident-specific runbooks for two incidents (including threat escalation criteria and Visio workflow)
      • Discussion points for review with response team
      • Incident-specific runbooks for two incidents (including threat escalation criteria and Visio workflow)
      • Discussion points for review with response team
      • Security Incident Metrics Tool
      • Post-Incident Review Questions Tracking Tool
      • Post-Incident Report Analysis Template
      • Root Cause Analysis Template
      • Post-Incident Review Questions Tracking Tool
      • Communication plans
      • Workshop summary documentation
    • All final deliverables
    • Measured value for Guided Implementations

      Engaging in GIs doesn’t just offer valuable project advice – it also results in significant cost savings.

      GI Purpose Measured Value
      Section 1: Prepare

      Understand the need for an incident response program.
      Develop your incident response policy and plan.
      Develop classifications around incidents.
      Establish your program implementation roadmap.

      Time, value, and resources saved using our classification guidance and templates: 2 FTEs*2 days*$80,000/year = $1,280
      Time, value, and resources saved using our classification guidance and templates:
      2 FTEs*5 days*$80,000/year = $3,200

      Section 2: Operate

      Prioritize runbooks and develop the processes to create your own incident response program:

    • Detect
    • Analyze
    • Contain
    • Eradicate
    • Recover
    • Post-Incident Activity
    • Time, value, and resources saved using our guidance:
      4 FTEs*10 days*$80,000/year = $12,800 (if done internally)

      Time, value, and resources saved using our guidance:
      1 consultant*15 days*$2,000/day = $30,000 (if done by third party)
      Section 3: Maintain and Optimize Develop methods of proper reporting and create templates for communicating incident response to key parties. Time, value, and resources saved using our guidance, templates, and tabletop exercises:
      2 FTEs*3 days*$80,000/year = $1,920
      Total Costs To just get an incident response program off the ground. $49,200

      Insurance company put incident response aside; executives were unhappy

      Organization implemented ITIL, but formal program design became less of a priority and turned more ad hoc.

      Situation

      • Ad hoc processes created management dissatisfaction around the organization’s ineffective responses to data breaches.
      • Because of the lack of formal process, an entirely new security team needed to be developed, costing people their positions.

      Challenges

      • Lack of criteria to categorize and classify security incidents.
      • Need to overhaul the long-standing but ineffective program means attempting to change mindsets, which can be time consuming.
      • Help desk is not very knowledgeable on security.
      • New incident response program needs to be in alignment with data classification policy and business continuity.
      • Lack of integration with MSSP’s ticketing system.

      Next steps:

      • Need to get stakeholder buy-in for a new program.
      • Begin to establish classification/reporting procedures.

      Follow this case study to Phase 1

      Phase 1

      Prepare

      Develop and Implement a Security Incident Management Program

      Phase 1: Prepare

      PHASE 1 PHASE 2 PHASE 3
      Prepare Operate Optimize

      This phase walks you through the following activities:

      1.1 Establish the drivers, challenges, and benefits.
      1.2 Examine the security incident landscape and trends.
      1.3 Understand your security obligations, scope, and boundaries.
      1.4 Gauge your current process to identify gaps.
      1.5 Formalize a security incident management charter.
      1.6 Identify key players and develop a call escalation tree.
      1.7 Develop a security incident management policy.

      This phase involves the following participants:

      • CISO
      • Security team
      • IT staff
      • Business leaders

      Outcomes of this phase

      • Formalized stakeholder support.
      • Security incident management policy.
      • Security incident management charter.
      • Call escalation tree.

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Prepare for Incident Response
      Proposed Time to Completion: 3 Weeks
      Step 1.1-1.3 Understand Incident Response Step 1.4-1.7 Begin Developing Your Program
      Start with an analyst kick-off call:
    • Discuss your current incident management status.
    • Review findings with analyst:
    • Review documents.
    • Then complete these activities…
      • Establish your security obligations, scope, and boundaries.
      • Identify the drivers, challenges, and benefits of formalized incident response.
      • Review any existing documentation.
      Then complete these activities…
      • Discuss further incident response requirements.
      • Identify key players for escalation and notifications.
      • Develop the policy.
      • Develop the plan.

      With these tools & templates:
      Security Incident Management Maturity Checklist ‒ Preliminary Information Security Requirements Gathering Tool

      With these tools & templates:
      Security Incident Management Policy
      Security Incident Management Plan
      Phase 1 Results & Insights:

      Ready-made incident response solutions often contain too much coverage: too many irrelevant cases that are not applicable to the organization are accounted for, making it difficult to sift through all the incidents to find the ones you care about. Develop specific incident use cases that correspond with relevant incidents to quickly identify the response process and eliminate ambiguity when handled by different individuals.

      Ice breaker: What is a security incident for your organization?

      1.1 Whiteboard Exercise – 60 minutes

      How do you classify various incident types between service desk, IT/infrastructure, and security?

      • Populate sticky notes with various incidents and assign them to the appropriate team.
        • Who owns the remediation? When are other groups involved? What is the triage/escalation process?
        • What other groups need to be notified (e.g. cyber insurance, Legal, HR, PR)?
        • Are there dependencies among incidents?
        • What are we covering in the scope of this project?

      Learn the right way to manage metrics

      • Parent Category Name: Improve Your Processes
      • Parent Category Link: /improve-your-processes

      Learn to use metrics in the right way. Avoid staff (subconciously) gaming the numbers, as it is only natural to try to achieve the objective. This is really a case of be careful what you wish for, you may just get it.

      Register to read more …

      Adapt Your Onboarding Process to a Virtual Environment

      • Buy Link or Shortcode: {j2store}577|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Attract & Select
      • Parent Category Link: /attract-and-select
      • For many, the WFH arrangement will be temporary, however, the uncertainty around the length of the pandemic makes it hard for organizations to plan long term.
      • As onboarding plans traditionally carry a six- to twelve-month outlook, the uncertainty around how long employees will be working remotely makes it challenging to determine how much of the current onboarding program needs to change. In addition, introducing new technologies to a remote workforce and planning training on how to access and effectively use these technologies is difficult.

      Our Advice

      Critical Insight

      • The COVID-19 pandemic has led to a virtual environment many organizations were not prepared for.
      • Focusing on critical parts of the onboarding process and leveraging current technology allows organizations to quickly adapt to the uncertainty and constant change.

      Impact and Result

      • Organizations need to assess their existing onboarding process and identify the parts that are critical.
      • Using the technology currently available, organizations must adapt onboarding to a virtual environment.
      • Develop a plan to re-assess and update the onboarding program according to the duration of the situation.

      Adapt Your Onboarding Process to a Virtual Environment Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess current onboarding processes

      Map the current onboarding process and identify the challenges to a virtual approach.

      • Adapt Your Onboarding Process to a Virtual Environment Storyboard
      • Virtual Onboarding Workbook
      • Process Mapping Guide

      2. Modify onboarding activities

      Determine how existing onboarding activities can be modified for a virtual environment.

      • Virtual Onboarding Ideas Catalog
      • Performance Management for Emergency Work-From-Home

      3. Launch the virtual onboarding process and plan to re-assess

      Finalize the virtual onboarding process and create an action plan. Continue to re-assess and iterate over time.

      • Virtual Onboarding Guide for HR
      • Virtual Onboarding Guide for Managers
      • HR Action and Communication Plan
      • Virtual Onboarding Schedule
      [infographic]

      Get Started With Artificial Intelligence

      • Buy Link or Shortcode: {j2store}345|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $24,469 Average $ Saved
      • member rating average days saved: 18 Average Days Saved
      • Parent Category Name: Business Intelligence Strategy
      • Parent Category Link: /business-intelligence-strategy
      • It is hard to not hear about how AI is revolutionizing the world. Across all industries, new applications for AI are changing the way humans work and how we interact with technologies that are used in modern organizations.
      • It can be difficult to see the specific applications of AI for your business. With all of the talk about the AI revolution, it can be hard to tie the rapidly changing and growing field of AI to your industry and organization and to determine which technologies are worth serious time and investment, and which ones are too early and not worth your time.

      Our Advice

      Critical Insight

      • AI is not a magic bullet. Instead, it is a tool for speeding up data-driven decision making. A more appropriate term for current AI technology is data-enabled, automated, adaptive decision support. Use when appropriate.
      • Garbage in, garbage out still applies to AI ‒ and it is even more relevant! AI technology has its foundations in data. Lots of it. Relevant, accurate, and timely data is essential to the effective use of AI.
      • AI is a rapidly evolving field – and this means that you can learn from others more effectively. Using a use case-based approach, you can learn from the successes and failures of others to more rapidly narrow down how AI can show value for you.

      Impact and Result

      • Understand what AI really means in practice.
      • Learn what others are doing in your industry to leverage AI technologies for competitive advantage.
      • Determine the use cases that best apply to your situation for maximum value from AI in your environment.
      • Define your first AI proof-of-concept (PoC) project to start exploring what AI can do for you.
      • Separate the signal from the noise when wading through the masses of marketing material around AI.

      Get Started With Artificial Intelligence Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to get up to speed with the rapid changes in AI technologies taking over the world today, review Info-Tech’s methodology, and understand the four ways we can support you on your AI journey.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Explore the possibilities

      Understand what AI really is in the modern world and how AI technologies impact the business functions.

      • Get Started With Artificial Intelligence – Phase 1: Explore the Possibilities

      2. Learn from your peers and give your AI a purpose

      Develop a good understanding of where AI is delivering value in your industry and other verticals. Determine the top three business goals to get value from your AI and give your AI a purpose.

      • Get Started With Artificial Intelligence – Phase 2: Learn From Your Peers and Give Your AI a Purpose

      3. Select your first AI PoC

      Brainstorm your AI PoC projects, prioritize and sequence your AI ideas, select your first AI PoC, and create a minimum viable business case for this use case.

      • Get Started With Artificial Intelligence – Phase 3: Select Your First AI PoC
      • Idea Reservoir Tool
      • Minimum Viable Business Case Document
      • Prototyping Workbook
      [infographic]

      Hire or Develop a World-Class CISO

      • Buy Link or Shortcode: {j2store}243|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • It is difficult to find a “unicorn”: a candidate who is already fully developed in all areas.
      • The role of the CISO has changed so much in the past three years, it is unclear what competencies are most important.
      • Current CISOs need to scope out areas of future development.

      Our Advice

      Critical Insight

      The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.

      Impact and Result

      • Clarify the competencies that are important to your organizational needs and use them to find a candidate with those specific strengths.
      • If you are a current CISO, complete a self-assessment and identify your high-priority competency gaps so you can actively work to develop those areas.
      • Create an actionable plan to develop the CISO’s capabilities and regularly reassess these items to ensure constant improvement.

      Hire or Develop a World-Class CISO Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Hire of Develop a World-Class CISO Deck – A step-by-step guide on finding or developing the CISO that best fits your organization.

      Use this blueprint to hire or develop a world-class Chief Information Security Officer (CISO) with the competencies that suit your specific organizational needs. Once you have identified the right candidate, create a plan to develop your CISO.

      • Hire or Develop a World-Class CISO – Phases 1-4

      2. CISO Core Competency Evaluation Tool – Determine which competencies your organization needs and which competencies your CISO needs to work on.

      This tool will help you determine which competencies are a priority for your organizational needs and which competencies your CISO needs to develop.

      • CISO Core Competency Evaluation Tool

      3. CISO Stakeholder Power Map Template – Visualize stakeholder and CISO relationships.

      Use this template to identify stakeholders who are key to your security initiatives and to understand your relationships with them.

      • CISO Stakeholder Power Map Template

      4. CISO Stakeholder Management Strategy Template – Develop a strategy to improve stakeholder and CISO relationships.

      Create a strategy to cultivate your stakeholder relationships and manage each relationship in the most effective way.

      • CISO Stakeholder Management Strategy Template

      5. CISO Development Plan Template – Develop a plan to support a world-class CISO.

      This tool will help you create and implement a plan to remediate competency gaps.

      • CISO Development Plan Template

      Infographic

      Further reading

      Hire or Develop a World-Class CISO

      Find a strategic and security-focused champion for your business.

      Analyst Perspective

      Create a plan to become the security leader of tomorrow

      The days are gone when the security leader can stay at a desk and watch the perimeter. The rapidly increasing sophistication of technology, and of attackers, has changed the landscape so that a successful information security program must be elastic, nimble, and tailored to the organization’s specific needs.

      The Chief Information Security Officer (CISO) is tasked with leading this modern security program, and this individual must truly be a Chief Officer, with a finger on the pulses of the business and security processes at the same time. The modern, strategic CISO must be a master of all trades.

      A world-class CISO is a business enabler who finds creative ways for the business to take on innovative processes that provide a competitive advantage and, most importantly, to do so securely.

      Cameron Smith, Research Lead, Security and Privacy

      Cameron Smith
      Research Lead, Security & Privacy
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • CEOs/CXOs are looking to hire or develop a senior security leader and aren’t sure where to start.
      • Conversely, security practitioners are looking to upgrade their skill set and are equally stuck in terms of what an appropriate starting point is.
      • Organizations are looking to optimize their security plans and move from a tactical position to a more strategic one.

      Common Obstacles

      • It is difficult to find a “unicorn”: a candidate who is already fully developed in all areas.
      • The role of the CISO has changed so much in the past three years, it is unclear what competencies are most important.
      • You are a current CISO and need to scope out your areas of future development.

      Info-Tech’s Approach

      • Clarify the competencies that are important to your organizational needs and use them to find a candidate with those specific strengths.
      • If you are a current CISO, complete a self-assessment and identify your high-priority competency gaps so you can actively work to develop those areas.
      • Create an actionable plan to develop the CISO’s capabilities and regularly reassess these items to ensure constant improvement.

      Info-Tech Insight
      The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.

      Your challenge

      This Info-Tech blueprint will help you hire and develop a strategic CISO

      • Security without strategy is a hacker’s paradise.
      • The outdated model of information security is tactical, where security acts as a watchdog and responds.
      • The new security leader must be strategic, striking a balance between being tactical and taking a proactive security stance. They must incorporate security into business practices from day one and enable secure adoption of new technologies and business practices.

      Around one in five organizations don’t have an individual with the sole responsibility for security1

      1 Navisite

      Info-Tech Insight
      Assigning security responsibilities to departments other than security can lead to conflicts of interest.

      Common obstacles

      It can be difficult to find the right CISO for your organization

      • The smaller the organization, the less likely it will have a CISO or equivalent position.
      • Because there is a shortage of qualified candidates, qualified CISOs can demand high salaries and many CISO positions will go unfilled.
      • It is easier for larger companies to attract top CISO talent, as they generally have more resources available.

      Source: Navisite

      Only 36% of small businesses have a CISO (or equivalent position).

      48% of mid-sized businesses have a CISO.

      90% of large organizations have a CISO.

      Source: Navisite

      Strategic versus tactical

      CISOs should provide leadership based on a strategic vision 1

      Strategic CISO Tactical CISO

      Proactive

      Focus is on protecting hyperdistributed business processes and data

      Elastic, flexible, and nimble

      Engaged in business design decisions

      Speaks the language of the audience (e.g. business, financial, technical)

      Reactive

      Focus is on protecting current state

      Perimeter and IT-centric approach

      Communicates with technical jargon

      1 Journal of Computer Science and Information Technology

      Info-Tech has identified three key behaviors of the world-class CISO

      To determine what is required from tomorrow’s security leader, Info-Tech examined the core behaviors that make a world-class CISO. These are the three areas that a CISO engages with and excels in.

      Later in this blueprint, we will review the competencies and skills that are required for your CISO to perform these behaviors at a high level.

      Align

      Aligning security enablement with business requirements

      Enable

      Enabling a culture of risk management

      Manage

      Managing talent and change

      Info-Tech Insight
      Through these three overarching behaviors, you can enable a security culture that is aligned to the business and make security elastic, flexible, and nimble to maintain the business processes.

      Info-Tech’s approach

      Understand what your organization needs in a CISO: Consider the core competencies of a CISO. Assess: Assess candidates' core competencies and the CISO's stakeholder relationships. Plan improvements: Identify resources to close competency gaps and an approach to improve stakeholder relationships. Executive development: Decide next steps to support your CISO moving forward and regularly reassess to measure progress.

      Info-Tech’s methodology to Develop or Hire a World-Class CISO

      1. Launch 2. Assess 3. Plan 4. Execute
      Phase Steps
      1. Understand the core competencies
      2. Measure security and business satisfaction and alignment
      1. Assess stakeholder relationships
      2. Assess core competencies
      1. Identify resources to address your CISO’s competency gaps
      2. Plan an approach to improve stakeholder relationships
      1. Decide next actions and support your CISO moving forward
      2. Regularly reassess to measure development and progress
      Phase Outcomes

      At the end of this phase, you will have:

      • Determined the current gaps in satisfaction and business alignment for your IT security program.
      • Identified the desired qualities in a security leader, specific to your current organizational needs.

      At the end of this phase, you will have:

      • Used the core competencies to help identify the ideal candidate.
      • Identified areas for development in your new or existing CISO.
      • Determined stakeholder relationships to cultivate.

      At the end of this phase, you will have:

      • Created a high-level plan to address any deficiencies.
      • Improved stakeholder relations.

      At the end of this phase, you will have:

      • Created an action-based development plan, including relevant metrics, due dates, and identified stakeholders. This plan is the beginning, not the end. Continually reassessing your organizational needs and revisiting this blueprint’s method will ensure ongoing development.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      CISO Core Competency Evaluation Tool

      Assess the competency levels of a current or prospective CISO and identify areas for improvement.

      Stakeholder Power Map Template

      Visualize the importance of various stakeholders and their concerns.

      Stakeholder Management Strategy Template

      Document a plan to manage stakeholders and track actions.

      Key deliverable:

      CISO Development Plan Template

      The CISO Development Plan Template is used to map specific activities and time frames for competency development to address gaps and achieve your goal.

      Strategic competencies will benefit the organization and the CISO

      Career development should not be seen as an individual effort. By understanding the personal core competencies that Info-Tech has identified, the individual wins by developing relevant new skills and the organization wins because the CISO provides increased value.

      Organizational Benefits Individual Benefits
      • Increased alignment between security and business objectives
      • Development of information security that is elastic, nimble, and flexible for the business
      • Reduction in wasted efforts and resources, and improvement in efficiency of security and the organization as a whole
      • True synergy between security and business stakeholders, where the goals of both groups are being met
      • Increased opportunity as you become a trusted partner within your organization
      • Improved relationships with peers and stakeholders
      • Less resistance and more support for security initiatives
      • More involvement and a stronger role for security at all levels of the organization

      Measured value of a world-class CISO

      Organizations with a CISO saw an average of $145,000 less in data breach costs.1

      However, we aren’t talking about hiring just any CISO. This blueprint seeks to develop your CISO’s competencies and reach a new level of effectiveness.

      Organizations invest a median of around $375,000 annually in their CISO.2 The CISO would have to be only 4% more effective to represent $15,000 more value from this position. This would offset the cost of an Info-Tech workshop, and this conservative estimate pales in comparison to the tangible and intangible savings as shown below.

      Your specific benefits will depend on many factors, but the value of protecting your reputation, adopting new and secure revenue opportunities, and preventing breaches cannot be overstated. There is a reason that investment in information security is on the rise: Organizations are realizing that the payoff is immense and the effort is worthwhile.

      Tangible cost savings from having a world-class CISO Intangible cost savings from having a world-class CISO
      • Cost savings from incident reduction.
      • Cost savings achieved through optimizing information security investments, resulting in savings from previously misdiagnosed issues.
      • Cost savings from ensuring that dollars spent on security initiatives support business strategy.
      • More opportunities to create new business processes through greater alignment between security and business.
      • Improved reputation and brand equity achieved through a proper evaluation of the organization’s security posture.
      • Continuous improvement achieved through a good security assessment and measurement strategy.
      • Ability to plan for the future since less security time will be spent firefighting and more time will be spent engaged with key stakeholders.

      1 IBM Security
      2 Heidrick & Struggles International, Inc.

      Case Study

      In the middle of difficulty lies opportunity

      SOURCE
      Kyle Kennedy
      CISO, CyberSN.com

      Challenge
      The security program identified vulnerabilities at the database layer that needed to be addressed.

      The decision was made to move to a new vendor. There were multiple options, but the best option in the CISO’s opinion was a substantially more expensive service that provided more robust protection and more control features.

      The CISO faced the challenge of convincing the board to make a financial investment in his IT security initiative to implement this new software.

      Solution
      The CISO knew he needed to express this challenge (and his solution!) in a way that was meaningful for the executive stakeholders.

      He identified that the business has $100 million in revenue that would move through this data stream. This new software would help to ensure the security of all these transactions, which they would lose in the event of a breach.

      Furthermore, the CISO identified new business plans in the planning stage that could be protected under this initiative.

      Results
      The CISO was able to gain support for and implement the new database platform, which was able to protect current assets more securely than before. Also, the CISO allowed new revenue streams to be created securely.

      This approach is the opposite of the cautionary tales that make news headlines, where new revenue streams are created before systems are put in place to secure them.

      This proactive approach is the core of the world-class CISO.

      Info-Tech offers various levels of support to best suit your needs

      Guided Implementation

      What does a typical GI on this topic look like?

      Launch Assess Plan Execute

      Call #1: Review and discuss CISO core competencies.

      Call #2: Discuss Security Business Satisfaction and Alignment diagnostic results.

      Call #3: Discuss the CISO Stakeholder Power Map Template and the importance of relationships.

      Call #4: Discuss the CISO Core Competency Evaluation Tool.

      Call #5: Discuss results of the CISO Core Competency Evaluation and identify resources to close gaps.

      Call #6: Review organizational structure and key stakeholder relationships.

      Call #7: Discuss and create your CISO development plan and track your development

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 6 to 10 calls over the course of 3 to 6 months.

      Phase 1

      Launch

      Phase 1
      1.1 Understand Core Competencies
      1.2 Measure Security and Business Satisfaction and Alignment

      Phase 2
      2.1 Assess Stakeholder Relationships
      2.2 Assess the Core Competencies

      Phase 3
      3.1 Identify Resources to Address Competency Gaps
      3.2 Plan Approach to Improve Stakeholder Relationships

      Phase 4
      4.1 Decide Next Actions and Support Your CISO Moving Forward
      4.2 Regularly Reassess to Measure Development and Progress

      This phase will walk you through the following activities:

      • Review and understand the core competencies of a world-class CISO.
      • Launch your diagnostic survey.
      • Evaluate current business satisfaction with IT security.
      • Determine the competencies that are valuable to your IT security program’s needs.

      Hire or Develop a World-Class CISO

      Case study

      Mark Lester
      InfoSec Manager, SC Ports Authority

      An organization hires a new Information Security Manager into a static and well-established IT department.

      Situation: The organization acknowledges the need for improved information security, but there is no framework for the Security Manager to make successful changes.

      Challenges Next Steps
      • The Security Manager is an outsider in a company with well-established habits and protocols. He is tasked with revamping the security strategy to create unified threat management.
      • Initial proposals for information security improvements are rejected by executives. It is a challenge to implement changes or gain support for new initiatives.
      • The Security Manager will engage with individuals in the organization to learn about the culture and what is important to them.
      • He will assess existing misalignments in the business so that he can target problems causing real pains to individuals.

      Follow this case study throughout the deck to see this organization’s results

      Step 1.1

      Understand the Core Competencies of a World-Class CISO

      Activities

      Review core competencies the security leader must develop to become a strategic business partner

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step
      Analysis and understanding of the eight strategic CISO competencies required to become a business partner

      Launch

      Core competencies

      Info-Tech has identified eight core competencies affecting the CISO’s progression to becoming a strategic business partner.

      Business Acumen
      A CISO must focus primarily on the needs of the business.

      Leadership
      A CISO must be a security leader and not simply a practitioner.

      Communication
      A CISO must have executive communication skills

      Technical Knowledge
      A CISO must have a broad technical understanding.

      Innovative Problem Solving
      A good CISO doesn’t just say “no,” but rather finds creative ways to say “yes.”

      Vendor Management
      Vendor and financial management skills are critical to becoming a strategic CISO.

      Change Management
      A CISO improves security processes by being an agent of change for the organization.

      Collaboration
      A CISO must be able to use alliances and partnerships strategically.

      1.1 Understand the core competencies a CISO must focus on to become a strategic business partner

      < 1 hour

      Over the next few slides, review each world-class CISO core competency. In Step 1.2, you will determine which competencies are a priority for your organization.

      CISO Competencies Description
      Business Acumen

      A CISO must focus primarily on the needs of the business and how the business works, then determine how to align IT security initiatives to support business initiatives. This includes:

      • Contributing to business growth with an understanding of the industry, core functions, products, services, customers, and competitors.
      • Understanding the business’ strategic direction and allowing it to securely capitalize on opportunities.
      • Understanding the key drivers of business performance and the use of sound business practice.
      Leadership

      A CISO must be a security leader, and not simply a practitioner. This requires:

      • Developing a holistic view of security, risk, and compliance for the organization.
      • Fostering a culture of risk management.
      • Choosing a strong team. Having innovative and reliable employees who do quality work is a critical component of an effective department.
        • This aspect involves identifying talent, engaging your staff, and managing their time and abilities.

      1.1 Understand the core competencies (continued)

      CISO Competencies Description
      Communication

      Many CISOs believe that using technical jargon impresses their business stakeholders – in fact, it only makes business stakeholders become confused and disinterested. A CISO must have executive communication skills. This involves:

      • Clearly communicating with business leaders in meaningful language (i.e. business, financial, social) that they understand by breaking down the complexities of IT security into simple and relatable concepts.
      • Not using acronyms or technological speak. Easy-to-understand translations will go a long way.
      • Strong public speaking and presentation abilities.
      Technical Knowledge

      A CISO must have a broad technical understanding of IT security to oversee a successful security program. This includes:

      • Understanding key security and general IT technologies and processes.
      • Assembling a complementary team, because no individual can have deep knowledge in all areas.
      • Maintaining continuing education to stay on top of emerging technologies and threats.

      1.1 Understand the core competencies (continued)

      CISO Competencies Description
      Innovative Problem Solving

      A good CISO doesn’t just say “no,” but rather finds creative ways to say “yes.” This can include:

      • Taking an active role in seizing opportunities created by emerging technologies.
      • Facilitating the secure implementation of new, innovative revenue models.
      • Developing solutions for complex business problems that require creativity and ingenuity.
      • Using information and technology to drive value around the customer experience.
      Vendor Management

      With the growing use of “anything as a service,” negotiation, vendor, and financial management skills are critical to becoming a strategic CISO.

      • The CISO must be able to evaluate service offerings and secure favorable contracts with the right provider. It is about extracting the maximum value from vendors for the dollars you are spending.
      • Vendor products must be aligned with future business plans to create maximum ongoing value.
      • The CISO must develop financial management skills. This includes the ability to calculate total cost of ownership, return on investment, and project spending over multiyear business plans.

      1.1 Understand the core competencies (continued)

      CISO Competencies Description
      Change Management

      A world-class CISO improves security processes by being an agent of change for the organization. This involves:

      • Leading, guiding, and motivating teams to adopt a responsible risk management culture.
      • Communicating important and complex ideas in a persuasive way.
      • Demonstrating an ability to change themselves and taking the initiative in adopting more efficient behaviors.
      • Handling unplanned change, such as unforeseen attacks or personnel changes, in a professional and proactive manner.
      Collaboration

      A CISO must be able to use alliances and partnerships strategically to benefit both the business and themselves. This includes:

      • Identifying formal and informal networks and constructive relationships to enable security development.
      • Leveraging stakeholders to influence positive outcomes for the organization.
      • Getting out of the IT or IT security sphere and engaging relationships in diverse areas of the organization.

      Step 1.2

      Evaluate satisfaction and alignment between the business and IT security

      Activities

      • Conduct the Information Security Business Satisfaction and Alignment diagnostic
      • Use your results as input into the CISO Core Competency Evaluation Tool

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step
      Determine current gaps in satisfaction and alignment between information security and your organization.

      If seeking to hire/develop a CISO: Your diagnostic results will help develop a profile of the ideal CISO candidate to use as a hiring and interview guide.

      If developing a current CISO, use your diagnostic results to identify existing competency gaps and target them for improvement.

      For the CISO seeking to upgrade capabilities: Use the core competencies guide to self-assess and identify competencies that require improvement.

      Launch

      1.2 Get started by conducting Info-Tech’s Information Security Business Satisfaction and Alignment diagnostic

      Suggested Time: One week for distribution, completion, and collection of surveys
      One-hour follow-up with an Info-Tech analyst

      The primary goal of IT security is to protect the organization from threats. This does not simply mean bolting everything down, but it means enabling business processes securely. To do this effectively requires alignment between IT security and the overall business.

      • Once you have completed the diagnostic, call Info-Tech to review your results with one of our analysts.
      • The results from this assessment will provide insights to inform your entries in the CISO Core Competency Evaluation Tool.

      Call an analyst to review your results and provide you with recommendations.

      Info-Tech Insight
      Focus on the high-priority competencies for your organization. You may find a candidate with perfect 10s across the board, but a more pragmatic strategy is to find someone with strengths that align with your needs. If there are other areas of weakness, then target those areas for development.

      1.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to understand your organizational needs

      After completing the Info-Tech diagnostic, use the CISO Core Competency Evaluation Tool to determine which CISO competencies are a priority for your organization.

      • Your diagnostic results will indicate where your information security program is aligned well or poorly with your business.
      • For example, the diagnostic may show significant misalignment between information security and executives over the level of external compliance. The CISO behavior that would contribute to solving this is aligning security enablement with business requirements.
        • This misalignment may be due to a misunderstanding by either party. The competencies that will contribute to resolving this are communication, technical knowledge, and business acumen.
        • This mapping method is what will be used to determine which competencies are most important for your needs at the present moment.

      Download the CISO Core Competency Evaluation Tool

      1.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to understand your organizational needs

      After completing the Info-Tech diagnostic, use the CISO Core Competency Evaluation Tool to determine which CISO competencies are a priority for your organization.

      1. Starting on Tab 2: CISO Core Competencies, use your understanding of each competency from section 1.1 along with the definitions described in the tool.
        • For each competency, assign a degree of importance using the drop-down menu in the second column from the right.
        • Importance ratings will range from not at all important at the low end to critically important at the high end.
        • Your importance score will be influenced by several factors, including:
          • The current alignment of your information security department.
          • Your organizational security posture.
          • The size and structure of your organization.
          • The existing skills and maturity within your information security department.

      Download the CISO Core Competency Evaluation Tool

      1.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to understand your organizational needs

      After completing the Info-Tech diagnostic, use the CISO Core Competency Evaluation Tool to determine which CISO competencies are a priority for your organization.

      1. Still on Tab 2. CISO Core Competencies, you will now assign a current level of effectiveness for each competency.
        • This will range from foundational at a low level of effectiveness up to capable, then inspirational, and at the highest rating, transformational.
        • Again, this rating will be very specific to your organization, depending on your structure and your current employees.
        • Fundamentally, these scores will reflect what you want to improve in the area of information security. This is not an absolute scale, and it will be influenced by what skills you want to support your goals and direction as an organization.

      Download the CISO Core Competency Evaluation Tool

      Phase 2

      Assess

      Phase 1
      1.1 Understand Core Competencies
      1.2 Measure Security and Business Satisfaction and Alignment

      Phase 2
      2.1 Assess Stakeholder Relationships
      2.2 Assess the Core Competencies

      Phase 3
      3.2 Plan Approach to Improve Stakeholder Relationships

      Phase 4
      4.1 Decide Next Actions and Support Your CISO Moving Forward
      4.2 Regularly Reassess to Measure Development and Progress

      This phase will walk you through the following activities:

      • Use the CISO Core Competency Evaluation Tool to create and implement an interview guide.
      • Assess and analyze the core competencies of your prospective CISOs. Or, if you are a current CISO, use the CISO Core Competency Evaluation Tool as a self-analysis and identify areas for personal development.
      • Evaluate the influence, impact, and support of key executive business stakeholders using the CISO Stakeholder Power Map Template.

      Hire or Develop a World-Class CISO

      Case study

      Mark Lester
      InfoSec Manager, SC Ports Authority

      The new Security Manager engages with employees to learn the culture.

      Outcome: Understand what is important to individuals in order to create effective collaboration. People will engage with a project if they can relate it to something they value.

      Actions Next Steps
      • The Security Manager determines that he must use low-cost small wins to integrate with the organizational culture and create trust and buy-in and investment will follow.
      • The Security Manager starts a monthly newsletter to get traction across the organization, create awareness of his mandate to improve information security, and establish himself as a trustworthy partner.
      • The Security Manager will identify specific ways to engage and change the culture.
      • Create a persuasive case for investing in information security based on what resonates with the organization.

      Follow this case study throughout the deck to see this organization’s results

      Step 2.1

      Identify key stakeholders for the CISO and assess current relationships

      Activities

      Evaluate the power, impact, and support of key stakeholders

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step

      • Power map of executive business stakeholders
      • Evaluation of each stakeholder in terms of influence, impact, and current level of support

      Assess

      Identify key stakeholders who own business processes that intersect with security processes

      Info-Tech Insight
      Most organizations don’t exist for the sole purpose of doing information security. For example, if your organization is in the business of selling pencils, then information security is in business to enable the selling of pencils. All the security in the world is meaningless if it doesn’t enable your primary business processes. The CISO must always remember the fundamental goals of the business.

      The above insight has two implications:

      1. The CISO needs to understand the key business processes and who owns them, because these are the people they will need to collaborate with. Like any C-level, the CISO should be one of the most knowledgeable people in the organization regarding business processes.
      2. Each of these stakeholders stands to win or lose depending on the performance of their process, and they can act to either block or enable your progress.
        • To work effectively with these stakeholders, you must learn what is important to them, and pose your initiatives so that you both benefit.

      When people are not receptive to the CISO, it’s usually because the CISO has not been part of the discussion when plans were being made. This is the heart of proactivity.

      You need to be involved from the start … from the earliest part of planning.

      The job is not to come in late and say “No” ... the job is to be involved early and find creative and intelligent ways to say “Yes.”

      The CISO needs to be the enabling security asset that drives business.

      – Elliot Lewis, CEO at Keyavi Data

      Evaluate the importance of business stakeholders and the support necessary from them

      The CISO Stakeholder Power Map Template is meant to provide a visualization of the CISO’s relationships within the organization. This should be a living document that can be updated throughout the year as relationships develop and the structure of an organization changes.

      At a glance, this tool should show:

      • How influential each stakeholder is within the company.
      • How supportive they currently are of the CISO’s initiatives.
      • How strongly each person is impacted by IT security activities.

      Once this tool has been created, it provides a good reference as the CISO works to develop lagging relationships. It shows the landscape of influence and impact within the organization, which may help to guide the CISO’s strategy in the future.

      Evaluate the importance of business stakeholders and the support necessary from them

      Download the CISO Stakeholder Power Map Template

      Evaluate the importance of business stakeholders and the support necessary from them

      1. Identify key stakeholders.
        1. Focus on owners of important business processes.
      2. Evaluate and map each stakeholder in terms of:
        1. Influence (up/down)
        2. Support (left/right)
        3. Impact (size of circle)
        4. Involvement (color of circle)
      3. Decide whether the level of support from each stakeholder needs to change to facilitate success.

      Evaluate the importance of business stakeholders and the support necessary from them

      Info-Tech Insight
      Some stakeholders must work closely with your incoming CISO. It is worth consideration to include these individuals in the interview process to ensure you will have partners that can work well together. This small piece of involvement early on can save a lot of headache in the future.

      Where can you find your desired CISO?

      Once you know which competencies are a priority in your new CISO, the next step is to decide where to start looking. This person may already exist in your company.

      Internal

      Take some time to review your current top information security employees or managers. It may be immediately clear that certain people will or will not be suitable for the CISO role. For those that have potential, proceed to Step 2.2 to map their competencies.

      Recruitment

      If you do not have any current employees that will fit your new CISO profile, or you have other reasons for wanting to bring in an outside individual, you can begin the recruitment process. This could start by posting the position for applications or by identifying and targeting specific candidates.

      Ready to start looking for your ideal candidate? You can use Info-Tech’s Chief Information Security Officer job description template.

      Use the CISO job description template

      Alternatives to hiring a CISO

      Small organizations are less able to muster the resources required to find and retain a CISO,

      Technical Counselor Seat

      In addition to having access to our research and consulting services, you can acquire a Technical Counselor Seat from our Security & Risk practice, where one of our senior analysts would serve with you on a retainer. You may find that this option saves you the expense of having to hire a new CISO altogether.

      Virtual CISO

      A virtual CISO, or vCISO, is essentially a “CISO as a service.” A vCISO provides an organization with an experienced individual that can, on a part-time basis, lead the organization’s security program through policy and strategy development.

      Why would an organization consider a vCISO?

      • A vCISO can provide services that are flexible, technical, and strategic and that are based on the specific requirements of the organization.
      • They can provide a small organization with program maturation within the organization’s resources.
      • They can typically offer depth of experience beyond what a small business could afford if it were to pursue a full-time CISO.

      Source: InfoSec Insights by Sectigo Store

      Why would an organization not consider a vCISO?

      • The vCISO’s attention is divided among their other clients.
      • They won’t feel like a member of your organization.
      • They won’t have a deep understanding of your systems and processes.

      Source: Georgia State University

      Step 2.2

      Assess CISO candidates and evaluate their current competency

      Activities

      Assess CISO candidates in terms of desired core competencies

      or

      Self-assess your personal core competencies

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO

      or

      • Current CISO seeking to upgrade capabilities

      and

      • Any key stakeholders or collaborators you choose to include in the assessment process

      Outcomes of this step

      • You have assessed your requirements for a CISO candidate.
      • The process of hiring is under way, and you have decided whether to hire a CISO, develop a CISO, or consider a Counselor Seat as another option.

      Assess

      2.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to assess your CISO candidate

      Use Info-Tech’s CISO Core Competency Evaluation Tool to assess your CISO candidate

      Download the CISO Core Competency Evaluation Tool

      Info-Tech Insight
      The most important competencies should be your focus. Unless you are lucky enough to find a candidate that is perfect across the board, you will see some areas that are not ideal. Don’t forget the importance you assigned to each competency. If a candidate is ideal in the most critical areas, you may not mind that some development is needed in a less important area.

      2.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to evaluate your candidates

      After deciding the importance of and requirements for each competency in Phase 1, assess your CISO candidates.

      Your first pass on this tool will be to look at internal candidates. This is the develop a CISO option.

      1. In the previous phase, you rated the Importance and Current Effectiveness for each competency in Tab 2. CISO Core Competencies. In this step, use Tab 3. Gap Analysis to enter a Minimum Level and a Desired Level for each competency. Keep in mind that it may be unrealistic to expect a candidate to be fully developed in all aspects.
      2. Next, enter a rating for your candidate of interest for each of the eight competencies.
      3. This scorecard will generate an overall suitability score for the candidate. The color of the output (from red to green) indicates the suitability, and the intensity of the color indicates the importance you assigned to that competency.

      Download the CISO Core Competency Evaluation Tool

      2.2 Use Info-Tech’s CISO Core Competency Evaluation Tool to evaluate your candidates

      • If the internal search does not identify a suitable candidate, you will want to expand your search.
      • Repeat the scoring process for external candidates until you find your new CISO.
      • You may want to skip your external search altogether and instead contact Info-Tech for more information on our Counselor Seat options.

      Download the CISO Core Competency Evaluation Tool

      Phase 3

      Plan

      Phase 1
      1.1 Understand Core Competencies
      1.2 Measure Security and Business Satisfaction and Alignment

      Phase 2
      2.1 Assess Stakeholder Relationships
      2.2 Assess the Core Competencies

      Phase 3
      3.1 Identify Resources to Address Competency Gaps
      3.2 Plan Approach to Improve Stakeholder Relationships

      Phase 4
      4.1 Decide Next Actions and Support Your CISO Moving Forward
      4.2 Regularly Reassess to Measure Development and Progress

      This phase will walk you through the following activities:

      • Create a plan to develop your competency gaps.
      • Construct and consider your organizational model.
      • Create plan to cultivate key stakeholder relationships.

      Hire or Develop a World-Class CISO

      Case study

      Mark Lester
      InfoSec Manager, SC Ports Authority

      The new Security Manager changes the security culture by understanding what is meaningful to employees.

      Outcome: Engage with people on their terms. The CISO must speak the audience’s language and express security terms in a way that is meaningful to the audience.

      Actions Next Steps
      • The Security Manager identifies recent events where ransomware and social engineering attacks were successful in penetrating the organization.
      • He uses his newsletter to create organization-wide discussion on this topic.
      • This very personal example makes employees more receptive to the Security Manager’s message, enabling the culture of risk management.
      • The Security Manager will leverage his success in improving the information security culture and awareness to gain support for future initiatives.

      Follow this case study throughout the deck to see this organization’s results

      Step 3.1

      Identify resources for your CISO to remediate competency gaps

      Activities

      Create a plan to remediate competency gaps

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO
      • The newly hired CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step

      • Identification of core competency deficiencies
      • A plan to close the gaps

      Plan

      3.1 Close competency gaps with Info-Tech’s Cybersecurity Workforce Development Training

      Resources to close competency gaps

      Info-Tech’s Cybersecurity Workforce Training develops critical cybersecurity skills missing within your team and organization. The leadership track provides the same deep coverage of technical knowledge as the analyst track but adds hands-on support and has a focus on strategic business alignment, program management, and governance.

      The program builds critical skills through:

      • Standardized curriculum with flexible projects tailored to business needs
      • Realistic cyber range scenarios
      • Ready-to-deploy security deliverables
      • Real assurance of skill development

      Info-Tech Insight
      Investing in a current employee that has the potential to be a world-class CISO may take less time, effort, and money than finding a unicorn.

      Learn more on the Cybersecurity Workforce Development webpage

      3.1 Identify resources for your CISO to remediate competency gaps

      < 2 hours

      CISO Competencies Description
      Business Acumen

      Info-Tech Workshops & Blueprints

      Actions/Activities

      • Take a business acumen course: Acumen Learning, What the CEO Wants You to Know: Building Business Acumen.
      • Meet with business stakeholders. Ask them to take you through the strategic plan for their department and then identify opportunities where security can provide support to help drive their initiatives.
      • Shadow another C-level executive. Understand how they manage their business unit and demonstrate an eagerness to learn.
      • Pursue an MBA or take a business development course.

      3.1 Identify resources for your CISO to remediate competency gaps (continued)

      < 2 hours

      CISO Competencies Description
      Leadership

      Info-Tech Training and Blueprints

      Action/Activities

      • Communicate your vision for security to your team. You will gain buy-in from your employees by including them in the creation of your program, and they will be instrumental to your success.

      Info-Tech Insight
      Surround yourself with great people. Insecure leaders surround themselves with mediocre employees that aren’t perceived as a threat. Great leaders are supported by great teams, but you must choose that great team first.

      3.1 Identify resources for your CISO to remediate competency gaps (continued)

      < 2 hours

      CISO Competencies Description
      Communication

      Info-Tech Workshops & Blueprints

      Build and Deliver an Optimized IT Update Presentation: Show IT’s value and relevance by dropping the technical jargon and speaking to the business in their terms.

      Master Your Security Incident Response Communications Program: Learn how to talk to your stakeholders about what’s going on when things go wrong.

      Develop a Security Awareness and Training Program That Empowers End Users: Your weakest link is between the keyboard and the chair, so use engaging communication to create positive behavior change.

      Actions/Activities

      Learn to communicate in the language of your audience (whether business, finance, or social), and frame security solutions in terms that are meaningful to your listener.

      Technical Knowledge

      Actions/Activities

      • In many cases, the CISO is progressing from a strong technical background, so this area is likely a strength already.
      • However, as the need for executive skills are being recognized, many organizations are opting to hire a business or operations professional as a CISO. In this case, various Info-Tech blueprints across all our silos (e.g. Security, Infrastructure, CIO, Apps) will provide great value in understanding best practices and integrating technical skills with the business processes.
      • Pursue an information security leadership certification: GIAC, (ISC)², and ISACA are a few of the many organizations that offer certification programs.

      3.1 Identify resources for your CISO to remediate competency gaps (continued)

      < 2 hours

      CISO Competencies Description
      Innovative Problem Solving

      Info-Tech Workshops & Blueprints

      Actions/Activities

      Vendor Management

      Info-Tech Blueprints & Resources

      Actions/Activities

      3.1 Identify resources for your CISO to remediate competency gaps (continued)

      < 2 hours

      CISO Competencies Description
      Change Management

      Info-Tech Blueprints

      Actions/Activities

      • Start with an easy-win project to create trust and support for your initiatives.
      Collaboration

      Info-Tech Blueprints

      Actions/Activities

      • Get out of your office. Have lunch with people from all areas of the business. Understanding the goals and the pains of employees throughout your organization will help you to design effective initiatives and cultivate support.
      • Be clear and honest about your goals. If people know what you are trying to do, then it is much easier for them to work with you on it. Being ambiguous or secretive creates confusion and distrust.

      3.1 Create the CISO’s personal development plan

      • Use Info-Tech’s CISO Development Plan Template to document key initiatives that will close previously identified competency gaps.
      • The CISO Development Plan Template is used to map specific actions and time frames for competency development, with the goal of addressing competency gaps and helping you become a world-class CISO. This template can be used to document:
        • Core competency gaps
        • Security process gaps
        • Security technology gaps
        • Any other career/development goals
      • If you have a coach or mentor, you should share your plan and report progress to that person. Alternatively, call Info-Tech to speak with an executive advisor for support and advice.
        • Toll-Free: 1-888-670-8889

      What you will need to complete this exercise

      • CISO Core Competency Evaluation Tool results
      • Information Security Business Satisfaction and Alignment diagnostic results
      • Insights gathered from business stakeholder interviews

      Step 3.2

      Plan an approach to improve your relationships

      Activities

      • Review engagement strategies for different stakeholder types
      • Create a stakeholder relationship development plan

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO
      • The newly hired CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step

      • Stakeholder relationship strategy deliverable

      Plan

      Where should the CISO sit?

      Where the CISO sits in the organization can have a big impact on the security program.

      • Organizations with CISOs in the C-suite have a fewer security incidents.1
      • Organizations with CISOs in the C-suite generally have better IT ability.1
      • An organization whose CISO reports to the CIO risks conflict of interest.1
      • 51% of CISOs believe their effectiveness can be hampered by reporting lines.2
      • Only half of CISOs feel like they are in a position to succeed.2

      A formalized security organizational structure assigns and defines the roles and responsibilities of different members around security. Use Info-Tech’s blueprint Implement a Security Governance and Management Program to determine the best structure for your organization.

      Who the CISO reports to, by percentage of organizations3

      Who the CISO reports to, by percentage of organizations

      Download the Implement a Security Governance and Management Program blueprint

      1. Journal of Computer Science and Information
      2. Proofpoint
      3. Heidrick & Struggles International, Inc

      3.2 Make a plan to manage your key stakeholders

      Managing stakeholders requires engagement, communication, and relationship management. To effectively collaborate and gain support for your initiatives, you will need to build relationships with your stakeholders. Take some time to review the stakeholder engagement strategies for different stakeholder types.

      Influence Mediators
      (Satisfy)
      Key Players
      (Engage)
      Spectators
      (Monitor)
      Noisemakers
      (Inform)
      Support for you

      When building relationships, I find that what people care about most is getting their job done. We need to help them do this in the most secure way possible.

      I don’t want to be the “No” guy, I want to enable the business. I want to find to secure options and say, “Here is how we can do this.”

      – James Miller, Information Security Director, Xavier University

      Download the CISO Stakeholder Management Strategy Template

      Key players – Engage

      Goal Action
      Get key players to help champion your initiative and turn your detractors into supporters. Actively involve key players to take ownership.
      Keep It Positive Maintain a Close Relationship
      • Use their positive support to further your objectives and act as your foundation of support.
      • Key players can help you build consensus among other stakeholders.
      • Get supporters to be vocal in your town halls.
      • Ask them to talk to other stakeholders over whom they have influence.
      • Get some quick wins early to gain and maintain stakeholder support and help convert them to your cause.
      • Use their influence and support to help persuade blockers to see your point of view.
      • Collaborate closely. Key players are tuned in to information streams that are important. Their advice can keep you informed and save you from being blindsided.
      • Keep them happy. By definition, these individuals have a stake in your plans and can be affected positively or negatively. Going out of your way to maintain relationships can be well worth the effort.

      Info-Tech Insight
      Listen to your key players. They understand what is important to other business stakeholders, and they can provide valuable insight to guide your future strategy.

      Mediators – Satisfy

      Goal Action
      Turn mediators into key players Increase their support level.
      Keep It Positive Maintain a Close Relationship
      • Make stakeholders part of the conversation by consulting them for input on planning and strategy.
      • Sample phrases:
        • “I’ve heard you have experience in this area. Do you have time to answer a few questions?”
        • “I’m making some decisions and I would value your thoughts. Can I get your perspective on this?”
      • Enhance their commitment by being inclusive. Encourage their support whenever possible.
      • Make them feel acknowledged and solicit feedback.
      • Listen to blockers with an open mind to understand their point of view. They may have valuable insight.
      • Approach stakeholders on their individual playing fields.
        • They want to know that you understand their business perspective.
      • Stubborn mediators might never support you. If consulting doesn’t work, keep them informed of important decision-making points and give them the opportunity to be involved if they choose to be.

      Info-Tech Insight
      Don’t dictate to stakeholders. Make them feel like valued contributors by including them in development and decision making. You don’t have to incorporate all their input, but it is essential that they feel respected and heard.

      Noisemakers – Inform

      Goal Action
      Have noisemakers spread the word to increase their influence. Encourage noisemakers to influence key stakeholders.
      Keep It Positive Maintain a Close Relationship
      • Identify noisemakers who have strong relationships with key stakeholders and focus on them.
        • These individuals may not have decision-making power, but their opinions and advice may help to sway a decision in your favor.
      • Look for opportunities to increase their influence over others.
      • Put effort into maintaining the positive relationship so that it doesn’t dwindle.
      • You already have this group’s support, but don’t take it for granted.
      • Be proactive, pre-emptive, and transparent.
      • Address issues or bad news early and be careful not to exaggerate their significance.
      • Use one-on-one meetings to give them an opportunity to express challenges in a private setting.
      • Show individuals in this group that you are a problem-solver:
        • “The implementation was great, but we discovered problems afterward. Here is what we’re doing about it.”

      Spectators – Monitor

      Goal Action
      Keep spectators content and avoid turning them into detractors. Keep them well informed.
      Keep It Positive Maintain a Close Relationship
      • A hands-on approach is not required with this group.
      • Keep them informed with regular, high-altitude communications and updates.
      • Use positive, exciting announcements to increase their interest in your initiatives.
      • Select a good venue for generating excitement and assessing the mood of spectators.
      • Spectators may become either supporters or blockers. Monitor them closely and keep in touch with them to stop these individuals from becoming blockers.
      • Listen to questions from spectators carefully. View any engagement as an opportunity to increase participation from this group and generate a positive shift in interest.

      3.2 Create the CISO’s stakeholder management strategy

      Develop a strategy to manage key stakeholders in order to drive your personal development plan initiatives.

      • The purpose of the CISO Stakeholder Management Strategy Template is to document the results of the power mapping exercise, create a plan to proactively manage stakeholders, and track the actions taken.
      • Use this in concert with Info-Tech’s CISO Stakeholder Power Map Template to help visualize the importance of key stakeholders to your personal development. You will document:
        • Stakeholder role and type.
        • Current relationship with the stakeholder.
        • Level of power/influence and degree of impact.
        • Current and desired level of support.
        • Initiatives that require the stakeholder’s engagement.
        • Actions to be taken – along with the status and results.

      What you will need to complete this exercise

      • Completed CISO Stakeholder Power Map
      • Security Business Satisfaction and Alignment Diagnostic results

      Download the CISO Stakeholder Management Strategy Template

      Phase 4

      Execute

      Phase 1
      1.1 Understand Core Competencies
      1.2 Measure Security and Business Satisfaction and Alignment

      Phase 2
      2.1 Assess Stakeholder Relationships
      2.2 Assess the Core Competencies

      Phase 3
      3.1 Identify Resources to Address Competency Gaps
      3.2 Plan Approach to Improve Stakeholder Relationships

      Phase 4
      4.1 Decide Next Actions and Support Your CISO Moving Forward
      4.2 Regularly Reassess to Measure Development and Progress

      This phase will walk you through the following activities:

      • Populate the CISO Development Plan Template with appropriate targets and due dates.
      • Set review and reassess dates.
      • Review due dates with CISO.

      Hire or Develop a World-Class CISO

      Case study

      Mark Lester
      InfoSec Manager, SC Ports Authority

      The new Security Manager leverages successful cultural change to gain support for new security investments.

      Outcome: Integrating with the business on a small level and building on small successes will lead to bigger wins and bigger change.

      Actions Next Steps
      • By fostering positive relationships throughout the organization, the Security Manager has improved the security culture and established himself as a trusted partner.
      • In an organization that had seen very little change in years, he has used well developed change management, business acumen, leadership, communication, collaboration, and innovative problem-solving competencies to affect his initiatives.
      • He can now return to the board with a great deal more leverage in seeking support for security investments.
      • The Security Manager will leverage his success in improving the information security culture and awareness to gain support for future initiatives.

      Step 4.1

      Decide next actions and support your CISO moving forward

      Activities

      • Complete the Info-Tech CISO Development Plan Template
      • Create a stakeholder relationship development plan

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO
      • The newly hired CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step

      Next actions for each of your development initiatives

      Execute

      Establish a set of first actions to set your plan into motion

      The CISO Development Plan Template provides a simple but powerful way to focus on what really matters to execute your plan.

      • By this point, the CISO is working on the personal competency development while simultaneously overseeing improvements across the security program, managing stakeholders, and seeking new business initiatives to engage with. This can be a lot to juggle effectively.
      • Disparate initiatives like these can hinder progress by creating confusion.
      • By distilling your plan down to Subject > Action > Outcome, you immediately restore focus and turn your plans into actionable items.
      • The outcome is most valuable when it is measurable. This makes progress (or lack of it) very easy to track and assess, so choose a meaningful metric.
      Item to Develop
      (competency/process/tech)
      First Action Toward Development
      Desired Outcome, Including a Measurable Indicator

      Download the CISO Development Plan Template

      4.1 Create a CISO development plan to keep all your objectives in one place

      Use Info-Tech’s CISO Development Plan Template to create a quick and simple yet powerful tool that you can refer to and update throughout your personal and professional development initiatives. As instructed in the template, you will document the following:

      Your Item to Develop The Next Action Required The Target Outcome
      This could be a CISO competency, a security process item, a security technology item, or an important relationship (or something else that is a priority). This could be as simple as “schedule lunch with a stakeholder” or “email Info-Tech to schedule a Guided Implementation call.” This part of the tool is meant to be continually updated as you progress through your projects. The strength of this approach is that it focuses your project into simple actionable steps that are easily achieved, rather than looking too far down the road and seeing an overwhelming task ahead. This will be something measurable like “reduce spending by 10%” or “have informal meeting with leaders from each department.”

      Info-Tech Insight
      A good plan doesn’t require anything that is outside of your control. Good measurable outcomes are behavior based rather than state based.
      “Increase the budget by 10%” is a bad goal because it is ultimately reliant on someone else and can be derailed by an unsupportive executive. A better goal is “reduce spending by 10%.” This is something more within the CISO’s control and is thus a better performance indicator and a more achievable goal.

      4.1 Create a CISO development plan to keep all your objectives in one place

      Below you will find sample content to populate your CISO Development Plan Template. Using this template will guide your CISO in achieving the goals identified here.

      The template itself is a metric for assessing the development of the CISO. The number of targets achieved by the due date will help to quantify the CISO’s progress.

      You may also want to include improvements to the organization’s security program as part of the CISO development plan.

      Area for Development Item for Development Next Action Required Key Stakeholders/ Owners Target Outcome Due Date Completed
      Core Competencies:
      Communication
      Executive
      communication
      Take economics course to learn business language Course completed [Insert date] [Y/N]
      Core Competencies:
      Communication
      Improve stakeholder
      relationships
      Email Bryce from finance to arrange lunch Improved relationship with finance department [Insert date] [Y/N]
      Technology Maturity: Security Prevention Identity and access management (IAM) system Call Info-Tech to arrange call on IAM solutions 90% of employees entered into IAM system [Insert date] [Y/N]
      Process Maturity: Response & Recovery Disaster recovery Read Info-Tech blueprint on disaster recovery Disaster recovery and backup policies in place [Insert date] [Y/N]

      Check out the First 100 Days as CISO blueprint for guidance on bringing improvements to the security program

      4.1 Use your action plan to track development progress and inform stakeholders

      • As you progress toward your goals, continually update the CISO development plan. It is meant to be a living document.
      • The Next Action Required should be updated regularly as you make progress so you can quickly jump in and take meaningful actions without having to reassess your position every time you open the plan. This is a simple but very powerful method.
      • To view your initiatives in customizable ways, you can use the drop-down menu on any column header to sort your initiatives (i.e. by due date, completed status, area for development). This allows you to quickly and easily see a variety of perspectives on your progress and enables you to bring upcoming or incomplete projects right to the top.
      Area for Development Item for Development Next Action Required Key Stakeholders/ Owners Target Outcome Due Date Completed
      Core Competencies:
      Communication
      Executive
      communication
      Take economics course to learn business language Course completed [Insert date] [Y/N]
      Core Competencies:
      Communication
      Improve stakeholder
      relationships
      Email Bryce from finance to arrange lunch Improved relationship with finance department [Insert date] [Y/N]
      Technology Maturity: Security Prevention Identity and access management (IAM) system Call Info-Tech to arrange call on IAM solutions 90% of employees entered into IAM system [Insert date] [Y/N]
      Process Maturity: Response & Recovery Disaster recovery Read Info-Tech blueprint on disaster recovery Disaster recovery and backup policies in place [Insert date] [Y/N]

      Step 4.2

      Regularly reassess to track development and progress

      Activities

      Create a calendar event for you and your CISO, including which items you will reassess and when

      This step involves the following participants:

      • CEO or other executive seeking to hire/develop a CISO
      • The newly hired CISO

      or

      • Current CISO seeking to upgrade capabilities

      Outcomes of this step

      Scheduled reassessment of the CISO’s competencies

      Execute

      4.2 Regularly evaluate your CISO’s progress

      < 1 day

      As previously mentioned, your CISO development plan is meant to be a living document. Your CISO will use this as a companion tool throughout project implementation, but periodically it will be necessary to re-evaluate the entire program to assess your progress and ensure that your actions are still in alignment with personal and organizational goals.

      Info-Tech recommends performing the following assessments quarterly or twice yearly with the help of our executive advisors (either over the phone or onsite).

      1. Sit down and re-evaluate your CISO core competencies using the CISO Core Competency Evaluation Tool.
      2. Analyze your relationships using the CISO Stakeholder Power Map Template.
      3. Compare all of these against your previous results to see what areas you have strengthened and decide if you need to focus on a different area now.
      4. Consider your CISO Development Plan Template and decide whether you have achieved your desired outcomes. If not, why?
      5. Schedule your next reassessment, then create a new plan for the upcoming quarter and get started.
      Materials
      • Laptop
      • CISO Development Plan Template
      Participants
      • CISO
      • Hiring executive (possibly)
      Output
      • Complete CISO and security program development plan

      Summary of Accomplishment

      Knowledge Gained

      • Understanding of the competencies contributing to a successful CISO
      • Strategic approach to integrate the CISO into the organization
      • View of various CISO functions from a variety of business and executive perspectives, rather than just a security view

      Process Optimized

      • Hiring of the CISO
      • Assessment and development of stakeholder relationships for the CISO
      • Broad planning for CISO development

      Deliverables Completed

      • IT Security Business Satisfaction and Alignment Diagnostic
      • CISO Core Competency Evaluation Tool
      • CISO Stakeholder Power Map Template
      • CISO Stakeholder Management Strategy Template
      • CISO Development Plan Template

      If you would like additional support, have our analysts guide you through an Info-Tech workshop or Guided Implementation

      Contact your account representative for more information

      workshop@infotech.com
      1-888-670-8889

      Related Info-Tech Research

      Build an Information Security Strategy
      Your security strategy should not be based on trying to blindly follow best practices but on a holistic risk-based assessment that is risk aware and aligns with your business context.

      The First 100 Days as CISO
      Every CISO needs to follow Info-Tech’s five-step approach to truly succeed in their new position. The meaning and expectations of a CISO role will differ from organization to organization and person to person, but the approach to the new position will be relatively the same.

      Implement a Security Governance and Management Program
      Business and security goals should be the same. Businesses cannot operate without security, and security's goal is to enable safe business operations.

      Research Contributors

      • Mark Lester, Information Security Manager, South Carolina State Ports Authority
      • Kyle Kennedy, CISO, CyberSN.com
      • James Miller, Information Security Director, Xavier University
      • Elliot Lewis, Vice President Security & Risk, Info-Tech Research Group
      • Andrew Maroun, Enterprise Security Lead, State of California
      • Brian Bobo, VP Enterprise Security, Schneider National
      • Candy Alexander, GRC Security Consultant, Towerall Inc.
      • Chad Fulgham, Chairman, PerCredo
      • Ian Parker, Head of Corporate Systems Information Security Risk and Compliance, Fujitsu EMEIA
      • Diane Kelly, Information Security Manager, Colorado State Judicial Branch
      • Jeffrey Gardiner, CISO, Western University
      • Joey LaCour, VP & Chief Security, Colonial Savings
      • Karla Thomas, Director IT Global Security, Tower Automotive
      • Kevin Warner, Security and Compliance Officer, Bridge Healthcare Providers
      • Lisa Davis, CEO, Vicinage
      • Luis Brown, Information Security & Compliance Officer, Central New Mexico Community College
      • Peter Clay, CISO, Qlik
      • Robert Banniza, Senior Director IT Center Security, AMSURG
      • Tim Tyndall, Systems Architect, Oregon State

      Bibliography

      Dicker, William. "An Examination of the Role of vCISO in SMBs: An Information Security Governance Exploration." Dissertation, Georgia State University, May 2, 2021. Accessed 30 Sep. 2022.

      Heidrick & Struggles. "2022 Global Chief Information Security Officer (CISO) Survey" Heidrick & Struggles International, Inc. September 6, 2022. Accessed 30 Sep. 2022.

      IBM Security. "Cost of a Data Breach Report 2022" IBM. August 1, 2022. Accessed 9 Nov. 2022.

      Mehta, Medha. "What Is a vCISO? Are vCISO Services Worth It?" Infosec Insights by Sectigo, June 23, 2021. Accessed Nov 22. 2022.

      Milica, Lucia. “Proofpoint 2022 Voice of the CISO Report” Proofpoint. May 2022. Accessed 6 Oct. 2022.

      Navisite. "The State of Cybersecurity Leadership and Readiness" Navisite. November 9, 2021. Accessed 9 Nov. 2022.

      Shayo, Conrad, and Frank Lin. “An Exploration of the Evolving Reporting Organizational Structure for the Chief Information Security Officer (CISO) Function” Journal of Computer Science and Information Technology, vol. 7, no. 1, June 2019. Accessed 28 Sep. 2022.

      Acquire the Right Hires with Effective Interviewing

      • Buy Link or Shortcode: {j2store}576|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $15,749 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Attract & Select
      • Parent Category Link: /attract-and-select
      • Scope: Acquiring the best talent relies heavily on an effective interviewing process, which involves the strategic preparation of stakeholders, including interviewers. Asking the most effective questions will draw out the most appropriate information to best assess the candidate. Evaluating the interview process and recording best practices will inspire continuous interviewing improvement within the organization.
      • Challenge: The majority of organizations do not have a solid interviewing process in place, and most interviewers are not practiced at interviewing. This results in many poor hiring decisions, costing the organization in many ways. Upsizing is on the horizon, the competition for good talent is escalating, and distinguishing between a good interviewee and a good candidate fit for a position is becoming more difficult.
      • Pain/Risk: Although properly preparing for and conducting an interview requires additional time on the part of HR, the hiring manager, and all interviewers involved, the long-term benefits of an effective interview process positively affect the organization’s bottom line and company morale.

      Our Advice

      Critical Insight

      • Most interviewers are not as good as they think they are, resulting in many poor hiring decisions. A poor hire can cost an organization up to 15 times the position’s annual salary, as well as hurt employee morale.
      • The Human Resources department needs to take responsibility for an effective interview process, but the business needs to take responsibility for developing its new hire needs, and assessing the candidates using the best questions and the most effective interview types and techniques.
      • All individuals with a stake in the interview process need to invest sufficient time to help define the ideal candidate, understand their roles and decision rights in the process, and prepare individually to interview effectively.
      • There are hundreds of different interview types, techniques, and tools for an organization to use, but the most practiced and most effective is behavioral interviewing.
      • There is no right interview type and technique. Each hiring scenario needs to be evaluated to pick the appropriate type and technique that should be practiced, and the right questions that should be asked.

      Impact and Result

      • Gain insight into and understand the need for a strong interview process.
      • Strategize and plan your organization’s interview process, including how to make up an ideal candidate profile, who should be involved in the process, and how to effectively match interview types, techniques, and questions to assess the ideal candidate attributes.
      • Understand various hiring scenarios, and how an interview process may be modified to reflect your organization’s scenario.
      • Learn about the most common interview types and techniques, when they are appropriate to use, and best practices around using them effectively.
      • Evaluate your interview process and yourself as an interviewer to better inform future candidate interviewing strategy.

      Acquire the Right Hires with Effective Interviewing Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Implement an effective interview and continuous improvement process

      Acquire the right hire.

      • Storyboard: Acquire the Right Hires with Effective Interviewing

      2. Document all aspects of your interview strategy and plan with stakeholders

      Ensure an effective and seamless interview process.

      • Candidate Interview Strategy and Planning Guide

      3. Recognize common interviewing errors and study best practices to address these errors

      Be an effective interviewer.

      • Screening Interview Template
      • Interview Guide Template
      • Supplement: Quick Fixes to Common Interview Errors
      • Pre-interview Guide for Interviewers
      • Candidate Communication Template
      [infographic]

      Define a Release Management Process to Deliver Lasting Value

      • Buy Link or Shortcode: {j2store}158|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,999 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Your software platforms are a key enabler of your brand. When there are issues releasing, this brand suffers. Client confidence and satisfaction erode.
      • Your organization has invested significant capital in creating a culture product ownership, Agile, and DevOps. Yet the benefits from these investments are not yet fully realized.
      • Customers have more choices than ever when it comes to products and services. They require features and capabilities delivered quickly, consistently, and of sufficient quality otherwise they will look elsewhere.

      Our Advice

      Critical Insight

      • Eliminate the need for dedicating time for off-hour or weekend release activities. Use a release management framework for optimizing release-related tasks, making them predictable and of high quality.

      Impact and Result

      • Develop a release management framework that efficiently and effectively orchestrates the different functions supporting a software’s release.
      • Use the release management framework and turn release-related activities into non-events.
      • Use principles of continuous delivery for converting your release processes from an overarching concern to a feature of a high-performing software practice.

      Define a Release Management Process to Deliver Lasting Value Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define a Release Management Process to Deliver Lasting Value Deck – A step-by-step document that walks you through how to develop and implement a release management framework that takes advantage of continuous delivery.

      This presentation documents the Info-Tech approach to defining your application release management framework.

      • Define a Release Management Process to Deliver Lasting Value – Phases 1-4

      2. Define a Release Management Process to Deliver Lasting Value Template – Use this template to help you define, detail, and make a reality your strategy in support of your application release management framework.

      The template gives the user a guide to the development of their application release management framework.

      • Define a Release Management Process to Deliver Lasting Value Template

      3. Define a Release Management Process to Deliver Lasting Value Workbook – This workbook documents the results of the exercises contained in the blueprint and offers the user a guide to development of their release management framework.

      This workbook is designed to capture the results of your exercises from the Define a Release Management Process to Deliver Lasting Value blueprint.

      • Define a Release Management Process to Deliver Lasting Value Workbook
      [infographic]

      Workshop: Define a Release Management Process to Deliver Lasting Value

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define the Current Situation

      The Purpose

      Document the existing release management process and current pain points and use this to define the future-state framework.

      Key Benefits Achieved

      Gain an understanding of the current process to confirm potential areas of opportunity.

      Understand current pain points so that we can build resolution into the new process.

      Activities

      1.1 Identify current pain points with your release management process. If appropriate, rank them in order of most to least disruptive.

      1.2 Use the statement of quality and current pain points (in addition to other considerations) and outline the guiding principles for your application release management framework.

      1.3 Brainstorm a set of metrics that will be used to assess the success of your aspired-to application release management framework.

      Outputs

      Understanding of pain points, their root causes, and ranking.

      Built guiding principles for application release management framework.

      Created set of metrics to measure the effectiveness of the application release management framework.

      2 Define Standard Release Criteria

      The Purpose

      Build sample release criteria, release contents, and standards for how it will be integrated in production.

      Key Benefits Achieved

      Define a map to what success will look like once a new process is defined.

      Develop standards that the new process must meet to ensure benefits are realized.

      Activities

      2.1 Using an example of a product known to the team, list its criteria for release.

      2.2 Using an example of a product known to the team, develop a list of features and tasks that are directly and indirectly important for either a real or hypothetical upcoming release.

      2.3 Using an example of product known to the team, map out the process for its integration into the release-approved code in production. For each step in the process, think about how it satisfies guiding principles, releasability and principles of continuous anything.

      Outputs

      Completed Workbook example highlighting releasability.

      Completed Workbook example defining and detailing feature and task selection.

      Completed Workbook example defining and detailing the integration step.

      3 Define Acceptance and Deployment Standards

      The Purpose

      Define criteria for the critical acceptance and deployment phases of the release.

      Key Benefits Achieved

      Ensure that releases will meet or exceed expectations and meet user quality standards.

      Ensure release standards for no / low risk deployments are recognized and implemented.

      Activities

      3.1 Using an example of product known to the team, map out the process for its acceptance. For each step in the process, think about how it satisfies guiding principles, releasability and principles of continuous anything.

      3.2 Using an example of product known to the team, map out the process for its deployment. For each step in the process, think about how it satisfies guiding principles, releasability and principles of continuous anything.

      Outputs

      Completed Workbook example defining and detailing the acceptance step.

      Completed Workbook example defining and detailing the deployment step.

      4 Implement the Strategy

      The Purpose

      Define your future application release management process and the plan to make the required changes to implement.

      Key Benefits Achieved

      Build a repeatable process that meets the standards defined in phases 2 and 3.

      Ensure the pain points defined in Phase 1 are resolved.

      Show how the new process will be implemented.

      Activities

      4.1 Develop a plan and roadmap to enhance the integration, acceptance, and deployment processes.

      Outputs

      List of initiatives to reach the target state

      Application release management implementation roadmap

      Further reading

      Define a Release Management Process for Your Applications to Deliver Lasting Value

      Use your releases to drive business value and enhance the benefits delivered by your move to Agile.

      Analyst Perspective

      Improving your release management strategy and practices is a key step to fully unlock the value of your portfolio.

      As firms invest in modern delivery practices based around product ownership, Agile, and DevOps, organizations assume that’s all that is necessary to consistently deliver value. As organizations continue to release, they continue to see challenges delivering applications of sufficient and consistent quality.

      Delivering value doesn’t only require good vision, requirements, and technology. It requires a consistent and reliable approach to releasing and delivering products and services to your customer. Reaching this goal requires the definition of standards and criteria to govern release readiness, testing, and deployment.

      This will ensure that when you deploy a release it meets the high standards expected by your clients and delivers the value you have intended.

      Dr. Suneel Ghei

      Principal Research Director, Application Development

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Your software platforms are a key enabler of your brand. When there are issues releasing, the brand suffers. Client confidence and satisfaction erode.
      • Your organization has invested significant capital in creating a culture of product ownership, Agile, and DevOps. Yet the benefits from these investments are not yet fully realized.
      • Customers have more choices than ever when it comes to products and services. They require features and capabilities delivered quickly, consistently, and of sufficient quality, otherwise they will look elsewhere.

      Common Obstacles

      • Development teams are moving faster but then face delays waiting for testing and deployment due to a lack of defined release cycle and process.
      • Individual stages in your software development life cycle (SDLC), such as code collaboration, testing, and deployment, have become leaner, but the overall complexity has increased since many products and services are composed of many applications, platforms, and processes.
      • The specifics of releasing products is (wrongly) classified as a technical concern and not a business concern, hindering the ability to prioritize improved release practices.

      Info-Tech's Approach

      • Develop a release management framework that efficiently and effectively orchestrates the different functions supporting a software’s release.
      • Use the release management framework and turn release-related activities into non-events.
      • Use principles of continuous delivery for converting your release processes from an overarching concern to a feature of a high-performing software practice.

      Executive Summary

      Info-Tech Insights

      Turn release-related activities into non-events.

      Eliminate the need for dedicating time for off-hour or weekend release activities. Use a release management framework for optimizing release-related tasks, making them predictable and of high quality.

      Release management is NOT a part of the software delivery life cycle.

      The release cycle runs parallel to the software delivery life cycle but is not tightly coupled with it. The act of releasing begins at the point requirements are confirmed and ends when user satisfaction is measurable. In contrast, the software delivery life cycle is focused on activities such as building, architecting, and testing.

      All releases are NOT created equal.

      Barring standard guiding principles, each release may have specific nuances that need to be considered as part of release planning.

      Your release management journey

      1. Optimize Applications Release Management - Set a baseline release management process and organization.
      2. Modernize Your SDLC - Move your organization to Agile and increase throughput to feed releases.
      3. Deliver on Your Digital Product Vision - Understand the practices that go into delivering products, including articulating your release plans.
      4. Automate Testing to Get More Done - Create the ability to do more testing quickly and ensure test coverage.
      5. Implement DevOps Practices That Work - Build in tools and techniques necessary for release deployment automation.
      6. Define a Release Management Process to Deliver Lasting Value (We Are Here)

      Define a Release Management Process for Your Applications to Deliver Lasting Value

      Use your releases to drive business value and enhance the benefits delivered by your move to Agile.

      Executive Brief

      Your software delivery teams are expected to deliver value to stakeholders in a timely manner and with high quality

      Software delivery teams must enable the organization to react to market needs and competitive changes to improve the business’ bottom line. Otherwise, the business will question the team’s competencies.

      The business is constantly looking for innovative ways to do their jobs better and they need support from your technical teams.

      The increased stress from the business is widening the inefficiencies that already exist in application release management, risking poor product quality and delayed releases.

      Being detached from the release process, business stakeholders do not fully understand the complexities and challenges of completing a release, which complicates the team’s communication with them when issues occur.

      IT Stakeholders Are Also Not Satisfied With Their Own Throughput

      • Only 29% of IT employees find application development throughput highly effective.
      • Only 9% of organizations were classified as having highly effective application development throughput.
      • Application development throughput ranked 37th out of 45 core IT processes in terms of effectiveness.

      (Info-Tech’s Management and Governance Diagnostic, N=3,930)

      Your teams, however, struggle with core release issues, resulting in delayed delivery (and disappointed stakeholders)

      Implementing tools on top of an inefficient pipeline can significantly magnify the existing release issues. This can lead to missed deadlines, poor product quality, and business distrust with software delivery teams.

      COMMON RELEASE ISSUES

      1. Local Thinking: Release decisions and changes are made and approved without consideration of the holistic system, process, and organization.
      2. No Release Cadence: Lack of process governance and oversight generates unpredictable bottlenecks and load and ill-prepared downstream teams.
      3. Mismanagement of Releases: Program management does not accommodate the various integrated releases completed by multiple delivery teams.
      4. Poor Scope Management: Teams are struggling to effectively accommodate changes during the project.

      The bottom line: The business’ ability to operate is dictated by the software delivery team’s ability to successfully complete releases. If the team performs poorly, then the business will do poorly as well. Application release management is critical to ensure business expectations are within the team’s constraints.

      As software becomes more embedded in the business, firms are discovering that the velocity of business change is now limited by how quickly they can deploy.” – Five Ways To Streamline Release Management, J.S. Hammond

      Historically, managing releases has been difficult and complicated…

      Typically, application release management has been hard to coordinate because…

      • Software has multiple dependencies and coordinating their inclusion into a deployable whole was not planned.
      • Teams many be spending too much time on features that are not needed any longer.
      • Software development functions (such as application architecture, test-first or test-driven design, source code integration, and functional testing) are not optimized.
      • There are no agreed upon service-level contracts (e.g. expected details in requirements, adequate testing, source control strategy) between development functions.
      • The different development functions are not integrated in a holistic style.
      • The different deployment environments have variability in their configuration, reducing the reliability of testing done in different environments.
      • Minimum thresholds for acceptable quality of development functions are either too low (leading to adverse outcomes down stream) or too high (leading to unnecessary delays).

      …but research shows being effective at application release management increases your throughput

      Research conducted on Info-Tech's members shows overwhelming evidence that application throughput is strongly tied to an effective application release management approach.

      The image shows a scatter plot, with Release Management Effectiveness on the x-axis and Application Development Throughput Effectiveness on the Y-axis. The graph shows a steady increase.

      (Info-Tech Management & Governance Diagnostic, since 2019; N=684 organizations)

      An application release management framework is critical for effective and timely delivery of software

      A well-developed application release management framework is transformative and changes...

      From To
      Short-lived projects Ongoing enhancements supporting a product strategy
      Aiming for mandated targets Flexible roadmaps
      Manual execution of release processes Automating a release pipeline as much as possible and reasonable
      Manual quality assurance Automated assessment of quality
      Centralized decision making Small, independent release teams, orchestrated through an optimized value stream

      Info-Tech Insight: Your application release management framework should turn a system release into a non-event. This is only possible through the development of a holistic, low-risk and standardized approach to releasing software, irrespective of their size or complexity.

      Robust continuous “anything” requires proficiency in five core practices

      A continuous anything evaluation should not be a “one-and-done” event. As part of ongoing improvements, keep evolving it to make it a fundamental component of a strong operational strategy.

      Continuous Anything

      • Automate where appropriate
        • Automation is not a silver bullet. All processes are not created equal; and therefore, some are not worthy of being automated.
      • Control system variables
        • Deploying and testing in environments that are apple to apple in comparison reduces the risk of unintended outcomes from production release.
      • Measure process outcomes
        • A process not open to being measured is a process bound to fail. If it can be measured, it should be, and insights found should be used for improving the system.
      • Select smaller features batches
        • Smaller release packages reduce the chances of cognitive load associated with finding root causes for defects and issues that may result as post-production incidents.
      • Reduction of cycle time
        • Identification of waste in each stage of the continuous anything process helps in lowering cost of operations and results in quicker generation of value for stakeholders.

      Invest time in developing an application release management framework for your development team(s) with a continuous anything mindset

      An application release management framework converts a set of features and make them ready for releasability in a low-risk, standardized, and high-quality process.

      The image shows a diagram titled Application Release Engineering From Idea to Product, which illustrates the process.

      A continuous anything (integration, delivery, and deployment) mindset is based on a growth and improvement philosophy, where every event is considered a valid data point for investigation of process efficiency.

      Diagram adapted from Continuous Delivery in the Wild, Pete Hodgson, Published by O'Reilly Media, Inc., 2020

      Related Info-Tech Research

      Streamline Application Maintenance

      • Justify the necessity of streamlined maintenance. Gain a grounded understanding of stakeholder objectives and concerns and validate their achievability against the current state of the people, process, and technologies involved in application maintenance.
      • Strengthen triaging and prioritization practices. Obtain a holistic picture of the business and technical impacts, risks, and urgencies of each accepted maintenance request to justify its prioritization and relevance within your backlog. Identify opportunities to bundle requests together or integrate them within project commitments to ensure completion.
      • Establish and govern a repeatable process. Develop a maintenance process with well-defined stage gates, quality controls, and roles and responsibilities, and instill development best practices to improve the success of delivery.

      “Releasability” (or release criteria) of a system depends upon the inclusion of necessary building blocks and proof that they were worked on

      There is no standard definition of a system’s releasability. However, there are common themes around completions or assessments that should be investigated as part of a release:

      • The range of performance, technical, or compliance standards that need to be assessed.
      • The full range of test types required for business approval: unit tests, acceptance tests, security test, data migration tests, etc.
      • The volume-criticality mix of defects the organization is willing to accept as a risk.
      • The best source and version control strategy for the development team. This is mostly a function of the team's skill with using release branches and coordinating their work artifacts.
      • The addition of monitoring points and measures required for evaluations and impact analysis.
      • The documentation required for audit and compliance.
      • External and internal dependencies and integrations.
      • Validations, approvals, and sign-offs required as part of the business’ operating procedure.
      • Processes that are currently carried out outside and should be moved into the pipeline.
      • Manual processes that may be automated.
      • Any waste activities that do not directly contribute to releasability that can be eliminated from the development process.
      • Knowledge the team has regarding challenges and successes with similar software releases in the past.

      Releasability of a system is different than governing principles for application release management

      Governing principles are fundamental ways of doing something, which in this case is application release management, while releasability will generally have governing principles in addition to specific needs for a successful release.

      Example of Governing Principles

      • Approval from Senior Director is necessary before releasing to production
      • Production deployments can only be done in off-hours
      • We will try to automate processes whenever it is possible for us to do so
      • We will use a collaborative set of metrics to measure our processes

      Examples of Releasability Criteria

      • For the upcoming release, add performance testing for Finance and Budget Teams’ APIs
      • Audit and compliance documentation is required for this release
      • Automation of manual deployment
      • Use trunk-based source code management instead of feature-based

      Regulated industries are not more stable despite being less nimble

      A pervasive myth in industry revolves around the misperception that continuous anything and nimble and non-event application release management is not possible in large bureaucratic and regulated organizations because they are risk-averse.

      "We found that external approvals were negatively correlated with lead-time, deployment frequency and restore time, and had no correlation with change failure rate. In short, approval by an external body (such as a manager or Change Approval Board) simply doesn’t work to increase the stability of production systems…However, it certainly slows things down. It is in fact worse than having no change approval process at all." – Accelerate by Gene Kim, Jez Humble, and Nicole Forsgren

      Many organizations reduce risk in their product release by adopting a paternalistic stance by:

      • Requiring manual sign-offs from senior personnel who are external to the organization.
      • Increasing the number and level of authorization gates.
      • Staying away from change and preferring to stick with what has worked in the past.

      Despite the prevalence of these types of responses to risk, the evidence is that they do not work and are in fact counter-productive because they:

      • Create blocks to frequent releases.
      • Introduce procedural complexity to each release and in effect make them “bigger.”
      • Prefer process over people (and trusting them). Increase non-value-add scrutiny and reporting.

      There is a persistent misunderstanding about continuous anything being only an IT engineering practice

      01

      At the enterprise level, continuous anything focuses on:

      • Visibility of final value being provided in a high-quality and expedited manner
      • Ensuring efficiency in the organization’s delivery framework
      • Ensuring adherence to established governance and risk mitigation strategy

      02

      Focus of this blueprint

      At the product level, continuous anything focuses on:

      • Reliability of the product delivery system
      • Use of scientific evidence for continuous improvement of the product’s delivery system
      • Orchestration of different artifacts into a single whole

      03

      At the functional level, continuous anything focuses on*:

      • Local functional optimization (functions = software engineering, testing, application design)
      • Automation of local functions
      • Use of patterns for standardizing inputs and functional areas

      *Where necessary, practices at this level have been mentioned.

      Related Info-Tech Research

      Implement DevOps Practices That Work

      • Be DevOps, rather than do DevOps. DevOps is a philosophy, not an industry framework. Your organization’s culture must shift toward system-wide thinking, cross-function collaboration, and empathy.
      • Culture, learning, automation, integrated teams, and metrics and governance (CLAIM) are all critical components of effective DevOps.

      Automate Testing to Get More Done

      • Optimize and automate SDLC stages to recover team capacity. Recognize that automation without optimization is a recipe for long-term pain. Do it right the first time.
      • Optimization and automation are not one-hit wonders. Technical debt is a part of software systems and never goes away. The only remedy is constant vigilance and enhancements to the processes.

      The seeds of a good release are sown even before work on it begins

      Pre-release practices such as requirements intake and product backlog management are important because:

      • A standard process for documentation of features and requirements helps reduce “cognitive dissonance” between business and technology teams. Clearly articulated and well-understood business needs are fundamental ingredients of a high-quality product.
      • Product backlog management done right ensures the prioritized delivery of value to stakeholders. Features can become stale or get a bump in importance, depending upon evolving circumstances. Prioritizing the backlog is, therefore, critical for ensuring time, effort, and budget are spent on things that matter.

      Improve Service Desk Ticket Queue Management

      • Buy Link or Shortcode: {j2store}492|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Service desk tickets pile up in the queue, get lost or buried, jump between queues without progress, leading to slow response and resolution times, a seemingly insurmountable backlog and breached SLAs.
      • There are no defined rules or processes for how tickets should be assigned and routed and technicians don’t know how to prioritize their assigned work, meaning tickets take too long to get to the right place and aren’t always resolved in the correct or most efficient order.
      • Nobody has authority or accountability for queue management, meaning everyone has eyes only on their own tickets while others fall through the cracks.

      Our Advice

      Critical Insight

      If everybody is managing the queue, then nobody is. Without clear ownership and accountability over each and every queue, then it becomes too easy for everyone to assume someone else is handling or monitoring a ticket when in fact nobody is. Assign a Queue Manager to each queue and ensure someone is responsible for monitoring ticket movement across all the queues.

      Impact and Result

      • Clearly define your queue structure, organize the queues by content, then assign resources to relevant queues depending on their role and expertise.
      • Define and document queue management processes, from initial triage to how to prioritize work on assigned tickets. Once processes have been defined, identify opportunities to build in automation to improve efficiency.
      • Ensure everyone who handles tickets is clear on their responsibilities and establish clear ownership and accountability for queue management.

      Improve Service Desk Ticket Queue Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Ticket Queue Management Deck – A guide to service desk ticket queue management best practices and advice

      This storyboard reviews the top ten pieces of advice for improving ticket queue management at the service desk.

      • Improve Service Desk Ticket Queue Management Storyboard

      2. Service Desk Queue Structure Template – A template to help you map out and optimize your service desk ticket queues

      This template includes several examples of service desk queue structures, followed by space to build your own model of your optimal service desk queue structure and document who is assigned to each queue and responsible for managing each queue.

      • Service Desk Queue Structure Template
      [infographic]

      Further reading

      Improve Service Desk Ticket Queue Management

      Strong queue management is the foundation to good customer service

      Analyst Perspective

      Secure your foundation before you start renovating.

      Service Desk and IT leaders who are struggling with low efficiency, high backlogs, missed SLAs, and poor service desk metrics often think they need to hire more resources or get a new ITSM tool with better automation and AI capabilities. However, more often than not, the root cause of their challenges goes back to the fundamentals.

      Strong ticket queue management processes are critical to the success of all other service desk processes. You can’t resolve incidents and fulfill service requests in time to meet SLAs without first getting the ticket to the right place efficiently and then managing all tickets in the queue effectively. It sounds simple, but we see a lot of struggles around queue management, from new tickets sitting too long before being assigned, to in-progress tickets getting buried in favor of easier or higher-priority tickets, to tickets jumping from queue to queue without progress, to a seemingly insurmountable backlog.

      Once you have taken the time to clearly structure your queues, assign resources, and define your processes for routing tickets to and from queues and resolving tickets in the queue, you will start to see response and resolution time decrease along with the ticket backlog. However, accountability for queue management is often overlooked and is really key to success.
      This is an image of Dr. Natalie Sansone, Senior Research Analyst at Info-Tech Research Group

      Natalie Sansone, PhD
      Senior Research Analyst, Infrastructure & Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Tickets come into the service desk via multiple channels (email, phone, chat, portal) and aren’t consolidated into a single queue, making it difficult to know what to prioritize.
      • New tickets sit in the queue for too long before being assigned while assigned tickets sit for too long without progress or in the wrong queue, leading to slow response and resolution times.
      • Tickets quickly pile up in the queues, get lost or buried, or jump between queues without finding the right home, leading to a seemingly insurmountable backlog and breached SLAs.

      Common Obstacles

      • All tickets pile into the same queue, making it difficult to view, manage, or know who’s working on what.
      • There are no defined rules or processes for how tickets should be assigned and routed, meaning they often take too long to get to the right place.
      • Technicians have no guidelines as to how to prioritize their work, and no easy way to organize their tickets or queue to know what to work on next.
      • Nobody has authority or accountability for queue management, meaning everyone has eyes only on their own tickets while others fall through the cracks.

      Info-Tech’s Approach

      • Clearly define your queue structure, organize the queues by content, then assign resources to relevant queues depending on their role and expertise.
      • Define and document queue management processes, from initial triage to how to prioritize work on assigned tickets. Ensure everyone who handles tickets is clear on their responsibilities.
      • Establish clear ownership and accountability for queue management.
      • Once processes have been defined, identify opportunities to build in automation to improve efficiency.

      Info-Tech Insight

      If everybody is managing the queue, then nobody is. Without clear ownership and accountability over each and every queue it becomes too easy for everyone to assume someone else is handling or monitoring a ticket when in fact nobody is. Assign a Queue Manager to each queue and ensure someone is responsible for monitoring ticket movement across all the queues.

      Timeliness is essential to customer satisfaction

      And timeliness can’t be achieved without good queue management practices.

      As soon as that ticket comes in, the clock starts ticking…

      A host of different factors influence service desk response time and resolution time, including process optimization and documentation, workflow automation, clearly defined prioritization and escalation rules, and a comprehensive and easily accessible knowledgebase.

      However, the root cause of poor response and resolution time often comes down to the basics like ticket queue management. Without clearly defined processes and ownership for assigning and actioning tickets from the queue in the most effective order and manner, customer satisfaction will suffer.

      For every 12-hour delay in response time*, CSAT drops by 9.6%.

      *to email and web support tickets
      Source: Freshdesk, 2021

      A Freshworks analysis of 107 million service desk interactions found the relationship between CSAT and response time is stronger than resolution time - when customers receive prompt responses and regular updates, they place less value on actual resolution time.

      A queue is simply a line of people (or tickets) waiting to be helped

      When customers reach out to the service desk for help, their messages are converted into tickets that are stored in a queue, waiting to be actioned appropriately.

      Ticket Queue

      Email/web
      Ideally, the majority of tickets come into the ticket queue through email or a self-service portal, allowing for appropriate categorization, prioritization, and assignment.

      Phone
      For IT teams with a high volume of support requests coming in through the phone, reducing wait time in queue may be a priority.

      Chat
      Live chat is growing in popularity as an intake method and may require routing and distribution rules to prevent long or multiple queues.

      Queue Management

      Queue management is a set of processes and tools to direct and monitor tickets or manage ticket flow. It involves the following activities:

      • Review incoming tickets
      • Categorize and prioritize tickets
      • Route or assign appropriately
      • View or update ticket status
      • Monitor resource workload
      • Ensure tickets are being actioned in time
      • Proactively identify SLA breaches

      Ineffective queue management can bury you in backlog

      Ticket backlog with poor queue management

      Without a clear and efficient process or accountability for moving incoming tickets to the right place, tickets will be worked on randomly, older tickets will get buried, the backlog will grow, and SLAs will be missed.

      Ticket backlog with good queue management

      With effective queue management and ownership, tickets are quickly assigned to the right resource, worked on within the appropriate SLO/SLA, and actively monitored, leading to a more manageable backlog and good response and resolution times.

      A growing backlog will quickly lead to dissatisfied end users and staff

      Failing to efficiently move tickets from the queue or monitor tickets in the queue can quickly lead to tickets being buried and support staff feeling buried in tickets.

      Common challenges with queue management include:

      • Tickets come in through multiple channels and aren’t consolidated into a single queue
      • New tickets sit unassigned for too long, resulting in long response times
      • Tickets move around between multiple queues with no clear ownership
      • Assigned tickets sit too long in a queue without progress and breach SLA
      • No accountability for queue ownership and monitoring
      • Technicians cherry pick the easiest tickets from the queue
      • Technicians have no easy way to organize their queue to know what to work on next

      This leads to:

      • Long response times
      • Long resolution times
      • Poor workload distribution and efficiency
      • High backlog
      • Disengaged, frustrated staff
      • Dissatisfied end users

      Info-Tech Insight

      A growing backlog will quickly lead to frustrated and dissatisfied customers, causing them to avoid the service desk and seek alternate methods to get what they need, whether going directly to their favorite technician or their peers (otherwise known as shadow IT).

      Dig yourself out with strong queue management

      Strong queue management is the foundation to good customer service.

      Build a mature ticket queue management process that allows your team to properly prioritize, assign, and work on tickets to maximize response and resolution times.

      A mature queue management process will:

      • Reduce response time to address tickets.
      • Effectively prioritize tickets and ensure everyone knows what to work on next.
      • Ensure tickets get assigned and routed to the right queue and/or resource efficiently.
      • Reduce overall resolution time to resolve tickets.
      • Enable greater accountability for queue management and monitoring of tickets.
      • Improve customer and employee satisfaction.

      As queue management maturity increases:
      Response time decreases
      Resolution time decreases
      Backlog decreases
      End-user satisfaction increases

      Ten Tips to Effectively Manage Your Queue

      The remaining slides in this deck will review these ten pieces of advice for designing and managing your ticket queues effectively and efficiently.

      1. Define your optimal queue structure
      2. Design and assign resources to relevant queues
      3. Define and document queue management processes
      4. Clearly define queue management responsibilities for every team member
      5. Establish clear ownership & accountability over all queues
      6. Always keep ticket status and documentation up to date
      7. Shift left to reduce queue volume
      8. Build-in automation to improve efficiency
      9. Configure your ITSM tool to support and optimize queue management processes
      10. Don’t lose visibility of the backlog

      #1: Define your optimal queue structure

      There is no one right way to do queue management; choose the approach that will result in the highest value for your customers and IT staff.

      Sample queue structures

      This is an image of a sample Queue structure, where Incoming Tickets from all channels pass through auto or manual Queue assignment, to a numbered queue position.

      *Queues may be defined by skillset, role, ticket category, priority, or a hybrid.

      Triage and Assign

      • All incoming tickets are assigned to an appropriate queue based on predefined criteria.
      • Queue assignment may be done through automated workflows based on specific fields within the ticket, or manually by a
      • Queue Manager, dedicated coordinator, or Tier 1 staff.
      • Queues may be defined based on:
        • Skillset/team (e.g. Infrastructure, Security, Apps, etc.)
        • Ticket category (e.g. Network, Office365, Hardware, etc.)
        • Priority (e.g. P1, P2, P3, P4, P5)
      • Resources may be assigned to multiple queues.

      Define your optimal queue structure (cont.)

      Tiered generalist model

      • All incidents and service requests are routed to Tier 1 first, who prioritize and, if appropriate, conduct initial triage, troubleshooting, and resolution on a wide range of issues.
      • More complex or high-priority tickets are escalated to resources at Tier 2 and/or Tier 3, who are specialists working on projects in addition to support tickets.
      This is an image of the Tiered Generalist Model

      Unassigned queue

      • Very small teams may work from an unassigned queue if there are processes in place to monitor tickets and workload balance.
      • Typically, these teams work by resolving the oldest tickets first regardless of complexity (also known as First In, First Out or FIFO). However, this doesn’t allow for much flexibility in terms of priority of the request or customer.
      This is an image of an unassigned queue model

      #2: Design and assign resources to relevant queues

      Once you’ve defined your overall structure, define the content of each queue.

      This image depicts a sample queue organization structure. The bin titles are: Workgroup; Customer Group; Problem Type; and Hybrid

      Info-Tech Insight

      Start small; don’t create a queue for every possible ticket type. Remember that someone needs to be accountable for each of these queues, so only build what you can monitor.

      #3 Define and document queue management processes

      A clear, comprehensive, easily digestible SOP or workflow outlining the steps for handling new tickets and working tickets from the queue will help agents deliver a consistent experience.

      PROCESS INCLUDES:

      DEFINE THE FOLLOWING:

      TRIAGING INCOMING TICKETS

      • Ensure a ticket is created for every issue coming from every channel (e.g. phone, email, chat, walk-in, portal).
      • Assign a priority to each ticket.
      • Categorize ticket and add any necessary documentation
      • Update ticket status.
      • Delete spam, merge duplicate tickets, clean up inbox.
      • Assign tickets to appropriate queue or resource, escalate when necessary.
      • How should tickets be prioritized?
      • How should tickets from each channel be prioritized and routed? (e.g. are phone calls resolved right away? Are chats responded to immediately?)
      • Criteria that determine where a ticket should be sent or assigned (i.e. ticket category, priority, customer type).
      • How should VIP tickets be handled?
      • When should tickets be automatically escalated?
      • Which tickets require hierarchical escalation (i.e. to management)?

      WORKING ON ASSIGNED TICKETS

      • Continually update ticket status and documentation.
      • Assess which tickets should be worked on or completed ahead of others.
      • Troubleshoot, resolve, or escalate tickets.
      • In what order should tickets be worked on (e.g. by priority, by age, by effort, by time to breach)?
      • How long should a ticket be worked on without progress before it should be escalated to a different tier or queue?
      • Exceptions to the rule (e.g. in which circumstances should a lower priority ticket be worked on over a higher priority ticket).

      Process recommendations

      As you define queue management processes, keep the following advice in mind:

      Rotate triage role

      The triage role is critical but difficult. Consider rotating your Tier 1 resources through this role, or your service desk team if you’re a very small group.

      Limit and prioritize channels

      You decide which channels to enable and prioritize, not your users. Phone and chat are very interrupt-driven and should be reserved for high-priority issues if used. Your users may not understand that but can learn over time with training and reinforcement.

      Prioritize first

      Priority matrixes are necessary for consistency but there are always circumstances that require judgment calls. Think about risk and expected outcome rather than simply type of issue alone. And if the impact is bigger than the initial classification, change it.

      Define VIP treatment

      In some organizations, the same issue can be more critical if it happens to a certain user role (e.g. client facing, c-suite). Identify and flag VIP users and clearly define how their tickets should be prioritized.

      Consider time zone

      If users are in different time zones, take their current business hours into account when choosing which ticket to work on.

      Info-Tech Insight

      Think of your service desk as an emergency room. Patients come in with different symptoms, and the triage nurse must quickly assess these symptoms to decide who the patient should see and how soon. Some urgent cases will need to see the doctor immediately, while others can wait in another queue (the waiting room) for a while before being dealt with. Some cases who come in through a priority channel (e.g. ambulance) may jump the queue. Checklists and criteria can help with this decision making, but some degree of judgement is also required and that comes with experience. The triage role is sometimes seen as a junior-level role, but it actually requires expertise to be done well.

      For more detailed process guidance, see Standardize the Service Desk

      Info-Tech’s blueprint Standardize the Service Desk will help you standardize and document core service desk processes and functions, including:

      • Service desk structure, roles, and responsibilities
      • Metrics and reporting
      • Ticket handling and ticket quality
      • Incident and critical incident management
      • Ticket categorization
      • Prioritization and escalation
      • Service request fulfillment
      • Self-service considerations
      • Building a knowledgebase
      this image contains three screenshots from Info-Tech's Standardize the Service Desk Blueprint

      #4 Clearly define queue management responsibilities for every team member

      This may be one of the most critical yet overlooked keys to queue management success. Define the following:

      Who will have overall accountability?

      Someone must be responsible for monitoring all incoming and open tickets as well as assigned tickets in every queue to ensure they are routed and fulfilled appropriately. This person must have authority to view and coordinate all queues and Queue Managers.

      Who will manage each queue?

      Someone must be responsible for managing each queue, including assigning resources, balancing workload, and ensuring SLOs are met for the tickets within their queue. For example, the Apps Manager may be the Queue Manager for all tickets assigned to the Apps team queue.

      Who is responsible for assigning tickets?

      Will you have a triage team who monitors and assigns all incoming tickets? What are their specific responsibilities (e.g. prioritize, categorize, attempt troubleshooting, assign or escalate)? If not, who is responsible for assigning new tickets and how is this done? Will the triage role be a rotating role, and if so, what will the schedule be?

      What are everyone’s responsibilities?

      Everyone who is assigned tickets should understand the ticket handling process and their specific responsibilities when it comes to queue management.

      #5 Establish clear ownership & accountability over all queues

      If everyone is accountable, then no one is accountable. Ownership for each queue and all queues must be clearly designated.

      You may have multiple queue manager roles: one for each queue, and one who has visibility over all the queues. Typically, these roles make up only part of an individual’s job. Clearly define the responsibilities of the Queue Manager role; sample responsibilities are on the right.

      Info-Tech Insight

      Lack of authority over queues – especially those outside Tier 1 of the service desk – is one of the biggest pitfalls we see causing aging tickets and missed SLAs. Every queue needs clear ownership and accountability with everyone committed to meeting the same SLOs.

      The Queue Manager or Coordinator is accountable for ensuring tickets are routed to the correct resources service level objectives or agreements are met.

      Specific responsibilities may include:

      • Monitors queues daily
      • Ensures new tickets are assigned to appropriate resources for resolution
      • Verifies tickets have been routed and assigned correctly and reroutes if necessary
      • Reallocates tickets if assigned resource is suddenly unavailable or away
      • Ensures ticket handling process is met, ticket status is up to date and correct, and ticket documentation is complete
      • Escalates tickets that are aging or about to breach
      • Ensures service level objectives or agreements are met
      • Facilitates resource allocation based on workload
      • Coordinates tickets that require collaboration across workgroups to ensure resolution is achieved within SLA
      • Associates child and parent tickets
      • Prepares reports on ticket status and volume by queues
      • Regularly reviews reports to identify and act on issues and make improvements or changes where needed
      • Identifies opportunities for improvement

      #6 Always keep ticket status and documentation up to date

      Anyone should be able to quickly understand the status and progress on a ticket without needing to ask the technician working on it. This means both the ticket status and documentation must be continually and accurately updated.

      Ticket Documentation
      Ticket descriptions and documentation must be kept accurate and up to date. This ensures that if the ticket is escalated or assigned to a new person, or the Queue Manager or Service Desk Manager needs to know what progress has been made on a ticket, that person doesn’t need to waste time with back-and-forth communication with the technician or end user.

      Ticket Status
      The ticket status field should change as the ticket moves toward resolution, and must be updated every time the status changes. This ensures that anyone looking at the ticket queue can quickly learn and communicate the status of a ticket, tickets don’t get lost or neglected, metrics are accurate (such as time to resolve), and SLAs are not impacted if a ticket is on hold.

      Common ticket statuses include:

      • New/open
      • Assigned
      • In progress
      • Declined
      • Canceled
      • Pending/on hold
      • Resolved
      • Closed
      • Reopened

      For more guidance on ticket handling and documentation, download Info-Tech’s blueprint: Standardize the Service Desk.

      • For ticket handling and documentation, see Step 1.4
      • For ticket status fields, see Step 2.2.

      #7 Shift left to reduce queue volume

      Enable processes such as knowledge management, self-service, and problem management to prevent tickets from even coming into the queue.

      Shift left means enabling fulfilment of repeatable tasks and requests via faster, lower-cost delivery channels, self-help tools, and automation.

      This image contains a graph, where the Y axis is labeled Cost, and the X axis is labeled Time to Resolve.  On the graph are depicted service desk levels 0, 1, 2, and 3.

      Shift to Level 1

      • Identify tickets that are often escalated beyond Tier 1 but could be resolved by Level 1 if they were given the tools, training, resources, or access they need to do so.
      • Provide tools to succeed at resolving those defined tasks (e.g. knowledge article, documentation, remote tools).
      • Embed knowledge management in resolution workflows.

      Shift to End User

      • Build a centralized, easily accessible self-service portal where users can search for solutions to resolve their issues without having to submit a ticket.
      • Communicate and train users on how to use the portal regularly update and improve it.

      Automate & Eliminate

      • Identify processes or tasks that could be automated to eliminate work.
      • Invest in problem management and event management to fix the root problem of recurring issues and prevent a problem from occurring in the first place, thereby preventing future tickets.

      #8 Build in automation to improve efficiency

      Manually routing every ticket can be time-consuming and prone to errors. Once you’ve established the process, automate wherever possible.

      Automation rules can be used to ensure tickets are assigned to the right person or queue, to alert necessary parties when a ticket is about to breach or has breached SLA, or to remind technicians when a ticket has sat in a queue or at a particular status for too long.

      This can improve efficiency, reduce error, and bring greater visibility to both high-priority tickets and aging tickets in the backlog.

      However, your processes, queues, and responsibilities must be clearly defined before you can build in automation.

      For more guidance on implementing automation and AI within your service desk, see these blueprints:

      https://tymansgrpup.com/research/ss/accelerate-your-automation-processes https://tymansgrpup.com/research/ss/improve-it-operations-with-ai-and-ml

      For examples of rules, triggers, and fields you can automate to improve the efficiency of your queue management processes, see the next slide.

      Sample automation rules

      Criteria or triggers you can automate actions based on:

      • Ticket type
      • Specific field in a ticket web form
      • Ticket form that was used (e.g. specific service request form from the portal)
      • Ticket category
      • Ticket priority
      • Keyword in an email subject line
      • Keywords or string in a chat
      • Requester name or email
      • Requester location
      • Requester/ticket language
      • Requester VIP status
      • Channel ticket was received through
      • SLAs or time-based automations
      • Agent skill
      • Agent status or capacity

      Fields or actions those triggers can automate

      • Priority
      • Category
      • Ticket routing
      • Assigned agent
      • Assigned queue
      • SLA/due date
      • Notifications/communication

      Sample Automation Rules

      • When ticket is about to breach, send alert to Queue Manager and Service Desk Manager.
      • When ticket comes from VIP user, set urgency to high.
      • When ticket status has been set to “open” for ten hours, send an alert to Queue Manager.
      • When ticket status has been set to “on hold” for five days, send a reminder to assignee.
      • When ticket is categorized as “Software-ERP,” send to ERP queue.
      • When ticket is prioritized as P1/critical, send alert to emergency response team.
      • When ticket is prioritized as P1 and hasn’t been updated for one hour, send an alert to Incident Manager.
      • When an in-progress ticket is reassigned to a new queue, alert Queue Manager.
      • When ticket has not been resolved within seven days, flag as aging ticket.

      #9 Configure your ITSM tool to support and optimize queue management processes

      Configure your tool to support your needs; don’t adjust your processes to match the tool.

      • Most ITSM tools have default queues out of the box and the option to create as many custom queues, filters, and views as you need. Custom queues should allow you to name the queue, decide which tickets will be sent to the queue, and what columns or information are displayed in the queue.
      • Before you configure your queues and dashboards, sit down with your team to decide what you need and what will best enable each agent to manage their workload.
      • Decide which queues each role should have access to – most should only need to see their own queue and their team’s queue.
      • Configure which queues or views new tickets will be sent to.
      • Configure automation rules defined earlier (e.g. automate sending certain tickets to specific queues or sending notifications to specific parties when certain conditions are met).
      • Configure dashboards and reports on queue volume and ticket status data relevant to each team to help them manage their workload, increase visibility, and identify issues or actions.

      Info-Tech Insight

      It can be overwhelming to support agents when their view is a long and never-ending queue. Set the default dashboard view to show only those tickets assigned to the viewer to make it appear more manageable and easier to organize.

      Configure queues to maximize productivity

      Info-Tech Insight

      The queue should quickly give your team all the information they need to prioritize their work, including ticket status, priority, category, due date, and updated timestamps. Configuration is important - if it’s confusing, clunky, or difficult to filter or sort, it will impact response and resolution times and can lead to missed tickets. Give your team input into configuration and use visuals such as color coding to help agents prioritize their work – for example, VIP tickets may be clearly flagged, critical or high priority tickets may be highlighted, tickets about to breach may be red.

      this image contains a sample queue organization which demonstrates how to maximize productivity

      #10 Don’t lose visibility of the backlog

      Be careful not to focus so much on assigning new tickets that you forget to update aging tickets, leading to an overwhelming backlog and dissatisfied users.

      Track metrics that give visibility into how quickly tickets are being resolved and how many aging tickets you have. Metrics may include:

      • Ticket resolution time by priority, by workgroup
      • Ticket volume by status (i.e. open, in progress, on hold, resolved)
      • Ticket volume by age
      • Ticket volume by queue and assignee

      Regularly review reports on these metrics with the team.

      Make it an agenda item to review aging tickets, on hold tickets, and tickets about to breach or past breach with the team.

      Take action on aging tickets to ensure progress is being made.

      Set rules to close tickets after a certain number of attempts to reach unresponsive users (and change ticket status appropriately).

      Schedule times for your team to tackle aged tickets or tickets in the backlog.

      Info-Tech Insight

      It can be easy for high priority work to constantly push down low priority work, leaving the lower priority tickets to constantly be ignored and users to be frustrated. If you’re struggling with aging tickets, backlog, and tickets breaching SLA, experiment with your team and queue structure to figure out the best resource distribution to handle your workload. This could mean rotating people through the triage role to allow them time to work through the backlog, reducing the number of people doing triage during slower volume periods, or giving technicians dedicated time to work through tickets. For help with forecasting demand and optimizing resources, see Staff the Service Desk to Meet Demand.

      Activity 1.1: Define ticket queues

      1 hour

      Map out your optimal ticket queue structure using the Service Desk Queue Structure Template. Follow the instructions in the template to complete it as a team.

      The template includes several examples of service desk queue structures followed by space to build your own model of an optimal service desk queue structure and to document who is assigned to each queue and responsible for managing each queue.

      Note:

      The template is not meant to map out your entire service desk structure (e.g. tiers, escalation paths) or ticket resolution process, but simply the ticket queues and how a ticket moves between queues. For help documenting more detailed process workflows or service desk structure, see the blueprint Standardize the Service Desk.

      this image contains screenshot from Info-Tech's blueprint: Service Desk Queue structure Template

      Input

      • Current queue structure and roles

      Output

      • Defined service desk ticket queues and assigned responsibilities

      Materials

      • Org chart
      • ITSM tool for reference, if needed

      Participants

      • Service Desk Manager
      • IT Director
      • Queue Managers

      Document in the Service Desk Queue Structure Template.

      Related Info-Tech Research

      Standardize the Service Desk

      This project will help you build and improve essential service desk processes including incident management, request fulfillment, and knowledge management to create a sustainable service desk.

      Optimize the Service Desk With a Shift-Left Strategy

      This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.

      Improve Service Desk Ticket Intake

      This project will help you streamline your ticket intake process and identify improvements to your intake channels.

      Staff the Service Desk to Meet Demand

      This project will help you determine your optimal service desk structure and staffing levels based on your unique environment, workload, and trends.

      Works Cited

      “What your Customers Really Want.” Freshdesk, 31 May 2021. Accessed May 2022.

      Select a Marketing Management Suite

      • Buy Link or Shortcode: {j2store}533|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $6,560 Average $ Saved
      • member rating average days saved: 50 Average Days Saved
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • Time, money, and effort are wasted on channels and campaigns that are not resonating with your customer base.
      • Email marketing, social marketing, and/or lead management alone are often not enough to meet more sophisticated marketing needs.
      • Many organizations struggle with taking a systematic approach to selection that pairs functional requirements with specific marketing workflows, and as a result they choose a marketing management suite (MMS) that is not well aligned to their needs, wasting resources and causing end-user frustration.
      • For IT managers or marketing professionals, the task to incorporate MMS technology into the organization requires not only receiving the buy-in for the MMS investment but also determining the vendor and solution that best fit the organization’s particular marketing management needs.

      Our Advice

      Critical Insight

      • An MMS enables complex campaigns across many channels, product lines, customer segments, and marketing groups throughout the enterprise.
      • Selecting an MMS has become increasingly difficult because the number of players in the marketplace has ballooned. Moreover, picking the wrong marketing solution has a direct impact on revenue.
      • Determine whether the investment in an MMS is worthwhile or the funds are better allocated elsewhere. For organizations with a large audience or varied product offerings, an MMS enables complex campaigns across many channels, product lines, customer segments, and marketing groups throughout the enterprise.

      Impact and Result

      • Maximize your success and credibility with a proposal that emphasizes the areas relevant to your situation.
      • Perform more effective customer targeting and campaign management. Having an MMS equips marketers with the tools they need to make informed decisions around campaign execution, resulting in better targeting, acquisition, and customer retention. This means more revenue.
      • Maximize marketing impact with analytics-based decision making. Understanding users’/customers’ behaviors and preferences will allow you to run effective marketing initiatives.

      Select a Marketing Management Suite Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to approach selecting an MMS, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Launch the MMS project and collect requirements

      Assess the organization’s fit for MMS technology and structure the MMS selection project.

      • Select a Marketing Management Suite – Phase 1: Launch the MMS Project and Collect Requirements
      • MMS Readiness Assessment Checklist

      2. Shortlist marketing management suites

      Produce a vendor shortlist for your MMS.

      • Select a Marketing Management Suite – Phase 2: Shortlist Marketing Management Suites

      3. Select vendor and communicate decision to stakeholders

      Evaluate RFPs, conduct vendor demonstrations, and select an MMS.

      • Select a Marketing Management Suite – Phase 3: Select Vendor and Communicate Decision to Stakeholders
      • MMS Requirements Picklist Tool
      • MMS Request for Proposal Template
      • MMS Vendor Demo Script
      • MMS Selection Executive Presentation Template
      [infographic]

      Workshop: Select a Marketing Management Suite

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Launch the MMS Project and Collect Requirements

      The Purpose

      Determine a “right-size” approach to marketing enablement applications.

      Key Benefits Achieved

      Confirmation of the goals, objectives, and direction of the organization is marketing application strategy.

      Activities

      1.1 Assess the value and identify the organization’s fit for MMS technology.

      1.2 Understand the art of the possible.

      1.3 Understand CXM strategy and identify your fit for MMS technology.

      1.4 Build procurement team and project customer experience management (CXM) strategy.

      1.5 Identify your MMS requirements.

      Outputs

      Project team list.

      Preliminary requirements list.

      2 Shortlist Marketing Management Suites

      The Purpose

      Enumerate relevant marketing management suites and point solutions.

      Key Benefits Achieved

      List of marketing enablement applications based on requirements articulated in the preliminary requirements list strategy.

      Activities

      2.1 Identify relevant use cases.

      2.2 Discuss the vendor landscape.

      Outputs

      Vendor shortlist.

      3 Select Vendor and Communicate Decision to Stakeholders

      The Purpose

      Develop a rationale for selecting a specific MMS vendor.

      Key Benefits Achieved

      MMS Vendor decision.

      A template to communicate the decision to executives.

      Activities

      3.1 Create a procurement strategy.

      3.2 Discuss the executive presentation.

      3.3 Plan the procurement process.

      Outputs

      Executive/stakeholder PowerPoint presentation.

      Selection of an MMS.

      Further reading

      Select a Marketing Management Suite

      A best-fit solution balances needs, cost, and capability.

      Table of contents

      1. Project Rationale
      2. Execute the Project/DIY Guide
      3. Appendices

      ANALYST PERSPECTIVE

      Navigate the complexity of a vast ecosystem by taking a structured approach to marketing management suite (MMS) selection.

      Marketing applications are in high demand, but it is difficult to select a suite that is right for your organization. Market offerings have grown from 50 vendors to over 800 in the past five years. Much of the process of identifying an appropriate vendor is not about the vendor at all, but rather about having a comprehensive understanding of internal needs. There are instances where a smaller-point solution is necessary to satisfy requirements and a full marketing management suite is an overinvestment.

      Likewise, a partner with differentiating features such as AI-driven workflows and a mobile software development kit can act as a powerful extension of an overall customer experience management strategy. It is crucial to make the right decision; missing the mark on an MMS selection will have a direct impact on the business’ bottom line.

      Ben Dickie
      Research Director, Enterprise Applications
      Info-Tech Research Group

      Phase milestones

      Launch the MMS Project and Collect Requirements — Phase 1

      • Understand the MMS market space.
      • Assess organizational and project readiness for MMS selection.
      • Structure your MMS selection and implementation project by refining your MMS roadmap.
      • Align organizational use-case fit with market use cases.
      • Collect, prioritize, and document MMS requirements.

      Shortlist MMS Tool — Phase 2

      • Review MMS market leaders and players within your aligned use case.
      • Review MMS vendor profiles and capabilities.
      • Shortlist MMS vendors based on organizational fit.

      Select an MMS — Phase 3

      • Submit request for proposal (RFP) to shortlisted vendors.
      • Evaluate vendor responses and develop vendor demonstration scripts.
      • Score vendor demonstrations and select the final product.

      Stop! Are you ready for this project?

      This Research Is Designed For:
      • IT applications directors and business analysts supporting their marketing teams in selecting and implementing a robust marketing solution.
      • Any organization looking to procure an MMS tool that will allow it to automate its marketing processes or learn more about the MMS vendor landscape.
      This Research Will Help You:
      • Understand today’s MMS market, specific to marketing automation, marketing intelligence, and social marketing use-case scenarios.
      • Understand MMS functionality as well as marketing terminology.
      • Follow best practices to prepare for and execute on selection, including requirements gathering and vendor evaluation.
      This Research Will Also Assist:
      • Marketing managers, brand managers, and any marketing professional looking to build a cohesive marketing platform.
      • MMS project teams or working groups tasked with managing an RFP process for vendor selection.
      This Research Will Help Them
      • Assess organizational and project readiness for embarking on MMS selection.
      • Draft an RFP, manage the vendor and product review process, and select a vendor.

      Executive summary

      Situation

      The MMS market is a landscape of vendors offering campaign management, multichannel support, analytics, and publishing tools. Many vendors specialize in some of these areas but not all. Sometimes multiple products are necessary – but determining which feature sets the organization truly needs can be a challenging task. The right technology stack is critical in order to bring automation to marketing initiatives.

      Complication

      • The first challenge is deciding whether to implement a full marketing suite or a point solution.
      • The number of marketing suites and point solutions has increased from 50 to more than 800 just in the past five years.
      • IT is receiving a growing number of marketing analytics requests and must be prepared to speak intelligently about marketing management vendor selection.

      Resolution

      • Leverage Info-Tech’s comprehensive three-phase approach to MMS selection projects: assess your organization’s preparedness to go into the selection stage, move through technology selection, and present decisions to stakeholders.
      • Conduct an MMS project preparedness assessment to ensure you maximize the value of your time, effort, and spend.
      • Determine whether your organization’s needs will best be met by a marketing management suite or a point solution.
      • Determine which use case your organization fits into and review the relevant vendor landscape, common capability, and areas of product differentiation. Consult Info-Tech’s market analysis to shortlist vendors for your RFP process.
      • Take advantage of traceable and auditable selection tools to run an effective evaluation and selection process. Be prepared to answer the retroactive question “Why this MMS?” with documentation of your selection process and outputs.

      Info-Tech Insight

      1. The new MMS market. Selecting a marketing management solution has become increasingly difficult, with the number of players in the marketplace ballooning to meet buyer demand.
      2. Direct translation to revenue. Picking the wrong marketing solution has a direct impact on the bottom line. However, the right MMS can lead to a 7.3x greater year-over-year increase in annual revenue.
      3. Don’t buy best-of-breed; buy best-for-you. Base your vendor selection on your requirements and use case, not on the vendor’s overall performance.

      MMS is a key piece of the CRM puzzle

      In order to optimize cross-sell opportunities and marketing effectiveness, there needs to be a master customer database, which belongs in the customer relationship management (CRM) suite.

      When it comes to marketing automation capabilities, using CRM is like building a car from a kit. All the parts are there, but you need the time and skill to put it all together. Using marketing automation is like buying the car you want or need, with all the features you want already installed and some gas in the tank, ready to drive. In either case, you still need to know how to drive and where you want to go.” (Mac McIntosh, Marketo Inc.) 'CRM' surrounded by its components with 'MMS' highlighted. A master database – the central place where all up-to-the-minute data on a customer profile is stored – is essential for MMS success. This is particularly true for real-time capability effectiveness and to minimize customer fatigue.

      Understand what an MMS can do for you

      Take time to learn the capabilities of modern marketing applications. Understanding the “art of the possible” will help you to get the most out of your MMS.

      MMS helps marketers in two primary ways:
      1. It allows them to efficiently execute and manage campaigns across dozens of channels and products.
      2. It allows them to analyze the outcomes of campaigns.
      Marketing suites accomplish these tasks by:
      • Leveraging workflow automation to reduce the amount of time spent creating marketing campaigns
      • Using internal or third-party data to increase conversion effectiveness from customer databases across the organization
      A strong MMS provides marketers with the data they need for actionable insights about their customers.
      A marketing automation solution delivers essentially all the benefits of an email marketing solution along with integrated capabilities that would otherwise need to be cobbled together using various standalone technologies.” (Marketo Inc.)

      Review Info-Tech’s vendor profiles of the MMS market to identify vendors that meet your requirements

      Logos of multiple vendors including 'Hubspot', 'IBM', 'Salesforce marketing cloud', etc.

      Use Info-Tech’s MMS implementation methodology as a starting point for your organization’s MMS selection

      Info-Tech’s implementation methodology is not a step-by-step approach to vendor selection, but rather it highlights the pertinent considerations for MMS selection at each of the five steps outlined below.

      1

      2

      3

      4

      5

      Establish Resources Gather Requirements Write and Assemble RFP Exercise Due Diligence Evaluate Candidate Solutions
      • Determine work initiative dependencies and project milestones.
      • Establish the project timeline.
      • Designate project resources.
      • Prioritize rollout of functionality.
      • Link business goals with the MMS selection project.
      • Determine user roles and profiles.
      • Conduct stakeholder interviews.
      • Build communication and change management plan.
      • Draft an RFP.
      • Make a plan for soliciting feedback and publishing the RFP.
      • Customize a vendor demo script and scorecard.
      • Conduct vendor demos.
      • Speak with vendor references.
      • Evaluate nonfunctional requirements.
      • Understand upgrade schedules.
      • Define a vendor evaluation framework.
      • Prepare the final evaluation.
      • Prepare a presentation for management.

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Professional services provider engages Info-Tech to guide it through its MMS selection journey

      CASE STUDY

      Industry: Professional Services | Source: Info-Tech Consulting

      Challenge

      A large professional services firm specializing in knowledge development was looking to modernize an outdated marketing services stack.

      Previous investments in marketing tools ranging from email automation to marketing analytics led to system fragmentation. As a result, there was no 360-degree overview of marketing operations and no way to run campaigns at scale.

      To satisfy the organization’s aspirations, a comprehensive marketing management suite had to be selected that met needs for the foreseeable future.

      Solution

      The Info-Tech consulting team was brought in to assist in the MMS selection process.

      After meeting with several stakeholders, MMS requirements were developed and weighted. An RFP was then created from these requirements.

      Following a market scan, four vendors were selected to complete the organization’s RFP. Demonstration scripts were then developed as the RFPs were completed by vendors.

      Shortlisted vendors progressed to the demonstration phase.

      Results

      Vendor scorecards were utilized during the two-day demonstrations with the core project team to score each vendor.

      During the scoring process the team also identified the need to replace the organization’s core customer repository (a legacy CRM).

      The decision was made to select a CRM before finalizing the MMS selection. Doing so ensured uniform system architecture and strong interoperability between the firm’s MMS and its CRM.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Select a Marketing Management Suite – project overview

      1. Launch the MMS Project and Collect Requirements 2. Shortlist Marketing Management Suites 3. Select Vendor and Communicate Decision to Stakeholders
      Supporting Tool icon

      Best-Practice Toolkit

      1.1 Assess the value and identify your organization’s fit for MMS technology.

      1.2 Build your procurement team and project customer experience management (CXM) strategy.

      1.3 Identify your MMS requirements.

      2.1 Produce your shortlist

      3.1 Select your MMS

      3.2 Present selection

      Guided Implementations

      • Understand CXM strategy and identify your fit for MMS technology.
      • Identify staffing needs.
      • Plan requirements gathering steps.
      • Discuss use-case fit assessment results.
      • Discuss vendor landscape.
      • Create a procurement strategy.
      • Discuss executive presentation.
      • Conduct a proposal review.
      Associated Activity icon

      Onsite Workshop

      Module 1:
      Launch Your MMS Selection Project
      Module 2:
      Analyze MMS Requirements and Shortlist Vendors
      Module 3:
      Plan Your Procurement Process
      Phase 1 Outcome:
      • Launch of MMS selection project
      Phase 2 Outcome:
      • Shortlist of vendors
      Phase 3 Outcome:
      • Selection of MMS

      Use these icons to help direct you as you navigate this research

      Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

      A small monochrome icon of a wrench and screwdriver creating an X.

      This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

      A small monochrome icon depicting a person in front of a blank slide.

      This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members who will come onsite to facilitate a workshop for your organization.

      A small monochrome icon depicting a descending bar graph.

      This icon denotes a slide that pertains directly to the Info-Tech vendor profiles on marketing management technology. Use these slides to support and guide your evaluation of the MMS vendors included in the research.

      Select a Marketing Management Suite

      PHASE 1

      Launch the MMS Project and Collect Requirements

      Phase 1 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Launch Your MMS Project and Collect Requirements

      Proposed Time to Completion: 3 weeks
      Step 1.2: Structure the Project Step 1.3: Gather Requirements
      Start with an analyst kick-off call:
      • Review readiness requirements for an MMS project.
      • Understand the work initiatives involved in MMS selection.
      Review findings with analyst:
      • Determine use case based on your organizational alignment.
      • Discuss core MMS requirements.
      Then complete these activities…
      • Conduct an organizational MMS readiness assessment.
      Then complete these activities…
      • Identify best-fit use case.
      • Elicit, capture, and prioritize requirements.
      With these tools & templates:
      • MMS Readiness Assessment Checklist
      With these tools & templates:
      • MMS Requirements Picklist Tool
      Phase 1 Results:
      • Completed readiness assessment.
      • Refined project plan to incorporate selection and implementation.

      Phase 1 milestones

      Launch the MMS Project and Collect Requirements — Phase 1

      • Understand the MMS market space.
      • Assess organizational and project readiness for MMS selection.
      • Structure your MMS selection and implementation project by refining your MMS roadmap.
      • Align organizational use-case fit with market use cases.
      • Collect, prioritize, and document MMS requirements.

      Shortlist MMS Tool — Phase 2

      • Review MMS market leaders and players within your aligned use case.
      • Review MMS vendor profiles and capabilities.
      • Shortlist MMS vendors based on organizational fit.

      Select an MMS — Phase 3

      • Submit request for proposal (RFP) to shortlisted vendors.
      • Evaluate vendor responses and develop vendor demonstration scripts.
      • Score vendor demonstrations and select the final product.

      Step 1.1: Understand the MMS market

      1.1

      1.2

      1.3

      Understand the MMS Market Structure the Project Gather MMS Requirements

      This step will walk you through the following activities:

      • MMS market overview

      This step involves the following participants:

      • Project team
      • Project manager
      • Project sponsor

      Outcomes of this step

      • An understanding of the evolution of the MMS market space and how it helps today’s organizations.
      • An evaluation of new and upcoming trends sought by MMS clients.
      • Verification of whether an MMS is a fit with your organization.

      Speak the same language as the marketing department to deliver the most business value

      Marketing Management Suite Glossary

      Analytics The practice of measuring marketing performance to improve return on investment (ROI). It is often carried out through the visualization of meaningful patterns in data as a result of marketing initiatives.
      Channels The different places where marketers can reach customers (e.g. social media, print mail, television).
      Click-through rate The percentage of individuals who proceed (click-through) from one part of a marketing campaign to the next.
      Content management Curating, creating, editing, and keeping track of content and client-facing assets.
      Customer relationship management (CRM) A core enterprise application that provides a broad feature set for supporting customer interaction processes. The CRM frequently serves as a core customer data repository.
      Customer experience management (CXM) The holistic management of customer interaction processes across marketing, sales, and customer service to create valuable, mutually beneficial customer experiences.
      Engagement rate A social media metric used to describe the amount of likes, comments, shares, etc., that a piece of content receives.
      Lead An individual or organization who has shown interest in the product or service being marketed.
      Omnichannel The portfolio of interaction channels you use.

      MMS is a key piece of the customer experience ecosystem

      Within the broader CXM ecosystem, an MMS typically lives within the CRM platform. Interfacing with the CRM’s master customer database allows an MMS to optimize cross-sell opportunities and marketing effectiveness.

      A master database – the central place where all up-to-the-minute data on a customer profile is stored – is essential for MMS success. This is particularly true for real-time capability effectiveness and to minimize customer fatigue.

      If you have customer records in multiple places, you risk missing customer opportunities and potentially upsetting clients. For example, if a client has communicated preferences or disinterest through one channel, and this is not effectively recorded throughout the organization, another representative is likely to contact them in the same method again – possibly alienating the customer for good.

      A master database requires automatic synchronization with all point solutions, POS, billing systems, agencies, etc. If you don’t have up-to-the-minute information, you can’t score prospects effectively and you lose out on the benefits of the MMS.

      'CRM' surrounded by its components with 'MMS' highlighted.
      Focus on the fundamentals before proceeding. Secure organizational readiness to reduce project risk using Info-Tech’s Build a Strong Technology Foundation for CXM and Select and Implement a CRM Platform blueprints.

      Understanding the “art of the possible”

      The world of marketing technology changes rapidly! Understand how modern marketing management suites are used in most organizations.

      An MMS helps marketers in two primary ways:

      1. It allows them to efficiently execute and manage campaigns across dozens of channels and products.
      2. It allows them to analyze the outcomes of campaigns.

      Marketing suites accomplish these tasks by:

      • Leveraging workflow automation to reduce the amount of time spent creating marketing campaigns.
      • Using internal or third-party data to increase conversion effectiveness from customer databases across the organization.

      A strong MMS provides marketers with the data they need for actionable insights about their customers.

      A marketing automation solution delivers essentially all the benefits of an email marketing solution along with integrated capabilities that would otherwise need to be cobbled together using various standalone technologies.” (Marketo Inc.)

      Inform your way of thinking by understanding the capabilities of modern marketing applications.

      A tree with icons related to knowledge.

      Expect the marketing department to drive suite adoption, but don’t count out the benefits MMS will also provide to IT

      MMS adoption is driven by the need for better campaign execution and marketing intelligence. MMS technologies are adopted to create faster, easier, more intelligent, and more measurable campaigns and make managing complex channels easy and repeatable.

      Top Drivers for Adopting Marketing Management Technologies

      Bar chart of top drivers for adopting marketing management technology. The first four bars are highlighted and the largest, they are labelled 'Campaign Measurement & Effectiveness', 'Execute Multi-channel Campaigns', 'Shorten Marketing Campaign Cycle', and 'Reduce Manual Campaign Creation'.
      (Source: Info-Tech Research Group; N=23)

      The key drivers for MMS are business-related, not IT-related. However, this does not mean that there are no benefits to IT. In fact, the IT department will see numerous benefits, including time and resource savings. Further, not having an MMS creates more work for your IT department. IT must serve as a valued partner for selection and implementation.

      Additional benefits to IT driven by MMS

      Marketing management suites are ideal for large organizations with multiple product lines in complex marketing environments. IT is often more centralized than its counterparts in the business, making it uniquely positioned to encourage greater coordination by helping the business units understand the shared goals and the benefits of working together to roll out suites for marketing workflow management, intelligence, and channel management.

      Cross-Segmentation Additional Revenue Generation Real-Time Capabilities Lead Growth/ Conversion Rate
      Business Value
      • Share resources between brands and product lines.
      • Increase database size with populated client data.
      • Track customer lifetime value.
      • Increase average deal size.
      • Decrease time to execute campaigns.
      • Decrease lead acquisition costs while collecting higher quality leads.
      • Improve retention rates.
      • Reduce cost to serve.
      • Increase customer retention due to effective service.
      • Higher campaign and response rates.
      • Track, measure, and prove the value of marketing activities.
      • Broaden reach through social channels.
      IT Value
      • Reduce reliance on IT for routine tasks such as list creation and data cleansing.
      • Free up IT resources for the sectors of the business where the ROI is greatest.
      • Reduce need for IT to cleanse, modify, or merge data lists because most suites include CRM connectors.
      • Reduce need for constant customization on status reports on lead value and campaign success.

      Info-Tech Insight

      Don’t forget that MMS technologies deliver on the overarching suite value proposition: a robust solution within one integrated offering. Without an MMS in play, organizations in need of this functionality are forced to piece together point solutions (or ad hoc management). This not only increases costs but also is an integration nightmare for IT.

      Step 1.2: Structure the project

      1.1

      1.2

      1.3

      Understand the MMS MarketStructure the ProjectGather MMS Requirements

      This step will walk you through the following activities:

      • Determine if you are ready to kick off the MMS selection project.
      • Align project goals with CXM strategy and business goals.

      This step involves the following participants:

      • Core project team
      • Project manager
      • Project sponsor

      Outcomes of this step

      • Assurance that you have completed adequate preparation, obtained stakeholder and sponsor buy-in, secured sufficient resources, and completed strategy and planning activities to move forward with selection.
      • An approach to remedy organizational readiness to prepare for MMS selection.
      • An understanding of stakeholder goals.

      Identify the scope and purpose of your MMS selection process

      Vendor Profiles icon

      Sample Project Overview

      [Organization] plans to select and implement a marketing management suite in order to introduce better campaign management to the business’ processes. This procurement and implementation of an MMS tool will enable the business to improve the efficiency and effectiveness of marketing campaign execution.

      This project will oversee the assessment and shortlisting of MMS vendors, selection of an MMS tool, the configuration of the solution, and the implementation of the technology into the business environment.

      Rationale Behind the Project

      Consider the business drivers behind the interest in MMS technology.

      Be specific to business units impacted and identify key considerations (both opportunities and risks).

      Business Drivers

      • Organizational productivity
      • Customer satisfaction
      • Marketing management costs
      • Risk management

      Info-Tech Insights

      Creating repeatable and streamlined marketing processes is a common overarching business objective that is driven by multiple factors. To ensure this objective is achieved, confirm that the primary drivers are following the implementation of the first automated marketing channels.

      Activity: Understand your business’ goals for MMS by parsing your formal CXM strategy

      Associated Activity icon 1.2.1 1 hour

      INPUT: Stakeholder user stories

      OUTPUT: Understanding of ideal outcomes from MMS implementation

      MATERIALS: Whiteboard and marker or sticky notes

      PARTICIPANTS: Project sponsor, Project stakeholders, Business analysts, Business unit reps

      Instructions

      1. Outline the purpose of the future MMS tool and the drivers behind this business decision with the project’s key stakeholders.
      2. Document plans to ensure that these drivers are taken into consideration and realized following implementation. Example:
        Improve Reduce/Eliminate KPIs
        Multichannel marketing Duplication of effort Number of customer interaction channels supported
        Social integration Process inefficiencies Number of social signals received (likes, shares, etc.)

      If you do not have a well-defined CXM strategy, leverage Info-Tech’s research to Build a Strong Technology Foundation for Customer Experience Management.

      Understanding marketing suites

      Vendor Profiles icon

      This blueprint focuses on complete, integrated marketing management suites

      An integrated suite is a single product that is designed to assist with multiple marketing processes. Information from these suites is deeply connected to the core CRM. Changing a piece of information for one process will update all affected.

      'MMS' surrounded by its integrated processes, including 'Marketing Operations Management', 'Breadth of Channel Support', 'Marketing Asset Management', etc.

      Understanding marketing point solutions

      Vendor Profiles icon

      A point solution typically interfaces with a single customer interaction channel with minimal CRM integration.

      Why use a marketing point solution?

      1. A marketing point solution is a standalone application used to manage a unique process.
      2. Point solutions can be implemented and updated relatively quickly.
      3. They cost less than full-feature, integrated marketing suites.
      4. Some point solutions integrate with CRM platforms or MMS platforms.

      Refer to Phase 2 for a bird’s-eye view of the point solution marketplace.

      Marketing Point Solutions

      • Twitter Analytics
      • Search Engine Optimization
      • Customer Portals
      • Livechat
      • Marketing Attribution
      • Demand Side Platform

      Determine if MMS is right for your organization

      Vendor Profiles icon

      Adopt an MMS if:

      1. Your organization is actively pursuing a multichannel marketing strategy, particularly if its marketing campaigns are complex and multifaceted, involving consumer-specific conditional messaging.
      2. Your enterprise serves a high volume of customers and marketing needs extend to formally managing budgets and resources, lead generation and segmentation, and measuring channel effectiveness.
      3. Your organizations has multiple product lines and is interested in increasing cross-sale opportunities.

      Bypass an MMS if:

      • Your organization does not participate in multichannel campaigns and is primarily using email or web channels to generate leads. You may find the advanced features and capabilities of an MMS to be overkill and should consider lead marketing automation (LMA) or email marketing services first.
      • You are a small to midsize business (SMB) with a limited budget or fewer than five marketing professionals. Don’t buy what you don’t need; organizations with fewer than five people in the marketing department are unlikely to need an MMS.
      • Sales generation is not a priority for the business or a primary goal for the marketing department.

      Info-Tech Insight

      Using an MMS is ideal for organizations with multiple brands and product portfolios (e.g. consumer packaged goods). Ad hoc management and email marketing services are best for small organizations with a client base that requires only bare bones engagement.

      Determine if you are ready to kick off your MMS selection and implementation project

      Supporting Tool icon 1.2.2 MMS Readiness Assessment Checklist
      Use Info-Tech’s MMS Readiness Assessment Checklist to determine if your organization has sufficient process and campaign maturity to warrant the investment in a consolidated marketing management suite.

      Sections of the Tool:

      1. Goals & Objectives
      2. Project Team
      3. Current State Understanding
      4. Future State Vision
      5. Business Process Improvement
      6. Project Metrics
      7. Executive Sponsorship
      8. Stakeholder Buy-In & Change Management
      9. Risk Management
      10. Cost & Budget

      INFO-TECH DELIVERABLE

      Sample of Info-Tech's MMS Readiness Assessment Checklist.

      Complete the MMS Readiness Assessment Checklist by following the instructions in Activity 1.2.3.

      Activity: Determine if you are ready to kick off your MMS selection project

      Associated Activity icon 1.2.3 30 minutes

      INPUT: MMS foundation, MMS strategy

      OUTPUT: Readiness remediation approach, Validation of MMS project readiness

      MATERIALS: Info-Tech’s MMS Readiness Assessment Checklist

      PARTICIPANTS: Project sponsor, Core project team

      Instructions

      1. Download the MMS Readiness Assessment Checklist.
      2. Review Section 1 of the checklist with the core project team and/or project sponsor, item by item. For completed items, tick the relative checkbox.
      3. Once the whole checklist has been reviewed, document all incomplete items in the table under Section 1 in the first table column (“Incomplete Readiness Item”).
      4. For each incomplete item, use your discretion to determine whether its completion is critical in preparation for MMS selection and implementation. This may vary given the complexity of your MMS project. If the item is critical to the project, indicate this with “Y” in the second column (“Criticality (Y/N)”).
      5. For each critical item, reflect on the barriers that have prevented or are preventing its completion. Possible barriers include incomplete task dependencies, low value-to-effort determination, lack of organizational knowledge or resources, pressure of deadlines, etc. Document these barriers in the third column (“Barriers to Completion”).
      6. Based on the barriers determined in Step 5, determine a remediation approach for each item. Document the approach in the fourth column (“Remediation Approach”).
      7. For each remediation activity, designate a due date and remediation owner. Document this in the fifth column (“Due Date & Owner”).
      8. Carry out the remediation of critical tasks and return to this blueprint to kickstart your selection and implementation project.

      Step 1.3: Gather MMS requirements

      1.1

      1.2

      1.3

      Understand the MMS MarketStructure the ProjectGather MMS Requirements

      This step will walk you through the following activities:

      • Understand your MMS use case.
      • Elicit and capture your MMS requirements.
      • Prioritize your solution requirements.

      This step involves the following participants:

      • Core project team
      • Project manager
      • Business analysts
      • Procurement subject-matter experts (SMEs)

      Outcomes of this step

      • Project alignment with MMS market use case.
      • Inventory of categorized and prioritized MMS business requirements.

      Understand the dominant use-case scenarios for MMS across organizations

      Vendor Profiles icon

      USE CASES

      While an organization may be product- or service-centric, most fall into one of the three use cases described on this slide.

      1) Marketing Automation

      Workflow Management

      Managing complex marketing campaigns and building and tracking marketing workflows are the mainstay responsibilities of brand managers and other senior marketing professionals. In this category, we evaluated vendors that provide marketers with comprehensive tools for marketing campaign automation, workflow building and tracking, lead management, and marketing resource planning for campaigns that need to reach a large segment of customers.

      Omnichannel Management

      The proliferation of marketing channels has created significant challenges for many organizations. In this use case, we executed a special evaluation of vendors that are well suited for the intricacies of juggling multiple channels, particularly mobile, social, and email marketing.

      2) Marketing Intelligence

      Sifting through data from a myriad of sources and coming up with actionable intelligence and insights remains a critical activity for marketing departments, particularly for market researchers. In this category, we evaluated solutions that aggregate, analyze, and visualize complex marketing data from multiple sources to allow decision makers to execute informed decisions.

      3) Social Marketing

      The proliferation of social networks, customer data, and use cases has made ad hoc social media management challenging. In this category we evaluated vendors that bring uniformity to an organization’s social media capabilities and contribute to a 360-degree customer view.

      Activity: Understand which type of MMS you need

      Associated Activity icon 1.3.1 30 minutes

      INPUT: Use-case breakdown

      OUTPUT: Project use-case alignments

      Materials: Whiteboard, markers

      Participants: Project manager, Core project team (optional)

      Instructions

      1. Familiarize your team with Info-Tech’s MMS use-case breakdown from the previous slide.
      2. Determine which use case is best aligned with your organization’s MMS project objectives. If you need assistance with this, consider the relevance of the cases studies and statements on the following slides.
      3. If your team agrees with most or all statements under a given use case, this indicates strong alignment towards that use case. It is possible for an organization to align with more than one use case. Your use-case alignment will guide you in creating a vendor shortlist later in this project.

      Use Info-Tech’s vendor research and use-case scenarios to support your organization’s vendor analysis

      The use-case view of vendor and product performance provides multiple opportunities for vendors to fit into your application architecture depending on their product and market performance. The use cases selected are based on market research and client demand.

      Determining your use case is crucial for:

      1. Selecting an application that is the right fit
      2. Establishing a business case for MMS

      The following slides illustrate how the three most common use cases (marketing automation, marketing intelligence, and social marketing) align with business needs. As shown by the case studies, the right MMS can result in great benefits to your organization.

      Use-case alignment and business need

      Vendor Profiles icon

      Marketing Automation

      Marketing Need Manage customer experience across multiple channels Manage multiple campaigns simultaneously Integrate web-enabled devices (IoT) into marketing campaigns Run and track email marketing campaigns
      A line of arrows pointing down.
      Corresponding Feature End-to-end management of email marketing Visual workflow editor Customer journey mapping Business rules engine A/B tracking

      The Portland Trail Blazers utilize an MMS to amplify their message with marketing automation technology

      CASE STUDY

      Industry: Entertainment | Source: Marketo

      Challenge

      The Portland Trail Blazers, an NBA franchise, were looking to expand their appeal beyond the city of Portland and into the greater Pacific Northwest Region.

      The team’s management group also wanted to showcase the full range of events that were hosted in the team’s multipurpose stadium.

      The Trail Blazers were looking to engage fans in a more targeted fashion than their CRM allowed for. Ultimately, they hoped to move from “batch and blast” email campaigns to an automated and targeted approach.

      Solution

      The Trail Blazers implemented an MMS that allowed it to rapidly build different types of campaigns. These campaigns could be executed across a variety of channels and target multiple demographics at various points in the fan journey.

      Contextual ads were implemented using the marketing suite’s automated customer journey mapping feature. Targeted ads were served based on a fan’s location in the journey and interactions with the Trail Blazers’ online collateral.

      Results

      The automated campaigns led to a 75% email open rate, which contributed to a 96% renewal rate for season ticket holders – a franchise record.

      Other benefits resulting from the improved conversion rate included an increased cohesion between the Trail Blazers’ marketing, analytics, and ticket sales operations.

      Use-case alignment and business need

      Vendor Profiles icon

      Marketing Intelligence

      Marketing Need Capture marketing- and customer-related data from multiple sources Analyze large quantities of marketing data Visualize marketing-related data in a manner that is easy for decision makers to consume Perform trend and predictive analysis
      A line of arrows pointing down.
      Corresponding Feature Integrate data across customer segments Analysis through machine learning Assign attributers to unstructured data Displays featuring data from external sources Create complex customer data visualizations

      Chico’s FAS uses marketing intelligence to drive customer loyalty

      CASE STUDY

      Industry: Retail | Source: SAS

      Challenge

      Women’s apparel retailer Chico’s FAS was looking to capitalize on customer data from in-store and online experiences.

      Chico’s hoped to consolidate customer data from multiple online and brick-and-mortar retail channels to get a complete view of the customer.

      Doing so would satisfy Chico’s need to create more highly segmented, cost-effective marketing campaigns

      Solution

      Chico’s selected an MMS with strong marketing intelligence, analysis, and data visualization capability.

      The MMS could consolidate and analyze customer and transactional information. The suite’s functionality enabled Chico’s marketing team to work directly with the data, without help from statisticians or IT staff.

      Results

      The approach to marketing indigence led to customers getting deals on products that were actually relevant to them, increasing sales and brand loyalty.

      Moreover, the time it took to perform data consolidation decreased dramatically, from 17 hours to two hours, allowing the process to be performed daily instead of weekly.

      Use-case alignment and business need

      Vendor Profiles icon

      Social Marketing

      Marketing Need Understand customers' likes and dislikes Manage and analyze social media channels like Facebook and Twitter Foster a conversation around specific products Engage international audiences through regional messaging apps
      A line of arrows pointing down.
      Corresponding Feature Social listening capabilities Tools for curating customer community content Ability to aggregate social data Integration with popular social networks Ability to conduct trend reporting

      Bayer leverages MMS technology to cultivate a social presence

      CASE STUDY

      Industry: Life Sciences | Source: Adobe

      Challenge

      Bayer, a Fortune 500 health and life sciences company, was looking for a new way to communicate its complex medical breakthroughs to the general public.

      The decision was made to share the science behind its products via social channels in order to generate excitement.

      Bayer needed tools to publish content across a variety of social media platforms while fostering conversations that were more focused on the science behind products.

      Solution

      Based on the requirements, Bayer decided that an MMS would be the best fit.

      After conducting a market scan, the company selected an MMS with a comprehensive social media suite.

      The suite included tools for social listening and moderation and tools to guide conversations initiated by both marketers and customers.

      Results

      The MMS provided Bayer with the toolkit to engage its audience.

      Bayer took control of the conversation about its products by serving potential customers with relevant video content on social media.

      Its social strategy coupled with advanced engagement tools resulted in new business opportunities and more than 65,000 views on YouTube and more than 87,000 Facebook views in a single month.

      Leverage Info-Tech’s requirements gathering framework to serve as the basis for capturing your MMS requirements

      An important step in selecting an MMS that will have widespread user adoption is creating archetypal customer personas. This will enable you to talk concretely about them as consumers of the application you select and allow you to build buyer scenarios around them.
      REQUIREMENTS GATHERING
      Info-Tech’s requirements gathering framework is a comprehensive approach to requirements management that can be scaled to any size of project or organization. This framework ensures that the application created will capture the needs of all stakeholders and deliver business value. Develop and right-size a proven standard operating procedure for requirements gathering with Info-Tech’s blueprint Build a Strong Approach to Business Requirements Gathering.
      Stock photo of a Jenga tower with title: Build a Strong Approach to Business Requirements Gathering
      KEY INPUTS TO MMS REQUIREMENTS GATHERING
      Requirements Gathering Methodology

      Sample of Requirements Gathering Blueprint.

      Requirements Gathering Blueprint Slide 25: Understand the best-practice framework for requirements gathering for enterprise applications projects.

      Requirements Gathering SOP

      Sample of Requirements Gathering Blueprint.

      Requirements Gathering Blueprint Activities 1.2.2-1.2.5, 2.1.1, 2.1.2, 3.1.1, 3.2.1, 4.1.1-4.1.3, 4.2.2: Consolidate outputs to right-size a best-practice SOP for your organization.

      Project Level Selection Tool

      Sample of Requirements Gathering Blueprint.

      Requirements Gathering Blueprint Activity 1.2.4: Determine project-level selection guidelines to inform the due diligence required in your MMS requirements gathering.

      Activity: Elicit and capture your MMS requirements

      Associated Activity icon 1.3.2 Varies

      INPUT: MMS tool user expertise, MMS Requirements Picklist Tool

      OUTPUT: A list of needs from the MMS tool user perspective

      Materials: Note-taking materials, Whiteboard or flip chart, markers

      Participants: MMS users in the organization, MMS selection committee

      Instructions

      1. Identify stakeholders for the requirements gathering exercise. Consider holding one-on-one sessions or large focus groups with key stakeholders or the project sponsor to gather business requirements for an MMS.
      2. Use the MMS Requirements Picklist Tool as a starting point for conducting the requirements elicitation session(s).
      3. Begin by reading the instructions in the template and then move to the “Requirements” worksheet. Read each defined requirement in the worksheet and indicate in the “Requirement Status” column whether the requirement is a “Must,” “High,” or “Low.” Confirming the status is an important part of the exercise. The status will help filter vendors for final selection later on in the process.
      4. Decide whether additional requirements are necessary by asking the MMS tool users. If so, add the requirements to the bottom of the “Requirements” worksheet and indicate their “Requirement Status.”

      Download the MMS Requirements Picklist Tool to help with completing this activity.

      Show the measurable benefits of MMS with metrics

      The return on investment (ROI) and perceived value of the organization’s marketing solution will be a critical indication of the likelihood of success of the suite’s selection and implementation.

      EXAMPLE
      METRICS

      MMS and Technology Adoption

      Marketing Performance Metrics
      Average revenue gain per campaign Quantity and quality of marketing insights
      Average time to execute a campaign Customer acquisition rates
      Savings from automated processes Marketing cycle times
      User Adoption and Business Feedback Metrics
      User satisfaction feedback User satisfaction survey with the technology
      Business adoption rates Application overhead cost reduction

      Info-Tech Insight

      Even if marketing metrics are difficult to track right now, the implementation of an MMS brings access to valuable customer intelligence from data that was once kept in silos.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech Workshop Associated Activity icon

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analyst will join you and your team onsite at your location or welcome you to Info-Tech's historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.2.1

      Sample of activity 1.2.1 'Understand your business' goals for MMS by parsing your formal CXM strategy'. Align the CXM strategy value proposition to MMS capabilities

      Our facilitator will help your team identify the IT CXM strategy and marketing goals. The analyst will then work with the team to map the strategy to technological drivers available in the MMS market.

      1.3.2

      Sample of activity 1.3.2 'Elicit and capture your MMS requirements'. Define the needs of MMS users

      Our facilitator will work with your team to identify user requirements for the MMS Requirements Picklist Tool. The analyst will facilitate a discussion with your team to prioritize identified requirements.

      Select a Marketing Management Suite

      PHASE 2

      Shortlist Marketing Management Suites

      Phase 2 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Shortlist Marketing Management Suites

      Proposed Time to Completion: 1-3 months
      Step 2.1: Analyze and Shortlist MMS Vendors
      Start with an analyst kick-off call:
      • Review requirements gathering findings.
      • Review the MMS market space.
      Then complete these activities…
      • Review vendor profiles and analysis.
      • Weigh the evaluation criteria’s importance in product capabilities and vendor characteristics.
      • Shortlist MMS vendors.
      With these tools & templates:
      Phase 2 Results:
      • Shortlist of MMS tools

      Phase 2 milestones

      Launch the MMS Project and Collect Requirements — Phase 1

      • Understand the MMS market space.
      • Assess organizational and project readiness for MMS selection.
      • Structure your MMS selection and implementation project by refining your MMS roadmap.
      • Align organizational use-case fit with market use cases.
      • Collect, prioritize, and document MMS requirements.

      Shortlist MMS Tool — Phase 2

      • Review MMS market leaders and players within your aligned use case.
      • Review MMS vendor profiles and capabilities.
      • Shortlist MMS vendors based on organizational fit.

      Select an MMS — Phase 3

      • Submit request for proposal (RFP) to shortlisted vendors.
      • Evaluate vendor responses and develop vendor demonstration scripts.
      • Score vendor demonstrations and select the final product.

      Step 2.1: Analyze and shortlist MMS vendors

      2.1

      Analyze and Shortlist MMS Vendors

      This step will walk you through the following activities:

      • Review MMS vendor landscape.
      • Take note of relevant point solutions.
      • Shortlist vendors for the RFP process.

      This step involves the following participants:

      • Core project team

      Outcomes of this step

      • Understanding of Info-Tech’s use-case scenarios for MMS: marketing automation, marketing intelligence, and social marketing.
      • Familiarity with the MMS vendor landscape.
      • Shortlist of MMS vendors for RFP process.

      Familiarize yourself with the MMS market: How it got here

      Vendor Profiles icon

      Loosely Tied Together

      Originally the sales and marketing enterprise application space was highly fragmented, with disparate best-of-breed point solutions patched together. Soon after, vendors in the late 1990s started bundling automation technologies into a single suite offering. Marketing capabilities of CRM suites were minimal at best and often restricted to web and email only.

      Limited to Large Enterprises

      Many vendors started to combine all marketing tools into a single, comprehensive marketing suite, but cost and complexity limited them to large enterprises and marketing agencies.

      Best-of-breed solutions targeting new channels and new goals, like closed-loop sales and marketing, continued driving new marketing software genres, like dedicated lead management suites.

      In today’s volatile business environment, judgment built from past experience is increasingly unreliable. With consumer behaviors in flux, once-valid assumptions (e.g. ‘older consumers don’t use Facebook or send text messages’) can quickly become outdated.” (SAS Magazine)

      Info-Tech Insight

      As the market evolves, capabilities that were once cutting edge become default and new functionality becomes differentiating. Some features, like basic CRM integration, have become table stakes capabilities. Focus on advanced analytics features and omnichannel integration capabilities to get the best fit for your requirements.

      Familiarize yourself with the MMS market: Where it’s going

      Vendor Profiles icon

      AI and Machine Learning

      Vendors are beginning to offer AI capabilities across MMS for data-driven customer engagement scoring and social listening insights. Machine learning capability is being leveraged to determine optimal customer journey and suggest next steps to users.

      Marketplace Fragmentation

      The number of players in the marketing application space has grown exponentially. The majority of these new vendors offer point solutions rather than full-blown marketing suites. Fragmentation is leading to tougher choices when looking to augment an existing platform with specific functionality.

      Improving Application Integration

      MMS vendors are fostering deeper integrations between their marketing products and core CRM products, leading to improved data hygiene. At the same time, vendors are improving flexibility in the marketing suite so that new channels can be added easily.

      Greater Self-Service

      Vendors have an increased emphasis on application usability. Their goal is to enable marketers to execute campaigns without relying on specialists.

      There’s a firehose of customer data coming at marketers today, and with more interconnected devices emerging (wearables, smart watches, etc.), cultivating a seamless customer experience is likely to grow even more challenging.

      Building out a data-driven marketing strategy and technology stack that enables you to capture behaviors across channels is key.” (IBM, Ideas for Exceeding Customer Expectations)

      Review Info-Tech’s vendor profiles of the MMS market to identify vendors that meet your requirements

      Vendors & Products Evaluated

      Vendor logos including 'Adobe', 'ORACLE', and 'IBM'.

      VENDOR PROFILES

      Review the MMS Vendor Evaluation

      Large icon of a descending bar graph for vendor profiles title page.

      Table stakes are the minimum standard; without these, a product doesn’t even get reviewed

      Vendor Profiles icon

      TABLE STAKES

      Feature Table Stake Functionality
      Basic Workflow Automation Simple automation of common marketing tasks (e.g. handling inbound leads).
      Basic Channel Integration Integration with minimum two or more marketing channels (e.g. email and direct mail).
      Customizable User Interface A user interface that can be changed and optimized to users’ preferences. This includes customizable dashboards for displaying relevant marketing metrics.
      Basic Mobile UX Accessible from a mobile device in some fashion.
      Cloud Compatibility Able to offer integration within pre-existing or proprietary cloud server. Many vendors only have SaaS products.

      What does this mean?

      The products assessed in these vendor profiles meet, at the very least, the requirements outlined as table stakes.

      Many of the vendors go above and beyond the outlined table stakes; some even do so in multiple categories. This section aims to highlight the products’ capabilities in excess of the criteria listed here.

      Info-Tech Insight

      If table stakes are all you need from your MMS, determine whether your existing CRM platform already satisfies your requirements. Otherwise, dig deeper to find the best price-to-value ratio for your needs.

      Take a holistic approach to vendor and product evaluation

      Almost – or equally – as important as evaluating vendor feature capabilities is the need to evaluate vendor viability and non-functional aspects of the MMS. Include an evaluation of the following criteria in your vendor scoring methodology:

      Vendor Attribute Description
      Vendor Stability and Variability The vendor’s proven ability to execute on constant product improvement, deliberate strategic direction, and overall commitment to research and development efforts in responding to emerging trends.
      Security Model The potential to integrate the application to existing security models and the vendor's approach to handling customer data.
      Deployment Style The choice to deploy a single or multi-tenant SaaS environment via a perpetual license.
      Ease of Customization The relative ease with which a system can be customized to accommodate niche or industry-specific business or functional needs.
      Vendor Support Options The availability of vendor support options, including selection consulting, application development resources, implementation assistance, and ongoing support resources.
      Size of Partner Ecosystem The quantity of enterprise applications and third-party add-ons that can be linked to the MMS, as well as the number of system integrators available.
      Ease of Data Integration The relative ease with which the system can be integrated with an organization’s existing application environment, including legacy systems, point solutions, and other large enterprise applications.

      Info-Tech Insight

      Evaluate vendor capabilities, not just product capabilities. An MMS is typically a long-term commitment; ensure that your organization is teaming up with a vendor or provider that you feel you can work well with and depend on.

      Advanced features are the capabilities that allow for granular differentiation of market players and use-case performance

      Vendor Profiles icon

      Evaluation Methodology

      These product features were assessed as part of the classification of vendors into use cases. In determining use-case leaders and players, select features were considered based on best alignment with the use case.

      Feature Advanced Functionality
      Advanced Campaign Management End-to-end marketing campaign management: customer journey mapping, campaign initiation, monitoring, and dynamic reporting and adjustment.
      Marketing Asset Management Content repository functionality (or tight ECM integration) for marketing assets and campaign collateral (static, multimedia, e-commerce–related, etc.).
      Marketing Analytics
      • Predictive analytics; machine learning; capabilities for data ingestion and visualization across various marketing research/marketing intelligence categories (demographic, psychographic, etc.).
      • Data segmentation; drill-down ability to assign attributes to unstructured data; ability to construct complex customer/competitive data visualizations from segmented data.
      Breadth of Channel Support Ability to support and manage a wide range of marketing channels (e-commerce, SEO/SEM, paid advertising, email, traditional [print, multimedia], etc.).
      Marketing Workflow Management Visual workflow editors and business rules engine creation.

      Advanced features are the capabilities that allow for granular differentiation of market players and use-case performance

      Vendor Profiles icon

      Evaluation Methodology

      These product features were assessed as part of the classification of vendors into use cases. In determining use-case leaders and players, select features were considered based on best alignment with the use case.

      Feature Advanced Functionality
      Community Marketing Management Branded customer communities (e.g. community support forums) and DMB/DSP.
      Email Marketing Automation End-to-end management of email marketing: email templates, email previews, spam testing, A/B tracking, multivariate testing, and email metrics tracking.
      Social Marketing Ability to integrate with popular social media networks and manage social properties and to aggregate and analyze social data for trend reporting.
      Mobile Marketing Ability to manage SMS, push, and mobile application marketing.
      Marketing Operations Management Project management tools for marketers (timelines, performance indicators, budgeting/resourcing tools, etc.).

      Use the information in the MMS vendor profiles to streamline your vendor analysis process

      Vendor Profiles icon This section includes profiles of the vendors evaluated against the previously outlined framework.
      Review the use-case scenarios relevant to your organization’s use case to identify a vendor’s fit to your organization’s MMS needs.
      • L = Use-case leader
      • P = Use-case player
      Three column headers: 'Marketing Automation', 'Marketing Intelligence', and 'Social Media Marketing'.
      Understand your organization’s size and whether it falls within the product’s market focus.
      • Large enterprise: 2,000+ employees and revenue of $250M+
      • Small-medium enterprise: 30-2,000 employees and revenue of $25M-$250M
      Column header 'MARKET FOCUS' with row headers 'Small-Medium' and 'Large Enterprise'.
      Review the differentiating features to identify where the application performs best. A list of features.
      Colors signify a feature’s performance. A key for color-coding: Blue - 'Best of Breed', Green - 'Present: Competitive Strength', Yellow-Green - 'Present: Competitive Parity', Yellow - 'Semi-Present', Grey - 'Absent'.

      Adobe Marketing Cloud

      Vendor Profiles icon
      Logo for Adobe. FUNCTIONAL SPOTLIGHT

      Creative Cloud Integration: To make for a more seamless cross-product experience, projects can be sent between Marketing Cloud and Creative Cloud apps such as Photoshop and After Effects.

      Sensei: Adobe has revamped its machine learning and AI platform in an effort to integrate AI into all of its marketing applications. Sensei includes data from Microsoft in a new partnership program.

      Anomaly Detection: Adobe’s Anomaly Detection contextualizes data and provides a statistical method to determine how a given metric has changed in relation to previous metrics.

      USE-CASE PERFORMANCE
      Marketing
      Automation
      Marketing
      Intelligence
      Social
      Marketing

      L

      L

      P

      MARKET FOCUS
      Small-Medium
      Large Enterprise
      Adobe’s goal with Marketing Cloud is to help businesses provide customers with cohesive, seamless experiences by surfacing customer profiles in relevant situations quickly. Adobe Marketing Cloud has traditionally been used in the B2C space but has seen an increase in B2C use cases driven by the finance and technology sectors. FEATURES
      Color-coded ranking of each feature for Adobe.
      Employees (2018): 17,000 Presence: Global Founded: 1982 NASDAQ: ADBE

      HubSpot

      Vendor Profiles icon

      Logo for Hubspot.FUNCTIONAL SPOTLIGHT

      Content Optimization System (COS): The fully integrated system stores assets and serves them to their designated channels at relevant times. The COS is integrated into HubSpot's marketing platform.

      Email Automation: HubSpot provides basic email that can be linked to a specific part of an organization’s marketing funnel. These emails can also be added to pre-existing automated workflows.

      Email Deliverability Tool: HubSpot identifies HTML or content that will be flagged by spam filters. It also validates links and minimizes email load times.

      USE-CASE PERFORMANCE
      Marketing
      Automation
      Marketing
      Intelligence
      Social
      Marketing

      P

      P

      P

      MARKET FOCUS
      Small-Medium
      Large Enterprise
      Hubspot’s primary focus has been on email marketing campaigns. It has put effort into developing solid “click not code” email marketing capabilities. Also, Hubspot has an official integration with Salesforce for expanded operations management and analytics capabilities. FEATURES
      Color-coded ranking of each feature for Hubspot.
      Employees (2018): 1,400 Presence: Global Founded: 2006 NYSE: HUBS

      IBM Marketing Cloud

      Vendor Profiles icon

      Logo for IBM.FUNCTIONAL SPOTLIGHT

      Watson: IBM is leveraging its popular Watson AI brand to generate marketing insights for automated campaigns.

      Weather Effects: Set campaign rules based on connections between weather conditions and customer behavior relative to zip code made by Watson.

      Real-Time Personalization: IBM has made efforts to remove campaign interaction latency and optimize live customer engagement by acting on information about what customers are doing in the current moment.

      USE-CASE PERFORMANCE
      Marketing
      Automation
      Marketing
      Intelligence
      Social
      Marketing

      L

      L

      P

      MARKET FOCUS
      Small-Medium
      Large Enterprise
      IBM has remained ahead of the curve by incorporating its well-known AI technology throughout Marketing Cloud. The application’s integration with the wide array of IBM products makes it a powerful tool for users already in the IBM ecosystem. FEATURES
      Color-coded ranking of each feature for IBM.
      Employees (2018): 380,000 Presence: Global Founded: 1911 NYSE: IBM

      Marketo

      Vendor Profiles icon

      Logo for Marketo.FUNCTIONAL SPOTLIGHT

      Content AI: Marketo has leveraged its investments in machine learning to intelligently fetch marketing assets and serve them to customers based on their interactions with a campaign.

      Email A/B Testing: To improve lead generation from email campaigns, Marketo features the ability to execute A/B testing for customized campaigns.

      Partnership with Google: Marketo is now hosted on Google’s cloud platform, enabling it to provide support for larger enterprise clients and improve GDPR compliance.

      USE-CASE PERFORMANCE
      Marketing
      Automation
      Marketing
      Intelligence
      Social
      Marketing

      P

      P

      P

      MARKET FOCUS
      Small-Medium
      Large Enterprise
      Marketo has strong capabilities for lead management but has recently bolstered its analytics capabilities. Marketo is hoping to capture some of the analytics application market share by offering tools with varying complexity and to cater to firms with a wide range of analytics needs. FEATURES
      Color-coded ranking of each feature for Marketo.
      Employees (2018): 1,000 Presence: Global Founded: 2006 Private Corporation

      Oracle Marketing Cloud

      Vendor Profiles icon

      Logo for Oracle.FUNCTIONAL SPOTLIGHT

      Data Visualization: To make for a more seamless cross-product experience, marketing projects can be sent between Marketing Cloud and Creative Cloud apps such as Dreamweaver.

      ID Graph: Use ID Graph to unite disparate data sources to form a singular profile of leads, making the personalization and contextualization of campaigns more efficient.

      Interest-Based Messaging: Pause a campaign to update a segment or content based on aggregated customer activity and interaction data.

      USE-CASE PERFORMANCE
      Marketing
      Automation
      Marketing
      Intelligence
      Social
      Marketing

      P

      P

      P

      MARKET FOCUS
      Small-Medium
      Large Enterprise
      Oracle Marketing Cloud is known for its balance between campaigns and analytics products. Oracle has taken the lead on expanding its marketing channel mix to include international options such as WeChat. Users already using Oracle’s CRM/CEM products will derive the most value from Marketing Cloud. FEATURES
      Color-coded ranking of each feature for Oracle.
      Employees (2018): 138,000 Presence: Global Founded: 1977 NYSE: ORCL

      Salesforce Marketing Cloud

      Vendor Profiles icon

      Logo for Salesforce Marketing Cloud.FUNCTIONAL SPOTLIGHT

      Einstein: Salesforce is putting effort into integrating AI into all of its applications. The Einstein AI platform provides marketers with predictive analytics and insights into customer behavior.

      Mobile Studio: Salesforce has a robust mobile marketing offering that encompasses SMS/MMS, in-app engagement, and group messaging platforms.

      Journey Builder: Salesforce created Journey Builder, which is a workflow automation tool. Its user-friendly drag-and-drop interface makes it easy to automate responses to customer actions.

      USE-CASE PERFORMANCE
      Marketing
      Automation
      Marketing
      Intelligence
      Social
      Marketing

      L

      P

      L

      MARKET FOCUS
      Small-Medium
      Large Enterprise
      Salesforce Marketing Cloud is primarily used by organizations in the B2C space. It has strong Sales Cloud CRM integration. Pardot is positioning itself as a tool for sales teams in addition to marketers. FEATURES
      Color-coded ranking of each feature for Salesforce Marketing Cloud.
      Employees (2018): 1,800 Presence: Global Founded: 2000 NYSE: CRM

      Salesforce Pardot

      Vendor Profiles icon

      Logo for Salesforce Pardot.FUNCTIONAL SPOTLIGHT

      Engagement Studio: Salesforce is putting marketing capabilities in the hands of sales reps by giving them access to a team email engagement platform.

      Einstein: Salesforce’s Einstein AI platform helps marketers and sales reps identify the right accounts to target with predictive lead scoring.

      Program Steps: Salesforce developed a distinct own workflow building tool for Pardot. Workflows are made of “Program Steps” that have the functionality to initiate campaigns based on insights from Einstein.

      USE-CASE PERFORMANCE
      Marketing
      Automation
      Marketing
      Intelligence
      Social
      Marketing

      P

      P

      -

      MARKET FOCUS
      Small-Medium
      Large Enterprise
      Pardot is Salesforce’s B2B marketing solution. Pardot has focused on developing tools that enable sales teams and marketers to work in lockstep in order to achieve lead-generation goals. Pardot has deep integration with Salesforce’s CRM and customer service management products. FEATURES
      Color-coded ranking of each feature for Salesforce Pardot.
      Employees (2018): 1,800 Presence: Global Founded: 2000 NYSE: CRM

      SAP Hybris Marketing

      Vendor Profiles icon

      Logo for SAP.FUNCTIONAL SPOTLIGHT

      CMO Dashboard: The specialized dashboard is aimed at providing overviews for the executive level. It includes the ability to coordinate marketing activities and project budgets, KPIs, and timelines.

      Loyalty Management: SAP features in-app tools to manage campaigns specifically geared toward customer loyalty with digital coupons and iBeacons.

      Customer Segmentation: SAP’s predictive capabilities dynamically suggest relevant customer profiles for new campaigns.

      USE-CASE PERFORMANCE
      Marketing
      Automation
      Marketing
      Intelligence
      Social
      Marketing

      P

      L

      P

      MARKET FOCUS
      Small-Medium
      Large Enterprise
      SAP Hybris Marketing Cloud optimizes marketing strategies in real time with accurate attribution and measurements. SAP’s operations management capabilities are robust, including the ability to view consolidated data streams from ongoing marketing plans, performance targets, and budgets. FEATURES
      Color-coded ranking of each feature for SAP.
      Employees (2018): 84,000 Presence: Global Founded: 1972 NYSE: SAP

      SAS Marketing Intelligence

      Vendor Profiles icon

      Logo for SAS.FUNCTIONAL SPOTLIGHT

      Activity Map: A user-friendly workflow builder that can be used to execute campaigns. Multiple activities can be simultaneously A/B tested within the Activity Map UI. The outcome of the test can automatically adjust the workflow.

      Spots: A native digital asset manager that can store property that is part of existing and future campaigns.

      Viya: A framework for fully integrating third-party data sources into SAS Marketing Intelligence. Viya assists with pairing on-premises databases with a cloud platform for use with the SAS suite.

      USE-CASE PERFORMANCE
      Marketing
      Automation
      Marketing
      Intelligence
      Social
      Marketing

      P

      L

      MARKET FOCUS
      Small-Medium
      Large Enterprise
      SAS has been a leading BI and analytics provider for more than 35 years. Rooted in statistical analysis of data, SAS products provide forward-looking strategic insights. Organizations that require extensive customer intelligence capabilities and the ability to “slice and dice” segments should have SAS on their shortlist. FEATURES
      Color-coded ranking of each feature for SAS.
      Employees (2018): 14,000 Presence: Global Founded: 1976 Private Corporation

      Consider alternative MMS vendors not included in Info-Tech’s vendor profiles

      Info-Tech evaluated only a portion of vendors in the MMS market. In order for a vendor to be included in this landscape, the company needed to meet three baseline criteria:
      1. Our clients must be talking about the solution.
      2. Our analysts must believe the solution will play well within the evaluation.
      3. The vendor must meet table stakes criteria.
      Below is a list of notable vendors in the space that did not meet all of Info-Tech’s inclusion requirements.

      Additional vendors in the MMS market:

      Logo for act-on. Logo for SharpSpring.

      See the next slides for suggested point solutions.

      Leverage Info-Tech’s WXM and SMMP vendor landscapes to select platforms that fit with your CXM strategy

      Web experience management (WXM) and social media management platforms (SMMP) act in concert with your MMS to execute complex campaigns.

      Social Media Management

      Info-Tech’s SMMP selection guide enables you to find a solution that satisfies your objectives across marketing, sales, public relations, HR, and customer service. Create a unified framework for driving successful implementation and adoption of your SMMP that fully addresses CRM and marketing automation integration, end-user adoption, and social analytics with Info-Tech’s blueprint Select and Implement a Social Media Management Platform.

      Stock image with the title Select and Implement a Social Media Management Platform.
      Web Experience Management

      Info-Tech’s approach to WXM ensures you have the right suite of tools for web content management, experience design, and web analytics. Put your best foot forward by conducting due diligence as the selection project advances. Ensure that your organization will see quick results with Info-Tech’s blueprint Select and Implement a Web Experience Management Solution.

      Stock image with the title Select and Implement a Web Experience Management Solution.

      POINT SOLUTION PROFILES

      Review this cursory list of point solutions by use case

      Consider point solutions if a full suite is not required

      Large icon of a target for point solution profiles title page.

      Consider point solutions if a full suite is not required

      Email Marketing

      Logos of companies for Email Marketing including MailChimp and emma.

      Consider point solutions if a full suite is not required

      Search Engine Optimization (SEO)

      Logos of companies for Search Engine Optimization including SpyFu and SerpStat.

      Consider point solutions if a full suite is not required

      Demand-Side Platform (DSP)

      Logos of companies for Demand-Side Platform including MediaMath and rocketfuel.

      Consider point solutions if a full suite is not required

      Customer Portal Software

      Logos of companies for Customer Portal Software including LifeRay and lithium.

      Select a Marketing Management Suite

      PHASE 3

      Select Vendor and Communicate Decision to Stakeholders

      Phase 3 outline

      Associated Activity icon Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Plan Your MMS Implementation

      Proposed Time to Completion: 2 weeks
      Step 3.1: Select Your MMS Step 3.2: Communicate the Decision to Stakeholders
      Start with an analyst kick-off call:
      • Review the MMS shortlist.
      • Discuss how to link RFP questions and demo script scenarios to gathered requirements.
      Review findings with analyst:
      • Review the alignment between MMS capability and the business’ CXM strategy.
      • Discuss how to present the decision to stakeholders.
      Then complete these activities…
      • Build a vendor response template.
      • Evaluate RFP responses from vendors.
      • Build demo scripts and set up product demonstrations.
      • Establish evaluation criteria.
      • Select MMS product and vendor.
      Then complete these activities…
      • Present decision rationale to stakeholders.
      With these tools & templates:
      • MMS Request for Proposal Template
      • MMS Vendor Demo Script
      With these tools & templates:
      • MMS Selection Executive Presentation Template
      Phase 3 Results
      • Select an MMS that meets requirements and is approved by stakeholders.

      Phase 3 milestones

      Launch the MMS Project and Collect Requirements — Phase 1

      • Understand the MMS market space.
      • Assess organizational and project readiness for MMS selection.
      • Structure your MMS selection and implementation project by refining your MMS roadmap.
      • Align organizational use-case fit with market use cases.
      • Collect, prioritize, and document MMS requirements.

      Shortlist MMS Tool — Phase 2

      • Review MMS market leaders and players within your aligned use case.
      • Review MMS vendor profiles and capabilities.
      • Shortlist MMS vendors based on organizational fit.

      Select an MMS — Phase 3

      • Submit request for proposal (RFP) to shortlisted vendors.
      • Evaluate vendor responses and develop vendor demonstration scripts.
      • Score vendor demonstrations and select the final product.

      Step 2.1: Analyze and shortlist MMS vendors

      3.1

      3.2

      Select Your MMS Communicate Decision to Stakeholders

      This step will walk you through the following activities:

      • Build a response template to standardize potential vendor responses and streamline your evaluation process.
      • Evaluate the RFPs you receive with a clear scoring process and evaluation framework.
      • Build a demo script to evaluate product demonstrations by vendors.
      • Select your solution.

      This step involves the following participants:

      • Core project team
      • Procurement SMEs
      • Project sponsor

      Outcomes of this step

      • Completed MMS RFP vendor response template
      • Completed MMS demo script(s)
      • Established product and vendor evaluation criteria
      • Final MMS selection

      Activity: Shortlist vendors for the RFP process

      Associated Activity icon 3.1.1 30 minutes

      INPUT: Organizational use-case fit

      OUTPUT: MMS vendor shortlist

      Materials: Info-Tech’s MMS use cases, Info-Tech’s vendor profiles, Whiteboard, markers

      Participants: Core project team

      Instructions

      1. Collectively with the core project team, determine any knock-out criteria for shortlisting MMS vendors. For example, if your team is executing on a strategy that favors mobile deployment, vendors who do not have a mobile offering may be off the table.
      2. Based on the results in Activity 1.3.2, write a longlist of vendors. In most cases, this list will consist of all the vendors that fall into your organization’s use-case scenario. If your organization fits into more than one use case (e.g. your organization has both product-centric and service-centric MMS needs), look for the overlap of vendors between the use cases.
      3. Review the profiles of the vendors that fall into your use-case scenario. Based on your knock-out criteria established in Step 1, eliminate any vendors as applicable.
      4. Finalize and record your shortlist of MMS vendors.

      Use Info-Tech’s MMS Request for Proposal Template to document and communicate your requirements to vendors

      Supporting Tool icon 3.1.2 MMS Request for Proposal Template

      Use the MMS Request for Proposal Template as a step-by-step guide on how to request interested vendors to submit written proposals that meet your set of requirements.

      If interested in bidding for your project, vendors will respond with a description of the techniques they would employ to address your organizational challenges and meet your requirements, along with a plan of work and detailed budget for the project.

      The RFP is an important piece of setting and aligning your expectations with the vendors’ product offerings. Make sure to address the following elements in the RFP:

      Sections of the Tool:

      1. Statement of work
      2. General information
      3. Proposal preparation instructions
      4. Scope of work, specifications, and requirements
      5. Vendor qualifications and references
      6. Budget and estimated pricing
      7. Additional terms and conditions
      8. Vendor certification

      INFO-TECH DELIVERABLE

      Sample of Info-Tech's MMS Request Proposal Template.

      Complete the MMS Request for Proposal Template by following the instructions in Activity 3.1.3.

      Activity: Create an RFP to submit to MMS vendors

      Associated Activity icon 3.1.3 1-2 hours

      INPUT: Business requirements document, Procurement procedures

      OUTPUT: MMS RFP

      Materials: Internal RFP tools or templates (if available), Info-Tech’s MMS Request for Proposal Template (optional)

      Participants: Procurement SMEs, Project manager, Core project team (optional)

      Instructions

      1. Download Info-Tech’s MMS Request for Proposal Template or prepare internal best-practice RFP tools.
      2. Build your RFP:
        1. Complete the statement of work and general information sections to provide organizational context to your longlisted vendors.
        2. Outline the organization’s procurement instructions for vendors, including due diligence, assessment criteria, and dates.
        3. Input the business requirements document as created in Activity 1.3.2.
        4. Create a scenario overview to provide vendors with an opportunity to give an estimate price.
      3. Obtain approval for your RFP. Each organization has a unique procurement process; follow your own organization’s process as you submit your RFPs to vendors. Ensure compliance with your organization’s standards and gain approval for submitting your RFP.

      Establish vendor evaluation criteria

      Vendor demonstrations are an integral part of the selection process. Having clearly defined selection criteria will help with setting up relevant demos as well as inform the vendor scorecards.

      EXAMPLE EVALUATION CRITERIAPie chart indicating the weight of each 'Vendor Evaluation Criteria': 'Functionality, 30%', 'Ease of Use, 25%', 'Cost, 15%', 'Vendor, 15%', and 'Technology, 15%'.
      Functionality (30%)
      • Breadth of capability
      • Tactical capability
      • Operational capability
      Ease of Use (25%)
      • End-user usability
      • Administrative usability
      • UI attractiveness
      • Self-service options
      Cost (15%)
      • Maintenance
      • Support
      • Licensing
      • Implementation (internal and external costs)
      Vendor (15%)
      • Support model
      • Customer base
      • Sustainability
      • Product roadmap
      • Proof of concept
      • Implementation model
      Technology (15%)
      • Configurability options
      • Customization requirements
      • Deployment options
      • Security and authentication
      • Integration environment
      • Ubiquity of access (mobile)

      Info-Tech Insight

      Base your vendor evaluations not on the capabilities of the solutions but instead on how the solutions align with your organization’s process automation requirements and considerations.

      Vendor demonstrations

      Examine how the vendor’s solution performs against your evaluation framework.

      What is the value of a vendor demonstration?

      Vendor demonstrations create a valuable opportunity for your organization to confirm that the vendor’s claims in the RFP are actually true.

      A display of the vendor’s functional capabilities and its execution of the scenarios given in your demo script will help to support your assessment of whether a vendor aligns with your MMS requirements.

      What should be included in a vendor demonstration?

      1. Vendor’s display of its solution for the scenarios provided in the demo script.
      2. Display of functional capabilities of the tool.
      3. Briefing on integration capabilities.

      Activity: Invite top performing vendors for product demonstrations

      Associated Activity icon 3.1.4 1-2 hours

      INPUT: Business requirements document, Logistical considerations, Usage scenarios by functional area

      OUTPUT: MMS demo script

      Materials: Info-Tech’s MMS Vendor Demo Script

      Participants: Procurement SMEs, Core project team

      Instructions

      1. Have your evaluation team (selected at the onset of the project) present to evaluate each vendor’s presentation. In some cases you may choose to bring in a subject matter expert (SME) to evaluate a specific area of the tool.
      2. Outline the logistics of the demonstration in the Introduction section of the template. Be sure to outline the total length of the demo and the amount of time that should be dedicated to the following:
        • Product demonstration in response to the demo script
        • Showcase of unique product elements, not reflective of the demo script
        • Question and answer session
        • Breaks and other potential interruptions
      3. Provide prompts for the vendor to display the capabilities by listing and describing usage scenarios by functional area. For example, when asking a vendor to demo financial and accounting management capabilities, you may break scenarios out by task (e.g. general ledger, accounts payable) or user role (e.g. finance manager, administrator).

      Info-Tech Insight

      Challenge vendor project teams during product demonstrations. Asking the vendor to make adjustments or customizations on the fly will allow you to get an authentic feel of product capability and flexibility, as well as of the degree of adaptability of the vendor project team. Ask the vendor to demonstrate how to do things not listed in your user scenarios, such as change system visualizations or design, change underlying data, add additional datasets, demonstrate analytics capabilities, or channel specific automation.

      Use Info-Tech’s MMS Vendor Demo Script template to set expectations for vendor product demonstration

      Vendor Profiles icon MMS Vendor Demo Script

      Customize and use Info-Tech’s MMS Vendor Demo Script to help identify how a vendor’s solution will fit your organization’s particular business capability needs.

      This tool assists with outlining logistical considerations for the demo itself and the scenarios with which the vendors should script their demonstration.

      Sections of the Tool:

      1. Introduction
      2. Demo scenarios by functional area

      Info-Tech Best Practice

      Avoid providing vendors with a rigid script for product demonstration; instead, provide user scenarios. Part of the value of a vendor demonstration is the opportunity to assess whether or not the vendor project team has a solid understanding of your organization’s MMS challenges and requirements and can work with your team to determine the best solution possible. A rigid script may result in your inability to assess whether the vendor will adjust for and scale with your project and organization as a technology partner.

      INFO-TECH DELIVERABLE

      Sample of Info-Tech's MMS Vendor Demo Script.

      Use the MMS Vendor Demo Script by following the instructions in Activity 3.1.4.

      Leverage Info-Tech’s vendor selection and negotiation models as the basis for a streamlined MMS selection process

      Design a procurement process that is robust, ruthless, and reasonable. Rooting out bias during negotiation is vital to making unbiased vendor selections.

      Vendor Selection

      Info-Tech’s approach to vendor selection gets you to design a procurement process that is robust, ruthless, and reasonable. This approach enables you to take control of vendor communications. Implement formal processes with an engaged team to achieve the right price, the right functionality, and the right fit for the organization with Info-Tech's blueprint Implement a Proactive and Consistent Vendor Selection Process.

      Stock image with the title Implement a Proactive and Consistent Vendor Selection Process.
      Vendor Negotiation

      Info-Tech’s SaaS negotiation strategy focuses on taking control of implementation from the beginning. The strategy allows you to work with your internal stakeholders to make sure they do not team up with the vendor instead of you. Reach an agreement with your vendor that takes into account both parties’ best interests with Info-Tech’s blueprint Negotiate SaaS Agreements That Are Built to Last.

      Stock image with the title Negotiate SaaS Agreements That Are Built to Last.

      Step 3.2: Communicate decision to stakeholders

      3.1

      3.2

      Select Your MMS Communicate Decision to Stakeholders

      This step will walk you through the following activities:

      • Collect project rationale documentation.
      • Create a presentation to communicate your selection decision to stakeholders.

      This step involves the following participants:

      • Core project team
      • Procurement SMEs
      • Project sponsor
      • Business stakeholders
      • Relevant management

      Outcomes of this step

      • Completed MMS Selection Executive Presentation Template
      • Affirmation of MMS selection by stakeholders

      Inform internal stakeholders of the final decision

      Ensure traceability from the selected tool to the needs identified in the first phase. Internal stakeholders must understand the reasoning behind the final selection and see the alignment to their defined requirements and needs.

      Document the selection process to show how the selected tool aligns to stakeholder needs:

      A large arrow labelled 'Application Benefits', underlaid beneath two smaller arrows labelled 'MMS stakeholder needs' and 'MMS technology needs', all pointing to the right.

      Documentation will assist with:

      1. Adopting the selected MMS.
      2. Demonstrating that proper due diligence was performed during the selection process.
      3. Providing direct traceability between the selected applications and internal stakeholder needs.

      Activity: Prepare a presentation deck to communicate the selection process and decision to internal stakeholders

      Associated Activity icon 3.2.1 1 week

      INPUT: MMS tool selection committee expertise

      OUTPUT: Decision to invest or not invest in an MMS tool

      Materials: Note-taking materials, Whiteboard or flip chart, markers

      Participants: MMS tool selection committee

      Instructions

      1. Download Info-Tech’s MMS Selection Executive Presentation Template.
      2. Read the instructions on slide 2 of the template. Then, on slide 3, decide if any portion of the selection process should be removed from the communication. Discuss with the team and make adjustments to slide 3 as necessary.
      3. Work with the MMS selection committee to populate the slides that remain after the adjustments. Follow the instructions on each slide to help complete the content.
      4. Refer to the square brackets on each slide (e.g. [X.X]) to identify the activity numbers in this storyboard that correspond to the slide in the MMS Selection Executive Presentation Template. Use the outputs produced from the corresponding activities in this deck and populate each slide in the MMS Selection Executive Presentation Template.
      5. Use the completed template to present to internal stakeholders.

      Info-Tech Insight

      Documenting the process of how the selection decision was made will avoid major headaches down the road. Without a documented process, internal stakeholders and even vendors can challenge and discredit the selection process.

      Vendor participation

      Vendors Who Briefed with Info-Tech Research Group

      Logos of vendors who participated in this blueprint: Salesforce Pardot, SAS, Adobe, Marketo, and Salesforce Marketing Cloud.

      Professionals Who Contributed to Our Evaluation and Research

      • Sara Camden, Digital Change Agent, Equifax
      • Caren Carrasco, Lifecycle Marketing and Automation, Benjamin David Group
      • 10 anonymous contributors participated in the vendor briefings

      Works cited

      Adobe Systems Incorporated. “Bayer builds understanding, socially.” Adobe.com, 2017. Web.

      IBM Corporation, “10 Key Marketing Trends for 2017.” IBM.com, 2017. Web.

      Marketo, Inc. “The Definitive Guide to Marketing Automation.” Marketo.com, 2013. Web.

      Marketo, Inc. “NBA franchise amplifies its message with help from Marketo’s marketing automation technology.” Marketo.com, 2017. Web.

      Salesforce Pardot. “Marketing Automation & Your CRM: The Dynamic Duo.” Pardot.com, 2017. Web.

      SAS Institute Inc. “Marketing Analytics: How, why and what’s next.” SAS Magazine, 2013. Web.

      SAS Institute Inc. “Give shoppers offers they’ll love.” SAS.com, 2017. Web.

      Manage End-User Devices

      • Buy Link or Shortcode: {j2store}307|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $45,499 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: End-User Computing Devices
      • Parent Category Link: /end-user-computing-devices
      • Desktop and mobile device management teams use separate tools and different processes.
      • People at all levels of IT are involved in device management.
      • Vendors are pushing unified endpoint management (UEM) products, and teams struggling with device management are hoping that UEM is their savior.
      • The number and variety of devices will only increase with the continued advance of mobility and emergence of the Internet of Things (IoT).

      Our Advice

      Critical Insight

      • Many problems can be solved by fixing roles, responsibilities, and process. Standardize so you can optimize.
      • UEM is not a silver bullet. Your current solution can image computers in less than 4 hours if you use lean images.
      • Done with, not done to. Getting input from the business will improve adoption, avoid frustration, and save everyone time.

      Impact and Result

      • Define the benefits that you want to achieve and optimize based on those benefits.
      • Take an evolutionary, rather than revolutionary, approach to merging end-user support teams. Process and tool unity comes first.
      • Define the roles and responsibilities involved in end-user device management, and create a training plan to ensure everyone can execute their responsibilities.
      • Stop using device management practices from the era of Windows XP. Create a plan for lean images and app packages.

      Manage End-User Devices Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize end-user device management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify the business and IT benefits of optimizing endpoint management

      Get your desktop and mobile device support teams out of firefighting mode by identifying the real problem.

      • Manage End-User Devices – Phase 1: Identify the Business and IT Benefits
      • End-User Device Management Standard Operating Procedure
      • End-User Device Management Executive Presentation

      2. Improve supporting teams and processes

      Improve the day-to-day operations of your desktop and mobile device support teams through role definition, training, and process standardization.

      • Manage End-User Devices – Phase 2: Improve Supporting Teams and Processes
      • End-User Device Management Workflow Library (Visio)
      • End-User Device Management Workflow Library (PDF)

      3. Improve supporting technologies

      Stop using management tools and techniques from the Windows XP era. Save yourself, and your technicians, from needless pain.

      • Manage End-User Devices – Phase 3: Improve Supporting Technologies
      [infographic]

      Workshop: Manage End-User Devices

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify the Business and IT Benefits of Optimizing End-User Device Management

      The Purpose

      Identify how unified endpoint management (UEM) can improve the lives of the end user and of IT.

      Key Benefits Achieved

      Cutting through the vendor hype and aligning with business needs.

      Activities

      1.1 Identify benefits you can provide to stakeholders.

      1.2 Identify business and IT goals in order to prioritize benefits.

      1.3 Identify how to achieve benefits.

      1.4 Define goals based on desired benefits.

      Outputs

      Executive presentation

      2 Improve the Teams and Processes That Support End-User Device Management

      The Purpose

      Ensure that your teams have a consistent approach to end-user device management.

      Key Benefits Achieved

      Developed a standard approach to roles and responsibilities, to training, and to device management processes.

      Activities

      2.1 Align roles to your environment.

      2.2 Assign architect-, engineer-, and administrator-level responsibilities.

      2.3 Rationalize your responsibility matrix.

      2.4 Ensure you have the necessary skills.

      2.5 Define Tier 2 processes, including patch deployment, emergency patch deployment, device deployment, app deployment, and app packaging.

      Outputs

      List of roles involved in end-user device management

      Responsibility matrix for end-user device management

      End-user device management training plan

      End-user device management standard operating procedure

      Workflows and checklists of end-user device management processes

      3 Improve the Technologies That Support End-User Device Management

      The Purpose

      Modernize the toolset used by IT to manage end-user devices.

      Key Benefits Achieved

      Saving time and resources for many standard device management processes.

      Activities

      3.1 Define the core image for each device/OS.

      3.2 Define app packages.

      3.3 Gather action items for improving the support technologies.

      3.4 Create a roadmap for improving end-user device management.

      3.5 Create a communication plan for improving end-user device management.

      Outputs

      Core image outline

      Application package outline

      End-user device management roadmap

      End-user device management communication plan

      Establish an Analytics Operating Model

      • Buy Link or Shortcode: {j2store}339|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $8,449 Average $ Saved
      • member rating average days saved: 6 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Organizations are struggling to understand what's involved in the analytics developer lifecycle to generate reusable insights faster.
      • Discover what it takes to become a citizen analytics developer. Identify the proper way to enable self-serve analytics.
      • Self-serve business intelligence/analytics is misunderstood and confusing to the business, especially with regards to the roles and responsibilities of IT and the business.
      • End users are dissatisfied due to a lack of access to the data and the absence of a single source of truth.

      Our Advice

      Critical Insight

      Organizations that take data seriously should:

      • Decouple processes in which data is separated from business processes and elevate the visibility of the organization's data assets.
      • Leverage a secure platform where data can be easily exchanged for insights generation.
      • Create density for analytics where resources are mobilized around analytics ideas to generate value.

      Analytics is a journey, not a destination. This journey can eventually result in some level of sophisticated AI/machine learning in your organization. Every organization needs to mobilize its resources and enhance its analytics capabilities to quickly and incrementally add value to data products and services. However, most organizations fail to mobilize their resources in this way.

      Impact and Result

      • Firms become more agile when they realize efficiencies in their analytics operating models and can quickly implement reusable analytics.
      • IT becomes more flexible and efficient in understanding the business' data needs and eliminates redundant processes.
      • Trust in data-driven decision making goes up with collaboration, engagement, and transparency.
      • There is a clear path to continuous improvement in analytics.

      Establish an Analytics Operating Model Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief that outlines Info-Tech’s methodology for assessing the business' analytics needs and aligning your data governance, capabilities, and organizational structure to deliver analytics faster.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define your analytics needs

      This phase helps you understand your organization's data landscape and current analytics environment so you gain a deeper understanding of your future analytics needs.

      • Establish an Analytics Operating Model – Phase 1: Define Your Analytics Needs

      2. Establish an analytics operating model

      This phase introduces you to data operating model frameworks and provides a step-by-step guide on how to capture the right analytics operating model for your organization.

      • Establish an Analytics Operating Model – Phase 2: Establish an Analytics Operating Model
      • Analytics Operating Model Building Tool

      3. Implement your operating model

      This phase helps you implement your chosen analytics operating model, as well as establish an engagement model and communications plan.

      • Establish an Analytics Operating Model – Phase 3: Implement Your Analytics Operating Model
      [infographic]

      Workshop: Establish an Analytics Operating Model

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Your Analytics Needs

      The Purpose

      Achieve a clear understanding and case for data analytics.

      Key Benefits Achieved

      A successful analytics operating model starts with a good understanding of your analytical needs.

      Activities

      1.1 Review the business context.

      1.2 Understand your analytics needs.

      1.3 Draft analytics ideas and use cases.

      1.4 Capture minimum viable analytics.

      Outputs

      Documentation of analytics products and services

      2 Perform an Analytics Capability Assessment

      The Purpose

      Achieve a clear understanding of your organization's analytics capability and mapping across organizational functions.

      Key Benefits Achieved

      Understand your organization's data landscape and current analytics environment to gain a deeper understanding of your future analytics needs.

      Activities

      2.1 Capture your analytics capabilities.

      2.2 Map capabilities to a hub-and-spoke model.

      2.3 Document operating model results.

      Outputs

      Capability assessment results

      3 Establish an Analytics Operating Model

      The Purpose

      Capture the right analytics operating model for your organization.

      Key Benefits Achieved

      Explore data operating model frameworks.

      Capture the right analytics operating model for your organization using a step-by-step guide.

      Activities

      3.1 Discuss your operating model results.

      3.2 Review your organizational structure’s pros and cons.

      3.3 Map resources to target structure.

      3.4 Brainstorm initiatives to develop your analytics capabilities.

      Outputs

      Target operating model

      4 Implement Your Analytics Operating Model

      The Purpose

      Formalize your analytics organizational structure and prepare to implement your chosen analytics operating model.

      Key Benefits Achieved

      Implement your chosen analytics operating model.

      Establish an engagement model and communications plan.

      Activities

      4.1 Document your target organizational structure and RACI.

      4.2 Establish an analytics engagement model.

      4.3 Develop an analytics communications plan.

      Outputs

      Reporting and analytics responsibility matrix (RACI)

      Analytics engagement model

      Analytics communications plan

      Analytics organizational chart

      Design a Tabletop Exercise to Support Your Security Operation

      • Buy Link or Shortcode: {j2store}319|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,599 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: Threat Intelligence & Incident Response
      • Parent Category Link: /threat-intelligence-incident-response
      • Threat management has become resource intensive, requiring continuous monitoring, collection, and analysis of massive volumes of security event data.
      • Security incidents are inevitable, but how they are handled is critical.
      • The increasing use of sophisticated malware is making it difficult for organizations to identify the true intent behind the attack campaign.
      • The incident response is often handled in an ad hoc or ineffective manner.

      Our Advice

      Critical Insight

      • Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and share information mutually with other organizations to stay ahead of incoming threats.
      • Security operations is no longer a center, but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape.
      • You might experience a negative return on your security control investment. As technology in the industry evolves, threat actors will adopt new tools, tactics, and procedures; a tabletop exercise will help ensure teams are leveraging your security investment properly and providing relevant situational awareness to stay on top of the rapidly evolving threat landscape.

      Impact and Result

      Establish and design a tabletop exercise capability to support and test the efficiency of the core prevention, detection, analysis, and response functions that consist of an organization's threat intelligence, security operations, vulnerability management, and incident response functions.

      Design a Tabletop Exercise to Support Your Security Operation Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should design a tabletop exercise, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Plan

      Evaluate the need for a tabletop exercise.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 1: Plan

      2. Design

      Determine the topics, scope, objectives, and participant roles and responsibilities.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 2: Design

      3. Develop

      Create briefings, guides, reports, and exercise injects.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 3: Develop
      • Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

      4. Conduct

      Host the exercise in a conference or classroom setting.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 4: Conduct

      5. Evaluate

      Plan to ensure measurement and continued improvement.

      • Design a Tabletop Exercise to Support Your Security Operation – Phase 5: Evaluate
      [infographic]

      Vendor Management

      • Buy Link or Shortcode: {j2store}15|cart{/j2store}
      • Related Products: {j2store}15|crosssells{/j2store}
      • member rating overall impact: 9.3/10
      • member rating average dollars saved: $9,627
      • member rating average days saved: 10
      • Parent Category Name: Financial Management
      • Parent Category Link: /financial-management
      That does not mean strong-arming. It means maximizing the vendor relationship value.

      Deliver on Your Digital Product Vision

      • Buy Link or Shortcode: {j2store}351|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $133,318 Average $ Saved
      • member rating average days saved: 30 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Product organizations are under pressure to align the value they provide to the organization’s goals and overall company vision.
      • You need to clearly convey your direction, strategy, and tactics to gain alignment, support, and funding from your organization.
      • Products require continuous additions and enhancements to sustain their value. This requires detailed, yet simple communication to a variety of stakeholders.

      Our Advice

      Critical Insight

      • A vision without tactics is an unsubstantiated dream, while tactics without a vision is working without a purpose. You need to have a handle on both to achieve outcomes that are aligned with the needs of your organization.

      Impact and Result

      • Recognize that a vision is only as good as the data that backs it up – lay out a comprehensive backlog with quality built-in that can be effectively communicated and understood through roadmaps.
      • Your intent is only a dream if it cannot be implemented – define what goes into a release plan via the release canvas.
      • Define a communication approach that lets everyone know where you are heading.

      Deliver on Your Digital Product Vision Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a digital product vision that you can stand behind. Review Info-Tech’s methodology and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define a digital product vision

      Define a digital product vision that takes into account your objectives, business value, stakeholders, customers, and metrics.

      • Deliver on Your Digital Product Vision – Phase 1: Define a Digital Product Vision
      • Digital Product Strategy Template
      • Digital Product Strategy Supporting Workbook

      2. Build a better backlog

      Build a structure for your backlog that supports your product vision.

      • Deliver on Your Digital Product Vision – Phase 2: Build a Better Backlog
      • Product Backlog Item Prioritization Tool

      3. Build a product roadmap

      Define standards, ownership for your backlog to effectively communicate your strategy in support of your digital product vision.

      • Deliver on Your Digital Product Vision – Phase 3: Build a Product Roadmap
      • Product Roadmap Tool

      4. Release and deliver value

      Understand what to consider when planning your next release.

      • Deliver on Your Digital Product Vision – Phase 4: Release and Deliver Value

      5. Communicate the strategy – make it happen

      Build a plan for communicating and updating your strategy and where to go next.

      • Deliver on Your Digital Product Vision – Phase 5: Communicate the Strategy – Make It Happen!

      Infographic

      Workshop: Deliver on Your Digital Product Vision

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define a Digital Product Vision

      The Purpose

      Understand the elements of a good product vision and the pieces that back it up.

      Key Benefits Achieved

      Provide a great foundation for an actionable vision and goals people can align to.

      Activities

      1.1 Build out the elements of an effective digital product vision

      Outputs

      Completed product vision definition for a familiar product via the product canvas

      2 Build a Better Backlog

      The Purpose

      Define the standards and approaches to populate your product backlog that support your vision and overall strategy.

      Key Benefits Achieved

      A prioritized backlog with quality throughout that enables alignment and the operationalization of the overall strategy.

      Activities

      2.1 Introduction to key activities required to support your digital product vision

      2.2 What do we mean by a quality backlog?

      2.3 Explore backlog structure and standards

      2.4 Define backlog data, content, and quality filters

      Outputs

      Articulate the activities required to support the population and validation of your backlog

      An understanding of what it means to create a quality backlog (quality filters)

      Defining the structural elements of your backlog that need to be considered

      Defining the content of your backlog and quality standards

      3 Build a Product Roadmap

      The Purpose

      Define standards and procedures for creating and updating your roadmap.

      Key Benefits Achieved

      Enable your team to create a product roadmap to communicate your product strategy in support of your digital product vision.

      Activities

      3.1 Disambiguating backlogs vs. roadmaps

      3.2 Defining audiences, accountability, and roadmap communications

      3.3 Exploring roadmap visualizations

      Outputs

      Understand the difference between a roadmap and a backlog

      Roadmap standards and agreed-to accountability for roadmaps

      Understand the different ways to visualize your roadmap and select what is relevant to your context

      4 Define Your Release, Communication, and Next Steps

      The Purpose

      Build a release plan aligned to your roadmap.

      Key Benefits Achieved

      Understand what goes into defining a release via the release canvas.

      Considerations in communication of your strategy.

      Understand how to frame your vision to enable the communication of your strategy (via an executive summary).

      Activities

      4.1 Lay out your release plan

      4.2 How to introduce your product vision

      4.3 Communicate changes to your strategy

      4.4 Where do we get started?

      Outputs

      Release canvas

      An executive summary used to introduce other parties to your product vision

      Specifics on communication of the changes to your roadmap

      Your first step to getting started

      Build a Security Compliance Program

      • Buy Link or Shortcode: {j2store}257|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $23,879 Average $ Saved
      • member rating average days saved: 15 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Most organizations spend between 25 and 40 percent of their security budget on compliance-related activities.
      • Despite this growing investment in compliance, only 28% of organizations believe that government regulations help them improve cybersecurity.
      • The cost of complying with cybersecurity and data protection requirements has risen to the point where 58% of companies see compliance costs as barriers to entering new markets.
      • However, recent reports suggest that while the costs of complying are higher, the costs of non-compliance are almost three times greater.

      Our Advice

      Critical Insight

      • Test once, attest many. Having a control framework allows you to satisfy multiple compliance requirements by testing a single control.
      • Choose your own conformance adventure. Conformance levels allow your organization to make informed business decisions on how compliance resources will be allocated.
      • Put the horse before the cart. Take charge of your audit costs by preparing test scripts and evidence repositories in advance.

      Impact and Result

      • Reduce complexity within the control environment by using a single framework to align multiple compliance regimes.
      • Provide senior management with a structured framework for making business decisions on allocating costs and efforts related to cybersecurity and data protection compliance obligations.
      • Reduces costs and efforts related to managing IT audits through planning and preparation.
      • This blueprint can help you comply with NIST, ISO, CMMC, SOC2, PCI, CIS, and other cybersecurity and data protection requirements.

      Build a Security Compliance Program Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should manage your security compliance obligations, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Infographic

      Workshop: Build a Security Compliance Program

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the Program

      The Purpose

      Establish the security compliance management program.

      Key Benefits Achieved

      Reviewing and adopting an information security control framework.

      Understanding and establishing roles and responsibilities for security compliance management.

      Identifying and scoping operational environments for applicable compliance obligations.

      Activities

      1.1 Review the business context.

      1.2 Review the Info-Tech security control framework.

      1.3 Establish roles and responsibilities.

      1.4 Define operational environments.

      Outputs

      RACI matrix

      Environments list and definitions

      2 Identify Obligations

      The Purpose

      Identify security and data protection compliance obligations.

      Key Benefits Achieved

      Identifying the security compliance obligations that apply to your organization.

      Documenting obligations and obtaining direction from management on conformance levels.

      Mapping compliance obligation requirements into your control framework.

      Activities

      2.1 Identify relevant security and data protection compliance obligations.

      2.2 Develop conformance level recommendations.

      2.3 Map compliance obligations into control framework.

      2.4 Develop process for operationalizing identification activities.

      Outputs

      List of compliance obligations

      Completed Conformance Level Approval forms

      (Optional) Mapped compliance obligation

      (Optional) Identification process diagram

      3 Implement Compliance Strategy

      The Purpose

      Understand how to build a compliance strategy.

      Key Benefits Achieved

      Updating security policies and other control design documents to reflect required controls.

      Aligning your compliance obligations with your information security strategy.

      Activities

      3.1 Review state of information security policies.

      3.2 Recommend updates to policies to address control requirements.

      3.3 Review information security strategy.

      3.4 Identify alignment points between compliance obligations and information security strategy.

      3.5 Develop compliance exception process and forms.

      Outputs

      Recommendations and plan for updates to information security policies

      Compliance exception forms

      4 Track and Report

      The Purpose

      Track the status of your compliance program.

      Key Benefits Achieved

      Tracking the status of your compliance obligations.

      Managing exceptions to compliance requirements.

      Reporting on the compliance management program to senior stakeholders.

      Activities

      4.1 Define process and forms for self-attestation.

      4.2 Develop audit test scripts for selected controls.

      4.3 Review process and entity control types.

      4.4 Develop self-assessment process.

      4.5 Integrate compliance management with risk register.

      4.6 Develop metrics and reporting process.

      Outputs

      Self-attestation forms

      Completed test scripts for selected controls

      Self-assessment process

      Reporting process

      Recommended metrics

      Explore the Secrets of SAP Software Contracts to Optimize Spend and Reduce Compliance Risk

      • Buy Link or Shortcode: {j2store}140|cart{/j2store}
      • member rating overall impact: 9.8/10 Overall Impact
      • member rating average dollars saved: $73,994 Average $ Saved
      • member rating average days saved: 9 Average Days Saved
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • SAP has strict audit practices, which, in combination with 50+ types of user classifications and manual accounting for some licenses, make maintaining compliance difficult.
      • Mapping and matching SAP products to the environment can be highly complex, leading to overspending and an inability to reduce spend later.
      • Beware of indirect access to SAP applications from third-party applications (e.g. Salesforce).
      • Products that have been acquired by SAP may have altered licensing terms that are innocuously referred to in support renewal documents.

      Our Advice

      Critical Insight

      • Focus on needs first. Conduct a thorough requirements assessment and document the results. Well-documented license needs will be your core asset in navigating SAP licensing and negotiating your agreement.
      • Examine indirect access possibilities. Understanding how in-house or third-party applications may be accessing the SAP software is critical.
      • Know whats in the contract. Each customer agreement is different and there may be terms that are beneficial. Older agreements may provide both benefits and challenges when evaluating your SAP license position.

      Impact and Result

      • Conduct an analysis to remove inactive and duplicate users as multiple logins may exist and could end up costing the organization license fees when audited.
      • Adopt a cyclical approach to reviewing your SAP licensing and create a reference document to track your software needs, planned licensing, and purchase negotiation points.
      • Learn the “SAP way” of conducting business, which includes a best-in-class sales structure, unique contracts and license use policies, and a hyper-aggressive compliance function. Conducting business with SAP is not typical compared to other vendors, and you will need different tools to emerge successfully from a commercial transaction.
      • Manage SAP support and maintenance spend and policies. Once an agreement has been signed, it can be very difficult to decrease spend, as SAP will reprice products if support is dropped.

      Explore the Secrets of SAP Software Contracts to Optimize Spend and Reduce Compliance Risk Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you need to understand and document your SAP licensing strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Establish licensing requirements

      Begin your proactive SAP licensing journey by understanding which information to gather and assessing the current state and gaps.

      • Explore the Secrets of SAP Software Contracts to Optimize Spend and Reduce Compliance Risk – Phase 1: Establish Licensing Requirements
      • SAP License Summary and Analysis Tool

      2. Evaluate licensing options

      Review current licensing models and determine which licensing models will most appropriately fit your environment.

      • Explore the Secrets of SAP Software Contracts to Optimize Spend and Reduce Compliance Risk – Phase 2: Evaluate Licensing Options

      3. Evaluate agreement options

      Review SAP’s contract types and assess which best fit the organization’s licensing needs.

      • Explore the Secrets of SAP Software Contracts to Optimize Spend and Reduce Compliance Risk – Phase 3: Evaluate Agreement Options

      4. Purchase and manage licenses

      Conduct negotiations, purchase licensing, and finalize a licensing management strategy.

      • Explore the Secrets of SAP Software Contracts to Optimize Spend and Reduce Compliance Risk – Phase 4: Purchase and Manage Licenses
      [infographic]

      Identify and Manage Security Risk Impacts on Your Organization

      • Buy Link or Shortcode: {j2store}221|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • More than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.
      • A new global change will impact your organization at any given time. Ensure that you monitor threats appropriately and that your plans are flexible enough to manage the inevitable consequences.

      Our Advice

      Critical Insight

      • Identifying and managing a vendor’s potential security risk impacts on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes could introduce new risks.
      • Organizational leadership is often taken unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals and surprise incidents.

      Impact and Result

      • Vendor management practices educate organizations on the potential risks from vendors in your market and suggest creative and alternative ways to avoid and manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts with our Security Risk Impact Tool.

      Identify and Manage Security Risk Impacts on Your Organization Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and Manage Security Risk Impacts on Your Organization Deck – Use the research to better understand the negative impacts of vendor actions on your security.

      Use this research to identify and quantify the potential security impacts caused by vendors. Use Info-Tech’s approach to look at the security impacts from various perspectives to better prepare for issues that may arise.

      • Identify and Manage Security Risk Impacts on Your Organization Storyboard

      2. Security Risk Impact Tool – Use this tool to help identify and quantify the security impacts of negative vendor actions.

      By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      • Security Risk Impact Tool
      [infographic]

      Further reading

      Identify and Manage Security Risk Impacts on Your Organization

      Know where the attacks are coming from so you know where to protect.

      Analyst perspective

      It is time to start looking at risk realistically and move away from “trust but verify” toward zero trust.

      Frank Sewell, Research Director, Vendor Management

      Frank Sewell,
      Research Director, Vendor Management
      Info-Tech Research Group

      We are inundated with a barrage of news about security incidents on what seems like a daily basis. In such an environment, it is easy to forget that there are ways to help prevent such things from happening and that they have actual costs if we relax our diligence.

      Most people are aware of defense strategies that help keep their organization safe from direct attack and inside threats. Likewise, they expect their trusted partners to perform the same diligence. Unfortunately, as more organizations use cloud service vendors, the risks with n-party vendors are increasing.

      Over the last few years, we have learned the harsh lesson that downstream attacks affect more businesses than we ever expected as suppliers, manufacturers of base goods and materials, and rising transportation costs affect the global economy.

      “Trust but verify” – while a good concept – should give way to the more effective zero-trust model in favor of knowing it’s not a matter of if an incident happens but when.

      Executive Summary

      Your Challenge

      More than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their plans to accommodate risk on an unprecedented level.

      A new global change will impact your organization at any given time. Ensure that you monitor threats appropriately and that your plans are flexible enough to manage the inevitable consequences.

      Common Obstacles

      Identifying and managing a vendor’s potential security risk impacts on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes could introduce new risks.

      Organizational leadership is often taken unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals and surprise incidents.

      Info-Tech’s Approach

      Vendor management practices educate organizations on the potential risks from vendors in your market and suggest creative and alternative ways to avoid and manage them.

      Prioritize and classify your vendors with quantifiable, standardized rankings.

      Prioritize focus on your high-risk vendors.

      Standardize your processes for identifying and monitoring vendor risks to manage potential impacts with our Security Risk Impact Tool.

      Info-Tech Insight
      Organizations must evolve their security risk assessments to be more adaptive to respond to global changes in the market. Ongoing monitoring of third-party vendor risks and holding those vendors accountable throughout the vendor lifecycle are critical to preventing disastrous impacts.

      Info-Tech’s multi-blueprint series on vendor risk assessment

      There are many individual components of vendor risk beyond cybersecurity.

      Multi-blueprint series on vendor risk assessment

      This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

      Out of Scope:
      This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

      Security risk impacts

      Potential losses to the organization due to security incidents

      • In this blueprint we’ll explore security risks, particularly from third-party vendors, and their impacts.
      • Identify potentially disruptive events to assess the overall impact on organizations and implement adaptive measures to correct security plans.

      The world is constantly changing

      The IT market is constantly reacting to global influences. By anticipating changes, leaders can set expectations and work with their vendors to accommodate them.

      When the unexpected happens, being able to adapt quickly to new priorities ensures continued long-term business success.

      Below are some things no one expected to happen in the last few years:

      62% 83% 84%
      Ransomware attacks spiked 62% globally (and 158% in North America alone). 83% of companies increased organizational focus on third-party risk management in 2020. In a 2020 survey, 84% of organizations reported having experienced a third-party incident in the last three years.
      One Trust, 2022 Help Net Security, 2021 Deloitte, 2020

      Identify and manage security risk impacts on your organization

      Identify and manage security risk impacts on your organization

      Due diligence will enable successful outcomes.

      What is third-party risk?

      Third-Party Vendor: Anyone who provides goods or services to a company or individual in exchange for payment transacted with electronic instructions (Law Insider).

      Third-Party Risk: The potential threat presented to organizations’ employee and customer data, financial information, and operations from the organization’s supply chain and other outside parties that provide products and/or services and have access to privileged systems (Awake Security).

      It is essential to know not only who your vendors are but also who their vendors are (n-party vendors). Organizations often overlook that their vendors rely on others to support their business, and those layers can add risk to your organization.

      Identify and manage security risks

      Global Pandemic

      Very few people could have predicted that a global pandemic would interrupt business on the scale experienced today. Organizations should look at their lessons learned and incorporate adaptable preparations into their security planning and ongoing monitoring moving forward.

      Vendor Breaches

      The IT market is an ever-shifting environment; more organizations are relying on cloud service vendors, staff augmentation, and other outside resources. Organizations should hold these vendors (and their downstream vendors) to the same levels of security and standards of conduct that they hold their internal resources.

      Resource Shortages

      A lack of resources is often overlooked, but it’s easily recognized as a reason for a security incident. All too often, companies are unwilling to dedicate resources to their vendors’ security risk assessment and ongoing monitoring needs. Only once an incident occurs do companies decide it is time to reprioritize.

      Evaluate and Learn From Your Negotiation Sessions More Effectively

      • Buy Link or Shortcode: {j2store}226|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Forty-eight percent of CIOs believe their budgets are inadequate.
      • CIOs and IT departments are getting more involved with negotiations to reduce costs and risk.
      • Confident negotiators tend to be more successful, but even confident negotiators have room to improve.
      • Skilled negotiators are in short supply.

      Our Advice

      Critical Insight

      • Improving your negotiation skills requires more than practice or experience (i.e. repeatedly negotiating).
      • Creating and updating a negotiations lessons-learned library helps negotiators improve and provides a substantial return for the organization.
      • Failure is a great teacher; so is success … but you have to pay attention to indicators, not just results.

      Impact and Result

      Addressing and managing the negotiation debriefing process will help you:

      • Improve negotiation skills.
      • Implement your negotiation strategy more effectively.
      • Improve negotiation results.

      Evaluate and Learn From Your Negotiation Sessions More Effectively Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create and follow a scalable process for preparing to negotiate with vendors, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Negotiations continuing

      This phase will help you debrief after each negotiation session and identify the parts of your strategy that must be modified before your next negotiation session.

      • Evaluate and Learn From Your Negotiation Sessions More Effectively – Phase 1: Negotiations Continuing

      2. Negotiations completed

      This phase will help you conduct evaluations at three critical points after the negotiations have concluded.

      • Evaluate and Learn From Your Negotiation Sessions More Effectively – Phase 2: Negotiations Completed
      [infographic]

      Workshop: Evaluate and Learn From Your Negotiation Sessions More Effectively

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 12 Steps to Better Negotiation Preparation

      The Purpose

      Improve negotiation skills and outcomes; share lessons learned.

      Understand the value of debriefing sessions during the negotiation process.

      Understand how to use the Info-Tech After Negotiations Tool.

      Key Benefits Achieved

      A better understanding of how and when to debrief during the negotiation process to leverage key insights.

      The After Negotiations Tool will be reviewed and configured for the customer’s environment (as applicable).

      Activities

      1.1 Debrief after each negotiation session

      1.2 Determine next steps

      1.3 Return to preparation phase

      1.4 Conduct Post Mortem #1

      1.5 Conduct Implementation Assessment

      1.6 Conduct Post Mortem #2

      Outputs

      Negotiation Session Debrief Checklist and Questionnaire

      Next Steps Checklist

      Discussion

      Post Mortem #1 Checklist & Dashboard

      Implementation Assessment Checklist and Questionnaire

      Post Mortem #2 Checklist & Dashboard

      Customer Relationship Management Platform Selection Guide

      • Buy Link or Shortcode: {j2store}529|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $14,719 Average $ Saved
      • member rating average days saved: 32 Average Days Saved
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • Customer relationship management (CRM) suites are an indispensable part of a holistic strategy for managing end-to-end customer interactions.
      • After defining an approach to CRM, selection and implementation of the right CRM suite is a critical step in delivering concrete business value for marketing, sales, and customer service.
      • Despite the importance of CRM selection and implementation, many organizations struggle to define an approach to picking the right vendor and rolling out the solution in an effective and cost-efficient manner.
      • IT often finds itself in the unenviable position of taking the fall for CRM platforms that don't deliver on the promise of the CRM strategy.

      Our Advice

      Critical Insight

      • IT needs to be a trusted partner in CRM selection and implementation, but the business also needs to own the requirements and be involved from the beginning.
      • CRM requirements dictate the components of the target CRM architecture, such as deployment model, feature focus, and customization level. Savvy application directors recognize the points in the project where the CRM architecture model necessitates deviations from a "canned" roll-out plan.
      • CRM selection is a multi-step process that involves mapping target capabilities for marketing, sales, and customer service, assigning requirements across functional categories, determining the architecture model to prioritize criteria, and developing a comprehensive RFP that can be scored in a weighted fashion.
      • Companies that succeed with CRM implementation create a detailed roadmap that outlines milestones for configuration, security, points of implementation, data migration, training, and ongoing application maintenance.

      Impact and Result

      • A CRM platform that effectively meets the needs of marketing, sales, and customer service and delivers value.
      • Reduced costs during CRM selection.
      • Reduced implementation costs and time frame.
      • Faster time to results after implementation.

      Customer Relationship Management Platform Selection Guide Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Customer Relationship Management Platform Selection Guide – Speed up the process to build your business case and select your CRM solution.

      This blueprint will help you build a business case for selecting the right CRM platform, defining key requirements, and conducting a thorough analysis and scan of the ever-evolving CRM market space.

      • Customer Relationship Management Platform Selection Guide — Phases 1-3

      2. CRM Business Case Template – Document the key drivers for selecting a new CRM platform.

      Having a sound business case is essential for succeeding with a CRM. This template will allow you to document key drivers and impact, in line with the CRM Platform Selection Guide blueprint.

      • CRM Business Case Template

      3. CRM Request for Proposal Template

      Create your own request for proposal (RFP) for your customer relationship management (CRM) solution procurement process by customizing the RFP template created by Info-Tech.

      • CRM Request for Proposal Template

      4. CRM Suite Evaluation and RFP Scoring Tool

      The CRM market has many strong contenders and differentiation may be difficult. Instead of relying solely on reputation, organizations can use this RFP tool to record and objectively compare vendors according to their specific requirements.

      • CRM Suite Evaluation and RFP Scoring Tool

      5. CRM Vendor Demo Script

      Use this template to support your business's evaluation of vendors and their solutions. Provide vendors with scenarios that prompt them to display not only their solution's capabilities, but also how the tool will support your organization's particular needs.

      • CRM Vendor Demo Script

      6. CRM Use Case Fit Assessment Tool

      Use this tool to help build a CRM strategy for the organization based on the specific use case that matches your organizational needs.

      • CRM Use-Case Fit Assessment Tool
      [infographic]

      Further reading

      Customer Relationship Management Platform Selection Guide

      Speed up the process to build your business case and select your CRM solution.

      Table of Contents

      1. Analyst Perspective
      2. Executive Summary
      3. Blueprint Overview
      4. Executive Brief
      5. Phase 1: Understand CRM Functionality
      6. Phase 2: Build the Business Case and Elicit CRM requirements
      7. Phase 3: Discover the CRM Marketspace and Prepare for Implementation
      8. Conclusion

      Analyst Perspective

      A strong CRM platform is paramount to succeeding with customer engagement.

      Modern CRM platforms are the workhorses that provide functional capabilities and data curation for customer experience management. The market for CRM platforms has seen an explosion of growth over the last five years, as organizations look to mature their ability to deliver strong capabilities across marketing, sales, and customer service.

      IT needs to be a trusted partner in CRM selection and implementation, but the business also needs to own the requirements and be involved from the get-go.

      CRM selection must be a multistep process that involves defining target capabilities for marketing, sales, and customer service, prioritizing requirements across functional categories, determining the architecture model for the CRM environment, and developing a comprehensive RFP that can be scored in a weighted fashion.

      To succeed with CRM implementation, create a detailed roadmap that outlines milestones for configuration, security, points of implementation, data migration, training, and ongoing application maintenance.

      Photo of Ben Dickie, Research Lead, Customer Experience Strategy, Info-Tech Research Group. Ben Dickie
      Research Lead, Customer Experience Strategy
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Customer Relationship Management (CRM) suites are an indispensable part of a holistic strategy for managing end-to-end customer interactions. Selecting the right platform that aligns with your requirements is a significant undertaking.

      After defining an approach to CRM, selection and implementation of the right CRM suite is a critical step in delivering concrete business value for marketing, sales, and customer service.
      Common Obstacles

      Despite the importance of CRM selection and implementation, many organizations struggle to define an approach to picking the right vendor and rolling out the solution in an effective and cost-efficient manner.

      The CRM market is rapidly evolving and changing, making it tricky to stay on top of the space.

      IT often finds itself in the unenviable position of taking the fall for CRM platforms that don’t deliver on the promise of the CRM strategy.
      Info-Tech’s Approach

      CRM platform selection must be driven by your overall customer experience management strategy: link your CRM selection to your organization’s CXM framework.

      Determine if you need a CRM platform that skews toward marketing, sales, or customer service; leverage use cases to help guide selection.

      Ensure strong points of integration between CRM and other software such as MMS. A CRM should not live in isolation; it must provide a 360-degree view.

      Info-Tech Insight

      IT must work in lockstep with its counterparts in marketing, sales, and customer service to define a unified vision for the CRM platform.

      Info-Tech’s methodology for selecting the right CRM platform

      1. Understand CRM Features 2. Build the Business Case & Elicit CRM Requirements 3. Discover the CRM Market Space & Prepare for Implementation
      Phase Steps
      1. Define CRM platforms
      2. Classify table stakes & differentiating capabilities
      3. Explore CRM trends
      1. Build the business case
      2. Streamline requirements elicitation for CRM
      3. Construct the RFP
      1. Discover key players in the CRM landscape
      2. Engage the shortlist & select finalist
      3. Prepare for implementation
      Phase Outcomes
      • Consensus on scope of CRM and key CRM capabilities
      • CRM selection business case
      • Top-level use cases and requirements
      • Completed CRM RFP
      • CRM market analysis
      • Shortlisted vendor
      • Implementation considerations

      Guided Implementation

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      The CRM purchase process should be broken into segments:

      1. CRM vendor shortlisting with this buyer’s guide
      2. Structured approach to selection
      3. Contract review

      What does a typical GI on this topic look like?

      Phase 1

      Phase 2

      Phase 3

      Call #1: Understand what a CRM platform is and the “art of the possible” for sales, marketing, and customer service. Call #2: Build the business case to select a CRM.

      Call #3: Define your key CRM requirements.

      Call #4: Build procurement items such as an RFP.
      Call #5: Evaluate the CRM solution landscape and shortlist viable options.

      Call #6: Review implementation considerations.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      INFO~TECH RESEARCH GROUP

      Customer Relationship Management Platform Selection Guide

      Speed up the process to build your business case and select your CRM solution.

      EXECUTIVE BRIEF

      Info-Tech Research Group Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.
      © 1997-2022 Info-Tech Research Group Inc.

      What exactly is a CRM platform?

      Our Definition: A customer relationship management (CRM) platform (or suite) is a core enterprise application that provides a broad feature set for supporting customer interaction processes, typically across marketing, sales and customer service. These suites supplant more basic applications for customer interaction management (such as the contact management module of an enterprise resource planning (ERP) platform or office productivity suite).

      A customer relationship management suite provides many key capabilities, including but not limited to:

      • Account management
      • Order history tracking
      • Pipeline management
      • Case management
      • Campaign management
      • Reports and analytics
      • Customer journey execution

      A CRM suite provides a host of native capabilities, but many organizations elect to tightly integrate their CRM solution with other parts of their customer experience ecosystem to provide a 360-degree view of their customers.

      Stock image of a finger touching a screen showing a stock chart.

      Info-Tech Insight

      CRM feature sets are rapidly evolving. Focus on the social component of sales, marketing, and service management features, as well as collaboration, to get the best fit for your requirements. Moreover, consider investing in best-of-breed social media management platforms (SMMPs) and internal collaboration tools to ensure sufficient functionality.

      Build a cohesive CRM selection approach that aligns business goals with CRM capabilities.

      Info-Tech Insight

      Customers expect to interact with organizations through the channels of their choice. Now more than ever, you must enable your organization to provide tailored customer experiences.

      Customer expectations are on the rise: meet them!

      A CRM platform is a crucial system for enabling good customer experiences.

      CUSTOMER EXPERIENCE IS EVOLVING

      1. Thoughtfulness is in
          Connect with customers on a personal level
      2. Service over products
          The experience is more important than the product
      3. Culture is now number one
          Culture is the most overlooked piece of customer experience strategy
      4. Engineering and service finally join forces
          Companies are combining their technology and service efforts to create strong feedback loops
      5. The B2B world is inefficiently served
          B2B needs to step up with more tools and a greater emphasis placed on customer experience

      (Source: Forbes, 2019)

      Identifying organizational objectives of high priority will assist in breaking down business needs and CRM objectives. This exercise will better align the CRM systems with the overall corporate strategy and achieve buy-in from key stakeholders.

      A strong CRM platform supports a range of organizational objectives for customer engagement.

      Increase Revenue Enable lead scoring Deploy sales collateral management tools Improve average cost per lead via a marketing automation tool
      Enhance Market Share Enhance targeting effectiveness with a CRM Increase social media presence via an SMMP Architect customer intelligence analysis
      Improve Customer Satisfaction Reduce time-to-resolution via better routing Increase accessibility to customer service with live chat Improve first contact resolution with customer KB
      Increase Customer Retention Use a loyalty management application Improve channel options for existing customers Use customer analytics to drive targeted offers
      Create Customer-Centric Culture Ensure strong training and user adoption programs Use CRM to provide 360-degree view of all customer interactions Incorporate the voice of the customer into product development

      Succeeding with CRM selection and implementation has a positive effect on driving revenues and decreasing costs

      There are three buckets of metrics and KPIs where CRM will drive improvements

      The metrics of a smooth CRM selection and implementation process include:

      • Better alignment of CRM functionality to business needs.
      • Better functionality coverage of the selected platform.
      • Decreased licensing costs via better vendor negotiation.
      • Improved end-user satisfaction with the deployed solution.
      • Fewer errors and rework during implementation.
      • Reduced total implementation costs.
      • Reduced total implementation time.

      A successful CRM deployment drives revenue

      • Increased customer acquisition due to enhanced accuracy of segmentation and targeting, superior lead qualification, and pipeline management.
      • Increased customer satisfaction and retention due to targeted campaigns (e.g. customer-specific deals), quicker service incident resolution, and longitudinal relationship management.
      • Increased revenue per customer due to comprehensive lifecycle management tools, social engagement, and targeted upselling of related products and services (enabled by better reporting/analytics).

      A successful CRM deployment decreases cost

      • Deduplication of effort across business domains as marketing, sales, and service now have a common repository of customer information and interaction tools.
      • Increased sales and service agent efficiency due to their focus on selling and resolution, rather than administrative tasks and overhead.
      • Reduced cost-to-sell and cost-to-serve due to automation of activities that were manually intensive.
      • Reduced cost of accurate data due to embedded reporting and analytics functionality.

      CRM platforms sit at the core of a well-rounded customer engagement ecosystem

      At the center is 'Customer Relationship Management Platform' surrounded by 'Web Experience Management Platform', 'E-Commerce & Point-of-Sale Solutions', 'Social Media Management Platform', 'Customer Intelligence Platform', 'Customer Service Management Tools', and 'Marketing Management Suite'.

      Customer Experience Management (CXM) Portfolio

      Customer relationship management platforms are increasingly expansive in functional scope and foundational to an organization’s customer engagement strategy. Indeed, CRMs form the centerpiece for a comprehensive CXM system, alongside tools such as customer intelligence platforms and adjacent point solutions for sales, marketing, and customer service.

      Review Info-Tech’s CXM blueprint below to build a complete, end-to-end customer interaction solution portfolio that encompasses CRM alongside other critical components. The CXM blueprint also allows you to develop strategic requirements for CRM based on customer personas and external market analysis.

      Build a Strong Technology Foundation for Customer Experience Management

      Sample of the 'Build a Strong Technology Foundation for Customer Experience Management' blueprint. Design an end-to-end technology strategy to drive sales revenue, enhance marketing effectiveness, and create compelling experiences for your customers.

      View the blueprint

      Considering a CRM switch? Switching software vendors drives high satisfaction

      Eighty percent of organizations are more satisfied after changing their software vendor.

      • Most organizations see not only a positive change in satisfaction with their new vendor, but also a substantial change in satisfaction.
      • What matters is making sure your organization is well-positioned to make a switch.
      • When it comes to switching software vendors, the grass really can be greener on the other side.

      Over half of organizations are 60%+ more satisfied after changing their vendor.

      (Source: Info-Tech Research Group, "Switching Software Vendors Overwhelmingly Drives Increased Satisfaction", 2020.)

      IT is critical to the success of your CRM selection and rollout

      Today’s shared digital landscape of the CIO and CMO

      Info-Tech Insight

      Technology is the key enabler of building strong customer experiences: IT must stand shoulder to shoulder with the business to develop a technology framework for customer relationship management.

      CIO

      IT Operations

      Service Delivery and Management

      IT Support

      IT Systems and Application

      IT Strategy and Governance

      Cybersecurity
      Collaboration and Partnership

      Digital Strategy = Transformation
      Business Goals | Innovation | Leadership | Rationalization

      Customer Experience
      Architecture | Design | Omnichannel Delivery | Management

      Insight (Market Facing)
      Analytics | Business Intelligence | Machine Learning | AI

      Marketing Integration + Operating Model
      Apps | Channels | Experiences | Data | Command Center

      Master Data
      Customer | Audience | Industry | Digital Marketing Assets
      CMO

      PEO Media

      Brand Management

      Campaign Management

      Marketing Tech

      Marketing Ops

      Privacy, Trust, and Regulatory Requirements

      (Source: ZDNet, 2020)

      CRM by the numbers

      1/3

      Statistical analysis of CRM projects indicates failures vary from 18% to 69%. Taking an average of those analyst reports, about one-third of CRM projects are considered a failure. (Source: CIO Magazine, 2017)

      92%

      92% of organizations report that CRM use is important for accomplishing revenue objectives. (Source: Hall, 2020)

      40%

      In 2019, 40% of executives name customer experience the top priority for their digital transformation. (Source: CRM Magazine, 2019)

      Case Study

      Align strategy and technology to meet consumer demand.
      INDUSTRY
      Entertainment
      SOURCE
      Forbes, 2017
      Challenge

      Beginning as a mail-out service, Netflix offered subscribers a catalog of videos to select from and have mailed to them directly. Customers no longer had to go to a retail store to rent a video. However, the lack of immediacy of direct mail as the distribution channel resulted in slow adoption.

      Blockbuster was the industry leader in video retail but was lagging in its response to industry, consumer, and technology trends around customer experience.

      Solution

      In response to the increasing presence of tech-savvy consumers on the internet, Netflix invested in developing its online platform as its primary distribution channel. The benefit of doing so was two-fold: passive brand advertising (by being present on the internet) and meeting customer demands for immediacy and convenience. Netflix also recognized the rising demand for personalized service and created an unprecedented, tailored customer experience.

      Results

      Netflix’s disruptive innovation is built on the foundation of great customer experience management. Netflix is now a $28-billion company, which is tenfold what Blockbuster was worth.

      Netflix used disruptive technologies to innovatively build a customer experience that put it ahead of the long-time video rental industry leader, Blockbuster.

      CRM Buyer’s Guide

      Phase 1

      Understand CRM Features

      Phase 1

      1.1 Define CRM platforms

      1.2 Classify table stakes & differentiating capabilities

      1.3 Explore CRM trends

      Phase 2

      2.1 Build the business case

      2.2 Streamline requirements elicitation for CRM

      2.3 Construct the RFP

      Phase 3

      3.1 Discover key players in the CRM landscape

      3.2 Engage the shortlist & select finalist

      3.3 Prepare for implementation

      This phase will walk you through the following activities:

      • Set a level of understanding of CRM technology.
      • Define which CRM features are table stakes (standard) and which are differentiating.
      • Identify the “Art of the Possible” in a modern CRM from a sales, marketing, and service lens.

      This phase involves the following participants:

      • CIO
      • Applications manager
      • Project manager
      • Sales executive
      • Marketing executive
      • Customer service executive

      Understand CRM table stakes features

      Organizations can expect nearly all CRM vendors to provide the following functionality.

      Lead Management Pipeline Management Contact Management Campaign Management Customer Service Management
      • Tracks and captures a lead’s information, automatically building a profile. Leads are then qualified through contact scoring models. Assigning leads to sales is typically automated.
      • Enables oversight over future sales. Includes revenue forecasting based on past/present trends, tracking sales velocity, and identifying ineffective sales processes.
      • Tracks and stores customer data, including demography, account and billing history, social media, and contact information. Typically, records and fields can be customized.
      • Provides integrated omnichannel campaign functionality and data analysis of customer intelligence. Data insights can be used to drive new and effective marketing campaigns.
      • Provides integrated omnichannel customer experiences to provide convenient service. Includes case and ticket management, automated escalation rules, and third-party integrations.

      Identify differentiating CRM features

      While not always “must-have” functionality, these features may be the final dealbreaker when deciding between two CRM vendors.

      Image of clustered screens with various network and business icons surounding them.
      • Workflow Automation
        Automate repetitive tasks by creating workflows that trigger actions or send follow-up reminders for next steps.
      • Advanced Analytics and Reporting
        Provides customized dashboard visualizations, detailed reporting, AI-driven virtual assistants, data extraction & analysis, and ML forecasting.
      • Customizations and Open APIs
        Broad range of available customizations (e.g. for dashboards and fields), alongside ease of integration (e.g. via plugins or APIs).
      • Document Management
        Out-of-the-box centralized content repository for storing, uploading, and sharing documents.
      • Mobile Support
        Ability to support mobile devices, OSes, and platforms with a native application or HTML-based web-access.
      • Project and Task Management
        Native project and task management functionality, enhancing cross-team organization and communication.
      • Configure, Price, Quote (CPQ)
        Create and send quotes or proposals to prospective and current customers.

      Features aren’t everything – be wary of common CRM selection pitfalls

      You can have all the right features, but systemic problems will lead to poor CRM implementation. Dig out these root causes first to ensure a successful CRM selection.

      50% of organizations believe the quality of their CRM data is “very poor” or “neutral.”

      Without addressing data governance issues, CRMs will only be as good as your data.

      Source: (Validity 2020)
      27% of organizations report that bad data costs them 10% or more in lost revenue annually.
      42% rate the trust that users have in their data as “high” or “very high.”
      54% believe that sales forecasts are accurate or very accurate.
      69% attribute poor CRM governance to missing or incomplete data, followed by duplicate data, incorrect data, and expired data. Other data issues include siloed data or disparate systems.
      73% believe that they do not have a 360-degree view of their customers.

      Ensure you understand the “art of the possible” in the CRM landscape

      Knowing what is possible will help funnel which features are most suitable for your organization – having all the bells and whistles does not always equal strong ROI.

      Holistically examine the potential of any CRM solution through three main lenses: Stock image of a person working with dashboards.

      Sales

      Identify sales opportunities through recording customers’ interactions, generating leads, nurturing contacts, and forecasting revenues.
      Stock image of people experiencing digital ideas.

      Marketing

      Analyze customer interactions to identify upsell and cross-sell opportunities, drive customer loyalty, and use customer data for targeted campaigns.
      Stock image of a customer service representative.

      Customer Service

      Improve and optimize customer engagement and retention, leveraging customer data to provide round-the-clock omnichannel experiences.

      Art of the possible: Sales

      Stock image of a person working with dashboards.

      TRACK PROSPECT INTERACTIONS

      Want to engage with a prospect but don’t know what to lead with? CRM solutions can track and analyze many of the interactions a prospect has with your organization, including with fellow staff, their clickthrough rate on marketing material, and what services they are downloading on your website. This information can then auto-generate tasks to begin lead generation.

      COORDINATE LEAD SCORING

      Information captured from a prospect is generated into contact cards; missing data (such as name and company) can be auto-captured by the CRM via crawling sites such as LinkedIn. The CRM then centralizes and scores (according to inputted business rules) a lead’s potential, ensuring sales teams coordinate and keep a track of the lead’s journey without wrongful interference.

      AI-DRIVEN REVENUE FORECASTING

      Generate accurate forecasting reports using AI-driven “virtual assistants” within the CRM platform. These assistants are personal data scientists, quickly noting discrepancies, opportunities, and what-if scenarios – tasks that might take weeks to do manually. This pulled data is then auto-forecasted, with the ability to flexibly adjust to real-time data.

      Art of the possible: Marketing

      Stock image of people experiencing digital ideas.

      DRIVE LOYALTY

      Data captured and analyzed in the CRM from customer interactions builds profiles and a deeper understanding of customers’ interests. With this data, marketing teams can deliver personalized promotions and customer service to enhance loyalty – from sending a discount on a product the customer was browsing on the website, to providing notifications about delivery statuses.

      AUTOMATE WORKFLOWS

      Building customer profiles, learning spending habits, and charting a customer’s journey for upselling or cross-selling can be automated through workflows, saving hours of manual work. These workflows can immediately respond to customer enquiries or deliver offers to the customer’s preferred channel based on their prior usage.

      TARGETED CAMPAIGNING

      Information attained through a CRM platform directly informs any marketing strategy: identifying customer segments, spending habits, building a better product based on customer feedback, and identifying high-spending customers. With any new product or offering, it is straightforward for marketing teams to understand where to target their next campaign for highest impact.

      Art of the possible: Customer service

      Stock image of a customer service representative.

      OMNICHANNEL SUPPORT

      Rapidly changing demographics and modes of communications require an evolution toward omnichannel engagement. Many customers now expect to communicate with contact centers not just by voice, but via social media. Agents need customer information synced across each channel they use, meeting the customer’s needs where they are.

      INTELLIGENT SELF-SERVICE PORTALS

      Customers want their issues resolved as quickly as possible. Machine-learning self-service options deliver personalized customer experiences, which also reduce both agent call volume and support costs for the organization.

      LEVERAGING ANALYTICS

      The future of customer service is tied up with analytics. This not only entails AI-driven capabilities that fetch the agent relevant information, skills-based routing, and using biometric data (e.g. speech) for security. It also feeds operations leaders’ need for easy access to real insights about how their customers and agents are doing.

      Best-of-Breed Point Solutions

      Full CRM Suite

      Blue smiley face. Benefits
      • Features may be more advanced for specific functional areas and a higher degree of customization may be possible.
      • If a potential delay in real-time customer data transfer is acceptable, best-of-breeds provide a similar level of functionality to suites for a lower price.
      • Best-of-breeds allow value to be realized faster than suites, as they are easier and faster to implement and configure.
      • Rip and replace is easier, and vendor updates are relatively quick to market.
      Benefits
      • Everyone in the organization works from the same set of customer data.
      • There is a “lowest common denominator” for agent learning as consistent user interfaces lower learning curves and increase efficiency in usage.
      • There is a broader range of functionality using modules.
      • Integration between functional areas will be strong and the organization will be in a better position to enable version upgrades without risking invalidation of an integration point between separate systems.
      Green smiley face.
      Purple frowny face. Challenges
      • Best-of-breeds typically cover less breadth of functionality than suites.
      • There is a lack of uniformity in user experience across best-of-breeds.
      • Data integrity risks are higher.
      • Variable infrastructure may be implemented due to multiple disparate systems, which adds to architecture complexity and increased maintenance.
      • There is potential for redundant functionality across multiple best-of-breeds.
      Challenges
      • Suites exhibit significantly higher costs compared to point solutions.
      • Suite module functionality may not have the same depth as point solutions.
      • Due to high configuration availability and larger-scale implementation requirements, the time to deploy is longer than point solutions.
      Orange frowny face.
      Info-Tech Insight

      Even if a suite is missing a potential module, the proliferation of app extensions, integrations, and services could provide a solution. Salesforce’s AppExchange, for instance, offers a plethora of options to extend its CRM solution – from telephony integration, to gamification.

      CRM Buyer’s Guide

      Phase 2

      Build the Business Case & Elicit CRM Requirements

      Phase 1

      1.1 Define CRM platforms

      1.2 Classify table stakes & differentiating capabilities

      1.3 Explore CRM trends

      Phase 2

      2.1 Build the business case

      2.2 Streamline requirements elicitation for CRM

      2.3 Construct the RFP

      Phase 3

      3.1 Discover key players in the CRM landscape

      3.2 Engage the shortlist & select finalist

      3.3 Prepare for implementation

      This phase will walk you through the following activities:

      • Identify goals, objectives, challenges, and costs to inform the business case for a new CRM platform.
      • Elicit and prioritize key requirements for your platform.
      • Port the requirements into Info-Tech’s CRM RFP Template.

      This phase involves the following participants:

      • CIO
      • Applications manager
      • Project manager
      • Sales executive
      • Marketing executive
      • Customer service executive

      Right-size the CRM selection team to ensure you get the right information but are still able to move ahead quickly

      Full-Time Resourcing: At least one of these five team members must be allocated to the selection initiative as a full-time resource.

      A silhouetted figure.

      IT Leader

      A silhouetted figure.

      Technical Lead

      A silhouetted figure.

      Business Analyst/
      Project Manager

      A silhouetted figure.

      Business Lead

      A silhouetted figure.

      Process Expert(s)

      This team member is an IT director or CIO who will provide sponsorship and oversight from the IT perspective. This team member will focus on application security, integration, and enterprise architecture. This team member elicits business needs and translates them into technology requirements. This team member will provide sponsorship from the business needs perspective. Typically, a CMO or SVP of sales. These team members are the sales, marketing, and service process owners who will help steer the CRM requirements and direction.

      Info-Tech Insight

      It is critical for the selection team to determine who has decision rights. Organizational culture will play the largest role in dictating which team member holds the final say for selection decisions. For more information on stakeholder management and involvement, see this guide.

      Be prepared to define what issues you are trying to address and why a new CRM is the right approach

      Identify the current state and review the background of what you’ve done leading up to this point, goals you’ve been asked to meet, and challenges in solving known problems to help to set the stage for why your proposed solution is needed. If your process improvements have taken you as far as you can go without improved workflows or data, specify where the gaps are.
      Arrows with icons related to the text on the right merging into one arrow. Alignment

      Alignment to strategic goals is always important, but that is especially true with CRM because customer relationship management platforms are at the intersection of your organization and your customers. What are the strategic marketing, sales and customer service goals that you want to realize (in whole or in part) by improving your CRM ecosystem?

      Impact to your business

      Identify areas where your customers may be impacted by poor experiences due to inadequate or aging technology. What’s the impact on customer retention? On revenue?

      Impact to your organization

      Define how internal stakeholders within the organization are impacted by a sub-optimal CRM experience – what are their frustrations and pain points? How do issues with your current CRM environment prevent teams in sales, marketing, or service from doing their jobs?

      Impact to your department

      Describe the challenges within IT of using disparate systems, workarounds, poor data and reporting, lack of automation, etc., and the effect these challenges have on IT’s goals.

      Align the CRM strategy with the corporate strategy

      Corporate Strategy Unified Strategy CRM Strategy
      Spectrum spanning all columns.
      Your corporate strategy:
      • Conveys the current state of the organization and the path it wants to take.
      • Identifies future goals and business aspirations.
      • Communicates the initiatives that are critical for getting the organization from its current state to the future state.
      • The CRM strategy and the rationale for deploying a new CRM can be and should be linked, with metrics, to the corporate strategy and ultimate business objectives (such as improving customer acquisition, entering new segments, or improving customer lifetime value).
      Your CRM strategy:
      • Communicates the organization’s budget and spending on CRM.
      • Identifies IT initiatives that will support the business and key CRM objectives.
      • Outlines staffing and resourcing for CRM initiatives.
      CRM projects are more successful when the management team understands the strategic importance and the criticality of alignment. Time needs to be spent upfront aligning business strategies with CRM capabilities. Effective alignment between sales, marketing, customer service, operations, IT, and the business should happen daily. Alignment doesn’t just need to occur at the executive level, but also at each level of the organization.

      2.1 Create your list of goals and milestones for CRM

      1-3 hours

      Input: Corporate strategy, Target key performance indicators, End-user satisfaction results (if applicable)

      Output: Prioritized list of goals with milestones that can be met with a new or improved CRM solution

      Materials: Whiteboard/flip charts, CRM Business Case Template

      Participants: CIO, Application managers, CMO/SVP sales, Marketing, sales or service SMEs

      1. Review strategic goals to identify alignment to your CRM selection project. For example, digital transformation may be enhanced or enabled with a CRM solution that supports better outreach to key customer segments through improved campaign management.
      2. Next, brainstorm tactical goals with your colleagues.
      3. Identify specific goals the organization has set for the business that may be supported by improved customer prospecting, customer service, or analytics functionality through a better CRM solution.
      4. Identify specific goals your organization will be able to make possible with a new or improved CRM solution.
      5. Prioritize this list and lead with the most important goal that can be reached at the one-year, six-month, and three-month milestones.
      6. Document in the goals section of your business case.

      Download the CRM Business Case Template and record the outputs of this exercise in the strategic business goals, business drivers, and technical drivers slides.

      Identify what challenges exist with the current environment

      Ensure you are identifying issues at a high level, so as not to drown in detail, but still paint the right picture. Identify technical issues that are impacting customer experience or business goals. Typical complaints for CRM solutions that are old or have been outgrown include:

      1.

      Lack of a flexible, configurable customer data model that supports complex relationships between accounts and contacts.

      2.

      Lack of a flexible, configurable customer data model that supports complex relationships between accounts and contacts.

      3.

      Lack of meaningful reports and useable dashboards, or difficulty in surfacing them.

      4.

      Poor change enablement resulting in business interruptions.

      5.

      Inability to effectively automate routine sales, marketing, or service tasks at scale via a workflow tool.

      6.

      Lack of proper service management features, such as service knowledge management.

      7.

      Inability to ingest customer data at scale (for example, no ability to automatically log e-mails or calls).

      8.

      Major technical deficiencies and outages – the incumbent CRM platform goes down, causing business disruption.

      9.

      The platform itself doesn’t exist in the current state – everything is done in Microsoft Excel!

      Separate business issues from technical issues, but highlight where they’re connected and where technical issues are causing business issues or preventing business goals from being reached.

      Before switching vendors, evaluate your existing CRM to see if it’s being underutilized or could use an upgrade

      The cost of switching vendors can be challenging, but it will depend entirely on the quality of data and whether it makes sense to keep it.
      • Achieving success when switching vendors first requires reflection. We need to ask why we are dissatisfied with our incumbent software.
      • If the product is old and inflexible, the answer may be obvious, but don’t be afraid to include your incumbent in your evaluation if your issues might be solved with an upgrade.
      • Look at your use-case requirements to see where you want to take the CRM solution and compare them to your incumbent’s roadmap. If they don’t match, switching vendors may be the only solution. If your roadmaps align, see if you’re fully leveraging the solution or will be able to start working through process improvements.
      Pie graph with a 20% slice. Pie graph with a 25% slice.

      20%

      Small/Medium Enterprises

      25%

      Large Enterprises
      only occasionally or rarely/never use their software (Source: Software Reviews, 2020; N = 45,027)
      Fully leveraging your current software now will have two benefits:
      1. It may turn out that poor leveraging of your incumbent software was the problem all along; switching vendors won’t solve the problem by itself. As the data to the right shows, a fifth of small/medium enterprises and a quarter of large enterprises do not fully leverage their incumbent software.
      2. If you still decide to switch, you’ll be in a good negotiating position. If vendors can see you are engaged and fully leveraging your software, they will be less complacent during negotiations to win you over.
      Info-Tech Insight

      Switching vendors won’t improve poor internal processes. To be fully successful and meet the goals of the business case, new software implementations must be accompanied by process review and improvement.

      2.2 Create your list of challenges as they relate to your goals and their impacts

      1-2 hours

      Input: Goals lists, Target key performance indicators, End-user satisfaction results (if applicable)

      Output: Prioritized list of challenges preventing or hindering customer experiences

      Materials: Whiteboard/flip charts, CRM Business Case Template

      Participants: CIO, Application managers, CMO/SVP sales, Marketing, sales, or service SMEs

      1. Brainstorm with your colleagues to discuss your challenges with CRM today from an application and process lens.
      2. Identify how these challenges are impacting your ability to meet the goals and identify any that are creating customer-facing issues.
      3. Group together like areas and arrange in order of most impactful. Identify which of these issues will be most relevant to the business case for a new CRM platform.
      4. Document in the current-state section of your business case.
      5. Discuss and determine if the incumbent solution can meet your needs or if you’ll need to replace it with a different product.

      Download the CRM Business Case Template and document the outputs of this exercise in the current-state section of your business case.

      Determine costs of the solution

      Ensure the business case includes both internal and external costs related to the new CRM platform, allocating costs of project managers to improve accuracy of overall costs and level of success.

      CRM solutions include application costs and costs to design processes, install, and configure. These start-up costs can be a significant factor in whether the initial purchase is feasible.

      CRM Vendor Costs

      • Application licensing
      • Implementation and configuration
      • Professional services
      • Maintenance and support
      • Training
      • 3rd Party add-ons
      • Data transformation
      • Integration
      When thinking about vendor costs, also consider the matching internal cost associated with the vendor activity (e.g. data cleansing, internal support).

      Internal Costs

      • Project management
      • Business readiness
      • Change management
      • Resourcing (user groups, design/consulting, testing)
      • Training
      • Auditors (if regulatory requirements need vetting)
      Project management is a critical success factor at all stages of an enterprise application initiative from planning to post-implementation. Ensuring that costs for such critical areas are accurately represented will contribute to success.

      Download the blueprint Improve Your Statements of Work to Hold Your Vendors Accountable to define requirements for installation and configuration.

      Bring in the right resources to guarantee success. Work with the PMO or project manager to get help with creating the SOW.

      60% of IT projects are NOT finished “mostly or always” on time (Wellingtone, 2018).

      55% of IT personnel feel that the business objectives of their software projects are clear to them (Geneca, 2017).

      Document costs and expected benefits of the new CRM

      The business case should account for the timing of both expenditures and benefits. It is naïve to expect straight-line benefit realization or a big-bang cash outflow related to the solution implementation. Proper recognition and articulation of ramp-up time will make your business case more convincing.

      Make sure your timelines are realistic for benefits realization, as these will be your project milestones and your metrics for success.

      Example:
      Q1-Q2 Q3-Q6 Q6 Onwards

      Benefits at 25%

      At the early stages of an implementation, users are still learning the new system and go-live issues are being addressed. Most of the projected process improvements are likely to be low, zero, or even negative.

      Benefits at 75%

      Gradually, as processes become more familiar, an organization can expect to move closer to realizing the forecasted benefits or at least be in a position to recognize a positive trend toward their realization.

      Benefits at 100%

      In an ideal world, all projected benefits are realized at 100% or higher. This can be considered the stage where processes have been mastered, the system is operating smoothly, and change has been broadly adopted. In reality, benefits are often overestimated.

      Costs at 50%

      As with benefits, some costs may not kick in until later in the process or when the application is fully operational. In the early phases of implementation, factor in the cost of overlapping technology where you’ll need to run redundant systems and transition any data.

      Costs at 100%

      Costs are realized quicker than benefits as implementation activities are actioned, licensing and maintenance costs are introduced, and resourcing is deployed to support vendor activities internally. Costs that were not live in the early stages are an operational reality at this stage.

      Costs at 100%+

      Costs can be expected to remain relatively static past a certain point, if estimates accurately represented all costs. In many instances, costs can exceed original estimates in the business case, where costs were either underestimated, understated, or missed.

      2.3 Document your costs and expected benefits

      1-2 hours

      Input: Quotes with payment schedule, Budget

      Output: Estimated payment schedule and cost breakdown

      Materials: Spreadsheet or whiteboard, CRM Business Case Template

      Participants: CIO, Application managers, CMO/SVP sales, Marketing, sales, or service SMEs

      1. Estimate costs for the CRM solution. If you’re working with a vendor, provide the initial requirements to quote; otherwise, estimate as closely as you’re able.
      2. Calculate the five-year total cost for the solution to ensure the long-term budget is calculated.
      3. Break down costs for licenses, implementation, training, internal support, and hardware or hosting fees.
      4. Determine a reasonable breakdown of costs for the first year.
      5. Identify where residual costs of the old system may factor in if there are remaining contract obligations during the technology transition.
      6. Create a list of benefits expected to be realized within the same timeline.

      Sample of the table on the previous slide.

      Download the CRM Business Case Template and document the outputs of this exercise in the current-state section of your business case.

      Identify risks and dependencies to mitigate barriers to success as you look to roll out a CRM suite

      A risk assessment will be helpful to better understand what risks need to be mitigated to make the project a success and what risks are pending should the solution not be approved or be delayed.

      Risk Criteria Relevant Questions
      Timeline Uncertainty
      • How much risk is associated with the timeline of the CRM project?
      • Is this timeline realistic and can you reach some value in the first year?
      Success of Similar Projects
      • Have we undertaken previous projects that are similar?
      • Were those successful?
      • Did we note any future steps for improvement?
      Certainty of Forecasts
      • Where have the numbers originated?
      • How comfortable are the sponsors with the revenue and cost forecasts?
      Chance of Cost Overruns
      • How likely is the project to have cost overruns?
      • How much process and design work needs to be done prior to implementation?
      Resource Availability
      • Is this a priority project?
      • How likely are resourcing issues from a technical and business perspective?
      • Do we have the right resources?
      Change During Delivery
      • How volatile is the area in which the project is being implemented?
      • Are changes in the environment likely?
      • How complex are planned integrations?

      2.4 Identify risks to the success of the solution rollout and mitigation plan

      1-2 hours

      Input: List of goals and challenges, Target key performance indicators

      Output: Prioritized list of challenges preventing or hindering improvements for the IT teams

      Materials: Whiteboard/flip charts, CRM Business Case Template

      Participants: CIO, Application managers, CMO/SVP sales, Marketing, sales, or service SMEs

      1. Brainstorm with your colleagues to discuss potential roadblocks and risks that could impact the success of the CRM project.
      2. Identify how these risks could impact your project.
      3. Document the ones that are most likely to occur and derail the project.
      4. Discuss potential solutions to mitigate risks.

      Download the CRM Business Case Template and document the outputs of this exercise in the risk and dependency section of your business case. If the risk assessment needs to be more complex, complete the Risk Indicator Analysis in Info-Tech’s Business Case Workbook.

      Start requirements gathering by identifying your most important use cases across sales, marketing, and service

      Add to your business case by identifying which top-level use cases will meet your goals.

      Examples of target use cases for a CRM project include:

      • Enhance sales acquisition capabilities (i.e. via pipeline management)
      • Enhance customer upsell and cross-sell capabilities
      • Improve customer segmentation and targeting capabilities for multi-channel marketing campaigns
      • Strengthen customer care capabilities to improve customer satisfaction and retention (i.e. via improved case management and service knowledge management)
      • Create actionable insights via enhanced reporting and analytics

      Info-Tech Insight

      Lead with the most important benefit and consider the timeline. Can you reach that goal and report success to your stakeholders within the first year? As you look toward that one-year goal, you can consider secondary benefits, some of which may be opportunities to bring early value in the solution.

      Benefits of a successful deployment of use cases will include:
      • Improved customer satisfaction
      • Improved operational efficiencies
      • Reduced customer turnover
      • Increased platform uptime
      • License or regulatory compliance
      • Positioned for growth

      Typically, we see business benefits in this order of importance. Lead with the outcome that is most important to your stakeholders.

      • Net income increases
      • Revenue generators
      • Cost reductions
      • Improved customer service

      Consider perspectives of each stakeholder to ensure functionality needs are met and high satisfaction results

      Best of breed vs. “good enough” is an important discussion and will feed your success.

      Costs can be high when customizing an ill-fitting module or creating workarounds to solve business problems, including loss of functionality, productivity, and credibility.

      • Start with use cases to drive the initial discussion, then determine which features are mandatory and which are nice-to-haves. Mandatory features will help determine high success for critical functionality and identify where “good enough” is an acceptable state.
      • Consider the implications to implementation and all use cases of buying an all-in-one solution, integration of multiple best-of-breed solutions, or customizing features that were not built into a solution.
      • Be prepared to shelve a use case for this solution and look to alternatives for integration where mandatory features cannot meet highly specialized needs that are outside of traditional CRM solutions.

      Pros and Cons

      Build vs. Buy

      Multi-Source Best of Breed

      Flexibility
      vs.
      architectural complexity

      Vendor Add-Ons & Integrations

      Lower support costs
      vs.
      configuration

      Multi-source Custom

      Flexibility
      vs.
      high skills requirements

      Single Source

      Lower support costs
      vs.
      configuration

      2.5 Define use cases and high-level features for meeting business and technical goals

      1-2 hours

      Input: List of goals and challenges

      Output: Use cases to be used for determining requirements

      Materials: Whiteboard/flip charts, CRM Business Case Template

      Participants: CIO, Application managers, CMO/SVP sales, Marketing, sales, or service SMEs

      1. Identify the key customer engagement use cases that will support your overall goals as defined in the previous section.
      2. The following slide has examples of use case domains that will be enhanced from a CRM platform.
      3. Define high-level goals you wish to achieve in the first year and longer term. If you have more specific KPIs to add, and it is a requirement for your organization’s documentation, add them to this section.
      4. Take note of where processes will need to be improved to benefit from these use-case solutions – the tools are only as good as the process behind them.

      Download the CRM Business Case Template and document the outputs from this exercise in the current-state section of your business case.

      Understand the dominant use-case scenarios across organizations to narrow the list of potential CRM solutions

      Sales
      Enablement

      • Generate leads through multiple channels.
      • Rapidly sort, score, and prioritize leads based on multiple criteria.
      • Create in-depth sales forecasts segmented by multiple criteria (territory, representative, etc.).

      Marketing
      Management

      • Manage marketing campaigns across multiple channels (web, social, email, etc.).
      • Aggregate and analyze customer data to generate market intelligence.
      • Build and deploy customer-facing portals.

      Customer Service
      Management

      • Generate tickets, and triage customer service requests through multiple channels.
      • Track customer service interactions with cases.
      • There is a need to integrate customer records with contact center infrastructure.
      Info-Tech Insight

      Use your understanding of the CRM use case to accelerate the vendor shortlisting process. Since the CRM use case has a direct impact on the prioritization of a platform’s features and capabilities, you can rapidly eliminate vendors from contention or designate superfluous modules as out-of-scope.

      2.5.1 Use Info-Tech’s CRM Use-Case Fit Assessment Tool to align your CRM requirements to the vendor use cases

      30 min

      Input: Understanding of business objectives for CRM project, Use-Case Fit Assessment Tool

      Output: Use-case suitability

      Materials: Use-Case Fit Assessment Tool

      Participants: Core project team, Project managers

      1. Use the Use-Case Fit Assessment Tool to understand how your unique business requirements map into which CRM use case.
      2. This tool will assess your answers and determine your relative fit against the use-case scenarios.
      3. Fit will be assessed as “Weak,” “Moderate,” or “Strong.”
        1. Consider the common pitfalls, which were mentioned earlier, that can cause IT projects to fail. Plan and take clear steps to avoid or mitigate these concerns.
        2. Note: These use-case scenarios are not mutually exclusive, meaning your organization can align with one or more scenarios based on your answers. If your organization shows close alignment to multiple scenarios, consider focusing on finding a more robust solution and concentrate your review on vendors that performed strongly in those scenarios or meet the critical requirements for each.

      Download the CRM Use-Case Fit Assessment Tool

      Once you’ve identified the top-level use cases a CRM must support, elicit, and prioritize granular platform requirements.

      Understanding business needs through requirements gathering is the key to defining everything about what is being purchased, yet it is an area where people often make critical mistakes.

      Info-Tech Insight

      To avoid creating makeshift solutions, an organization needs to gather requirements with the desired future state in mind.

      Risks of poorly scoped requirements

      • Fail to be comprehensive and miss certain areas of scope
      • Focus on how the solution should work instead of what it must accomplish
      • Have multiple levels of detail within the requirements, which are inconsistent and confusing
      • Drill all the way down into system-level detail
      • Add unnecessary constraints based on what is done today rather than focusing on what is needed for tomorrow
      • Omit constraints or preferences that buyers think are “obvious”

      Best practices

      • Get a clear understanding of what the system needs to do and what it is expected to produce
      • Test against the principle of MECE – requirements should be “mutually exclusive and collectively exhaustive”
      • Explicitly state the obvious and assume nothing
      • Investigate what is sold on the market and how it is sold. Use language that is consistent with that of the market and focus on key differentiators – not table stakes
      • Contain the appropriate level of detail – the level should be suitable for procurement and sufficient for differentiating vendors

      Prioritize requirements to assist with vendor selection: focus on priority requirements linked to differentiated capabilities

      Prioritization is the process of ranking each requirement based on its importance to project success. Hold a meeting for the domain SMEs, implementation SMEs, project managers, and project sponsors to prioritize the requirements list. At the conclusion of the meeting, each requirement should be assigned a priority level. The implementation SMEs will use these priority levels to ensure efforts are targeted toward the proper requirements and to plan features available on each release. Use the MoSCoW Model of Prioritization to effectively order requirements.


      Pyramid of the MoSCoW Model.
      The MoSCoW model was introduced by Dai Clegg of Oracle UK in 1994.

      The MoSCoW Model of Prioritization

      Requirements must be implemented for the solution to be considered successful.

      Requirements that are high priority should be included in the solution if possible.

      Requirements are desirable but not necessary and could be included if resources are available.

      Requirements won’t be in the next release, but will be considered for the future releases.

      Base your prioritization on the right set of criteria

      Effective Prioritization Criteria

      Criteria

      Description

      Regulatory & Legal Compliance These requirements will be considered mandatory.
      Policy Compliance Unless an internal policy can be altered or an exception can be made, these requirements will be considered mandatory.
      Business Value Significance Give a higher priority to high-value requirements.
      Business Risk Any requirement with the potential to jeopardize the entire project should be given a high priority and implemented early.
      Likelihood of Success Especially in “proof of concept” projects, it is recommended that requirements have good odds.
      Implementation Complexity Give a higher priority to low implementation difficulty requirements.
      Alignment With Strategy Give a higher priority to requirements that enable the corporate strategy.
      Urgency Prioritize requirements based on time sensitivity.
      Dependencies A requirement on its own may be low priority, but if it supports a high-priority requirement, then its priority must match it.

      2.6 Identify requirements to support your use cases

      1-2 hours

      Input: List of goals and challenges

      Output: Use cases to be used for determining requirements

      Materials: Whiteboard/flip charts, Vendor Evaluation Workbook

      Participants: CIO, Application managers, CMO/SVP sales, Marketing, sales, or service SMEs

      1. Work with the team to identify which features will be most important to support your use cases. Keep in mind there will be some features that will require more effort to implement fully. Add that into your project plan.
      2. Use the features lists on the following slides as a guide to get started on requirements.
      3. Prioritize your requirements list into mandatory features and nice-to-have features (or use the MoSCoW model from the previous slides). This will help you to eliminate vendors who don’t meet bare minimums and to score remaining vendors.
      4. Use this same list to guide your vendor demos.

      Our Improve Requirements Gathering blueprint provides a deep dive into the process of eliciting, analyzing, and validating requirements if you need to go deeper into effective techniques.

      CRM features

      Table stakes vs. differentiating

      What is a table stakes/standard feature?

      • Certain features are standard for all CRM tools, but that doesn’t mean they are all equal.
      • The existence of features doesn’t guarantee their quality or functionality to the standards you need. Never assume that “Yes” in a features list means you don’t need to ask for a demo.
      • If Table Stakes are all you need from your CRM solution, the only true differentiator for the organization is price. Otherwise, dig deeper to find the best price to value for your needs.

      What is a differentiating/additional feature?

      • Differentiating features take two forms:
        • Some CRM platforms offer differentiating features that are vertical specific.
        • Other CRM platforms offer differentiating features that are considered cutting edge. These cutting-edge features may become table stakes over time.

      Table stakes features for CRM

      Account Management Flexible account database that stores customer information, account history, and billing information. Additional functionality includes: contact deduplication, advanced field management, document linking, and embedded maps.
      Interaction Logging and Order History Ability to view all interactions that have occurred between sales teams and the customer, including purchase order history.
      Basic Pipeline Management View of all opportunities organized by their current stage in the sales process.
      Basic Case Management The ability to create and manage cases (for customer service or order fulfilment) and associate them with designated accounts or contacts.
      Basic Campaign Management Basic multi-channel campaign management (i.e. ability to execute outbound email campaigns). Budget tracking and campaign dashboards.
      Reports and Analytics In-depth reports on CRM data with dashboards and analytics for a variety of audiences.
      Mobile Support Mobile access across multiple devices (tablets, smartphones and/or wearables) with access to CRM data and dashboards.

      Additional features for CRM

      Customer Information Management Customizable records with detailed demographic information and the ability to created nested accounts (accounts with associated sub-accounts or contact records).
      Advanced Case Management Ability to track detailed interactions with members or constituents through a case view.
      Employee Collaboration Capabilities for employee-to-employee collaboration, team selling, and activity streams.
      Customer Collaboration Capabilities for outbound customer collaboration (i.e. the ability to create customer portals).
      Lead Generation Capabilities for generating qualified leads from multiple channels.
      Lead Nurturing/Lead Scoring The ability to evaluate lead warmth using multiple customer-defined criteria.
      Pipeline and Deal Management Managing deals through cases, providing quotes, and tracking client deliverables.

      Additional features for CRM (Continued)

      Marketing Campaign Management Managing outbound marketing campaigns via multiple channels (email, phone, social, mobile).
      Customer Intelligence Tools for in-depth customer insight generation and segmentation, predictive analytics, and contextual analytics.
      Multi-Channel Support Capabilities for supporting customer interactions across multiple channels (email, phone, social, mobile, IoT, etc.).
      Customer Service Workflow Management Capabilities for customer service resolution, including ticketing and service management.
      Knowledge Management Tools for capturing and sharing CRM-related knowledge, especially for customer service.
      Customer Journey Mapping Visual workflow builder with automated trigger points and business rules engine.
      Document Management The ability to curate assets and attachments and add them to account or contact records.
      Configure, Price, Quote The ability to create sales quotes/proposals from predefined price lists and rules.

      2.7 Put it all together – port your requirements into a robust RFP template that you can take to market!

      1-2 hours
      1. Once you’ve captured and prioritized your requirements – and received sign-off on them from key stakeholders – it’s time to bake them into a procurement vehicle of your choice.
      2. For complex enterprise systems like a CRM platform, Info-Tech recommends that this should take the form of a structured RFP document.
      3. Use our CRM RFP Template and associated CRM RFP Scoring Tool to jump-start the process.
      4. The next step will be conducting a market scan to identify contenders, and issuing the RFP to a shortlist of viable vendors for further evaluation.

      Need additional guidance on running an effective RFP process? Our Drive Successful Sourcing Outcomes with a Robust RFP Process has everything you need to ace the creation, administration and assessment of RFPs!

      Samples of the CRM Request for Proposal Template and CRM Suite Evaluation and RFP Scoring Tool.

      Download the CRM Request for Proposal Template

      Download the CRM Suite Evaluation and RFP Scoring Tool

      Identify whether vertical-specific CRM platforms are a best fit

      In mature vendor landscapes (like CRM) vendors begin to differentiate themselves by offering vertical-specific platforms, modules, or feature sets. These feature sets accelerate the implantation, decrease the platform’s learning curve, and drive user adoption. The three use cases below cover the most common industry-specific offerings:

      Public Sector

      • Constituent management and communication.
      • Constituent portal deployment for self-service.
      • Segment constituents based on geography, needs and preferences.

      Education

      • Top-level view into the student journey from prospect to enrolment.
      • Track student interactions with services across the institution.
      • Unify communications across different departments.

      Financial Services

      • Determine customer proclivity for new services.
      • Develop self-service banking portals.
      • Track longitudinal customer relationships from first account to retirement management.
      Info-Tech Insight

      Vertical-specific solutions require less legwork to do upfront but could cost you more in the long run. Interoperability and vendor viability must be carefully examined. Smaller players targeting niche industries often have limited integration ecosystems and less funding to keep pace with feature innovation.

      Rein-in ballooning scope for CRM selection projects

      Stretching the CRM beyond its core capabilities is a short-term solution to a long-term problem. Educate stakeholders about the limits of CRM technology.

      Common pitfalls for CRM selection

      • Tangential capabilities may require separate solutions. It is common for stakeholders to list features such as “content management” as part of the new CRM platform. While content management goes hand in hand with the CRM’s ability to manage customer interactions, document management is best handled by a standalone platform.

      Keeping stakeholders engaged and in line

      • Ballooning scope leads to stakeholder dissatisfaction. Appeasing stakeholders by over-customizing the platform will lead to integration and headaches down the road.
      • Make sure stakeholders feel heard. Do not turn down ideas in the midst of an elicitation session. Once the requirements-gathering sessions are completed, the project team has the opportunity to mark requirements as “out of scope” and communicate the reasoning behind the decision.
      • Educate stakeholders on the core functionality of CRM. Many stakeholders do not know the best-fit use cases for CRM platforms. Help end users understand what CRM is good at and where additional technologies will be needed.
      Stock image of a man leaping with a balloon.

      CRM Buyer’s Guide

      Phase 3

      Discover the CRM Market Space & Prepare for Implementation

      Phase 1

      1.1 Define CRM platforms

      1.2 Classify table stakes & differentiating capabilities

      1.3 Explore CRM trends

      Phase 2

      2.1 Build the business case

      2.2 Streamline requirements elicitation for CRM

      2.3 Construct the RFP

      Phase 3

      3.1 Discover key players in the CRM landscape

      3.2 Engage the shortlist & select finalist

      3.3 Prepare for implementation

      This phase will walk you through the following activities:

      • Dive into the key players of the CRM vendor landscape.
      • Understand best practices for building a vendor shortlist.
      • Understand key implementation considerations for CRM.

      This phase involves the following participants:

      • CIO
      • Applications manager
      • Project manager
      • Sales executive
      • Marketing executive
      • Customer service executive

      Consolidating the Vendor Shortlist Up-Front Reduces Downstream Effort

      Put the “short” back in shortlist!

      • Radically reduce effort by narrowing the field of potential vendors earlier in the selection process. Too many organizations don’t funnel their vendor shortlist until nearing the end of the selection process. The result is wasted time and effort evaluating options that are patently not a good fit.
      • Leverage external data (such as SoftwareReviews) and expert opinion to consolidate your shortlist into a smaller number of viable vendors before the investigative interview stage and eliminate time spent evaluating dozens of RFP responses.
      • Having fewer RFP responses to evaluate means you will have more time to do greater due diligence.
      Stock image of river rapids.

      Review your use cases to start your shortlist

      Your Info-Tech analysts can help you narrow down the list of vendors that will meet your requirements.

      Next steps will include:
      1. Reviewing your requirements
      2. Checking out SoftwareReviews
      3. Shortlisting your vendors
      4. Conducting demos and detailed proposal reviews
      5. Selecting and contracting with a finalist!
      Image of a person presenting a dashboard of the steps on the left.

      Get to know the key players in the CRM landscape

      The proceeding slides provide a top-level overview of the popular players you will encounter in the CRM shortlisting process.

      Logos of the key players in the CRM landscape (Salesforce, Microsoft, Oracle, HubSpot, etc).

      Evaluate software category leaders through vendor rankings and awards

      SoftwareReviews

      Sample of SoftwareReviews' Data Quadrant Report. Title page of SoftwareReviews' Data Quadrant Report. The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

      Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.

      Sample of SoftwareReviews' Emotional Footprint. Title page of SoftwareReviews' Emotional Footprint. The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

      Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

      Speak with category experts to dive deeper into the vendor landscape

      SoftwareReviews

      Icon of a person.


      Fact-based reviews of business software from IT professionals.

      Icon of a magnifying glass over a chart.


      Top-tier data quality backed by a rigorous quality assurance process.

      CLICK HERE to ACCESS

      Comprehensive software reviews to make better IT decisions

      We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      Icon of a tablet.


      Product and category reports with state-of-the-art data visualization.

      Icon of a phone.


      User-experience insight that reveals the intangibles of working with a vendor.

      SoftwareReviews is powered by Info-Tech

      Technology coverage is a priority for Info-Tech, and SoftwareReviews provides the most comprehensive unbiased data on today’s technology. Combined with the insights of our expert analysts, our members receive unparalleled support in their buying journey.

      Logo for Salesforce.
      Est. 1999 | CA, USA | NYSE: CRM

      bio

      Link for their Twitter account. Link for their LinkedIn profile. Link for their website.
      Sales Cloud Enterprise allows you to be more efficient, more productive, more everything than ever before as it allows you to close more deals, accelerate productivity, get more leads, and make more insightful decisions.

      SoftwareReviews’ Enterprise CRM Rankings

      Strengths:
      • Breadth of features
      • Quality of features
      • Sales management functionality
      Areas to Improve:
      • Cost of service
      • Ease of implementation
      • Telephony and contact center management
      Logo gif for SoftwareReviews.
      8.0
      COMPOSITE SCORE
      8.3
      CX SCORE
      +77
      EMOTIONAL FOOTPRINT
      83%
      LIKELINESS TO RECOMMEND
      DOWNLOAD REPORT 600
      REVIEWS
      Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
      Sample of a Salesforce screen. Vendor Pulse rating. How often do we hear about Salesforce from our members for CRM? 'Very Frequently'.
      History of Salesforce in a vertical timeline.
      *Pricing correct as of August 2021. Listed in USD and absent discounts.
      See pricing on vendor’s website for latest information.
      Logo for Salesforce.

      “Salesforce is the pre-eminent vendor in the CRM marketplace and is a force to be reckoned with in terms of the breadth and depth of its capabilities. The company was an early disruptor in the category, placing a strong emphasis from the get-go on a SaaS delivery model and strong end-user experience. This allowed them to rapidly gain market share at the expense of more complacent enterprise application vendors. A series of savvy acquisitions over the years has allowed Salesforce to augment their core Sales and Service Clouds with a wide variety of other solutions, from e-commerce to marketing automation to CPQ. Salesforce is a great fit for any organization looking to partner with a market leader with excellent functional breadth, strong interoperability, and a compelling technology and partner ecosystem. All of this comes at a price, however – Salesforce prices at a premium, and our members routinely opine that Salesforce’s commercial teams are overly aggressive – sometimes pushing solutions without a clear link to underpinning business requirements.”

      Ben Dickie
      Research Practice Lead, Info-Tech Research Group

      Sales Cloud Essentials Sales Cloud Professional Sales Cloud Enterprise Sales Cloud Ultimate
      • Starts at $25*
      • Per user/mo
      • Small businesses after basic functionality
      • Starts at $75*
      • Per user/mo
      • Mid-market target
      • Starts at $150*
      • Per user/mo
      • Enterprise target
      • Starts at $300*
      • Per user/mo
      • Strong upmarket feature additions
      Logo for Microsoft.


      Est. 1975 | WA, USA | NYSE: MSFT

      bio

      Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
      Dynamics 365 Sales is an adaptive selling solution that helps your sales team navigate the realities of modern selling. At the center of the solution is an adaptive, intelligent system – prebuilt and ready to go – that actively monitors myriad signals and distills them into actionable insights.

      SoftwareReviews’ Enterprise CRM Rankings

      Strengths:

      • Business value created
      • Analytics and reporting
      • Lead management

      Areas to Improve:

      • Quote, contract, and proposals
      • Vendor support
      Logo gif for SoftwareReviews.
      8.1
      COMPOSITE SCORE
      8.3
      CX SCORE
      +84
      EMOTIONAL FOOTPRINT
      82%
      LIKELINESS TO RECOMMEND
      DOWNLOAD REPORT 198
      REVIEWS
      Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
      Sample of a Microsoft screen.Vendor Pulse rating. How often do we hear about Microsoft Dynamics from our Members? 'Very Frequently'.

      History of Microsoft in a vertical timeline.

      *Pricing correct as of June 2022. Listed in USD and absent discounts.
      See pricing on vendor’s website for latest information.
      Logo for Microsoft.
      “”

      “Microsoft Dynamics 365 is a strong and compelling player in the CRM arena. While Microsoft is no stranger to the CRM space, their offerings here have seen steady and marked improvement over the last five years. Good functional breadth paired with a modern user interface and best-in-class Microsoft stack compatibility ensures that we consistently see them on our members’ shortlists, particularly when our members are looking to roll out CRM capabilities alongside other components of the Dynamics ecosystem (such as Finance, Operations, and HR). Today, Microsoft segments the offering into discrete modules for sales, service, marketing, commerce, and CDP. While Microsoft Dynamics 365 is a strong option, it’s occasionally mired by concerns that the pace of innovation and investment lags Salesforce (its nearest competitor). Additionally, the marketing module of the product is softer than some of its competitors, and Microsoft themselves points organizations with complex marketing requirements to a strategic partnership that they have with Adobe.”

      Ben Dickie
      Research Practice Lead, Info-Tech Research Group

      D365 Sales Professional D365 Sales Enterprise D365 Sales Premium
      • Starts at $65*
      • Per user/mo
      • Midmarket focus
      • Starts at $95*
      • Per user/mo
      • Enterprise focus
      • Starts at $135*
      • Per user/mo
      • Enterprise focus with customer intelligence
      Logo for Oracle.


      Est. 1977 | CA, USA | NYSE: ORCL

      bio

      Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
      Oracle Engagement Cloud (CX Sales) provides a set of capabilities to help sales leaders transition smoothly from sales planning and execution through customer onboarding, account management, and support services.

      SoftwareReviews’ Enterprise CRM Rankings

      Strengths:

      • Quality of features
      • Activity and workflow management
      • Analytics and reporting

      Areas to Improve:

      • Marketing management
      • Product strategy & rate of improvement
      Logo gif for SoftwareReviews.
      7.8
      COMPOSITE SCORE
      7.9
      CX SCORE
      +77
      EMOTIONAL FOOTPRINT
      78%
      LIKELINESS TO RECOMMEND
      DOWNLOAD REPORT 140
      REVIEWS
      Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
      Sample of an Oracle screen.Vendor Pulse rating. How often do we hear about Oracle from our members for CRM? 'Frequently'.

      History of Oracle in a vertical timeline.

      Logo for Oracle.

      “Oracle is long-term juggernaut of the enterprise applications space. Their CRM portfolio is diverse – rather than a single stack, there are multiple Oracle solutions (many made by acquisition) that support CRM capabilities – everything from Siebel to JD Edwards to NetSuite to Oracle CX applications. The latter constitute Oracle’s most modern stab at CRM and are where the bulk of feature innovation and product development is occurring within their portfolio. While historically seen as lagging behind other competitors like Salesforce and Microsoft, Oracle has made excellent strides in improving their user experience (via their Redwoods design paradigm) and building new functional capabilities within their CRM products. Indeed, SoftwareReviews shows Oracle performing well in our most recent peer-driven reports. Nonetheless, we most commonly see Oracle as a pricier ecosystem play that’s often subordinate to a heavy Oracle footprint for ERP. Many of our members also express displeasure with Oracle as a vendor and highlight their heavy-handed “threat of audit” approach. ”

      Ben Dickie
      Research Practice Lead, Info-Tech Research Group

      Oracle CX Sales - Pricing Opaque:

      “Request a Demo”

      Logo for SAP.


      Est. 1972 | Germany | NYSE: SAP

      bio

      Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
      SAP is the third-largest independent software manufacturer in the world, with a presence in over 120 countries. Having been in the industry for over 40 years, SAP is perhaps best known for its ERP application, SAP ERP.

      SoftwareReviews’ Enterprise CRM Rankings

      Strengths:

      • Ease of data integration

      Areas to Improve:

      • Lead management
      • Marketing management
      • Collaboration
      • Usability & intuitiveness
      • Analytics & reporting
      Logo gif for SoftwareReviews.
      7.4
      COMPOSITE SCORE
      7.8
      CX SCORE
      +74
      EMOTIONAL FOOTPRINT
      75%
      LIKELINESS TO RECOMMEND
      DOWNLOAD REPORT 108
      REVIEWS
      Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
      Sample of a SAP screen.Vendor Pulse rating. How often do we hear about SAP from our members for CRM? 'Occasionally'.

      History of SAP in a vertical timeline.

      *Pricing correct as of August 2021. Listed in USD and absent discounts.
      See pricing on vendor’s website for latest information.
      Logo for SAP.

      “SAP is another mainstay of the enterprise applications market. While they have a sound breadth of capabilities in the CRM and customer experience space, SAP consistently underperforms in many of our relevant peer-driven SoftwareReviews reports for CRM and adjacent areas. CRM seems decidedly a secondary focus for SAP, behind their more compelling play in the enterprise resource planning (ERP) space. Indeed, most instances where we see SAP in our clients’ shortlists, it’s as an ecosystem play within a broader SAP strategy. If you’re blue on the ERP side, looking to SAP’s capabilities on the CRM front makes logical sense and can help contain costs. If you’re approaching a CRM selection from a greenfield lens and with no legacy vendor baggage for SAP elsewhere, experience suggests you’ll be better served by a vendor that places a higher degree of primacy on the CRM aspect of their portfolio.”

      Ben Dickie
      Research Practice Lead, Info-Tech Research Group

      SAP CRM - Pricing Opaque:

      “Request a Demo”

      Logo for pipedrive.


      Est. 2010 | NY, USA | Private

      bio

      Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
      Pipedrive brings together the tools and data, the platform focuses sales professionals on fundamentals to advance deals through their pipelines. Pipedrive's goal is to make sales success inevitable - for salespeople and teams.

      SoftwareReviews’ Enterprise CRM Rankings

      Strengths:

      • Sales Management
      • Account & Contact Management
      • Lead Management
      • Usability & Intuitiveness
      • Ease of Implementation

      Areas to Improve:

      • Customer Service Management
      • Marketing Management
      • Product Strategy & Rate of Improvement
      Logo gif for SoftwareReviews.
      8.3
      COMPOSITE SCORE
      8.4
      CX SCORE
      +85
      EMOTIONAL FOOTPRINT
      85%
      LIKELINESS TO RECOMMEND
      DOWNLOAD REPORT 262
      REVIEWS
      Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
      Sample of a Pipedrive screen.Vendor Pulse rating. How often do we hear about Pipedrive from our members for CRM? 'Occasionally'.

      History of Pipedrive in a vertical timeline.

      *Pricing correct as of June 2022. Listed in USD and absent discounts.
      See pricing on vendor’s website for latest information.
      Logo for Pipedrive.

      “A relatively new offering, Pipedrive has seen explosive growth over the last five years. They’re a vendor that has gone from near-obscurity to popping up frequently on our members’ shortlists. Pipedrive’s secret sauce has been a relentless focus on high-velocity sales enablement. Their focus on pipeline management, lead assessment and routing, and a good single pane of glass for sales reps has driven significant traction for the vendor when sales enablement is the driving rationale behind rolling out a new CRM platform. Bang for your buck is also strong with Pipedrive, with the vendor having a value-driven licensing and implementation model.

      Pipedrive is not without some shortcomings. It’s laser-focus on sales enablement is at the expense of deep capabilities for marketing and service management, and its profile lends itself better to SMBs and lower midmarket than it does large organizations looking for enterprise-grade CRM.”

      Ben Dickie
      Research Practice Lead, Info-Tech Research Group

      Essential Advanced Professional Enterprise
      • Starts at $12.50*
      • Per user/mo
      • Small businesses after basic functionality
      • Starts at $24.90*
      • Per user/mo
      • Small/mid-sized businesses
      • Starts at $49.90*
      • Per user/mo
      • Lower mid-market focus
      • Starts at $99*
      • Per user/mo
      • Enterprise focus
      Logo for SugarCRM.


      Est. 2004 | CA, USA | Private

      bio

      Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
      Produces Sugar, a SaaS-based customer relationship management application. SugarCRM is backed by Accel-KKR.

      SoftwareReviews’ Enterprise CRM Rankings

      Strengths:

      • Ease of customization
      • Product strategy and rate of improvement
      • Ease of IT administration

      Areas to Improve:

      • Marketing management
      • Analytics and reporting
      Logo gif for SoftwareReviews.
      8.4
      COMPOSITE SCORE
      8.8
      CX SCORE
      +92
      EMOTIONAL FOOTPRINT
      84%
      LIKELINESS TO RECOMMEND
      DOWNLOAD REPORT 97
      REVIEWS
      Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
      Sample of a SugarCRM screen.Vendor Pulse rating. How often do we hear about SugarCRM from our members for CRM? 'Frequently'.
      History of SugarCRM in a vertical timeline.
      *Pricing correct as of August 2021. Listed in USD and absent discounts.
      See pricing on vendor’s website for latest information.
      Logo for SugarCRM.

      “SugarCRM offers reliable baseline capabilities at a lower price point than other large CRM vendors. While SugarCRM does not offer all the bells and whistles that an Enterprise Salesforce plan might, SugarCRM is known for providing excellent vendor support. If your organization is only after standard features, SugarCRM will be a good vendor to shortlist.

      However, ensure you have the time and labor power to effectively implement and train on SugarCRM’s solutions. SugarCRM does not score highly for user-friendly experiences, with complaints centering on outdated and unintuitive interfaces. Setting up customized modules takes time to navigate, and SugarCRM does not provide a wide range of native integrations with other applications. To effectively determine whether SugarCRM does offer a feasible solution, it is recommended that organizations know exactly what kinds of integrations and modules they need.”

      Thomas Randall
      Research Director, Info-Tech Research Group

      Sugar Professional Sugar Serve Sugar Sell Sugar Enterprise Sugar Market
      • Starts at $52*
      • Per user/mo
      • Min. 3 users
      • Small businesses
      • Starts at $80*
      • Per user/mo
      • Min. 3 users
      • Focused on customer service
      • Starts at $80*
      • Per user/mo
      • Min. 3 users
      • Focused on sales automation
      • Starts at $80*
      • Per user/mo
      • Min. 3 users
      • On-premises, mid-sized businesses
      • Starts at $1000*
      • Priced per month
      • Min. 10k contacts
      • Large enterprise
      Logo for .


      Est. 2006 | MA, USA | HUBS (NYSE)

      bio

      Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
      Develops software for inbound customer service, marketing, and sales. Software includes CRM, SMM, lead gen, SEO, and web analytics.

      SoftwareReviews’ Enterprise CRM Rankings

      Strengths:

      • Breadth of features
      • Product strategy and rate of improvement
      • Ease of customization

      Areas to Improve:

      • Ease of data integration
      • Customer service management
      • Telephony and call center management
      Logo gif for SoftwareReviews.
      8.3
      COMPOSITE SCORE
      8.4
      CX SCORE
      +84
      EMOTIONAL FOOTPRINT
      86%
      LIKELINESS TO RECOMMEND
      DOWNLOAD REPORT 97
      REVIEWS
      Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
      Sample of a HubSpot screen.Vendor Pulse rating. How often do we hear about HubSpot from our members for CRM? 'Frequently'.

      History of HubSpot in a vertical timeline.

      *Pricing correct as of August 2021. Listed in USD and absent discounts
      See pricing on vendor’s website for latest information.
      Logo for HubSpot.

      “ HubSpot is best suited for small to mid-sized organizations that need a range of CRM tools to enable growth across sales, marketing campaigns, and customer service. Indeed, HubSpot offers a content management solution that offers a central storage location for all customer and marketing data. Moreover, HubSpot offers plenty of freemium tools for users to familiarize themselves with the software before buying. However, though HubSpot is geared toward growing businesses, smaller organizations may not see high ROI until they begin to scale. The “Starter” and “Professional” plans’ pricing is often cited by small organizations as a barrier to commitment, and the freemium tools are not a sustainable solution. If organizations can take advantage of discount behaviors from HubSpot (e.g. a startup discount), HubSpot will be a viable long-term solution. ”

      Thomas Randall
      Research Director, Info-Tech Research Group

      Starter Professional Enterprise
      • Starts at $50*
      • Per month
      • Min. 2 users
      • Small businesses
      • Starts at $500*
      • Per month
      • Min. 5 users
      • Small/mid-sized businesses
      • Starts at $1200*
      • Billed yearly
      • Min. 10 users
      • Mid-sized/small enterprise
      Logo for Zoho.


      Est. 1996 | India | Private

      bio

      Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
      Zoho Corporation offers a cloud software suite, providing a full operating system for CRM, alongside apps for finance, productivity, HR, legal, and more.

      SoftwareReviews’ Enterprise CRM Rankings

      Strengths:

      • Business value created
      • Breadth of features
      • Collaboration capabilities

      Areas to Improve:

      • Usability and intuitiveness
      Logo gif for SoftwareReviews.
      8.7
      COMPOSITE SCORE
      8.9
      CX SCORE
      +92
      EMOTIONAL FOOTPRINT
      85%
      LIKELINESS TO RECOMMEND
      DOWNLOAD REPORT 152
      REVIEWS
      Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
      Sample of a Zoho screen.Vendor Pulse rating. How often do we hear about Zoho from our members for CRM? 'Occasionally'.

      History of Zoho in a vertical timeline.

      *
      See pricing on vendor’s website for latest information.
      Logo for Zoho.

      “Zoho has a long list of software solutions for businesses to run end to end. As one of Zoho’s earliest software releases, though, ZohoCRM remains a flagship product. ZohoCRM’s pricing is incredibly competitive for mid/large enterprises, offering high business value for its robust feature sets. For those organizations that already utilize Zoho solutions (such as its productivity suite), ZohoCRM will be a natural extension.

      However, small/mid-sized businesses may wonder how much ROI they can get from ZohoCRM, when much of the functionality expected from a CRM (such as workflow automation) cannot be found until one jumps to the “Enterprise” plan. Given the “Enterprise” plan’s pricing is on par with other CRM vendors, there may not be much in a smaller organization’s eyes that truly distinguishes ZohoCRM unless they are already invested Zoho users.”

      Thomas Randall
      Research Director, Info-Tech Research Group

      Standard Professional Enterprise Ultimate
      • Starts at $20*
      • Per user/mo
      • Small businesses after basic functionality
      • Starts at $35*
      • Per user/mo
      • Small/mid-sized businesses
      • Adds inventory management
      • Starts at $50*
      • Per user/mo
      • Mid-sized/small enterprise
      • Adds Zia AI
      • Starts at $65*
      • Per user/mo
      • Enterprise
      • Bundles Zoho Analytics
      Logo for Zendesk.


      Est. 2009 | CA, USA | ZEN (NYSE)

      bio

      Link for their Twitter account.Link for their LinkedIn profile.Link for their website.
      Software developer for customer service. Founded in Copenhagen but moved to San Francisco after $6 million Series B funding from Charles River Ventures and Benchmark Capital.

      SoftwareReviews’ Enterprise CRM Rankings

      Strengths:

      • Quality of features
      • Breadth of features
      • Vendor support

      Areas to Improve:

      • Business value created
      • Ease of customization
      • Usability and intuitiveness
      Logo gif for SoftwareReviews.
      7.8
      COMPOSITE SCORE
      7.9
      CX SCORE
      +80
      EMOTIONAL FOOTPRINT
      72%
      LIKELINESS TO RECOMMEND
      DOWNLOAD REPORT 50
      REVIEWS
      Vendor scores are driven by real-world practitioner reviews via SoftwareReviews. Composite, CX, EF and NPS scores pulled from live data as of June 2022. Rankings and ”strengths” and ”areas to improve” pulled from January 2022 Category Report.
      Sample of a Zendesk screen.Vendor Pulse rating. How often do we hear about Zendesk from our members for CRM? 'Rarely'.

      History of Zendesk in a vertical timeline.

      *Pricing correct as of August 2021. Listed in USD and absent discounts
      See pricing on vendor’s website for latest information.
      Logo for Zendesk.

      “Zendesk’s initial growth was grounded in word-of-mouth advertising, owing to the popularity of its help desk solution’s design and functionality. Zendesk Sell has followed suit, receiving strong feedback for the breadth and quality of its features. Organizations that have already reaped the benefits of Zendesk’s customer service suite will find Zendesk Sell a straightforward fit for their sales teams.

      However, it is important to note that Zendesk Sell is predominantly focused on sales. Other key components of a CRM, such as marketing, are less fleshed out. Organizations should ensure they verify what requirements they have for a CRM before choosing Zendesk Sell – if sales process requirements (such as forecasting, call analytics, and so on) are but one part of what the organization needs, Zendesk Sell may not offer the highest ROI for the pricing offered.”

      Thomas Randall
      Research Director, Info-Tech Research Group

      Sell Team Sell Professional Sell Enterprise
      • Starts at $19*
      • Per user/mo
      • Max. 3 users
      • Small businesses
      • Basic functionality
      • Starts at $49*
      • Per user/mo
      • Small/mid-sized businesses
      • Advanced analytics
      • Starts at $99*
      • Per user/mo
      • Mid-sized/small enterprise
      • Task automation

      Speak with category experts to dive deeper into the vendor landscape

      Icon of a person.
      Fact-based reviews of business software from IT professionals.
      Icon of a magnifying glass over a chart.
      Top-tier data quality backed by a rigorous quality assurance process.
      CLICK HERE to ACCESS

      Comprehensive software reviews to make better IT decisions

      We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      Icon of a tablet.
      Product and category reports with state-of-the-art data visualization.
      Icon of a phone.
      User-experience insight that reveals the intangibles of working with a vendor.

      SoftwareReviews is powered by Info-Tech

      Technology coverage is a priority for Info-Tech, and SoftwareReviews provides the most comprehensive unbiased data on today’s technology. Combined with the insights of our expert analysts, our members receive unparalleled support in their buying journey.

      Conduct a day of rapid-fire vendor demos

      Zoom in on high-value use cases and answers to targeted questions

      Make sure the solution will work for your business

      Give each vendor 90 to 120 minutes to give a rapid-fire presentation. We suggest the following structure:

      • 30 minutes: company introduction and vision
      • 60 minutes: walk-through of two or three high-value demo scenarios
      • 30 minutes: targeted Q&A from the business stakeholders and procurement team
      To ensure a consistent evaluation, vendors should be asked analogous questions, and a tabulation of answers should be conducted.
      How to challenge the vendors in the investigative interview
      • Change the visualization/presentation.
      • Change the underlying data.
      • Add additional data sets to the artifacts.
      • Collaboration capabilities.
      • Perform an investigation in terms of finding BI objects and identifying previous changes, and examine the audit trail.
      Rapid-fire vendor investigative interview

      Invite vendors to come onsite (or join you via video conference) to demonstrate the product and to answer questions. Use a highly targeted demo script to help identify how a vendor’s solution will fit your organization’s particular business capability needs.

      Graphic of an alarm clock.
      To kick-start scripting your demo scenarios, leverage our CRM Demo Script Template.

      A vendor scoring model provides a clear anchor point for your evaluation of CRM vendors based on a variety of inputs

      A vendor scoring model is a systematic method for effectively assessing competing vendors. A weighted-average scoring model is an approach that strikes a strong balance between rigor and evaluation speed.

      Info-Tech Insight

      Even the best scoring model will still involve some “art” rather than science – scoring categories such as vendor viability always entails a degree of subjective interpretation.

      How do I build a scoring model?

      • Start by shortlisting the key criteria you will use to evaluate your vendors. Functional capabilities should always be a critical category, but you’ll also want to look at criteria such as affordability, architectural fit, and vendor viability.
      • Depending on the complexity of the project, you may break down some criteria into sub-categories to assist with evaluation (for example, breaking down functional capabilities into constituent use cases so you can score each one).
      • Once you’ve developed the key criteria for your project, the next step is weighting each criterion. Your weightings should reflect the priorities for the project at hand. For example, some projects may put more emphasis on affordability, others on vendor partnership.
      • Using the information collected in the subsequent phases of this blueprint, score each criterion from 1-100, then multiply by the weighting factor. Add up the weighted scores to arrive at the aggregate evaluation score for each vendor on your shortlist.

      What are some of the best practices?

      • While the criteria for each project may vary, it’s helpful to have an inventory of repeatable criteria that can be used across application selection projects. The next slide contains an example that you can add or subtract from.
      • Don’t go overboard on the number of criteria: five to 10 weighted criteria should be the norm for most projects. The more criteria (and sub-criteria) you must score against, the longer it will take to conduct your evaluation. Always remember, link the level of rigor to the size and complexity of your project! It’s possible to create a convoluted scoring model that takes significant time to fill out but yields little additional value.
      • Creation of the scoring model should be a consensus-driven activity among IT, procurement, and the key business stakeholders – it should not be built in isolation. Everyone should agree on the fundamental criteria and weights that are employed.
      • Consider using not just the outputs of investigative interviews and RFP responses to score vendors, but also third-party review services like SoftwareReviews.

      Define how you’ll score CRM proposals and demos

      Define key CRM selection criteria for your organization – this should be informed by the following goals, use cases, and requirements covered in the blueprint.

      Criteria

      Description

      Functional CapabilitiesHow well does the vendor align with the top-priority functional requirements identified in your accelerated needs assessment? What is the vendor’s functional breadth and depth?
      AffordabilityHow affordable is this vendor? Consider a three-to-five-year total cost of ownership (TCO) that encompasses not just licensing costs, but also implementation, integration, training, and ongoing support costs.
      Architectural FitHow well does this vendor align with our direction from an enterprise architecture perspective? How interoperable is the solution with existing applications in our technology stack? Does the solution meet our deployment model preferences?
      ExtensibilityHow easy is it to augment the base solution with native or third-party add-ons as our business needs may evolve?
      ScalabilityHow easy is it to expand the solution to support increased user, data, and/or customer volumes? Are there any capacity constraints of the solution?
      Vendor ViabilityHow viable is this vendor? Are they an established player with a proven track record, or a new and untested entrant to the market? What is the financial health of the vendor? How committed are they to the particular solution category?
      Vendor VisionDoes the vendor have a cogent and realistic product roadmap? Are they making sensible investments that align with your organization’s internal direction?
      Emotional FootprintHow well does the vendor’s organizational culture and team dynamics align to yours?
      Third-Party Assessments and/or ReferencesHow well-received is the vendor by unbiased, third-party sources like SoftwareReviews? For larger projects, how well does the vendor perform in reference checks (and how closely do those references mirror your own situation)?

      Decision Point: Select the Finalist

      After reviewing all vendor responses to your RFP, conducting vendor demos, and running a pilot project (if applicable), the time has arrived to select your finalist.

      All core selection team members should hold a session to score each shortlisted vendor against the criteria enumerated on the previous slide – based on an in-depth review of proposals, the demo sessions, and any pilots or technical assessments.

      The vendor that scores the highest in aggregate is your finalist.

      Congratulations – you are now ready to proceed to final negotiation and inking a contract. This blueprint provides a detailed approach on the mechanics of a major vendor negotiation.

      Leverage Info-Tech’s research to plan and execute your CRM implementation

      Use Info-Tech Research Group’s three phase implementation process to guide your own planning.
      The three phases of software implementation: 'Assess', 'Prepare', 'Govern & Course Correct'. Sample of the 'Governance and Management of Enterprise Software Implementation' blueprint.

      Establish and execute an end-to-end, agile framework to succeed with the implementation of a major enterprise application.

      Visit this link

      Prepare for implementation: establish a clear resourcing plan

      Organizations rarely have sufficient internal staffing to resource a CRM project on their own. Consider the options for closing the gap in internal resource availability.

      The most common project resourcing structures for enterprise projects are:
      Your own staff +
      1. Management consultant
      2. Vendor consultant
      3. System integrator
      Info-Tech Insight

      When contemplating a resourcing structure, consider:

      • Availability of in-house implementation competencies and resources.
      • Timeline and constraints.
      • Integration environment complexity.

      Consider the following:

      Internal vs. External Roles and Responsibilities

      Clearly delineate between internal and external team responsibilities and accountabilities, and communicate this to your technology partner up front.

      Internal vs. External Accountabilities

      Accountability is different than responsibility. Your vendor or SI partner may be responsible for completing certain tasks, but be careful not to outsource accountability for the implementation – ultimately, the internal team will be accountable.

      Partner Implementation Methodologies

      Often vendors and/or SIs will have their own preferred implementation methodology. Consider the use of your partner's implementation methodology; however, you know what will work for your organization.

      Establish team composition

      1 – 2 hours

      Input: Skills assessment, Stakeholder analysis, Vendor partner selection

      Output: Team composition

      Materials: Sticky notes, Whiteboard, Markers

      Participants: Project team

      Use Info-Tech’s Governance and Management of Enterprise Software Implementation to establish your team composition. Within that blueprint:

      1. Assess the skills necessary for an implementation. Inventory the competencies required for the implementation project team. Map your internal resources to each competency as applicable.
      2. Select your internal implementation team. Determine who needs to be involved closely with the implementation. Key stakeholders should also be considered as members of your implementation team.
      3. Identify the number of external consultants/support required for implementation. Consider your in-house skills, timeline considerations, integration environment complexity, and cost constraints as you make your team composition plan. Be sure to dedicate an internal resource to managing the vendor and partner relationships.
      4. Document the roles and responsibilities, accountabilities, and other expectations of your team as they relate to each step of the implementation.

      Governance and Management of Enterprise Software Implementation

      Sample of the 'Governance and Management of Enterprise Software Implementation' blueprint.Follow our iterative methodology with a task list focused on the business must-have functionality to achieve rapid execution and to allow staff to return to their daily work sooner.

      Visit this link

      Ensure your implementation team has a high degree of trust and communication

      If external partners are needed, dedicate an internal resource to managing the vendor and partner relationships.

      Communication

      Teams must have some type of communication strategy. This can be broken into:
      • Regularity: Having a set time each day to communicate progress and a set day to conduct retrospectives.
      • Ceremonies: Injecting awards and continually emphasizing delivery of value can encourage relationship-building and constructive motivation.
      • Escalation: Voicing any concerns and having someone responsible for addressing those concerns.

      Proximity

      Distributed teams create complexity as communication can break down. This can be mitigated by:
      • Location: Placing teams in proximity can close the barrier of geographical distance and time zone differences.
      • Inclusion: Making a deliberate attempt to pull remote team members into discussions and ceremonies.
      • Communication tools: Having the right technology (e.g. video conference) can help bring teams closer together virtually.

      Trust

      Members should trust other members are contributing to the project and completing their required tasks on time. Trust can be developed and maintained by:
      • Accountability: Having frequent quality reviews and feedback sessions. As work becomes more transparent, people become more accountable.
      • Role clarity: Having a clear definition of what everyone’s role is.

      Plan for your implementation of CRM based on deployment model

      Place your CRM application into your IT landscape by configuring and adjusting the tool based on your specific deployment method.

      Icon of a housing development.
      On-Premises

      1. Identify custom features and configuration items
      2. Train developers and IT staff on new software investment
      3. Install software
      4. Configure software
      5. Test installation and configuration
      6. Test functionality

      Icon of a cloud upload.
      SaaS-based

      1. Train developers and IT staff on new software investment
      2. Set up connectivity
      3. Identify VPN or internal solution
      4. Check firewalls
      5. Validate bandwidth regulations

      Integration is a top IT challenge and critical to the success of the CRM suite

      CRM suites are most effective when they are integrated with ERP and MarTech solutions.

      Data interchange between the CRM solution and other data sources is necessary

      Formulate a comprehensive map of the systems, hardware, and software with which the CRM solution must be able to integrate. Customer data needs to constantly be synchronized: without this, you lose out on one of the primary benefits of CRM. These connections must be bidirectional for maximum value (i.e. marketing data to the CRM, customer data to MMS).
      Specialized projects that include an intricate prospect or customer list and complex rules may need to be built by IT The more custom fields you have in your CRM suite and point solutions, the more schema mapping you will have to do. Include this information in the RFP to receive guidance from vendors on the ease with which integration can be achieved.

      Pay attention to legacy apps and databases

      If you have legacy CRM, POS, or customer contact software, more custom code will be required. Many vendors claim that custom integration can be performed for most systems, but custom comes at a cost. Don’t just ask if they can integrate; ask how long it will take and for references from organizations which have been successful in this.
      When assessing the current application portfolio that supports CRM, the tendency will be to focus on the applications under the CRM umbrella, relating mostly to marketing, sales, and customer service. Be sure to include systems that act as inputs to, or benefit due to outputs from, the CRM or similar applications.

      CRM data flow

      Example of a CRM data flow.

      Be sure to include enterprise applications that are not included in the CRM application portfolio. Popular systems to consider for POIs include billing, directory services, content management, and collaboration tools.

      Sample CRM integration map

      Sample of a CRM integration map.

      Scenario: Failure to address CRM data integration will cost you in the long run

      A company spent $15 million implementing a new CRM system in the cloud and decided NOT to spend an additional $1.5 million to do a proper cloud DI tool procurement. The mounting costs followed.

      Cost Element – Custom Data Integration

      $

      2 FTEs for double entry of sales order data $ 100,000/year
      One-time migration of product data to CRM $ 240,000 otc
      Product data maintenance $ 60,000/year
      Customer data synchronization interface build $ 60,000 otc
      Customer data interface maintenance $ 10,000/year
      Data quality issues $ 100,000/year
      New SaaS integration built in year 3 $ 300,000 otc
      New SaaS integration maintenance $ 150,000/year

      Cost Element – Data Integration Tool

      $

      DI strategy and platform implementation $1,500,000 otc
      DI tool maintenance $ 15,000/year
      New SaaS integration point in year 3 $ 300,000 otc
      Thumbs down color coded red to the adjacent chart. Custom integration is costing this organization $300,000/year for one SaaS solution.
      Thumbs up color coded blue to the adjacent chart.

      The proposed integration solution would have paid for itself in 3-4 years and saved exponential costs in the long run.

      Proactively address data quality in the CRM during implementation

      Data quality is a make-or-break issue in a CRM platform; garbage in is garbage out.
      • CRM suites are one of the leading offenders for generating poor-quality data. As such, it’s important to have a plan in place for structuring your data architecture in such a way the poor data quality is minimized from the get-go.
      • Having a plan for data quality should precede data migration efforts; some types of poor data quality can be mitigated prior to migration.
      • There are five main types of poor-quality data found in CRM platforms.
        • Duplicate data: Duplicate records can be a major issue. Leverage dedicated deduplication tools to eliminate them.
        • Stale data: Out-of-date customer information can reduce the usefulness of the platform. Use automated social listening tools to help keep data fresh.
        • Incomplete data: Records with missing info limit platform value. Specify data validation parameters to mandate that all fields are filled in.
        • Invalid and conflicting data: These can create cascading errors. Establishing conflict resolution rules in ETL tools for data integration can lessen issues.
      Info-Tech Insight

      If you have a complex POI environment, appoint data stewards for each major domain and procure a deduplication tool. As the complexity of CRM system-to-system integrations increases, so will the chance that data quality errors will crop up – for example, bidirectional POI with other sources of customer information dramatically increase the chances of conflicting/duplicate data.

      Profile data, eliminate dead weight, and enforce standards to protect data

      Identify and eliminate dead weight

      Poor data can originate in the firm’s CRM system. Custom queries, stored procedures, or profiling tools can be used to assess the key problem areas.

      Loose rules in the CRM system may lead to records of no significant value in the database. Those rules need to be fixed, but if changes are made before the data is fixed, users could encounter database or application errors, which will reduce user confidence in the system.

      • Conduct a data flow analysis: map the path that data takes through the organization.
      • Use a mass cleanup to identify and destroy dead weight data. Merge duplicates either manually or with the aid of software tools. Delete incomplete data, taking care to reassign related data.
      • COTS packages typically allow power users to merge records without creating orphaned records in related tables, but custom-built applications typically require IT expertise.

      Create and enforce standards and policies

      Now that the data has been cleaned, it’s important to protect the system from relapsing.

      Work with business users to find out what types of data require validation and which fields should have changes audited. Whenever possible, implement drop-down lists to standardize values and make programming changes to ensure that truncation ceases.

      • Truncated data is usually caused by mismatches in data structures during either one-time data loads or ongoing data integrations.
      • Don’t go overboard on assigning required fields; users will just put key data in note fields.
      • Discourage the use of unstructured note fields: the data is effectively lost except if it gets subpoenaed.
      Info-Tech Insight

      Data quality concerns proliferate with the customization level of your platform. The more extensive the custom integration points and module/database extensions that you have made, the more you will need to have a plan in place for managing data quality from a reactive and proactive standpoint.

      Create a formal communication process throughout the CRM implementation

      Establish a comprehensive communication process around the CRM enterprise roll-out to ensure that end users stay informed.

      The CRM kick-off meeting(s) should encompass: 'The high-level application overview', 'Target business-user requirements', 'Target quality of service (QoS) metrics', 'Other IT department needs', 'Tangible business benefits of application', 'Special consideration needs'. The overall objective for interdepartmental CRM kick-off meetings is to confirm that all parties agree on certain key points and understand platform rationale and functionality.

      The kick-off process will significantly improve internal communications by inviting all affected internal IT groups, including business units, to work together to address significant issues before the application process is formally activated.

      Department groups or designated trainers should take the lead and implement a process for:

      • Scheduling CRM platform roll-out/kick-off meetings.
      • Soliciting preliminary input from the attending groups to develop further training plans.
      • Establishing communication paths and the key communication agents from each department who are responsible for keeping lines open moving forward.

      Ensure requirements are met with robust user acceptance testing

      User acceptance testing (UAT) is a test procedure that helps to ensure end-user requirements are met. Test cases can reveal bugs before the suite is implemented.

      Five Secrets of UAT Success

      Bracket with colors corresponding the adjacent list items.

      1

      Create the plan With the information collected from requirements gathering, create the plan. Make sure this information is added to the main project plan documentation.

      2

      Set the agenda The time allotted will vary depending on the functionality being tested. Ensure that the test schedule allows for the resolution of issues and discussion.

      3

      Determine who will participate Work with the relevant stakeholders to identify the people who can best contribute to system testing. Look for experienced power users who have been involved in earlier decision making about the system.

      4

      Highlight acceptance criteria Together with the UAT group, pinpoint the criteria to determine system acceptability. Refer back to requirements specified in use cases in the initial requirements-gathering stages of the project.

      5

      Collect end user feedback Weaknesses in resolution workflow design, technical architecture, and existing customer service processes can be highlighted and improved on with ongoing surveys and targeted interviews.

      Calculate post-deployment metrics to assess measurable value of the project

      Track the post-deployment results from the project and compare the metrics to the current state and target state.

      CRM Selection and Implementation Metrics
      Description Formula Current or Estimated Target Post-Deployment
      End-User Satisfaction # of Satisfied Users
      # of End Users
      70% 90% 85%
      Percentage Over/Under Estimated Budget Amount Spent - 100%
      Budget
      5% 0% 2%
      Percentage Over/Under Estimated Timeline Project Length - 100%
      Estimated Timeline
      10% -5% -10%

      CRM Strategy Metrics
      Description Formula Current or Estimated Target Post-Deployment
      Number of Leads Generated (per month) # of Leads Generated 150 200 250
      Average Time to Resolution (in minutes) Time Spent on Resolution
      # of Resolutions
      30 minutes 10 minutes 15 minutes
      Cost per Interaction by Campaign Total Campaign Spending
      # of Customer Interactions
      $17.00 $12.00 $12.00

      Select the Right CRM Platform

      CRM technology is critical to facilitate an organization’s relationships with customers, service users, employees, and suppliers. Having a structured approach to building a business case, defining key requirements, and engaging with the right shortlist of vendors to pick the best finalist is crucial.

      This selection guide allows organizations to execute a structured methodology for picking a CRM that aligns with their needs. This includes:
      • Alignment and prioritization of key business and technology drivers for a CRM selection business case.
      • Identification of key use cases and requirements for CRM.
      • Construction of a robust CRM RFP.
      • A strong market scan of key players.
      • A survey of crucial implementation considerations.
      This formal CRM selection initiative will drive business-IT alignment, identify sales and marketing automation priorities, and allow for the rollout of a platform that’s highly likely to satisfy all stakeholder needs.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.
      workshops@infotech.com
      1-888-670-8889

      Insight summary

      Stakeholder satisfaction is critical to your success

      Choosing a solution for a single use case and then expanding it to cover other purposes can be a way to quickly gain approvals and then make effective use of dollars spent. However, this can also be a nightmare if the product is not fit for purpose and requires significant customization effort for future use cases. Identify use cases early, engage stakeholders to define success, and recognize where you need to find balance between a single off-the-shelf CRM platform and adjacent MarTech or sales enablement systems.

      Build a business case

      An effective business case isn’t a single-purpose document for obtaining funding. It can also be used to drive your approach to product selection, requirements gathering, and ultimately evaluating stakeholder and user satisfaction.

      Use your business case to define use cases and milestones as well as success.

      Balance process with technology

      A new solution with old processes will result in incremental increased value. Evaluate existing processes and identify opportunities to improve and remove workarounds. Then define requirements.

      You may find that the tools you have would be adequate with an upgrade and tool optimization. If not, this exercise will prepare you to select the right solution for your current and future needs.

      Drive toward early value

      Lead with the most important benefit and consider the timeline. Most stakeholders will lose interest if they don’t realize benefits within the fist year. Can you reach your goal and report success within that timeline?

      Identify secondary, incremental customer engagement improvements that can be made as you work toward the overall goal to be achieved at the one-year milestone.

      Related Info-Tech Research

      Stock image of an office worker. Build a Strong Technology Foundation for Customer Experience Management
      • Any CRM project needs to be guided by the broader strategy around customer engagement. This blueprint explores how to create a strong technology enablement approach for CXM using voice of the customer analysis.
      Stock image of a target with arrows. Improve Requirements Gathering
      • 70% of projects that fail do so because of poor requirements. If you need to double-click on best practices for eliciting, analyzing, and validating requirements as you build up your CRM picklist and RFP, this blueprint will equip you with the knowledge and tools you need to hit the ground running.
      Stock image of a pen on paper. Drive Successful Sourcing Outcomes with a Robust RFP Process
      • Managing a complex RFP process for an enterprise application like a CRM platform can be a challenging undertaking. This blueprint zooms into how to build, run, administer, and evaluate RFP responses effectively.

      Bibliography

      “Doomed From the Start? Why a Majority of Business and IT Teams Anticipate Their Software Development Projects Will Fail.” Geneca, 25 Jan. 2017. Web.

      Hall, Kerrie. “The State of CRM Data Management 2020.” Validity. 27 April 2020. Web.

      Hinchcliffe, Dion. “The Evolving Role of the CIO and CMO in Customer Experience.” ZDNet, 22 Jan. 2020. Web.

      Klie, L. “CRM Still Faces Challenges, Most Speakers Agree: CRM Systems Have Been Around for Decades, but Interoperability and Data Siloes Still Have to Be Overcome.” CRM Magazine, vol. 23, no. 5, 2019, pp. 13-14.

      Markman, Jon. "Netflix Knows What You Want... Before You Do." Forbes. 9 Jun. 2017. Web.

      Morgan, Blake. “50 Stats That Prove The Value Of Customer Experience.” Forbes, 24 Sept. 2019. Web.

      Taber, David. “What to Do When Your CRM Project Fails.” CIO Magazine, 18 Sept. 2017. Web.

      “The State of Project Management Annual Survey 2018.” Wellingtone, 2018. Web.

      “The History of Microsoft Dynamics.” Eswelt. 2021. Accessed 8 June 2022.

      “Unlock the Mysteries of Your Customer Relationships.” Harvard Business Review. 1 July 2014. Accessed 30 Mar. 2016.

      Present Security to Executive Stakeholders

      • Buy Link or Shortcode: {j2store}262|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $2,000 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • There is a disconnect between security leaders and executive stakeholders on what information is important to present.
      • Security leaders find it challenging to convey the necessary information to obtain support for security objectives.
      • Changes to the threat landscape and shifts in organizational goals exacerbate the issue, as they impact security leaders' ability to prioritize topics to be communicated.
      • Security leaders struggle to communicate the importance of security to a non-technical audience.

      Our Advice

      Critical Insight

      Security presentations are not a one-way street. The key to a successful executive security presentation is having a goal for the presentation and ensuring that you have met your goal.

      Impact and Result

      • Developing a thorough understanding of the security communication goals.
      • Understanding the importance of leveraging highly relevant and understandable data.
      • Developing and delivering presentations that will keep your audience engaged and build trust with your executive stakeholders.

      Present Security to Executive Stakeholders Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Present Security to Executive Stakeholders – A step-by-step guide to communicating security effectively to obtain support from decision makers.

      Use this as a guideline to assist you in presenting security to executive stakeholders.

      • Present Security to Executive Stakeholders Storyboard

      2. Security Presentation Templates – A set of security presentation templates to assist you in communicating security to executive stakeholders.

      The security presentation templates are a set of customizable templates for various types of security presentation including:

      • Present Security to Executive Stakeholders Templates

      Infographic

      Further reading

      Present Security to Executive Stakeholders

      Learn how to communicate security effectively to obtain support from decision makers.

      Analyst Perspective

      Build and deliver an effective security communication to your executive stakeholders.

      Ahmad Jowhar

      As a security leader, you’re tasked with various responsibilities to ensure your organization can achieve its goals while its most important assets are being protected.

      However, when communicating security to executive stakeholders, challenges can arise in determining what topics are pertinent to present. Changes in the security threat landscape coupled with different business goals make identifying how to present security more challenging.

      Having a communication framework for presenting security to executive stakeholders will enable you to effectively identify, develop, and deliver your communication goals while obtaining the support you need to achieve your objectives.

      Ahmad Jowhar
      Research Specialist, Security & Privacy

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      • Many security leaders struggle to decide what to present and how to present security to executive stakeholders.
      • Constant changes in the security threat landscape impacts a security leader’s ability to prioritize topics to be communicated.
      • There is a disconnect between security leaders and executive stakeholders on what information is important to present.
      • Security leaders struggle to communicate the importance of security to a non-technical audience.
      • Developing a thorough understanding of security communication goals.
      • Understanding the importance of leveraging highly relevant and understandable data.
      • Developing and delivering presentations that will keep your audience engaged and build trust with your executive stakeholders.

      Info-Tech Insight

      Security presentations are not a one-way street. The key to a successful executive security presentation is having a goal for the presentation and verifying that you have met your goal.

      Your challenge

      As a security leader, you need to communicate security effectively to executive stakeholders in order to obtain support for your security objectives.

      • When it comes to presenting security to executive stakeholders, many security leaders find it challenging to convey the necessary information in order to obtain support for security objectives.
      • This is attributed to various factors, such as an increase in the threat landscape, changes to industry regulations and standards, and new organizational goals that security has to align with.
      • Furthermore, with the limited time to communicate with executive stakeholders, both in frequency and duration, identifying the most important information to address can be challenging.

      76% of security leaders struggle in conveying the effectiveness of a cybersecurity program.

      62% find it difficult to balance the risk of too much detail and need-to-know information.

      41% find it challenging to communicate effectively with a mixed technical and non-technical audience.

      Source: Deloitte, 2022

      Common obstacles

      There is a disconnect between security leaders and executive stakeholders when it comes to the security posture of the organization:

      • Executive stakeholders are not confident that their security leaders are doing enough to mitigate security risks.
      • The issue has been amplified, with security threats constantly increasing across all industries.
      • However, security leaders don’t feel that they are in a position to make themselves heard.
      • The lack of organizational security awareness and support from cross-functional departments has made it difficult to achieve security objectives (e.g. education, investments).
      • Defining an approach to remove that disconnect with executive stakeholders is of utmost importance for security leaders, in order to improve their organization’s security posture.

      9% of boards are extremely confident in their organization’s cybersecurity risk mitigation measures.

      77% of organizations have seen an increase in the number of attacks in 2021.

      56% of security leaders claimed their team is not involved when leadership makes urgent security decisions.

      Source: EY, 2021
      The image contains a screenshot of an Info-Tech Thoughtmodel titled: Presenting Security to Executive Stakeholders.

      Info-Tech’s methodology for presenting security to executive stakeholders

      1. Identify communication goals

      2. Collect information to support goals

      3. Develop communication

      4. Deliver communication

      Phase steps

      1. Identify drivers for communicating to executives
      2. Define your goals for communicating to executives
      1. Identify data to collect
      2. Plan how to retrieve data
      1. Plan communication
      2. Build a compelling communication document
      1. Deliver a captivating presentation
      2. Obtain/verify goals

      Phase outcomes

      A defined list of drivers and goals to help you develop your security presentations

      A list of data sources to include in your communication

      A completed communication template

      A solidified understanding of how to effectively communicate security to your stakeholders

      Develop a structured process for communicating security to your stakeholders

      Security presentations are not a one-way street
      The key to a successful executive security presentation is having a goal for the presentation and verifying that you have met your goal.

      Identifying your goals is the foundation of an effective presentation
      Defining your drivers and goals for communicating security will enable you to better prepare and deliver your presentation, which will help you obtain your desired outcome.

      Harness the power of data
      Leveraging data and analytics will help you provide quantitative-based communication, which will result in a more meaningful and effective presentation.

      Take your audience on a journey
      Developing a storytelling approach will help engage with your audience.

      Win your audience by building a rapport
      Establishing credibility and trust with executive stakeholders will enable you to obtain their support for security objectives.

      Tactical insight
      Conduct background research on audience members (i.e. professional background) to help understand how best to communicate with them and overcome potential objections.

      Tactical insight
      Verifying your objectives at the end of the communication is important, as it ensures you have successfully communicated to executive stakeholders.

      Project deliverables

      This blueprint is accompanied by a supporting deliverable which includes five security presentation templates.

      Report on Security Initiatives
      Template showing how to inform executive stakeholders of security initiatives.

      Report on Security Initiatives.

      Security Metrics
      Template showing how to inform executive stakeholders of current security metrics that would help drive future initiatives.

      Security Metrics.

      Security Incident Response & Recovery
      Template showing how to inform executive stakeholders of security incidents, their impact, and the response plan.

      Security Incident Response & Recovery

      Security Funding Request
      Template showing how to inform executive stakeholders of security incidents, their impact, and the response plan.

      Security Funding Request

      Key template:

      Security and Risk Update

      Template showing how to inform executive stakeholders of proactive security and risk initiatives.

      Blueprint benefits

      IT/InfoSec benefits

      Business benefits

      • Reduce effort and time spent preparing cybersecurity presentations for executive stakeholders by having templates to use.
      • Enable security leaders to better prepare what to present and how to present it to their executive stakeholders, as well as driving the required outcomes from those presentations.
      • Establish a best practice for communicating security and IT to executive stakeholders.
      • Gain increased awareness of cybersecurity and the impact executive stakeholders can have on improving an organization’s security posture.
      • Understand how security’s alignment with the business will enable the strategic growth of the organization.
      • Gain a better understanding of how security and IT objectives are developed and justified.

      Measure the value of this blueprint

      Phase

      Measured Value (Yearly)

      Phase 1: Identify communication goals

      Cost to define drivers and goals for communicating security to executives:

      16 FTE hours @ $233K* =$1,940

      Phase 2: Collect information to support goals

      Cost to collect and synthesize necessary data to support communication goals:

      16 FTE hours @ $233K = $1,940

      Phase 3: Develop communication

      Cost to develop communication material that will contextualize information being shown:

      16 FTE hours @ $233K = $1,940

      Phase 4: Deliver communication

      Potential Savings:

      Total estimated effort = $5,820

      Our blueprint will help you save $5,820 and over 40 FTE hours

      * The financial figure depicts the annual salary of a CISO in 2022

      Source: Chief Information Security Officer Salary.” Salary.com, 2022

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Phase 1

      Identify communication goals

      Phase 1 Phase 2 Phase 3 Phase 4

      1.1 Identify drivers for communicating to executives

      1.2 Define your goals for communicating to executives

      2.1 Identify data to collect

      2.2 Plan how to retrieve data

      3.1 Plan communication

      3.2 Build a compelling communication document

      4.1 Deliver a captivating presentation

      4.2 Obtain/verify support for security goals

      This phase will walk you through the following activities:

      • Understanding the different drivers for communicating security to executive stakeholders
      • Identifying different communication goals

      This phase involves the following participants:

      • Security leader

      1.1. Identify drivers for communicating to executive stakeholders

      As a security leader, you meet with executives and stakeholders with diverse backgrounds, and you aim to showcase your organization’s security posture along with its alignment with the business’ goals.

      However, with the constant changes in the security threat landscape, demands and drivers for security could change. Thus, understanding potential drivers that will influence your communication will assist you in developing and delivering an effective security presentation.

      39% of organizations had cybersecurity on the agenda of their board’s quarterly meeting.

      Source: EY, 2021.

      Info-Tech Insight

      Not all security presentations are the same. Keep your communication strategy and processes agile.

      Know your drivers for security presentations

      By understanding the influences for your security presentations, you will be able to better plan what to present to executive stakeholders.

      • These meetings, which are usually held once per quarter, provide you with less than one hour of presentation time.
      • Hence, it is crucial to know why you need to present security and whether these drivers are similar across the other presentations.

      Understanding drivers will also help you understand how to present security to executive stakeholders.

      • These drivers will shape the structure of your presentation and help determine your approach to communicating your goals.
      • For example, financial-based presentations that are driven by budget requests might create a sense of urgency or assurance about investment in a security initiative.

      Identify your communication drivers, which can stem from various initiatives and programs, including:

      • Results from internal or external audit reports.
      • Upcoming budget meetings.
      • Briefing newly elected executive stakeholders on security.

      When it comes to identifying your communication drivers, you can collaborate with subject matter experts, like your corporate secretary or steering committees, to ensure the material being communicated will align with some of the organizational goals.

      Examples of drivers for security presentations

      Audit
      Upcoming internal or external audits might require updates on the organization’s compliance

      Organizational restructuring
      Restructuring within an organization could require security updates

      Merger & Acquisition
      An M&A would trigger presentations on organization’s current and future security posture

      Cyber incident
      A cyberattack would require an immediate presentation on its impact and the incident response plan

      Ad hoc
      Provide security information requested by stakeholders

      1.2. Define your goals for communicating to executives

      After identifying drivers for your communication, it’s important to determine what your goals are for the presentation.

      • Communication drivers are mainly triggers for why you want to present security.
      • Communication goals are the potential outcomes you are hoping to obtain from the presentation.
      • Your communication goals would help identify what data and metrics to include in your presentation, the structure of your communication deck, and how you deliver your communication to executive stakeholders.

      Identifying your communication goals could require the participation of the security team, IT leadership, and other business stakeholders.

      • As a group, brainstorm the security goals that align with your business goals for the coming year.
        • Aim to have at least two business goals that align with each security goal.
      • Identify what benefits and value the executive stakeholders will gain from the security goal being presented.
        • E.g. Increased security awareness, updates on organization's security posture.
      • Identify what the ask is for this presentation.
        • E.g. Approval for increasing budget to support security initiatives, executive support to implement internal security programs.

      Info-Tech Insight

      There can be different reasons to communicate security to executive stakeholders. You need to understand what you want to get out of your presentation.

      Examples of security presentation goals

      Educate
      Educate the board on security trends and/or latest risks in the industry

      Update
      Provide updates on security initiatives, relevant security metrics, and compliance posture

      Inform
      Provide an incident response plan due to a security incident or deliver updates on current threats and risks

      Investment
      Request funding for security investments or financial updates on past security initiatives

      Ad hoc
      Provide security information requested by stakeholders

      Phase 2

      Collect information to support goals

      Phase 1Phase 2Phase 3Phase 4

      1.1 Identify drivers for communicating to executives

      1.2 Define your goals for communicating to executives

      2.1 Identify data to collect

      2.2 Plan how to retrieve data

      3.1 Plan communication

      3.2 Build a compelling communication document

      4.1 Deliver a captivating presentation

      4.2 Obtain/verify support for security goals

      This phase will walk you through the following activities:

      • Understanding what types of data to include in your security presentations
      • Defining where and how to retrieve data

      This phase involves the following participants:

      • Security leader
      • Network/security analyst

      2.1 Identify data to collect

      After identifying drivers and goals for your communication, it’s important to include the necessary data to justify the information being communicated.

      • Leveraging data and analytics will assist in providing quantitative-based communication, which will result in a more meaningful and effective presentation.
      • The data presented will showcase the visibility of an organization’s security posture along with potential risks and figures on how to mitigate those risks.
      • Providing analysis of the quantitative data presented will also showcase further insights on the figures, allow the audience to better understand the data, and show its relevance to the communication goals.

      Identifying data to collect doesn’t need to be a rigorous task; you can follow these steps to help you get started:

      • Work with your security team to identify the main type of data applicable to the communication goals.
        • E.g. Financial data would be meaningful to use when communicating a budget presentation.
      • Identify supporting data linked to the main data defined.
        • E.g. If a financial investment is made to implement a security initiative, then metrics on improvements to the security posture will be relevant.
      • Show how both the main and supporting data align with the communication goals.
        • E.g. Improvement in security posture would increase alignment with regulation standards, which would result in additional contracts being awarded and increased revenue.

      Info-Tech Insight

      Understand how to present your information in a way that will be meaningful to your audience, for instance by quantifying security risks in financial terms.

      Examples of data to present

      Educate
      Number of organizations in industry impacted by data breaches during past year; top threats and risks affecting the industries

      Update
      Degree of compliance with standards (e.g. ISO-27001); metrics on improvement of security posture due to security initiatives

      Inform
      Percentage of impacted clients and disrupted business functions; downtime; security risk likelihood and financial impact

      Investment
      Capital and operating expenditure for investment; ROI on past and future security initiatives

      Ad hoc
      Number of security initiatives that went over budget; phishing test campaign results

      2.2 Plan how to retrieve the data

      Once the data that is going to be used for the presentation has been identified, it is important to plan how the data can be retrieved, processed, and shared.

      • Most of the data leveraged for security presentations are structured data, which are highly organized data that are often stored in a relational and easily searchable database.
        • This includes security log reports or expenditures for ongoing and future security investments.
      • Retrieving the data, however, would require collaboration and cooperation from different team members.
      • You would need to work with the security team and other appropriate stakeholders to identify where the data is stored and who the data owner is.

      Once the data source and owner has been identified, you need to plan how the data would be processed and leveraged for your presentation

      • This could include using queries to retrieve the relevant information needed (e.g. SQL, Microsoft Excel).
      • Verify the accuracy and relevance of the data with other stakeholders to ensure it is the most appropriate data to be presented to the executive stakeholders.

      Info-Tech Insight

      Using a data-driven approach to help support your objectives is key to engaging with your audience.

      Plan where to retrieve the data

      Identifying the relevant data sources to retrieve your data and the appropriate data owner enables efficient collaboration between departments collecting, processing, and communicating the data and graphics to the audience.

      Examples of where to retrieve your data

      Data Source

      Data

      Data Owner

      Communication Goal

      Audit & Compliance Reports

      Percentage of controls completed to be certified with ISO 27001; Number of security threats & risks identified.

      Audit Manager;

      Compliance Manager;

      Security Leader

      Ad hoc, Educate, Inform

      Identity & Access Management (IAM) Applications

      Number of privileged accounts/department; Percentage of user accounts with MFA applied

      Network/Security Analyst

      Ad hoc, Inform, Update

      Security Information & Event Management (SIEM)

      Number of attacks detected and blocked before & after implementing endpoint security; Percentage of firewall rules that triggered a false positive

      Network/Security Analyst

      Ad hoc, Inform, Update

      Vulnerability Management Applications

      Percentage of critical vulnerabilities patched; Number of endpoints encrypted

      Network/Security Analyst

      Ad hoc, Inform, Update

      Financial & Accounting Software

      Capital & operating expenditure for future security investments; Return on investment (ROI) on past and current security investments

      Financial and/or Accounting Manager

      Ad hoc, Educate, Investments

      Phase 3

      Develop communication

      Phase 1Phase 2Phase 3Phase 4

      1.1 Identify drivers for communicating to executives

      1.2 Define your goals for communicating to executives

      2.1 Identify data to collect

      2.2 Plan how to retrieve data

      3.1 Plan communication

      3.2 Build a compelling communication document

      4.1 Deliver a captivating presentation

      4.2 Obtain/verify support for security goals

      This phase will walk you through the following activities:

      • Identifying a communication strategy for presenting security
      • Identifying security templates that are applicable to your presentation

      This phase involves the following participants:

      • Security leader

      3.1 Plan communication: Know who your audience is

      • When preparing your communication, it's important to understand who your target audience is and to conduct background research on them.
      • This will help develop your communication style and ensure your presentation caters to the expected audience in the room.

      Examples of two profiles in a boardroom

      Formal board of directors

      The executive team

      • In the private sector, this will include an appointed board of shareholders and subcommittees external to the organization.
      • In the public sector, this can include councils, commissions, or the executive team itself.
      • In government, this can include mayors, ministers, and governors.
      • The board’s overall responsibility is governance.
      • This audience will include your boss and your peers internal to the organization.
      • This category is primarily involved in the day-to-day operations of the organization and is responsible for carrying out the strategic direction set by the board.
      • The executive team’s overall responsibility is operations.

      3.1.1 Know what your audience cares about

      • Understanding what your executive stakeholders value will equip you with the right information to include in your presentations.
      • Ensure you conduct background research on your audience to assist you in knowing what their potential interests are.
      • Your background research could include:
        • Researching the audience’s professional background through LinkedIn.
        • Reviewing their comments from past executive meetings.
        • Researching current security trends that align with organizational goals.
      • Once the values and risks have been identified, you can document them in notes and share the notes with subject matter experts to verify if these values and risks should be shared in the coming meetings.

      A board’s purpose can include the following:

      • Sustaining and expanding the organization’s purpose and ability to execute in a competitive market.
      • Determining and funding the organization’s future and direction.
      • Protecting and increasing shareholder value.
      • Protecting the company’s exposure to risks.

      Examples of potential values and risks

      • Business impact
      • Financial impact
      • Security and incidents

      Info-Tech Insight
      Conduct background research on audience members (e.g. professional background on LinkedIn) to help understand how best to communicate to them and overcome potential objections.

      Understand your audience’s concerns

      • Along with knowing what your audience values and cares about, understanding their main concerns will allow you to address those items or align them with your communication.
      • By treating your executive stakeholders as your project sponsors, you would build a level of trust and confidence with your peers as the first step to tackling their concerns.
      • These concerns can be derived from past stakeholder meetings, recent trends in the industry, or strategic business alignments.
      • After capturing their concerns, you’ll be equipped with the necessary understanding on what material to include and prioritize during your presentations.

      Examples of potential concerns for each profile of executive stakeholders

      Formal board of directors

      The executive team

      • Business impact (What is the impact of IT in solving business challenges?)
      • Investments (How will it impact organization’s finances and efficiency?)
      • Cybersecurity and risk (What are the top cybersecurity risks, and how is IT mitigating those risks to the business?)
      • Business alignment (How do IT priorities align to the business strategy and goals?)
      • IT operational efficiency (How is IT set up for success with foundational elements of IT’s operational strategy?)
      • Innovation & transformation priorities (How is IT enabling the organization’s competitive advantage and supporting transformation efforts as a strategic business partner?)

      Build your presentation to tackle their main concerns

      Your presentation should be well-rounded and compelling when it addresses the board’s main concerns about security.

      Checklist:

      • Research your target audience (their backgrounds, board composition, dynamics, executive team vs. external group).
      • Include value and risk language in your presentation to appeal to your audience.
      • Ensure your content focuses on one or more of the board’s main concerns with security (e.g. business impact, investments, or risk).
      • Include information about what is in it for them and the organization.
      • Research your board’s composition and skillsets to determine their level of technical knowledge and expertise. This helps craft your presentation with the right amount of technology vs. business-facing information.

      Info-Tech Insight
      The executive stakeholder’s main concerns will always boil down to one important outcome: providing a level of confidence to do business through IT products, services, and systems – including security.

      3.1.2 Take your audience through a security journey

      • Once you have defined your intended target and their potential concerns, developing the communication through a storytelling approach will be the next step to help build a compelling presentation.
      • You need to help your executive stakeholders make sense of the information being conveyed and allow them to understand the importance of cybersecurity.
      • Taking your audience through a story will allow them to see the value of the information being presented and better resonate with its message.
      • You can derive insights for your storytelling presentation by doing the following:
        • Provide a business case scenario on the topic you are presenting.
        • Identify and communicate the business problem up front and answer the three questions (why, what, how).
        • Quantify the problems in terms of business impact (money, risk, value).

      Info-Tech Insight
      Developing a storytelling approach will help keep your audience engaged and allow the information to resonate with them, which will add further value to the communication.

      Identify the purpose of your presentation

      You should be clear about your bottom line and the intent behind your presentation. However, regardless of your bottom line, your presentation must focus on what business problems you are solving and why security can assist in solving the problem.

      Examples of communication goals

      To inform or educate

      To reach a decision

      • In this presentation type, it is easy for IT leaders to overwhelm a board with excessive or irrelevant information.
      • Focus your content on the business problem and the solution proposed.
      • Refrain from too much detail about the technology – focus on business impact and risk mitigated. Ask for feedback if applicable.
      • In this presentation type, there is a clear ask and an action required from the board of directors.
      • Be clear about what this decision is. Once again, don’t lead with the technology solution: Start with the business problem you are solving, and only talk about technology as the solution if time permits.
      • Ensure you know who votes and how to garner their support.

      Info-Tech Insight
      Nobody likes surprises. Communicate early and often. The board should be pre-briefed, especially if it is a difficult subject. This also ensures you have support when you deliver a difficult message.

      Gather the right information to include in your boardroom presentation

      Once you understand your target audience, it’s important to tailor your presentation material to what they will care about.

      Typical IT boardroom presentations include:

      • Communicating the value of ongoing business technology initiatives.
      • Requesting funds or approval for a business initiative that IT is spearheading.
      • Security incident response/Risk/DRP.
      • Developing a business program or an investment update for an ongoing program.
      • Business technology strategy highlights and impacts.
      • Digital transformation initiatives (value, ROI, risk).

      Info-Tech Insight
      You must always have a clear goal or objective for delivering a presentation in front of your board of directors. What is the purpose of your board presentation? Identify your objective and outcome up front and tailor your presentation’s story and contents to fit this purpose.

      Info-Tech Insight
      Telling a good story is not about the message you want to deliver but the one the executive stakeholders want to hear. Articulate what you want them to think and what you want them to take away, and be explicit about it in your presentation. Make your story logically flow by identifying the business problem, complication, the solution, and how to close the gap. Most importantly, communicate the business impacts the board will care about.

      Structure your presentation to tell a logical story

      To build a strong story for your presentation, ensure you answer these three questions:

      WHY

      Why is this a business issue, or why should the executive stakeholders care?

      WHAT

      What is the impact of solving the problem and driving value for the company?

      HOW

      How will we leverage our resources (technology, finances) to solve the problem?

      Examples:

      Scenario 1: The company has experienced a security incident.

      Intent: To inform/educate the board about the security incident.

      WHY

      The data breach has resulted in a loss of customer confidence, negative brand impact, and a reduction in revenue of 30%.

      WHAT

      Financial, legal, and reputational risks identified, and mitigation strategies implemented. IT is working with the PR team on communications. Incident management playbook executed.

      HOW

      An analysis of vulnerabilities was conducted and steps to address are in effect. Recovery steps are 90% completed. Incident management program reviewed for future incidents.

      Scenario 2: Security is recommending investments based on strategic priorities.

      Intent: To reach a decision with the board – approve investment proposal.

      WHY

      The new security strategy outlines two key initiatives to improve an organization’s security culture and overall risk posture.

      WHAT

      Security proposed an investment to implement a security training & phishing test campaign, which will assist in reducing data breach risks.

      HOW

      Use 5% of security’s budget to implement security training and phishing test campaigns.

      Time plays a key role in delivering an effective presentation

      What you include in your story will often depend on how much time you have available to deliver the message.

      Consider the following:

      • Presenting to executive stakeholders often means you have a short window of time to deliver your message. The average executive stakeholder presentation is 15 minutes, and this could be cut short due to other unexpected factors.
      • If your presentation is too long, you risk overwhelming or losing your audience. You must factor in the time constraints when building your board presentation.
      • Your executive stakeholders have a wealth of experience and knowledge, which means they could jump to conclusions quickly based on their own experiences. Ensure you give them plenty of background information in advance. Provide your presentation material, a brief, or any other supporting documentation before the meeting to show you are well prepared.
      • Be prepared to have deep conversations about the topic, but respect that the executive stakeholders might not be interested in hearing the tactical information. Build an elevator pitch, a one-pager, back-up slides that support your ask and the story, and be prepared to answer questions within your allotted presentation time to dive deeper.

      Navigating through Q&A

      Use the Q&A portion to build credibility with the board.

      • It is always better to say, “I’m not certain about the answer but will follow up,” than to provide false or inaccurate information on the spot.
      • When asked challenging or irrelevant questions, ensure you have an approach to deflect them. Questions can often be out of scope or difficult to answer in a group. Find what works for you to successfully navigate through these questions:
        • “Let’s work with the sub-committee to find you an answer.”
        • “Let’s take that offline to address in more detail.”
        • “I have some follow-up material I can provide you to discuss that further after our meeting.”
      • And ensure you follow up! Make sure to follow through on your promise to provide information or answers after the meeting. This helps build trust and credibility with the board.

      Info-Tech Insight
      The average board presentation is 15 minutes long. Build no more than three or four slides of content to identify the business problem, the business impacts, and the solution. Leave five minutes for questions at the end, and be prepared with back-up slides to support your answers.

      Storytelling checklist

      Checklist:

      • Tailor your presentation based on how much time you have.
      • Find out ahead of time how much time you have.
      • Identify if your presentation is to inform/educate or reach a decision.
      • Identify and communicate the business problem up front and answer the three questions (why, what, how).
      • Express the problem in terms of business impact (risk, value, money).
      • Prepare and send pre-meeting collateral to the members of the board and executive team.
      • Include no more than 5-6 slides for your presentation.
      • Factor in Q&A time at the end of your presentation window.
      • Articulate what you want them to think and what you want them to take away – put it right up front and remind them at the end.
      • Have an elevator speech handy – one or two sentences and a one-pager version of your story.
      • Consider how you will build your relationship with the members outside the boardroom.

      3.1.3 Build a compelling communication document

      Once you’ve identified your communication goals, data, and plan to present to your stakeholders, it’s important to build the compelling communication document that will attract all audiences.

      A good slide design increases the likelihood that the audience will read the content carefully.

      • Bad slide structure (flow) = Audience loses focus
        • You can have great content on a slide, but if a busy audience gets confused, they’ll just close the file or lose focus. Structure encompasses horizontal and vertical logic.
      • Good visual design = Audience might read more
        • Readers will probably skim the slides first. If the slides look ugly, they will already have a negative impression. If the slides are visually appealing, they will be more inclined to read carefully. They may even use some slides to show others.
      • Good content + Good structure + Visual appeal = Good presentation
        • A presentation is like a house. Good content is the foundation of the house. Good structure keeps the house strong. Visual appeal differentiates houses.

      Slide design best practices

      Leverage these slide design best practices to assist you in developing eye-catching presentations.

      • Easy to read: Assume reader is tight on time. If a slide looks overwhelming, the reader will close the document.
      • Concise and clear: Fewer words = more skim-able.
      • Memorable: Use graphics and visuals or pithy quotes whenever you can do so appropriately.
      • Horizontal logic: Good horizontal logic will have slide titles that cascade into a story with no holes or gaps.
      • Vertical logic: People usually read from left to right, top to bottom, or in a Z pattern. Make sure your slide has an intuitive flow of content.
      • Aesthetics: People like looking at visually appealing slides, but make sure your attempts to create visual appeal do not detract from the content.

      Your presentation must have a logical flow

      Horizontal logic

      Vertical logic

      • Horizontal logic should tell a story.
      • When slide titles are read in a cascading manner, they will tell a logical and smooth story.
      • Title & tagline = thesis (best insight).
      • Vertical logic should be intuitive.
      • Each step must support the title.
      • The content you intend to include within each slide is directly applicable to the slide title.
      • One main point per slide.

      Vertical logic should be intuitive

      The image contains a screenshot example of a bad design layout for a slide. The image contains a screenshot example of a good design layout for a slide.

      The audience is unsure where to look and in what order.

      The audience knows to read the heading first. Then look within the pie chart. Then look within the white boxes to the right.

      Horizontal and vertical logic checklists

      Horizontal logic

      Vertical logic

      • List your slide titles in order and read through them.
      • Good horizontal logic should feel like a story. Incomplete horizontal logic will make you pause or frown.
      • After a self-test, get someone else to do the same exercise with you observing them.
      • Note at which points they pause or frown. Discuss how those points can be improved.
      • Now consider each slide title proposed and the content within it.
      • Identify if there is a disconnect in title vs. content.
      • If there is a disconnect, consider changing the title of the slide to appropriately reflect the content within it, or consider changing the content if the slide title is an intended path in the story.

      Make it easy to read

      The image contains a screenshot that demonstrates an uneasy to read slide. The image contains a screenshot that demonstrates an easy to read slide.
      • Unnecessary coloring makes it hard on the eyes
      • Margins for title at top is too small
      • Content is not skim-able (best to break up the slide)

      Increase skim-ability:

      • Emphasize the subheadings
      • Bold important words

      Make it easier on the eyes:

      • Declutter and add sections
      • Have more white space

      Be concise and clear

      1. Write your thoughts down
        • This gets your content documented.
        • Don’t worry about clarity or concision yet.
      2. Edit for clarity
        • Make sure the key message is very clear.
        • Find your thesis statement.
      3. Edit for concision
        • Remove unnecessary words.
        • Use the active voice, not passive voice (see below for examples).

      Passive voice

      Active voice

      “There are three things to look out for” (8 words)

      “Network security was compromised by hackers” (6 words)

      “Look for these three things” (5 words)

      “Hackers compromised network security” (4 words)

      Be memorable

      The image contains a screenshot of an example that demonstrates a bad example of how to be memorable. The image contains a screenshot of an example that demonstrates a good example of how to be memorable.

      Easy to read, but hard to remember the stats.

      The visuals make it easier to see the size of the problem and make it much more memorable.

      Remember to:

      • Have some kind of visual (e.g. graphs, icons, tables).
      • Divide the content into sections.
      • Have a bit of color on the page.

      Aesthetics

      The image contains a screenshot of an example of bad aesthetics. The image contains a screenshot of an example of good aesthetics.

      This draft slide is just content from the outline document on a slide with no design applied yet.

      • Have some kind of visual (e.g. graphs, icons, tables) as long as it’s appropriate.
      • Divide the content into sections.
      • Have a bit of color on the page.
      • Bold or italicize important text.

      Why use visuals?

      How graphics affect us

      Cognitively

      • Engage our imagination
      • Stimulate the brain
      • Heighten creative thinking
      • Enhance or affect emotions

      Emotionally

      • Enhance comprehension
      • Increase recollection
      • Elevate communication
      • Improve retention

      Visual clues

      • Help decode text
      • Attract attention
      • Increase memory

      Persuasion

      • 43% more effective than text alone
      Source: Management Information Systems Research Center

      Presentation format

      Often stakeholders prefer to receive content in a specific format. Make sure you know what you require so that you are not scrambling at the last minute.

      • Is there a standard presentation template?
      • Is a hard-copy handout required?
      • Is there a deadline for draft submission?
      • Is there a deadline for final submission?
      • Will the presentation be circulated ahead of time?
      • Do you know what technology you will be using?
      • Have you done a dry run in the meeting room?
      • Do you know the meeting organizer?

      Checklist to build compelling visuals in your presentation

      Leverage this checklist to ensure you are creating the perfect visuals and graphs for your presentation.

      Checklist:

      • Do the visuals grab the audience’s attention?
      • Will the visuals mislead the audience/confuse them?
      • Do the visuals facilitate data comparison or highlight trends and differences in a more effective manner than words?
      • Do the visuals present information simply, cleanly, and accurately?
      • Do the visuals display the information/data in a concentrated way?
      • Do the visuals illustrate messages and themes from the accompanying text?

      3.2 Security communication templates

      Once you have identified your communication goals and plans for building your communication document, you can start building your presentation deck.

      These presentation templates highlight different security topics depending on your communication drivers, goals, and available data.

      Info-Tech has created five security templates to assist you in building a compelling presentation.

      These templates provide support for presentations on the following five topics:

      • Security Initiatives
      • Security & Risk Update
      • Security Metrics
      • Security Incident Response & Recovery
      • Security Funding Request

      Each template provides instructions on how to use it and tips on ensuring the right information is being presented.

      All the templates are customizable, which enables you to leverage the sections you need while also editing any sections to your liking.

      The image contains screenshots of the Security Presentation Templates.

      Download the Security Presentation Templates

      Security template example

      It’s important to know that not all security presentations for an organization are alike. However, these templates would provide a guideline on what the best practices are when communicating security to executive stakeholders.

      Below is an example of instructions to complete the “Security Risk & Update” template. Please note that the security template will have instructions to complete each of its sections.

      The image contains a screenshot of the Executive Summary slide. The image contains a screenshot of the Security Goals & Objectives slide.

      The first slide following the title slide includes a brief executive summary on what would be discussed in the presentation. This includes the main security threats that would be addressed and the associated risk mitigation strategies.

      This slide depicts a holistic overview of the organization’s security posture in different areas along with the main business goals that security is aligning with. Ensure visualizations you include align with the goals highlighted.

      Security template example (continued)

      The image contains a screenshot example of the Top Threats & Risks. The image contains a screenshot example of the Top Threats & Risks.

      This slide displays any top threats and risks an organization is facing. Each threat consists of 2-3 risks and is prioritized based on the negative impact it could have on the organization (i.e. red bar = high priority; green bar = low priority). Include risks that have been addressed in the past quarter, and showcase any prioritization changes to those risks.

      This slide follows the “Top Threats & Risks” slide and focuses on the risks that had medium or high priority. You will need to work with subject matter experts to identify risk figures (likelihood, financial impact) that will enable you to quantify the risks (Likelihood x Financial Impact). Develop a threshold for each of the three columns to identify which risks require further prioritization, and apply color coding to group the risks.

      Security template example (continued)

      The image contains a screenshot example of the slide, Risk Analysis. The image contains a screenshot example of the slide, Risk Mitigation Strategies & Roadmap.

      This slide showcases further details on the top risks along with their business impact. Be sure to include recommendations for the risks and indicate whether further action is required from the executive stakeholders.

      The last slide of the “Security Risk & Update” template presents a timeline of when the different initiatives to mitigate security risks would begin. It depicts what initiatives will be completed within each fiscal year and the total number of months required. As there could be many factors to a project’s timeline, ensure you communicate to your executive stakeholders any changes to the project.

      Phase 4

      Deliver communication

      Phase 1Phase 2Phase 3Phase 4

      1.1 Identify drivers for communicating to executives

      1.2 Define your goals for communicating to executives

      2.1 Identify data to collect

      2.2 Plan how to retrieve data

      3.1 Plan communication

      3.2 Build a compelling communication document

      4.1 Deliver a captivating presentation

      4.2 Obtain/verify support for security goals

      This phase will walk you through the following activities:

      • Identifying a strategy to deliver compelling presentations
      • Ensuring you follow best practices for communicating and obtaining your security goals

      This phase involves the following participants:

      • Security leader

      4.1 Deliver a captivating presentation

      You’ve gathered all your data, you understand what your audience is expecting, and you are clear on the outcomes you require. Now, it’s time to deliver a presentation that both engages and builds confidence.

      Follow these tips to assist you in developing an engaging presentation:

      • Start strong: Give your audience confidence that this will be a good investment of their time. Establish a clear direction for what’s going to be covered and what the desired outcome is.
      • Use your time wisely: Odds are, your audience is busy, and they have many other things on their minds. Be prepared to cover your content in the time allotted and leave sufficient time for discussion and questions.
      • Be flexible while presenting: Do not expect that your presentation will follow the path you have laid out. Anticipate jumping around and spending more or less time than you had planned on a given slide.

      Keep your audience engaged with these steps

      • Be ready with supporting data. Don’t make the mistake of not knowing your content intimately. Be prepared to answer questions on any part of it. Senior executives are experts at finding holes in your data.
      • Know your audience. Who are you presenting to? What are their specific expectations? Are there sensitive topics to be avoided? You can’t be too prepared when it comes to understanding your audience.
      • Keep it simple. Don’t assume that your audience wants to learn the details of your content. Most just want to understand the bottom line, the impact on them, and how they can help. More is not always better.
      • Focus on solving issues. Your audience members have many of their own problems and issues to worry about. If you show them how you can help make their lives easier, you’ll win them over.

      Info-Tech Insight
      Establishing credibility and trust with executive stakeholders is important to obtaining their support for security objectives.

      Be honest and straightforward with your communication

      • Be prepared. Being properly prepared means not only that your update will deliver the value that you expect, but also that you will have confidence and the flexibility you require when you’re taken off track.
      • Don’t sugarcoat it. These are smart, driven people that you are presenting to. It is neither beneficial nor wise to try to fool them. Be open and transparent about problems and issues. Ask for help.
      • No surprises. An executive stakeholder presentation is not the time or the place for a surprise. Issues seen as unexpected or contentious should always be dealt with prior to the meeting with those most impacted.

      Hone presentation skills before meeting with the executive stakeholders

      Know your environment

      Be professional but not boring

      Connect with your audience

      • Your organization has standards for how people are expected to dress at work. Make sure that your attire meets this standard – don’t be underdressed.
      • Think about your audience – would they appreciate you starting with a joke, or do they want you to get to the point as quickly as possible?
      • State the main points of your presentation confidently. While this should be obvious, it is essential. Your audience should be able to clearly see that you believe the points you are stating.
      • Present with lots of energy, smile, and use hand gestures to support your speech.
      • Look each member of the audience in the eye at least once during your presentation. Avoid looking at the ceiling, the back wall, or the floor. Your audience should feel engaged – this is essential to keeping their attention on you.
      • Never read from your slides. If there is text on a slide, paraphrase it while maintaining eye contact.

      Checklist for presentation logistics

      Optimize the timing of your presentation:

      • Less is more: Long presentations are detrimental to your cause – they lead to your main points being diluted. Keep your presentation short and concise.
      • Keep information relevant: Only present information that is important to your audience. This includes the information that they are expecting to see and information that connects to the business.
      • Expect delays: Your audience will likely have questions. While it is important to answer each question fully, it will take away from the precious time given to you for your presentation. Expect that you will not get through all the information you have to present.

      Script your presentation:

      • Use a script to stay on track: Script your presentation before the meeting. A script will help you present your information in a concise and structured manner.
      • Develop a second script: Create a script that is about half the length of the first script but still contains the most important points. This will help you prepare for any delays that may arise during the presentation.
      • Prepare for questions: Consider questions that may be asked and script clear and concise answers to each.
      • Practice, practice, practice: Practice your presentation until you no longer need the script in front of you.

      Checklist for presentation logistics (continued)

      Other considerations:

      • After the introduction of your presentation, clearly state the objective – don’t keep people guessing and consequently lose focus on your message.
      • After the presentation is over, document important information that came up. Write it down or you may forget it soon after.
      • Rather than create a long presentation deck full of detailed slides that you plan to skip over during the presentation, create a second, compact deck that contains only the slides you plan to present. Send out the longer deck after the presentation.

      Checklist for delivering a captivating presentation

      Leverage this checklist to ensure you are prepared to develop and deliver an engaging presentation.

      Checklist:

      • Start with a story or something memorable to break the ice.
      • Go in with the end state in mind (focus on the outcome/end goal and work back from there) – What’s your call to action?
      • Content must compliment your end goal, filter out any content that doesn’t compliment the end goal.
      • Be prepared to have less time to speak. Be prepared with shorter versions of your presentation.
      • Include an appendix with supporting data, but don’t be data heavy in your presentation. Integrate the data into a story. The story should be your focus.

      Checklist for delivering a captivating presentation (continued)

      • Be deliberate in what you want to show your audience.
      • Ensure you have clean slides so the audience can focus on what you’re saying.
      • Practice delivering your content multiple times alone and in front of team members or your Info-Tech counselor, who can provide feedback.
      • How will you handle being derailed? Be prepared with a way to get back on track if you are derailed.
      • Ask for feedback.
      • Record yourself presenting.

      4.2 Obtain and verify support on security goals

      Once you’ve delivered your captivating presentation, it’s imperative to communicate with your executive stakeholders.

      • This is your opportunity to open the floor for questions and clarify any information that was conveyed to your audience.
      • Leverage your appendix and other supporting documents to justify your goals.
      • Different approaches to obtaining and verifying your goals could include:
        • Acknowledgment from the audience that information communicated aligns with the business’s goals.
        • Approval of funding requests for security initiatives.
        • Written and verbal support for implementation of security initiatives.
        • Identifying next steps for information to communicate at the next executive stakeholder meeting.

      Info-Tech Insight
      Verifying your objectives at the end of the presentation is important, as it ensures you have successfully communicated to executive stakeholders.

      Checklist for obtaining and verify support on security goals

      Follow this checklist to assist you in obtaining and verifying your communication goals.

      Checklist:

      • Be clear about follow-up and next steps if applicable.
      • Present before you present: Meet with your executive stakeholders before the meeting to review and discuss your presentation and other supporting material and ensure you have executive/CEO buy-in.
      • “Be humble, but don’t crumble” – demonstrate to the executive stakeholders that you are an expert while admitting you don’t know everything. However, don’t be afraid to provide your POV and defend it if need be. Strike the right balance to ensure the board has confidence in you while building a strong relationship.
      • Prioritize a discussion over a formal presentation. Create an environment where they feel like they are part of the solution.

      Summary of Accomplishment

      Problem Solved

      A better understanding of security communication drivers and goals

      • Understanding the difference between communication drivers and goals
      • Identifying your drivers and goals for security presentation

      A developed a plan for how and where to retrieve data for communication

      • Insights on what type of data can be leveraged to support your communication goals
      • Understanding who you can collaborate with and potential data sources to retrieve data from

      A solidified communication plan with security templates to assist in better presenting to your audience

      • A guideline on how to prepare security presentations to executive stakeholders
      • A list of security templates that can be customized and used for various security presentations

      A defined guideline on how to deliver a captivating presentation to achieve your desired objectives

      • Clear message on best practices for delivering security presentations to executive stakeholders
      • Understanding how to verify your communication goals have been obtained

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Related Info-Tech Research

      Build an Information Security Strategy
      This blueprint will walk you through the steps of tailoring best practices to effectively manage information security.

      Build a Security Metrics Program to Drive Maturity
      This blueprint will assist you in identifying security metrics that can tie to your organizational goals and build those metrics to achieve your desired maturity level.

      Bibliography

      Bhadauriya, Amit S. “Communicating Cybersecurity Effectively to the Board.” Metricstream. Web.
      Booth, Steven, et al. “The Biggest Mistakes Made When Presenting Cyber Security to Senior Leadership or the Board, and How to Fix Them.” Mandiant, May 2019. Web.
      Bradford, Nate. “6 Slides Every CISO Should Use in Their Board Presentation.” Security Boulevard, 9 July 2020. Web.
      Buckalew, Lauren, et al. “Get the Board on Board: Leading Cybersecurity from the Top Down.” Newsroom, 2 Dec. 2019. Web.
      Burg, Dave, et al. “Cybersecurity: How Do You Rise above the Waves of a Perfect Storm?” EY US - Home, EY, 22 July 2021. Web.
      Carnegie Endowment for International Peace. Web.
      “Chief Information Security Officer Salary.” Salary.com, 2022. Web.
      “CISO's Guide to Reporting to the Board - Apex Assembly.” CISO's Guide To Reporting to the Board. Web.
      “Cyber Security Oversight in the Boardroom” KPMG, Jan. 2016. Web.
      “Cybersecurity CEO: My 3 Tips for Presenting in the Boardroom.” Cybercrime Magazine, 31 Mar. 2020. Web.
      Dacri , Bryana. Do's & Don'ts for Security Professionals Presenting to Executives. Feb. 2018. Web.
      Froehlich, Andrew. “7 Cybersecurity Metrics for the Board and How to Present Them: TechTarget.” Security, TechTarget, 19 Aug. 2022. Web.
      “Global Board Risk Survey.” EY. Web.
      “Guidance for CISOs Presenting to the C-Suite.” IANS, June 2021. Web.
      “How to Communicate Cybersecurity to the Board of Directors.” Cybersecurity Conferences & News, Seguro Group, 12 Mar. 2020. Web.
      Ide, R. William, and Amanda Leech. “A Cybersecurity Guide for Directors” Dentons. Web.
      Lindberg, Randy. “3 Tips for Communicating Cybersecurity to the Board.” Cybersecurity Software, Rivial Data Security, 8 Mar. 2022. Web.
      McLeod, Scott, et al. “How to Present Cybersecurity to Your Board of Directors.” Cybersecurity & Compliance Simplified, Apptega Inc, 9 Aug. 2021. Web.
      Mickle, Jirah. “A Recipe for Success: CISOs Share Top Tips for Successful Board Presentations.” Tenable®, 28 Nov. 2022. Web.
      Middlesworth, Jeff. “Top-down: Mitigating Cybersecurity Risks Starts with the Board.” Spiceworks, 13 Sept. 2022. Web.
      Mishra, Ruchika. “4 Things Every CISO Must Include in Their Board Presentation.” Security Boulevard, 17 Nov. 2020. Web.
      O’Donnell-Welch, Lindsey. “CISOs, Board Members and the Search for Cybersecurity Common Ground.” Decipher, 20 Oct. 2022. Web.

      Bibliography

      “Overseeing Cyber Risk: The Board's Role.” PwC, Jan. 2022. Web.
      Pearlson, Keri, and Nelson Novaes Neto. “7 Pressing Cybersecurity Questions Boards Need to Ask.” Harvard Business Review, 7 Mar. 2022. Web.
      “Reporting Cybersecurity Risk to the Board of Directors.” Web.
      “Reporting Cybersecurity to Your Board - Steps to Prepare.” Pondurance ,12 July 2022. Web.
      Staynings, Richard. “Presenting Cybersecurity to the Board.” Resource Library. Web.
      “The Future of Cyber Survey.” Deloitte, 29 Aug. 2022. Web.
      “Top Cybersecurity Metrics to Share with Your Board.” Packetlabs, 10 May 2022. Web.
      Unni, Ajay. “Reporting Cyber Security to the Board? How to Get It Right.” Cybersecurity Services Company in Australia & NZ, 10 Nov. 2022. Web.
      Vogel, Douglas, et al. “Persuasion and the Role of Visual Presentation Support.” Management Information Systems Research Center, 1986.
      “Welcome to the Cyber Security Toolkit for Boards.” NCSC. Web.

      Research Contributors

      • Fred Donatucci, New-Indy Containerboard, VP, Information Technology
      • Christian Rasmussen, St John Ambulance, Chief Information Officer
      • Stephen Rondeau, ZimVie, SVP, Chief Information Officer

      AI Trends 2023

      • Buy Link or Shortcode: {j2store}207|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Business Intelligence Strategy
      • Parent Category Link: /business-intelligence-strategy

      As AI technologies are constantly evolving, organizations are looking for AI trends and research developments to understand the future applications of AI in their industries.

      Our Advice

      Critical Insight

      • Understanding trends and the focus of current and future AI research helps to define how AI will drive an organization’s new strategic opportunities.
      • Understanding the potential application of AI and its promise can help plan the future investments in AI-powered technologies and systems.

      Impact and Result

      Understanding AI trends and developments enables an organization’s competitive advantage.

      AI Trends 2023 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. AI Trends 2023 – An overview of trends that will continue to drive AI innovation.

      • AI Trends Report 2023
      [infographic]

      Further reading

      AI Trends Report 2023

      The eight trends:

      1. Design for AI
      2. Event-Based Insights
      3. Synthetic Data
      4. Edge AI
      5. AI in Science and Engineering
      6. AI Reasoning
      7. Digital Twin
      8. Combinatorial Optimization
      Challenges that slowed the adoption of AI

      To overcome the challenges, enterprises adopted different strategies

      Data Readiness

      • Lack of unified systems and unified data
      • Data quality issues
      • Lack of the right data required for machine learning
      • Improve data management capabilities, including data governance and data initiatives
      • Create data catalogs
      • Document data and information architecture
      • Solve data-related problems including data quality, privacy, and ethics

      ML Operations Capabilities

      • Lack of tools, technologies, and methodologies to operationalize models created by data scientists
      • Increase availability of cloud platforms, tools, and capabilities
      • Develop and grow machine learning operations (MLOps) tools, platforms, and methodologies to enable model operationalizing and monitoring in production

      Understanding of AI Role and Its Business Value

      • Lack of understanding of AI use cases – how AI/ML can be applied to solve specific business problems
      • Lack of understanding how to define the business value of AI investments
      • Identify AI C-suite toolkits (for example, Empowering AI Leadership from the World Economic Forum, 2022)
      • Document industry use cases
      • Use frameworks and tools to define business value for AI investments

      Design for AI

      Sustainable AI system design needs to consider several aspects: the business application of the system, data, software and hardware, governance, privacy, and security.

      It is important to define from the beginning how AI will be used by and for the application to clearly articulate business value, manage expectations, and set goals for the implementation.

      Design for AI will change how we store and manage data and how we approach the use of data for development and operation of AI systems.

      An AI system design approach should cover all stages of AI lifecycle, from design to maintenance. It should also support and enable iterative development of an AI system.

      To take advantage of different tools and technologies for AI system development, deployment, and monitoring, the design of an AI system should consider software and hardware needs and design for seamless and efficient integrations of all components of the system and with other existing systems within the enterprise.

      AI in Science and Engineering

      AI helps sequence genomes to identify variants in a person’s DNA that indicate genetic disorders. It allows researchers to model and calculate complicated physics processes, to forecast the genesis of the universe’s structure, and to understand planet ecosystem to help advance the climate research. AI drives advances in drug discovery and can assist with molecule synthesis and molecular property identification.

      AI finds application in all areas of science and engineering. The role of AI in science will grow and allow scientists to innovate faster.

      AI will further contribute to scientific understanding by assisting scientists in deriving new insights, generating new ideas and connections, generalizing scientific concepts, and transferring them between areas of scientific research.

      Using synthetic data and combining physical and machine learning models and other advances of AI/ML – such as graphs, use of unstructured data (language models), and computer vision – will accelerate the use of AI in science and engineering.

      Event- and Scenario-Driven AI

      AI-driven signal-gathering systems analyze a continuous stream of data to generate insights and predictions that enable strategic decision modeling and scenario planning by providing understanding of how and what areas of business might be impacted by certain events.

      AI enables the scenario-based approach to drive insights through pattern identification in addition to familiar pattern recognition, helping to understand how events are related.

      A system with anticipatory capabilities requires an event-driven architecture that enables gathering and analyzing different types of data (text, video, images) across multiple channels (social media, transactional systems, news feeds, etc.) for event-driven and event-sequencing modeling.

      ML simulation-based training of the model using advanced techniques under the umbrella of Reinforcement Learning in conjunction with statistically robust Bayesian probabilistic framework will aid in setting up future trends in AI.

      AI Reasoning

      Most of the applications of machine learning and AI today is about predicting future behaviors based on historical data and past behaviors. We can predict what product the customer would most likely buy or the price of a house when it goes on sale.

      Most of the current algorithms use the correlation between different parameters to make a prediction, for example, the correlation between the event and the outcome can look like “When X occurs, we can predict that Y will occur.” This, however, does not translate into “Y occurred because of X.”

      The development of a causal AI that uses causal inference to reason and identify the root cause and the causal relationships between variables without mistaking correlation and causation is still in its early stages but rapidly evolving.

      Some of the algorithms that the researchers are working with are casual graph models and algorithms that are at the intersection of causal inference with decision making and reinforcement learning (Causal Artificial Intelligence Lab, 2022).

      Synthetic Data

      Synthetic data is artificially generated data that mimics the structure of real-life data. It should also have the same mathematical and statistical properties as the real-world data that it is created to replicate.

      Synthetic data is used to train machine learning models when there is not enough real data or the existing data does not meet specific needs. It allows users to remove contextual bias from data sets containing personal data, prevent privacy concerns, and ensure compliance with privacy laws and regulations.

      Another application of synthetic data is solving data-sharing challenges.

      Researchers learned that quite often synthetic data sets outperform real-world data. Recently, a team of researchers at MIT built a synthetic data set of 150,000 video clips capturing human actions and used that data set to train the model. The researchers found that “the synthetically trained models performed even better than models trained on real data for videos that have fewer background objects” (MIT News Office, 2022).

      Today, synthetic data is used in language systems, in training self-driving cars, in improving fraud detection, and in clinical research, just to name a few examples.

      Synthetic data opens the doors for innovation across all industries and applications of AI by enabling access to data for any scenario and technology and business needs.

      Digital Twins

      Digital twins (DT) are virtual replicas of physical objects, devices, people, places, processes, and systems. In Manufacturing, almost every product and manufacturing process can have a complete digital replica of itself thanks to IoT, streaming data, and cheap cloud storage.

      All this data has allowed for complex simulations of, for example, how a piece of equipment will perform over time to predict future failures before they happen, reducing costly maintenance and extending equipment lifetime.

      In addition to predictive maintenance, DT and AI technologies have enabled organizations to design and digitally test complex equipment such as aircraft engines, trains, offshore oil platforms, and wind turbines before physically manufacturing them. This helps to improve product and process quality, manufacturing efficiency, and costs. DT technology also finds applications in architecture, construction, energy, infrastructure industries, and even retail.

      Digital twins combined with the metaverse provide a collaborative and interactive environment with immersive experience and real-time physics capabilities (as an example, Siemens presented an Immersive Digital Twin of a Plant at the Collision 2022 conference).

      Future trends include enabling autonomous behavior of a DT. An advanced DT can replicate itself as it moves into several devices, hence requiring the autonomous property. Such autonomous behavior of the DT will in turn influence the growth and further advancement of AI.

      Edge AI

      A simple definition for edge AI: A combination of edge computing and artificial intelligence, it enables the deployment of AI applications in devices of the physical world, in the field, where the data is located, such as IoT devices, devices on the manufacturing floor, healthcare devices, or a self-driving car.

      Edge AI integrates AI into edge computing devices for quicker and improved data processing and smart automation.

      The main benefits of edge AI include:

      • Real-time data processing capabilities to reduce latency and enable near real-time analytics and insights.
      • Reduced cost and bandwidth requirements as there is no need to transfer data to the cloud for computing.
      • Increased data security as the data is processed locally, on the device, reducing the risk of loss of sensitive data.
      • Improved automation by training machines to perform automated tasks.

      Edge AI is already used in a variety of applications and use cases including computer vision, geospatial intelligence, object detection, drones, and health monitoring devices.

      Combinatorial Optimization

      “Combinatorial optimization is a subfield of mathematical optimization that consists of finding an optimal object from a finite set of objects” (Wikipedia, retrieved December 2022).

      Applications of combinatorial optimization include:

      • Supply chain optimization
      • Scheduling and logistics, for example, vehicle routing where the trucks are making stops for pickup and deliveries
      • Operations optimization

      Classical combinatorial optimization (CO) techniques were widely used in operations research and played a major role in earlier developments of AI.

      The introduction of deep learning algorithms in recent years allowed researchers to combine neural network and conventional optimization algorithms; for example, incorporating neural combinatorial optimization algorithms in the conventional optimization framework. Researchers confirmed that certain combinations of these frameworks and algorithms can provide significant performance improvements.

      The research in this space continues and we look forward to learning how machine learning and AI (backtracking algorithms, reinforcement learning, deep learning, graph attention networks, and others) will be used for solving challenging combinatorial and decision-making problems.

      References

      “AI Can Power Scenario Planning for Real-Time Strategic Insights.” The Wall Street Journal, CFO Journal, content by Deloitte, 7 June 2021. Accessed 11 Dec. 2022.
      Ali Fdal, Omar. “Synthetic Data: 4 Use Cases in Modern Enterprises.” DATAVERSITY, 5 May 2022. Accessed
      11 Dec. 2022.
      Andrews, Gerard. “What Is Synthetic Data?” NVIDIA, 8 June 2021. Accessed 11 Dec. 2022.
      Bareinboim, Elias. “Causal Reinforcement Learning.” Causal AI, 2020. Accessed 11 Dec. 2022.
      Bengio, Yoshua, Andrea Lodi, and Antoine Prouvost. “Machine learning for combinatorial optimization: A methodological tour d’horizon.” European Journal of Operational Research, vol. 290, no. 2, 2021, pp. 405-421, https://doi.org/10.1016/j.ejor.2020.07.063. Accessed 11 Dec. 2022.
      Benjamins, Richard. “Four design principles for developing sustainable AI applications.” Telefónica S.A., 10 Sept. 2018. Accessed on 11 Dec. 2022.
      Blades, Robin. “AI Generates Hypotheses Human Scientists Have Not Thought Of.” Scientific American, 28 October 2021. Accessed 11 Dec. 2022.
      “Combinatorial Optimization.” Wikipedia article, Accessed 11 Dec. 2022.
      Cronholm, Stefan, and Hannes Göbel. “Design Principles for Human-Centred Artificial Intelligence.” University of Borås, Sweden, 11 Aug. 2022. Accessed on 11 Dec. 2022
      Devaux, Elise. “Types of synthetic data and 4 real-life examples.” Statice, 29 May 2022. Accessed 11 Dec. 2022.
      Emmental, Russell. “A Guide to Causal AI.” ITBriefcase, 30 March 2022. Accessed 11 Dec. 2022.
      “Empowering AI Leadership: AI C-Suite Toolkit.” World Economic Forum, 12 Jan. 2022. Accessed 11 Dec 2022.
      Falk, Dan. “How Artificial Intelligence Is Changing Science.” Quanta Magazine, 11 March 2019. Accessed 11 Dec. 2022.
      Fritschle, Matthew J. “The Principles of Designing AI for Humans.” Aumcore, 17 Aug. 2018. Accessed 8 Dec. 2022.
      Garmendia, Andoni I., et al. Neural Combinatorial Optimization: a New Player in the Field.” IEEE, arXiv:2205.01356v1, 3 May 2022. Accessed 11 Dec. 2022.
      Gülen, Kerem. “AI Is Revolutionizing Every Field and Science is no Exception.” Dataconomy Media GmbH, 9 Nov. 9, 2022. Accessed 11 Dec. 2022
      Krenn, Mario, et al. “On scientific understanding with artificial intelligence.” Nature Reviews Physics, vol. 4, 11 Oct. 2022, pp. 761–769. https://doi.org/10.1038/s42254-022-00518-3. Accessed 11 Dec. 2022.
      Laboratory for Information and Decision Systems. “The real promise of synthetic data.” MIT News, 16 Oct. 2020. Accessed 11 Dec. 2022.
      Lecca, Paola. “Machine Learning for Causal Inference in Biological Networks: Perspectives of This Challenge.” Frontiers, 22 Sept. 2021. Accessed 11 Dec. 2022. Mirabella, Lucia. “Digital Twin x Metaverse: real and virtual made easy.” Siemens presentation at Collision 2022 conference, Toronto, Ontario. Accessed 11 Dec. 2022. Mitchum, Rob, and Louise Lerner. “How AI could change science.” University of Chicago News, 1 Oct. 2019. Accessed 11 Dec. 2022.
      Okeke, Franklin. “The benefits of edge AI.” TechRepublic, 22 Sept. 2022, Accessed 11 Dec. 2022.
      Perlmutter, Nathan. “Machine Learning and Combinatorial Optimization Problems.” Crater Labs, 31 July 31, 2019. Accessed 11 Dec. 2022.
      Sampson, Ovetta. “Design Principles for a New AI World.” UX Magazine, 6 Jan. 2022. Accessed 11 Dec. 2022.
      Sgaier, Sema K., Vincent Huang, and Grace Charles. “The Case for Causal AI.” Stanford Social Innovation Review, Summer 2020. Accessed 11 Dec. 2022.
      “Synthetic Data.” Wikipedia article, Accessed 11 Dec. 2022.
      Take, Marius, et al. “Software Design Patterns for AI-Systems.” EMISA Workshop 2021, CEUR-WS.org, Proceedings 30. Accessed 11 Dec. 2022.
      Toews, Rob. “Synthetic Data Is About To Transform Artificial Intelligence.” Forbes, 12 June 2022. Accessed
      11 Dec. 2022.
      Zewe, Adam. “In machine learning, synthetic data can offer real performance improvements.” MIT News Office, 3 Nov. 2022. Accessed 11 Dec. 2022.
      Zhang, Junzhe, and Elias Bareinboim. “Can Humans Be out of the Loop?” Technical Report, Department of Computer Science, Columbia University, NY, June 2022. Accessed 11 Dec. 2022.

      Contributors

      Irina Sedenko Anu Ganesh Amir Feizpour David Glazer Delina Ivanova

      Irina Sedenko

      Advisory Director

      Info-Tech

      Anu Ganesh

      Technical Counselor

      Info-Tech

      Amir Feizpour

      Co-Founder & CEO

      Aggregate Intellect Inc.

      David Glazer

      VP of Analytics

      Kroll

      Delina Ivanova

      Associate Director, Data & Analytics

      HelloFresh

      Usman Lakhani

      DevOps

      WeCloudData

      Develop a COVID-19 Pandemic Response Plan

      • Buy Link or Shortcode: {j2store}420|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: DR and Business Continuity
      • Parent Category Link: /business-continuity
      • IT departments are being asked to rapidly ramp up work-from-home capabilities and other business process workarounds.
      • Crisis managers are experiencing a pandemic more severe than what they’ve managed in the past.
      • Organizations are scrambling to determine how they can keep their businesses running through this pandemic.

      Our Advice

      Critical Insight

      • Obstacles to working from home go beyond internet speed and needing a laptop. Business input is critical to uncover unexpected obstacles.
      • IT needs to address a range of issues from security risk to increased service desk demand from users who don’t normally work from home.
      • Resist the temptation to bypass IT processes – your future-self will thank you for tracking all those assets about to go out the door.

      Impact and Result

      • Start with crisis management fundamentals – identify crisis management roles and exercise appropriate crisis communication.
      • Prioritize business processes and work-from-home requirements. Not everyone can be set up on day one.
      • Don’t over-complicate your work-from-home deployment plan. A simple spreadsheet (see the Work-from-Home Requirements Tool) to track requirements can be very effective.

      Develop a COVID-19 Pandemic Response Plan Research & Tools

      Start here

      Stay up to date on COVID-19 and the resources available to you.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Develop a COVID-19 Pandemic Response Plan Storyboard

      1. Manage the pandemic crisis

      Identify key roles and immediate steps to manage this crisis.

      • Pandemic Response Plan Example

      2. Create IT’s plan to support the pandemic response plan

      Plan the deployment of a work-from-home initiative.

      • Work-From-Home Requirements Tool
      [infographic]

      Design Data-as-a-Service

      • Buy Link or Shortcode: {j2store}129|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $1,007 Average $ Saved
      • member rating average days saved: 31 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Lack of a consistent approach in accessing internal and external data within the organization and sharing data with third parties.
      • Data consumed by most organizations lacks proper data quality, data certification, standards tractability, and lineage.
      • Organizations are looking for guidance in terms of readily accessible data from others and data that can be shared with others or monetized.

      Our Advice

      Critical Insight

      • Despite data being everywhere, most organizations struggle to find accurate, trustworthy, and meaningful data when required.
      • Connecting to data should be as easy as connecting to the internet. This is achievable if all organizations start participating in the data marketplace ecosystem by leveraging a Data-as-a-Service (DaaS) framework.

      Impact and Result

      • Data marketplaces facilitate data sharing between the data producer and the data consumer. The data product must be carefully designed to truly benefit in today’s connected data ecosystem.
      • Follow Info-Tech’s step-by-step approach to establish your DaaS framework:
        1. Understand Data Ecosystem
        2. Design Data Products
        3. Establish DaaS framework

      Design Data-as-a-Service Research & Tools

      Start here – Read the Executive Brief

      Read our concise Executive Brief to find out why you should design Data-as-a-Service (DaaS), review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand data ecosystem

      Provide clear benefits of adopting the DaaS framework and solid rationale for moving towards a more connected data ecosystem and avoiding data silos.

      • Design Data-as-a-Service – Phase 1: Understand Data Ecosystem

      2. Design data product

      Leverage design thinking methodology and templates to document your most important data products.

      • Design Data-as-a-Service – Phase 2: Design Data Product

      3. Establish a DaaS framework

      Capture internal and external data sources critical to data products success for the organization and document an end-to-end DaaS framework.

      • Design Data-as-a-Service – Phase 3: Establish a DaaS Framework
      [infographic]

      Workshop: Design Data-as-a-Service

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Data Marketplace and DaaS Explained

      The Purpose

      The purpose of this module is to provide a clear understanding of the key concepts such as data marketplace, data sharing, and data products.

      Key Benefits Achieved

      This module will provide clear benefits of adopting the DaaS framework and solid rationale for moving towards a more connected data ecosystem and avoiding data silos.

      Activities

      1.1 Review the business context

      1.2 Understand the data ecosystem

      1.3 Draft products ideas and use cases

      1.4 Capture data product metrics

      Outputs

      Data product ideas

      Data sharing use cases

      Data product metrics

      2 Design Data Product

      The Purpose

      The purpose of this module is to leverage design thinking methodology and templates to document the most important data products.

      Key Benefits Achieved

      Data products design that incorporates end-to-end customer journey and stakeholder map.

      Activities

      2.1 Create a stakeholder map

      2.2 Establish a persona

      2.3 Data consumer journey map

      2.4 Document data product design

      Outputs

      Data product design

      3 Assess Data Sources

      The Purpose

      The purpose of this module is to capture internal and external data sources critical to data product success.

      Key Benefits Achieved

      Break down silos by integrating internal and external data sources

      Activities

      3.1 Review the conceptual data model

      3.2 Map internal and external data sources

      3.3 Document data sources

      Outputs

      Internal and external data sources relationship map

      4 Establish a DaaS Framework

      The Purpose

      The purpose of this module is to document end-to-end DaaS framework.

      Key Benefits Achieved

      End-to-end framework that breaks down silos and enables data product that can be exchanged for long-term success.

      Activities

      4.1 Design target state DaaS framework

      4.2 Document DaaS framework

      4.3 Assess the gaps between current and target environments

      4.4 Brainstorm initiatives to develop DaaS capabilities

      Outputs

      Target DaaS framework

      DaaS initiative

      Master Contract Review and Negotiation for Software Agreements

      • Buy Link or Shortcode: {j2store}170|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Internal stakeholders usually have different – and often conflicting – needs and expectations that require careful facilitation and management.
      • Vendors have well-honed negotiating strategies. Without understanding your own position and leverage points, it’s difficult to withstand their persuasive – and sometimes pushy – tactics.
      • Software – and software licensing – is constantly changing, making it difficult to acquire and retain subject matter expertise.

      Our Advice

      Critical Insight

      • Conservatively, it’s possible to save 5% of the overall IT budget through comprehensive software contract review.
      • Focus on the terms and conditions, not just the price.
      • Learning to negotiate is crucial.

      Impact and Result

      • Look at your contract holistically to find cost savings.
      • Guide communication between vendors and your organization for the duration of contract negotiations.
      • Redline the terms and conditions of your software contract.
      • Prioritize crucial terms and conditions to negotiate.

      Master Contract Review and Negotiation for Software Agreements Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to redline and negotiate your software agreement, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Gather requirements

      Build and manage your stakeholder team, then document your business use case.

      • Master Contract Review and Negotiation for Software Agreements – Phase 1: Gather Requirements
      • RASCI Chart
      • Vendor Communication Management Plan
      • Software Business Use Case Template
      • SaaS TCO Calculator

      2. Redline contract

      Redline your proposed software contract.

      • Master Contract Review and Negotiation for Software Agreements – Phase 2: Redline Contract
      • Software Terms & Conditions Evaluation Tool
      • Software Buyer's Checklist

      3. Negotiate contract

      Create a thorough negotiation plan.

      • Master Contract Review and Negotiation for Software Agreements – Phase 3: Negotiate Contract
      • Controlled Vendor Communications Letter
      • Key Vendor Fiscal Year End Calendar
      • Contract Negotiation Tactics Playbook
      [infographic]

      Workshop: Master Contract Review and Negotiation for Software Agreements

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Collect and Review Data

      The Purpose

      Assemble documentation.

      Key Benefits Achieved

      Understand current position before going forward.

      Activities

      1.1 Assemble existing contracts.

      1.2 Document their strategic and tactical objectives.

      1.3 Identify current status of the vendor relationship and any historical context.

      1.4 Clarify goals for ideal future state.

      Outputs

      Business Use Case

      2 Define Business Use Case and Build Stakeholder Team

      The Purpose

      Define business use case and build stakeholder team.

      Key Benefits Achieved

      Create business use case to document functional and nonfunctional requirements.

      Build internal cross-functional stakeholder team to negotiate contract.

      Activities

      2.1 Establish negotiation team and define roles.

      2.2 Write communication plan.

      2.3 Complete business use case.

      Outputs

      RASCI Chart

      Vendor Communication Management Plan

      SaaS TCO Calculator

      Software Business Use Case

      3 Redline Contract

      The Purpose

      Examine terms and conditions and prioritize for negotiation.

      Key Benefits Achieved

      Discover cost savings.

      Improve agreement terms.

      Prioritize terms for negotiation.

      Activities

      3.1 Review general terms and conditions.

      3.2 Review license- and application-specific terms and conditions.

      3.3 Match to business and technical requirements.

      3.4 Redline agreement.

      Outputs

      Software Terms & Conditions Evaluation Tool

      Software Buyer’s Checklist

      4 Build Negotiation Strategy

      The Purpose

      Create a negotiation strategy.

      Key Benefits Achieved

      Establish controlled communication.

      Choose negotiation tactics.

      Plot negotiation timeline.

      Activities

      4.1 Review vendor- and application-specific negotiation tactics.

      4.2 Build negotiation strategy.

      Outputs

      Contract Negotiation Tactics Playbook

      Controlled Vendor Communications Letter

      Key Vendor Fiscal Year End Calendar

      Build a Value Measurement Framework

      • Buy Link or Shortcode: {j2store}182|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $82,374 Average $ Saved
      • member rating average days saved: 35 Average Days Saved
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Rapid changes in today’s market require rapid, value-based decisions, and organizations that lack a shared definition of value fail to maintain their competitive advantage.
      • Different parts of an organization have different value drivers that must be given balanced consideration.
      • Focusing solely on revenue ignores the full extent of value creation in your organization and does not necessarily result in the right outcomes.

      Our Advice

      Critical Insight

      • Business is the authority on business value. While IT can identify some sources of value, business stakeholders must participate in the creation of a definition that is meaningful to the whole organization.
      • It’s about more than profit. Organizations must have a definition that encompasses all of the sources of value or they risk making short-term decisions with long-term negative impacts.
      • Technology creates business value. Treating IT as a cost center makes for short-sighted decisions in a world where every business process is enabled by technology.

      Impact and Result

      • Standardize your definition of business value. Work with your business partners to define the different sources of business value that are created through technology-enabled products and services.
      • Weigh your value drivers. Ensure that business and IT understand the relative weight and priority of the different sources of business value you have identified.
      • Use a balanced scorecard to understand value. Use the different value drivers to understand and prioritize different products, applications, projects, initiatives, and enhancements.

      Build a Value Measurement Framework Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to understand why building a consistent and aligned framework to measure the value of your products and services is vital for setting priorities and getting the business on board.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define your value drivers

      This phase will help you define and weigh value drivers based on overarching organizational priorities and goals.

      • Build a Value Measurement Framework – Phase 1: Define Your Value Drivers
      • Value Calculator

      2. Measure value

      This phase will help you analyze the value sources of your products and services and their alignment to value drivers to produce a value score that you can use for prioritization.

      • Build a Value Measurement Framework – Phase 2: Measure Value
      [infographic]

      Further reading

      Build a Value Measurement Framework

      Focus product delivery on business value–driven outcomes.

      ANALYST PERSPECTIVE

      "A meaningful measurable definition of value is the key to effectively managing the intake, prioritization, and delivery of technology-enabled products and services."

      Cole Cioran,

      Senior Director, Research – Application Development and Portfolio Management

      Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • CIOs who need to understand the value IT creates
      • Application leaders who need to make good decisions on what work to prioritize and deliver
      • Application and project portfolio managers who need to ensure the portfolio creates business value
      • Product owners who are accountable for delivering value

      This Research Will Help You:

      • Define quality in your organization’s context from both business and IT perspectives.
      • Define a repeatable process to understand the value of a product, application, project, initiative, or enhancement.
      • Define value sources and metrics.
      • Create a tool to make it easier to balance different sources of value.

      This Research Will Also Assist:

      • Product and application delivery teams who want to make better decisions about what they deliver
      • Business analysts who need to make better decisions about how to prioritize their requirements

      This Research Will Help Them:

      • Create a meaningful relationship with business partners around what creates value for the organization.
      • Enable better understanding of your customers and their needs.

      Executive summary

      Situation

      • Measuring the business value provided by IT is critical for improving the relationship between business and IT.
      • Rapid changes in today’s market require rapid, value-based decisions.
      • Every organization has unique drivers that make it difficult to see the benefits based on time and impact approaches to prioritization.

      Complication

      • An organization’s lack of a shared definition of value leads to politics and decision making that does not have a firm, quantitative basis.
      • Different parts of an organization have different value drivers that must be given balanced consideration.
      • Focusing solely on revenue does not necessarily result in the right outcomes.

      Resolution

      • Standardize your definition of business value. Work with your business partners to define the different sources of business value that are created through technology-enabled products and services.
      • Weigh your value drivers. Ensure business and IT understand the relative weight and priority of the different sources of business value you have identified.
      • Use a balanced scorecard to understand value. Use the different value drivers to understand and prioritize different products, applications, projects, initiatives, and enhancements.

      Info-Tech Insight

      1. Business is the authority on business value. While IT can identify some sources of value, business stakeholders must participate in the creation of a definition that is meaningful to the whole organization.
      2. It’s about more than profit. Organizations must have a definition that encompasses all of the sources of value, or they risk making short-term decisions with long-term negative impacts.
      3. Technology creates business value. Treating IT as a cost center makes for short-sighted decisions in a world where every business process is enabled by technology.

      Software is not currently creating the right outcomes

      Software products are taking more and more out of IT budgets.

      38% of spend on IT employees goes to software roles.

      Source: Info-Tech’s Staffing Survey

      18% of opex is spent on software licenses.

      Source: SoftwareReviews.com

      33% of capex is spent on new software.

      However, the reception and value of software products do not justify the money invested.

      Only 34% of software is rated as both important and effective by users.

      Source: Info-Tech’s CIO Business Vision

      IT benchmarks do not help or matter to the business. Focus on the metrics that represent business outcomes.

      A pie chart is shown as an example to show how benchmarks do not help the business.

      IT departments have a tendency to measure only their own role-based activities and deliverables, which only prove useful for selling practice improvement services. Technology doesn’t exist for technology's sake. It’s in place to generate specific outcomes. IT and the business need to be aligned toward a common goal of enabling business outcomes, and that’s the important measurement.

      "In today’s connected world, IT and business must not speak different languages. "

      – Cognizant, 2017

      CxOs stress the importance of value as the most critical area for IT to improve reporting

      A bar graph is shown to demonstrate the CxOs importance of value. Business value metrics are 32% of significant improvement necessary, and 51% where some improvement is necessary.

      N=469 CxOs from Info-Tech’s CEO/CIO Alignment Diagnostic

      Key stakeholders want to know how you and your products or services help them realize their goals.

      While the basics of value are clear, few take the time to reach a common definition and means to measure and apply value

      Often, IT misses the opportunity to become a strategic partner because it doesn’t understand how to communicate and measure its value to the business.

      "Price is what you pay. Value is what you get."

      – Warren Buffett

      Being able to understand the value context will allow IT to articulate where IT spend supports business value and how it enables business goal achievement.

      Value is...

      Derived from business context

    • What is our business context?
    • Enabled through governance and strategy

    • Who sees the strategy through?
    • The underlying context for decision making

    • How is value applied to support decisions?
    • A measure of achievement

    • How do I measure?
    • Determine your business context by assessing the goals and defining the unique value drivers in your organization

      Competent organizations know that value cannot always be represented by revenue or reduced expenses. However, it is not always apparent how to envision the full spectrum of sources of value. Dissecting value by the benefit type and the value source’s orientation allows you to see the many ways in which a product or service brings value to the organization.

      A business value matrix is shown. It shows the relationship between reading customers, increase revenue, reduce costs, and enhance services.

      Financial Benefits vs. Improved Capabilities

      Financial Benefits refers to the degree to which the value source can be measured through monetary metrics and is often quite tangible. Human Benefits refers to how a product or service can deliver value through a user’s experience.

      Inward vs. Outward Orientation

      Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations.Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.

      Increase Revenue

      Reduce Costs

      Enhance Services

      Reach Customers

      Product or service functions that are specifically related to the impact on your organization’s ability to generate revenue.

      Reduction of overhead. They typically are less related to broad strategic vision or goals and more simply limit expenses that would occur had the product or service not been put in place.

      Functions that enable business capabilities that improve the organization’s ability to perform its internal operations.

      Application functions that enable and improve the interaction with customers or produce market information and insights.

      See your strategy through by involving both IT and the business

      Buy-in for your IT strategy comes from the ability to showcase value. IT needs to ensure it has an aligned understanding of what is valuable to the organization.

      Business value needs to first be established by the business. After that, IT can build a partnership with the business to determine what that value means in the context of IT products and services.

      The Business

      What the Business and IT have in common

      IT

      Keepers of the organization’s mission, vision, and value statements that define IT success. The business maintains the overall ownership and evaluation of the products along with those most familiar with the capabilities or processes enabled by technology.

      Business Value of Products and Services

      Technical subject matter experts of the products and services they deliver and maintain. Each IT function works together to ensure quality products and services are delivered up to stakeholder expectations.

      Measure your product or services with Info-Tech’s Value Measurement Framework (VMF) and value scores

      The VMF provides a consistent and less subjective approach to generating a value score for an application, product, service, or individual feature, by using business-defined value drivers and product-specific value metrics.

      Info-Tech's Value Measurement Framework is shown.

      A consistent set of established value drivers, sources, and metrics gives more accurate comparisons of relative value

      Value Drivers

      Value Sources

      Value Fulfillment Metrics

      Broad categories of values, weighed and prioritized based on overarching goals

      Instances of created value expressed as a “business outcome” of a particular function

      Units of measurement and estimated targets linked to a value source

      Reach Customers

      Customer Satisfaction

      Net Promoter Score

      Customer Loyalty

      # of Repeat Visits

      Create Revenue Streams

      Data Monetization

      Dollars Derived From Data Sales

      Leads Generation

      Leads Conversation Rate

      Operational Efficiency

      Operational Efficiency

      Number of Interactions

      Workflow Management

      Cycle Time

      Adhere to regulations & compliance

      Number of Policy Exceptions

      A balanced and weighted scorecard allows you to measure the various ways products generate value to the business

      The Info-Tech approach to measuring value applies the balanced value scorecard approach.

      Importance of value source

      X

      Impact of value source

      = Value Score

      Which is based on…

      Which is based on…

      Alignment to value driver

      Realistic targets for the KPI

      Which is weighed by…

      Which is estimated by…

      A 1-5 scale of the relative importance of the value driver to the organization

      A 1-5 scale of the application or feature’s ability to fulfill that value source

      +

      Importance of Value Source

      X

      Impact of Value Source

      +

      Importance of Value Source

      +

      Impact of Value Source

      +

      Importance of Value Source

      +

      Impact of Value Source

      +

      Importance of Value Source

      +

      Impact of Value Source

      =

      Balanced Business Value Score

      Value Score1 + VS2 + … + VSN = Overall Balance Value Score

      Value scores help support decisions. This blueprint looks specifically at four use cases for value scores.

      A value score is an input to the following activities:

      1. Prioritize Your Product Backlog
      2. Estimate the relative value of different product backlog items (i.e. epics, features, etc.) to ensure the highest value items are completed first.

        This blueprint can be used as an input into Info-Tech’s Build a Better Backlog.

      3. Prioritize Your Project Backlog
      4. Estimate the relative value of proposed new applications or major changes or enhancements to existing applications to ensure the right projects are selected and completed first.

        This blueprint can be used as an input into Info-Tech’s Optimize Project Intake, Approval, and Prioritization.

      5. Rationalize Your Applications
      6. Gauge the relative value from the current use of your applications to support strategic decision making such as retirement, consolidation, and further investments.

        This blueprint can be used as an input into Info-Tech’s Visualize Your Application Portfolio Strategy With a Business Value-Driven Roadmap.

      7. Categorize Application Tiers
      8. Gauge the relative value of your existing applications to distinguish your most to least important systems and build tailored support structures that limit the downtime of key value sources.

        This blueprint can be used as an input into Info-Tech’s Streamline Application Maintenance.

      The priorities, metrics, and a common understanding of value in your VMF carry over to many other Info-Tech blueprints

      Transition to Product Delivery

      Build a Product Roadmap

      Modernize Your SDLC

      Build a Strong Foundation for Quality

      Implement Agile Practices That Work

      Use Info-Tech’s Value Calculator

      The Value Calculator facilitates the activities surrounding defining and measuring the business value of your products and services.

      Use this tool to:

      • Weigh the importance of each Value Driver based on established organizational priorities.
      • Create a repository for Value Sources to provide consistency throughout each measurement.
      • Produce an Overall Balanced Value Score for a specific item.

      Info-Tech Deliverable

      A screenshot of Info-Tech's Value Calculator is shown.

      Populate the Value Calculator as you complete the activities and steps on the following slides.

      Limitations of the Value Measurement Framework

      "All models are wrong, but some are useful."

      – George E.P. Box, 1979

      Value is tricky: Value can be intangible, ambiguous, and cause all sorts of confusion, with the multiple, and often conflicting, priorities any organization is sure to have. You won’t likely come to a unified understanding of value or an agreement on whether one thing is more valuable than something else. However, this doesn’t mean you shouldn’t try. The VMF provides a means to organize various priorities in a meaningful way and to assess the relative value of a product or service to guide managers and decision makers on the right track and keep alignment with the rest of the organization.

      Relative value vs. ROI: This assessment produces a score to determine the value of a product or service relative to other products or services. Its primary function is to prioritize similar items (projects, epics, requirements, etc.) as opposed to producing a monetary value that can directly justify cost and make the case for a positive ROI.

      Apply caution with metrics: We live in a metric-crazed era, where everything is believed to be measurable. While there is little debate over recent advances in data, analytics, and our ability to trace business activity, some goals are still quite intangible, and managers stumble trying to link these goals to a quantifiable data source.

      In applying the VMF Info-Tech urges you to remember that metrics are not a magical solution. They should be treated as a tool in your toolbox and are sometimes no more than a rough gauge of performance. Carefully assign metrics to your products and services and do not disregard the informed subjective perspective when SMART metrics are unavailable.

      "One of the deadly diseases of management is running a company on visible figures alone."

      – William Edwards Deming, 1982

      Info-Tech’s Build a Value Measurement Framework glossary of terms

      This blueprint discusses value in a variety of ways. Use our glossary of terms to understand our specific focus.

      Value Measurement Framework (VMF)

      A method of measuring relative value for a product or service, or the various components within a product or service, through the use of metrics and weighted organizational priorities.

      Value Driver

      A board organizational goal that acts as a category for many value sources.

      Value Source

      A specific business goal or outcome that business and product or service capabilities are designed to fulfill.

      Value Fulfillment

      The degree to which a product or service impacts a business outcome, ideally linked to a metric.

      Value Score

      A measurement of the value fulfillment factored by the weight of the corresponding value driver.

      Overall Balanced Value Score

      The combined value scores of all value sources linked to a product or service.

      Relative Value

      A comparison of value between two similar items (i.e. applications to applications, projects to projects, feature to feature).

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Build a Value Measurement Framework – project overview

      1. Define Your Value Drivers

      2. Measure Value

      Best-Practice Toolkit

      1.1 Identify your business value authorities.

      2.1 Define your value drivers.

      2.2 Weigh your value drivers.

      • Identify your product or service SMEs.
      • List your products or services items and components.
      • Identify your value sources.
      • Align to a value driver.
      • Assign metrics and gauge value fulfillment.

      Guided Implementations

      Identify the stakeholders who should be the authority on business value.

      Identify, define, and weigh the value drivers that will be used in your VMF and all proceeding value measurements.

      Identify the stakeholders who are the subject matter experts for your products or services.

      Measure the value of your products and services with value sources, fulfillment, and drivers.

      Outcome:

      • Value drivers and weights

      Outcome:

      • An initial list of reusable value sources and metrics
      • Value scores for your products or services

      Phase 1

      Define Your Value Drivers

      First determine your value drivers and add them to your VMF

      One of the main aspects of the VMF is to apply consistent and business-aligned weights to the products or services you will evaluate.

      This is why we establish your value drivers first:

      • Get the right executive-level “value authorities” to establish the overarching weights.
      • Build these into the backbone of the VMF to consistently apply to all your future measurements.
      An image of the Value Measure Framework is shown.

      Step 1.1: Identify Value Authorities

      Phase 1

      1.1: Identify Value Authorities

      1.2: Define Value Drivers

      Phase 2

      2.1: Identify Product or Service SMEs

      2.2: Measure Value

      This step will walk you through the following activities:

      • Identify your authorities on business value.

      This step involves the following participants:

      • Owners of your value measurement framework

      Outcomes of this step

      • Your list of targeted individuals to include in Step 2.1

      Business value is best defined and measured by the combined effort and perspective of both IT and the business

      Buy-in for your IT strategy comes from the ability to showcase value. IT needs to ensure it has an aligned understanding of what is valuable to the organization. First, priorities need to be established by the business. Second, IT can build a partnership with the business to determine what that value means in the context of IT products and services.

      The Business

      What the Business and IT have in common

      IT

      Keepers of the organization’s mission, vision, and value statements that define IT success. The business maintains the overall ownership and evaluation of the products along with those most familiar with the capabilities or processes enabled by technology.

      Business Value of Products and Services

      Technical subject matter experts of the products and services they deliver and maintain. Each IT function works together to ensure quality products and services are delivered up to stakeholder expectations.

      Engage key stakeholders to reach a consensus on organizational priorities and value drivers

      Engage these key players to create your value drivers:

      CEO: Who better holds the vision or mandate of the organization than its leader? Ideally, they are front and center for this discussion.

      CIO: IT must ensure that technical/practical considerations are taken into account when determining value.

      CFO: The CFO or designated representative will ensure that estimated costs and benefits can be used to manage the budgets.

      VPs: Application delivery and mgmt. is designed to generate value for the business. Senior management from business units must help define what that value is.

      Evaluators (PMO, PO, APM, etc.): Those primarily responsible for applying the VMF should be present and active in identifying and carefully defining your organization’s value drivers.

      Steering Committee: This established body, responsible for the strategic direction of the organization, is really the primary audience.

      Identify your authorities of business value to identify, define, and weigh value drivers

      1.1 Estimated Time: 15 minutes

      The objective of this exercise is to identify key business stakeholders involved in strategic decision making at an organizational level.

      1. Review your organization’s governance structure and any related materials.
      2. Identify your key business stakeholders. These individuals are the critical business strategic partners.
        1. Target those who represent the business at an organizational level and often comprise the organization’s governing bodies.
        2. Prioritize a product backlog – include product owners and product managers who are in tune with the specific value drivers of the product in question.

      INFO-TECH TIP

      If your organization does not have a formal governance structure, your stakeholders would be the key players in devising business strategy. For example:

      • CEO
      • CFO
      • BRMs
      • VPs

      Leverage your organizational chart, governing charter, and senior management knowledge to better identify key stakeholders.

      INPUT

      • Key decision maker roles

      OUTPUT

      • Targeted individuals to define and weigh value drivers

      Materials

      • N/A

      Participants

      • Owner of the value measurement framework

      Step 1.2: Define Value Drivers

      Phase 1

      1.1: Identify Value Authorities

      1.2: Define Value Drivers

      Phase 2

      2.1: Identify Product or Service SMEs

      2.2: Measure Value

      This step will walk you through the following activities:

      • Define your value drivers.
      • Weigh your value drivers.

      This step involves the following participants:

      • Owners of your value measurement framework
      • Authorities of business value

      Outcomes of this step

      • A list of your defined and weighted value drivers

      Value is based on business needs and vision

      Value is subjective. It is defined through the organization’s past achievement and its future objectives.

      Purpose & Mission

      Past Achievement & Current State

      Vision & Future State

      Culture & Leadership

      There must be a consensus view of what is valuable within the organization, and these values need to be shared across the enterprise. Instead of maintaining siloed views and fighting for priorities, all departments must have the same value and purpose in mind. These factors – purpose and mission, past achievement and current state, vision and future state, and culture and leadership – impact what is valuable to the organization.

      Value derives from the mission and vision of an organization; therefore, value is unique to each organization

      Business value represents what the business needs to do to achieve its target state. Establishing the mission and vision helps identify that target state.

      Mission

      Vision

      Business Value

      Why does the company exist?

      • Specify the company’s purpose, or reason for being, and use it to guide each day’s activities and decisions.

      What does the organization see itself becoming?

      • Identify the desired future state of the organization. The vision articulates the role the organization strives to play and the way it wants to be perceived by the customer.
      • State the ends, rather than the means, to get to the future state.

      What critical factors fulfill the mission and vision?

      • Articulate the important capabilities the business should have in order to achieve its objectives. All business activities must enable business value.
      • Communicate the means to achieve the mission and vision.

      Understand the many types of value your products or services produce

      Competent organizations know that value cannot always be represented by revenue or reduced expenses. However, it is not always apparent how to envision the full spectrum of value sources. Dissecting value by the benefit type and the value source’s orientation allows you to see the many ways in which a product or service brings value to the organization.

      A business value matrix is shown. It shows the relationship between reading customers, increase revenue, reduce costs, and enhance services.

      Financial Benefits vs. Improved Capabilities

      Financial Benefits refers to the degree to which the value source can be measured through monetary metrics and is often quite tangible. Human Benefits refers to how a product or service can deliver value through a user’s experience.

      Inward vs. Outward Orientation

      Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations. Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.

      Increase Revenue

      Reduce Costs

      Enhance Services

      Reach Customers

      Product or service functions that are specifically related to the impact on your organization’s ability to generate revenue.

      Reduction of overhead. They typically are less related to broad strategic vision or goals and more simply limit expenses that would occur had the product or service not been put in place.

      Functions that enable business capabilities that improve the organization’s ability to perform its internal operations.

      Application functions that enable and improve the interaction with customers or produce market information and insights.

      Expand past Info-Tech’s high-level value quadrants and identify the value drivers specific to your organization

      Different industries have a wide range of value drivers. Consider the difference between public and private entities with respect to generating revenue or reaching their customers or other external stakeholders. Even organizations in the same industry may have different values. For example, a mature, well-established manufacturer may view reputation and innovation as its highest-priority values, whereas a struggling manufacturer will see revenue or market share growth as its main drivers.

      Value Drivers

      Increase Revenue

      Reduce Costs

      Enhance Services

      Reach Customers

      • Revenue growth
      • Data monetization
      • Cost optimization
      • Labor reduction
      • Collaboration
      • Risk and compliance
      • Customer experience
      • Trust and reputation

      You do not need to dissect each quadrant into an exhaustive list of value drivers. Info-Tech recommends defining distinct value drivers only for the areas you’ve identified as critical to your organization’s core goals and objectives.

      Understand value drivers that enable revenue growth

      Direct Revenue

      This value driver is the ability of a product or service to directly produce revenue through core revenue streams.

      Can be derived from:

      • Creating revenue
      • Improving the revenue generation of an existing service
      • Preventing the loss of a revenue stream

      Be aware of the differences between your products and services that enable a revenue source and those that facilitate the flow of capital.

      Funding

      This value driver is the ability of a product or service to enable other types of funding unrelated to core revenue streams.

      Can be derived from:

      • Tax revenue
      • Fees, fines, and ticketing programs
      • Participating in government subsidy or grant programs

      Be aware of the difference between your products and services that enable a revenue source and those that facilitate the flow of capital.

      Scale & Growth

      In essence, this driver can be viewed as the potential for growth in market share or new developing revenue sources.

      Does the product or service:

      • Increase your market share
      • Help you maintain your market share

      Be cautious of which items you identify here, as many innovative activities may have some potential to generate future revenue. Stick to those with a strong connection to future revenue and don’t qualify for other value driver categories.

      Monetization of Assets

      This value driver is the ability of your products and services to generate additional assets.

      Can be derived from:

      • Sale of data
      • Sale of market or customer reports or analysis
      • Sale of IP

      This value source is often overlooked. If given the right attention, it can lead to a big win for IT’s role in the business.

      Understand value drivers that reduce costs

      Cost Reduction

      A cost reduction is a “hard” cost saving that is reflected as a tangible decrease to the bottom line.

      This can be derived from reduction of expenses such as:

      • Salaries and wages
      • Hardware/software maintenance
      • Infrastructure

      Cost reduction plays a critical role in an application’s ability to increase efficiency.

      Cost Avoidance

      A cost avoidance is a “soft” cost saving, typically achieved by preventing a cost from occurring in the first place (i.e. risk mitigation). Cost avoidance indirectly impacts the bottom line.

      This can be derived from prevention of expenses by:

      • Mitigating a business outage
      • Mitigating another risk event
      • Delaying a price increase

      Understand the value drivers that enhance your services

      Enable Core Operations

      Some applications are in place to facilitate and support the structure of the organization. These vary depending on the capabilities of your organization but should be assessed in relation to the organization’s culture and structure.

      • Enables a foundational capability
      • Enables a niche capability

      This example is intentionally broad, as “core operations” should be further dissected to define different capabilities with ranging priority.

      Compliance

      A product or service may be required in order to meet a regulatory requirement. In these cases, you need to be aware of the organizational risk of NOT implementing or maintaining a service in relation to those risks.

      In this case, the product or service is required in order to:

      • Prevent fines
      • Allow the organization to operate within a specific jurisdiction
      • Remediate audit gaps
      • Provide information required to validate compliance

      Internal Improvement

      An application’s ability to create value outside of its core operations and facilitate the transfer of information, insights, and knowledge.

      Value can be derived by:

      • Data analytics
      • Collaboration
      • Knowledge transfer
      • Organizational learning

      Innovation

      Innovation is typically an ill-defined value driver, as it refers to the ability of your products and services to explore new value streams.

      Consider:

      • Exploration into new markets and products
      • New methods of organizing resources and processes

      Innovation is one of the more divisive value drivers, as some organizations will strive to be cutting edge and others will want no part in taking such risks.

      Understand business value drivers that connect the business to your customers

      Policy

      Products and services can also be assessed in relation to whether they enable and support policies of the organization. Policies identify and reinforce required processes, organizational culture, and core values.

      Policy value can be derived from:

      • The service or initiative will produce outcomes in line with our core organizational values.
      • Products that enable sustainability and corporate social responsibility

      Experience

      Applications are often designed to improve the interaction between customer and product. This value type is most closely linked to product quality and user experience. Customers, in this sense, can also include any stakeholders who consume core offerings.

      Customer experience value can be derived from:

      • Improving customer satisfaction
      • Ease of use
      • Resolving a customer issue or identified pain point
      • Providing a competitive advantage for your customers

      Customer Information

      Understanding demand and customer trends is a core driver for all organizations. Data provided through understanding the ways, times, and reasons that consumers use your services is a key driver for growth and stability.

      Customer information value can be achieved when an app:

      • Addresses strategic opportunities or threats identified through analyzing trends
      • Prevents failures due to lack of capacity to meet demand
      • Connects resources to external sources to enable learning and growth within the organization

      Trust & Reputation

      Products and services are designed to enable goals of digital ethics and are highly linked to your organization’s brand strategy.

      Trust and reputation can also be described as:

      • Customer loyalty and sustainability
      • Customer privacy and digital ethics

      Prioritizing this value source is critical, as traditional priorities can often come at the expense of trust and reputation.

      Define your value drivers

      1.2 Estimated Time: 1.5 hours

      The objective of this exercise is to establish a common understanding of the different values of the organization.

      1. Place your business value authorities at the center of this exercise.
      2. Collect all the documents your organization has on the mission and vision, strategy, governance, and target state, which may be defined by enterprise architecture.
      3. Identify the company mission and vision. Simply transfer the information from the mission and vision document into the appropriate spaces in the business value statement.
      4. Determine the organization’s business value drivers. Use the mission and vision, as well as the information from the collected documents, to formulate your own idea of business values.
      5. Use value driver template on the next slide to define the value driver, including:
      • Value Driver Name
      • Description
      • Related Business Capabilities – If available, review business architecture materials, such as business capability maps.
      • Established KPI and Targets – If available, include any organization-wide established KPIs related to your value driver. These KPIs will likely be used or influence the metrics eventually assigned to your applications.

      INPUT

      • Mission, vision, value statements

      OUTPUT

      • List and description of value drivers

      Materials

      • Whiteboard
      • Markers

      Participants

      • Business value authorities
      • Owner of value measurement framework

      Example Value Driver

      Value Driver Name

      Reach Customers

      Value Driver Description

      Our organization’s ability to provide quality products and experience to our core customers

      Value Driver Weight

      10/10

      Related Business Capabilities

      • Customer Services
      • Marketing
        • Customer Segmentation
        • Customer Journey Mapping
      • Product Delivery
        • User Experience Design
        • User Acceptance Testing

      Key Business Outcomes, KPIs, and Targets

      • Improved Customer Satisfaction
        • Net Promotor Score: 80%
      • Improved Loyalty
        • Repeat Sales: 30%
        • Customer Retention: 25%
        • Customer Lifetime Value: $2,500
      • Improved Interaction
        • Repeat Visits: 50%
        • Account Conversation Rates: 40%

      Weigh your value drivers

      1.3 Estimated Time: 30 minutes

      The objective of this exercise is to prioritize your value drivers based on their relative importance to the business.

      1. Again, place the business value authorities at the center of this exercise.
      2. In order to determine priority, divide 100% among your value drivers, allocating a percentage to each based on its relative importance to the organization.
      3. Normalize those percentages on to a scale of 1 to 10, which will act as the weights for your value drivers.

      INPUT

      • Mission, vision, value statements

      OUTPUT

      • Weights for value drivers

      Materials

      • Whiteboard
      • Markers

      Participants

      • Business value authorities
      • Owner of value measurement framework

      Weigh your value drivers

      1.3 Estimated Time: 30 minutes

      Value Driver

      Percentage Allocation

      1 to 10 Weight

      Revenue and other funding

      24%

      9

      Cost reduction

      8%

      3

      Compliance

      5%

      2

      Customer value

      30%

      10

      Operations

      13%

      7

      Innovation

      5%

      2

      Sustainability and social responsibility

      2%

      1

      Internal learning and development

      3%

      1

      Future growth

      10%

      5

      Total

      100%

      Carry results over to the Value Calculator

      1.3

      Document results of this activity in the “Value Drivers” tab of the Value Calculator.

      A screenshot of Info-Tech's Value Calculator is shown.

      List your value drivers.

      Define or describe your value drivers.

      Use this tool to create a repository for value sources to reuse and maintain consistency across your measurements.

      Enter the weight of each value driver in terms of importance to the organization.

      Phase 2

      Measure Value

      Step 2.1: Identify Product or Service SMEs

      Phase 1

      1.1: Identify Value Authorities

      1.2: Define Value Drivers

      Phase 2

      2.1: Identify Product or Service SMEs

      2.2: Measure Value

      This step will walk you through the following activities:

      • Identify your product or service SMEs.
      • List your product or services items and components.

      This step involves the following participants:

      • Owners of your value measurement framework
      • Product or service SMEs

      Outcomes of this step

      • Your list of targeted individuals to include in Step 2.2

      Identify the products and services you are evaluating and break down their various components for the VMF

      In order to get a full evaluation of a product or service you need to understand its multiple facets, functions, features capabilities, requirements, or any language you use to describe its various components.

      An image of the value measure framework is shown.

      Decompose a product or service:

      • Get the right subject matter experts in place who know the business and technical aspects of the product or service.
      • Decompose the product or service to capture all necessary components.

      Before beginning, consider how your use case will impact your value measurement approach

      This table looks at how the different use cases of the VMF call for variations of this analysis, is directed at different roles, and relies on participation from different subject matter experts to provide business context.

      Use Case (uses of the VMF applied in this blueprint)

      Value (current vs. future value)

      Item (the singular entity you are producing a value score for)

      Components (the various facets of that entity that need to be considered)

      Scope (# of systems undergoing analysis)

      Evaluator (typical role responsible for applying the VMF)

      Cadence (when and why do you apply the VMF)

      Information Sources (what documents, tools, etc., do you need to leverage)

      SMEs (who needs to participate to define and measure value)

      1. Prioritize Your Product Backlog

      You are estimating future value of proposed changes to an application.

      Product backlog items (epic, feature, etc.) in your product backlog

      • Features
      • User stories
      • Enablers

      A product

      Product owner

      Continuously apply the VMF to prioritize new and changing product backlog items.

      • Epic hypothesis, documentation
      • Lean business case

      Product manager

      ????

      2. Prioritize Your Project Backlog

      Proposed projects in your project backlog

      • Benefits
      • Outcomes
      • Requirements

      Multiple existing and/or new applications

      Project portfolio manager

      Apply the VMF during your project intake process as new projects are proposed.

      • Completed project request forms
      • Completed business case forms
      • Project charters
      • Business requirements documents

      Project manager

      Product owners

      Business analysts

      3. Application Rationalization

      You are measuring current value of existing applications and their features.

      An application in your portfolio

      The uses of the application (features, function, capabilities)

      A subset of applications or the full portfolio

      Application portfolio manager

      During an application rationalization initiative:

      • Iteratively collect information and perform value measurements.
      • Structure your iterations based on functional areas to target the specific SMEs who can speak to a particular subset of applications.
      • Business capability maps

      Business process owners

      Business unit representatives

      Business architects

      Application architects

      Application SMEs

      4. Application Categorization

      The full portfolio

      Application maintenance or operations manager

      • SLAs
      • Business capability maps

      Identify your product or service SMEs

      2.1 Estimated Time: 15 minutes

      The objective of this exercise is to identify specific business stakeholders who can speak to the business outcomes of your applications at a functional level.

      1. Review your related materials that reference the stakeholders for the scoped products and services (i.e. capability maps, org charts, stakeholder maps).
      2. Identify your specific business stakeholders and application SMEs. These individuals represent the business at a functional level and are in tune with the business outcomes of their operations and the applications that support their operations.
        1. Use Case 1 – Product Owner, Product Manager
        2. Use Case 2 – Project Portfolio Manager, Project Manager, Product Owners, Business Process Owners, Appropriate Business Unit Representatives
        3. Use Case 3 – Application Portfolio Manager, Product Owners, Business Analysts, Application SMEs, Business Process Owners, Appropriate Business Unit Representatives
        4. Use Case 4 – Application Maintenance Manager, Operations Managers, Application Portfolio Manager, Product Owners, Application SMEs, Business Process Owners, Appropriate Business Unit Representatives

      INPUT

      • Specific product or service knowledge

      OUTPUT

      • Targeted individuals to measure specific products or services

      Materials

      • Whiteboard
      • Markers

      Participants

      • Owner of value measurement framework

      Use Case 1: Collect and review all of the product backlog items

      Prioritizing your product backlog (epics, features, etc.) requires a consistent method of measuring the value of your product backlog items (PBIs) to continuously compare their value relative to one another. This should be treated as an ongoing initiative as new items are added and existing items change, but an initial introduction of the VMF will require you to collect and analyze all of the items in your backlog.

      Regardless of producing a value score for an epic, feature, or user story, your focus should be on identifying their various value sources. Review your product’s artifact documentation, toolsets, or other information sources to extract the business outcomes, impact, benefits, KPIs, or any other description of a value source.

      High

      Epics

      Carefully valuated with input from multiple stakeholders, using metrics and consistent scoring

      Level of valuation effort per PBI

      User Stories

      Collaboratively valuated by the product owner and teams based on alignment and traceability to corresponding epic or feature

      Low

      Raw Ideas

      Intuitively valuated by the product owner based on alignment to product vision and organization value drivers

      What’s in your backlog?

      You may need to create standards for defining and measuring your different PBIs. Traceability can be critical here, as defined business outcomes for features or user stories may be documented at an epic level.

      Additional Research

      Build a Better Backlog helps you define and organize your product backlog items.

      Use Case 2: Review the scope and requirements of the project to determine all of the business outcomes

      Depending on where your project is in your intake process, there should be some degree of stated business outcomes or benefits. This may be a less refined description in the form of a project request or business case document, or it could be more defined in a project charter, business requirements document/toolset, or work breakdown structure (WBS). Regardless of the information source, to make proper use of the VMF you need a clear understanding of the various business outcomes to establish the new or improved value sources for the proposed project.

      Project

      User Requirements

      Business Requirements

      System Requirements

      1

      1

      1

      2

      2

      2

      3

      3

      4

      Set Metrics Early

      Good project intake documentation begins the discussion of KPIs early on. This alerts teams to the intended value and gives your PMO the ability to integrate it into the workload of other proposed or approved projects.

      Additional Research

      Optimize Project Intake, Approval, and Prioritization provides templates to define proposed project benefits and outcomes.

      Use Cases 3 & 4: Ensure you’ve listed all of each application’s uses (functions, features, capabilities, etc.) and user groups

      An application can enable multiple capabilities, perform a variety of functions, and have a range of different user groups. Therefore, a single application can produce multiple value sources, which range in type, impact, and significance to the business’ overarching priorities. In order to effectively measure the overall value of an application you need to determine all of the ways in which that application is used and apply a business-downward view of your applications.

      Business Capability

      • Sub-capability
      • Process
      • Task

      Application

      • Module
      • Feature
      • Function

      Aim for Business Use

      Simply listing the business capabilities of an app can be too high level. Regardless of your organization’s terminology, you need to establish all of the different uses and users of an application to properly measure all of the facets of its value.

      Additional Research

      Discover Your Applications helps you identify and define the business use and features of your applications.

      List your product or services items and components

      2.2 Estimated Time: 15 minutes

      The objective of this exercise is to produce a list of the different items that you are scoring and ensure you have considered all relevant components.

      1. List each item you intend to produce a value score for:
        1. Use Case 1 – This may be the epics in your product backlog.
        2. Use Case 2 – This may be the projects in your project backlog.
        3. Use Cases 3 & 4 – This may be the applications in your portfolio. For this approach Info-Tech strongly recommends iteratively assessing the portfolio to produce a list of a subset of applications.
      2. For each item list its various components:
        1. Use Case 1 – This may be the features or user stories of an epic.
        2. Use Case 2 – This may be the business requirements of a project.
        3. Use Cases 3 & 4 – This may be the modules, features, functions, capabilities, or subsystems of an application.

      Item

      Components

      Add Customer Portal (Epic)

      User story #1: As a sales team member I need to process customer info.

      User story #2: As a customer I want access to…

      Transition to the Cloud (Project)

      Requirement #1: Build Checkout Cart

      NFR – Build integration with data store

      CRM (Application)

      Order Processing (module), Returns & Claims (module), Analytics & Reporting (Feature)

      INPUT

      • Product or service knowledge

      OUTPUT

      • Detailed list of items and components

      Materials

      • Whiteboard
      • Markers

      Participants

      • Owner of value measurement framework
      • Product or service SMEs

      Use Cases 3 & 4: Create a functional view of your applications (optional)

      2.3 Estimated Time: 1 hour

      The objective of this exercise is to establish the different use cases of an application.

      1. Recall the functional requirements and business capabilities for your applications.
      2. List the various actors who will be interacting with your applications and list the consumers who will be receiving the information from the applications.
      3. Based on your functional requirements, list the use cases that the actors will perform to deliver the necessary information to consumers. Each use case serves as a core function of the application. See the diagram below for an example.
      4. Sometimes several use cases are completed before information is sent to consumers. Use arrows to demonstrate the flow of information from one use case to another.

      Example: Ordering Products Online

      Actors

      Order Customer

      Order Online

      Search Products

      Consumers

      Submit Delivery Information

      Order Customer

      Pay Order

      Bank

      INPUT

      • Product or service knowledge

      OUTPUT

      • Product or service function

      Materials

      • Whiteboard
      • Markers

      Participants

      • Application architect
      • Enterprise architect
      • Business and IT stakeholders
      • Business analyst
      • Development teams

      Use Cases 3 & 4: Create a functional view of your applications (optional) (cont’d.)

      2.3 Estimated Time: 1 hour

      5. Align your application’s use cases to the appropriate business capabilities and stakeholder objectives.

      Example:

      Stakeholder Objective: Automate Client Creation Processes

      Business Capability: Account Management

      Function: Create Client Profile

      Function: Search Client Profiles

      Business Capability: Sales Transaction Management

      Function: Order Online

      Function: Search Products Function: Search Products

      Function: Submit Delivery Information

      Function: Pay Order

      Step 2.2: Measure Value

      Phase 1

      1.1: Identify Value Authorities

      1.2: Define Value Drivers

      Phase 2

      2.1: Identify Product or Service SMEs

      2.2: Measure Value

      This step will walk you through the following activities:

      • Identify your value sources.
      • Align to a value driver.
      • Assign metrics and gauge value fulfillment.

      This step involves the following participants:

      • Owners of your value measurement framework
      • Product or service SMEs

      Outcomes of this step

      • An initial list of reusable value sources and metrics
      • Value scores for your products or services

      Use your VMF and a repeatable process to produce value scores for all of your items

      With your products or services broken down, you can then determine a list of value sources, as well as their alignment to a value driver and a gauge of their value fulfillment, which in turn indicate the importance and impact of a value source respectively.

      A image of the value measure framework is shown.

      Lastly, we produce a value score for all items:

      • Determine business outcomes and value sources.
      • Align to the appropriate value driver.
      • Use metrics as the gauge of value fulfillment.
      • Collect your score.
      • Repeat.

      The business outcome is the impact the product or service has on the intended business activity

      Business outcomes are the business-oriented results produced by organization’s capabilities and the applications that support those capabilities. The value source is, in essence, “How does the application impact the outcome?” and this can be either qualitative or quantitative.

      Quantitative

      Qualitative

      Key Words

      Examples

      Key Words

      Examples

      Faster, cheaper

      Deliver faster

      Better

      Better user experience

      More, less

      More registrations per week

      Private

      Enhanced privacy

      Increase, decrease

      Decrease clerical errors

      Easier

      Easier to input data

      Can, cannot

      Can access their own records

      Improved

      Improved screen flow

      Do not have to

      Do not have to print form

      Enjoyable

      Enjoyable user experience

      Compliant

      Complies with regulation 12

      Transparent

      Transparent progress

      Consistent

      Standardized information gathered

      Richer

      Richer data availability

      Adapted from Agile Coach Journal.

      Measure value – Identify your value sources

      2.4 Estimated Time: 30 minutes

      The objective of this exercise is to establish the different value sources of a product or service.

      1. List the items you are producing an overall balance value score for. These can be products, services, projects, applications, product backlog items, epics, etc.
      2. For each item, list its various business outcomes in the form of a description that includes:
        1. The item being measured
        2. Business capability or activity
        3. How the item impacts said capability or activity

      Consider applying the user story format for future value sources or a variation for current value sources.

      As a (user), I want to (activity) so that I get (impact)

      INPUT

      • Product or service knowledge
      • Business process knowledge

      OUTPUT

      • List of value sources

      Materials

      • Whiteboard
      • Markers

      Participants

      • Owner of value measurement framework
      • Product or service SMEs

      Measure value – Align to a value driver

      2.5 Estimated Time: 30 minutes

      The objective of this exercise is to determine the value driver for each value source.

      1. Align each value source to a value driver. Choose between options A and B.
        1. Using a whiteboard, draw out a 2 x 2 business value matrix or an adapted version based on your own organizational value drivers. Place each value source in the appropriate quadrant.
          1. Increase Revenue
          2. Reduce Costs
          3. Enhance Services
          4. Reach Customers
        2. Using a whiteboard or large sticky pads, create a section for each value driver. Place each value source with the appropriate value driver.

      INPUT

      • Product or service knowledge
      • Business process knowledge

      OUTPUT

      • Value driver weight

      Materials

      • Whiteboard
      • Markers

      Participants

      • Owner of value measurement framework
      • Product or service SMEs

      Brainstorm the different sources of business value (cont’d.)

      2.5

      Example:

      An example of activity 2.5 is shown.

      Carry results over to the Value Calculator

      2.5

      Document results of this activity in the Value Calculator in the Item {#} tab.

      A screenshot of the Value Calculator is shown.

      List your Value Sources

      Your Value Driver weights will auto-populate

      Aim, but do not reach, for SMART metrics

      Creating meaningful metrics

      S pecific

      M easureable

      A chievable

      R ealisitic

      T ime-based

      Follow the SMART framework when adding metrics to the VMF.

      The intention of SMART goals and metrics is to make sure you have chosen a gauge that will:

      • Reflect the actual business outcome or value source you are measuring.
      • Ensure all relevant stakeholders understand the goals or value you are driving towards.
      • Ensure you actually have the means to capture the performance.

      Info-Tech Insight

      Metrics are NOT a magical solution. They should be treated as a tool in your toolbox and are sometimes no more than a rough gauge of performance. Carefully assign metrics to your products and services and do not disregard the informed subjective perspective when SMART metrics are unavailable.

      Info-Tech Best Practice

      One last critical consideration here is the degree of effort required to collect the metric compared to the value of the analysis you are performing. Assessing whether or not to invest in a project should apply the rigor of carefully selecting and measuring value. However, performing a rationalization of the full app portfolio will likely lead to analysis paralysis. Taking an informed subjective perspective may be the better route.

      Measure value – Assign metrics and gauge value fulfillment

      2.6 30-60 minutes

      The objective of this exercise is to determine an appropriate metric for each value source.

      1. For each value source assign a metric that will be the unit of measurement to gauge the value fulfilment of the application.
      2. Review the product or services performance with the metric
        1. Use case 1&2 (Proposed Applications and/or Features) - You will need to estimate the degree of impact the product or services will have on your selected metric.
        2. Use case 3&4 (Existing Applications and/or Features) – You can review historically how the product or service has performed with your selected metric
      3. Determine a value fulfillment on a scale of 1 – 10.
      4. 10 = The product or service far exceeds expectations and targets on the metric.

        5 = the product or service meets expectations on this metric.

        1 = the product or service underperforms on this metric.

      INPUT

      • Product or service knowledge
      • Business process knowledge

      OUTPUT

      • Value driver weight

      Materials

      • Whiteboard
      • Markers

      Participants

      • Owner of value measurement framework
      • Product or service SMEs

      Carry results over to the Value Calculator

      2.6

      Document results of this activity in the Value Calculator in the Item {#} tab.

      A screenshot of Info-Tech's Value Calculator is shown.

      Assign Metrics.

      Consider using current or estimated performance and targets.

      Assess the impact on the value source with the value fulfillment.

      Collect your Overall Balanced Value Score

      Appendix

      Bibliography

      Brown, Alex. “Calculating Business Value.” Agile 2014 Orlando – July 13, 2014. Scrum Inc. 2014. Web. 20 Nov. 2017.

      Brown, Roger. “Defining Business Value.” Scrum Gathering San Diego 2017. Agile Coach Journal. Web.

      Curtis, Bill. “The Business Value of Application Internal Quality.” CAST. 6 April 2009. Web. 20 Nov. 2017.

      Fleet, Neville, Joan Lasselle, and Paul Zimmerman. “Using a Balance Scorecard to Measure the Productivity and Value of Technical Documentation Organizations.” CIDM. April 2008. Web. 20 Nov. 2017.

      Harris, Michael. “Measuring the Business Value of IT.” David Consulting Group. 20 Nov. 2017.

      Intrafocus. “What is a Balanced Scorecard?” Intrafocus. Web. 20 Nov. 2017

      Kerzner, Harold. Project Management: A Systems Approach to Planning, Scheduling, and Controlling. 12th ed., Wiley, 2017.

      Lankhorst, Marc., et al. “Architecture-Based IT Valuation.” Via Nova Architectura. 31 March 2010. Web. 20 Nov. 2017.

      Rachlin, Sue, and John Marshall. “Value Measuring Methodology.” Federal CIO Council, Best Practices Committee. October 2002. Web. April 2019.

      Thiagarajan, Srinivasan. “Bridging the Gap: Enabling IT to Deliver Better Business Outcomes.” Cognizant. July 2017. Web. April 2019.

      Enterprise Application Selection and Implementation

      • Buy Link or Shortcode: {j2store}29|cart{/j2store}
      • Related Products: {j2store}29|crosssells{/j2store}
      • member rating overall impact: 9.0/10
      • member rating average dollars saved: $37,356
      • member rating average days saved: 34
      • Parent Category Name: Applications
      • Parent Category Link: /applications

      The challenge

      • Large scale implementations are prone to failure. This is probably also true in your company. Typically large endeavors like this overrun the budget, are late to deliver, or are abandoned altogether. It would be best if you manage your risks when starting such a new project.

      Our advice

      Insight

      • Large-scale software implementations continue to fail at very high rates. A recent report by McKinsey & Company estimates that 66% go over budget, 33% over time, and 17% delivered less value than expected. Most companies will survive a botched implementation, but 17% threatened the existence of the company involved.
      • With all the knowledge sharing that we have today with oodles of data at our disposal, we should expect IT-providers to have clear, standardized frameworks to handle these implementations. But projects that overrun by more than 200% still occur more often than you may think.
      • When you solicit a systems integrator (SI), you want to equip yourself to manage the SI and not be utterly dependent on their methodology.

      Impact and results 

      • You can assume proper accountability for the implementation and avoid over-reliance on the systems integrator.
      • Leverage the collective knowledge and advice of additional IT professionals
      • Review the pitfalls and lessons learned from failed integrations.
      • Manage risk at every stage.
      • Perform a self-assessment at various stages of the integration path.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Executive Summary

      Determine the rations for your implementation

      See if a custom-of-the-shelf process optimization makes sense.

      • Storyboard: Govern and Manage an Enterprise Software Implementation (ppt)

      Prepare

      Determine the right (level of) governance for your implementation.

      • Large Software Implementation Maturity Assessment Tool (xls)
      • Project Success Measurement Tool (xls)
      • Risk Mitigation Plan Template (xls)

      Plan and analyze

      Prepare for the overall implementation journey and gather your requirements. Then conduct a stage-gate assessment of this phase.

      • Project Phases Entry and Exit Criteria Checklist Tool (xls)
      • Project Lessons Learned Document (doc)

      Design, build and deploy

      Conduct a stage-gate assessment after every step below.

      • Make exact designs of the software implementation and ensure that all stakeholders and the integrator completely understand.
      • Build the solution according to the requirements and designs.
      • Thoroughly test and evaluate that the implementation meets your business expectations. 
      • Then deploy

      Initiate your roadmap

      Review your dispositions to ensure they align with your goals. 

      • Build an Application Rationalization Framework – Phase 4: Initiate Your Roadmap (ppt)
      • Disposition Prioritization Tool (xls)

      Project Management

      • Buy Link or Shortcode: {j2store}48|cart{/j2store}
      • Related Products: {j2store}48|crosssells{/j2store}
      • member rating overall impact: 9.7/10
      • member rating average dollars saved: $303,499
      • member rating average days saved: 42
      • Parent Category Name: Project Portfolio Management and Projects
      • Parent Category Link: /ppm-and-projects

      The challenge

      • Ill-defined or even lack of upfront project planning will increase the perception that your IT department cannot deliver value because most projects will go over time and budget.
      • The perception is those traditional ways of delivering projects via the PMBOK only increase overhead and do not have value. This is less due to the methodology and more to do with organizations trying to implement best-practices that far exceed their current capabilities.
      • Typical best-practices are too clinical in their approach and place unrealistic burdens on IT departments. They fail to address the daily difficulties faces by staff and are not sized to fit your organization.
      • Take a flexible approach and ensure that your management process is a cultural and capacity fit for your organization. Take what fits from these frameworks and embed them tailored into your company.

      Our advice

      Insight

      • The feather-touch is often the right touch. Ensure that you have a lightweight approach for most of your projects while applying more rigor to the more complex and high-risk developments.
      • Pick the right tools. Your new project management processes need the right tooling to be successful. Pick a tool that is flexible enough o accommodate projects of all sizes without imposing undue governance onto smaller projects.
      • Yes, take what fits within your company from frameworks, but there is no cherry-picking. Ensure your processes stay in context: If you do not inform for effective decision-making, all will be in vain. Develop your methods such that guide the way to big-picture decision taking and support effective portfolio management.

      Impact and results 

      • The right amount of upfront planning is a function of the type of projects you have and your company. The proper levels enable better scope statements, better requirements gathering, and increased business satisfaction.
      • An investment in a formal methodology is critical to projects of all sizes. An effective process results in more successful projects with excellent business value delivery.
      • When you have a repeatable and consistent approach to project planning and execution, you can better communicate between the IT project managers and decision-makers.
      • Better communication improves the visibility of the overall project activity within your company.

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Get started.

      Read our executive brief to understand why you should tailor project management practices to the type of projects you do and your company and review our methodology. We show you how we can support you.

      Lay the groundwork for project management success

      Assess your current capabilities to set the right level of governance.

      • Tailor Project Management Processes to Fit Your Projects – Phase 1: Lay the Groundwork for PM Success (ppt)
      • Project Management Triage Tool (xls)
      • COBIT BAI01 (Manage Programs and Projects) Alignment Workbook (xls)
      • Project Level Definition Matrix (xls)
      • Project Level Selection Tool (xls)
      • Project Level Assessment Tool (xls)
      • Project Management SOP Template (doc)

      Small project require a lightweight framework

      Increase small project's throughput.

      • Tailor Project Management Processes to Fit Your Projects – Phase 2: Build a Lightweight PM Process for Small Initiatives (ppt)
      • Level 1 Project Charter Template (doc)
      • Level 1 Project Status Report Template (doc)
      • Level 1 Project Closure Checklist Template (doc)

      Build the standard process medium and large-scale projects

      The standard process contains fully featured initiation and planning.

      • Tailor Project Management Processes to Fit Your Projects – Phase 3: Establish Initiation and Planning Protocols for Medium-to-Large Projects (ppt)
      • Project Stakeholder and Impact Assessment Tool (xls)
      • Level 2 Project Charter Template (doc)
      • Level 3 Project Charter Template (doc)
      • Kick-Off Meeting Agenda Template (doc)
      • Scope Statement Template (doc)
      • Project Staffing Plan(xls)
      • Communications Management Plan Template (doc)
      • Customer/Sponsor Project Status Meeting Template (doc)
      • Level 2 Project Status Report Template (doc)
      • Level 3 Project Status Report Template (doc)
      • Quality Management Workbook (xls)
      • Benefits Management Plan Template (xls)
      • Risk Management Workbook (xls)

      Build a standard process for the execution and closure of medium to large scale projects

      • Tailor Project Management Processes to Fit Your Projects – Phase 4: Develop Execution and Closing Procedures for Medium-to-Large Projects (ppt)
      • Project Team Meeting Agenda Template (doc)
      • Light Project Change Request Form Template (doc)
      • Detailed Project Change Request Form Template (doc)
      • Light Recommendation and Decision Tracking Log Template (xls)
      • Detailed Recommendation and Decision Tracking Log Template (xls)
      • Deliverable Acceptance Form Template (doc)
      • Handover to Operations Template (doc)
      • Post-Mortem Review Template (doc)
      • Final Sign-Off and Acceptance Form Template (doc)

      Implement your project management standard operating procedures (SOP)

      Develop roll-out and training plans, implement your new process and track metrics.

      • Tailor Project Management Processes to Fit Your Projects – Phase 5: Implement Your PM SOP (ppt)
      • Level 2 Project Management Plan Template (doc)
      • Project Management Process Costing Tool (xls)
      • Project Management Process Training Plan Template (doc)
      • Project Management Training Monitoring Tool (xls)
      • Project Management Process Implementation Timeline Tool (MS Project)
      • Project Management Process Implementation Timeline Tool (xls)

       

       

      Perform an Agile Skills Assessment

      • Buy Link or Shortcode: {j2store}153|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $32,166 Average $ Saved
      • member rating average days saved: 15 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Your organization is trying to address the key delivery challenges you are facing. Early experiments with Agile are starting to bear fruit.
      • As part of maturing your Agile practice, you want to evaluate if you have the right skills and capabilities in place.

      Our Advice

      Critical Insight

      • Focusing on the non-technical skills can yield significant returns for your products, your team, and your organization. These skills are what should be considered as the real Agile skills.

      Impact and Result

      • Define the skills and values that are important to your organization to be successful at being Agile.
      • Put together a standard criterion for measurement of the attainment of given skills.
      • Define the roadmap and communication plan around your agile assessment.

      Perform an Agile Skills Assessment Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should perform an agile skills assessment. review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Take stock of the Agile skills and values important to you

      Confirm the list of Agile skills that you wish to measure.

      • Perform an Agile Skills Assessment – Phase 1: Take Stock of the Agile Skills and Values Important to You
      • Agile Skills Assessment Tool
      • Agile Skills Assessment Tool Example

      2. Define an assessment method that works for you

      Define what it means to attain specific agile skills through a defined ascension path of proficiency levels, and standardized skill expectations.

      • Perform an Agile Skills Assessment – Phase 2: Define an Assessment Method That Works for You

      3. Plan to assess your team

      Determine the roll-out and communication plan that suits your organization.

      • Perform an Agile Skills Assessment – Phase 3: Plan to Assess Your Team
      • Agile Skills Assessment Communication and Roadmap Plan
      • Agile Skills Assessment Communication and Roadmap Plan Example
      [infographic]

      Workshop: Perform an Agile Skills Assessment

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Agile Skills and Maturity Levels

      The Purpose

      Learn about and define the Agile skills that are important to your organization.

      Define the different levels of attainment when it comes to your Agile skills.

      Define the standards on a per-role basis.

      Key Benefits Achieved

      Get a clear view of the Agile skills important into meet your Agile transformation goals in alignment with organizational objectives.

      Set a clear standard for what it means to meet your organizational standards for Agile skills.

      Activities

      1.1 Review and update the Agile skills relevant to your organization.

      1.2 Define your Agile proficiency levels to evaluate attainment of each skill.

      1.3 Define your Agile team roles.

      1.4 Define common experience levels for your Agile roles.

      1.5 Define the skill expectations for each Agile role.

      Outputs

      A list of Agile skills that are consistent with your Agile transformation

      A list of proficiency levels to be used during your Agile skills assessment

      A confirmed list of roles that you wish to measure on your Agile teams

      A list of experience levels common to Agile team roles (example: Junior, Intermediate, Senior)

      Define the skill expectations for each Agile role

      Get the Most Out of Your CRM

      • Buy Link or Shortcode: {j2store}537|cart{/j2store}
      • member rating overall impact: 9.7/10 Overall Impact
      • member rating average dollars saved: $31,749 Average $ Saved
      • member rating average days saved: 22 Average Days Saved
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • Application optimization is essential to stay competitive and productive in today’s digital environment.
      • Enterprise applications often involve large capital outlay, unquantified benefits, and high risk of failure.
      • Customer relationship management (CRM) application portfolios are often messy with multiple integration points, distributed data, and limited ongoing end-user training.
      • User dissatisfaction is common.

      Our Advice

      Critical Insight

      A properly optimized CRM ecosystem will reduce costs and increase productivity.

      Impact and Result

      • Build an ongoing optimization team to conduct application improvements.
      • Assess your CRM application(s) and the environment in which they exist. Take a business-first strategy to prioritize optimization efforts.
      • Validate CRM capabilities, user satisfaction, issues around data, vendor management, and costs to build out an optimization strategy.
      • Pull this all together to develop a prioritized optimization roadmap.

      Get the Most Out of Your CRM Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize your CRM, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Map current-state capabilities

      Gather information around the application:

      • Get the Most Out of Your CRM Workbook

      2. Assess your current state

      Assess CRM and related environment. Perform CRM process assessment. Assess user satisfaction across key processes, applications, and data. Understand vendor satisfaction

      • CRM Application Inventory Tool

      3. Build your optimization roadmap

      Build your optimization roadmap: process improvements, software capability improvements, vendor relationships, and data improvement initiatives.

      Infographic

      Workshop: Get the Most Out of Your CRM

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Your CRM Application Vision

      The Purpose

      Define your CRM application vision.

      Key Benefits Achieved

      Develop an ongoing application optimization team.

      Realign CRM and business goals.

      Understand your current system state capabilities.

      Explore CRM and related costs.

      Activities

      1.1 Determine your CRM optimization team.

      1.2 Align organizational goals.

      1.3 Inventory applications and interactions.

      1.4 Define business capabilities.

      1.5 Explore CRM-related costs (optional).

      Outputs

      CRM optimization team

      CRM business model

      CRM optimization goals

      CRM system inventory and data flow

      CRM process list

      CRM and related costs

      2 Map Current-State Capabilities

      The Purpose

      Map current-state capabilities.

      Key Benefits Achieved

      Complete a CRM process gap analysis to understand where the CRM is underperforming.

      Review the CRM application portfolio assessment to understand user satisfaction and data concerns.

      Undertake a software review survey to understand your satisfaction with the vendor and product.

      Activities

      2.1 Conduct gap analysis for CRM processes.

      2.2 Perform an application portfolio assessment.

      2.3 Review vendor satisfaction.

      Outputs

      CRM process gap analysis

      CRM application portfolio assessment

      CRM software reviews survey

      3 Assess CRM

      The Purpose

      Assess CRM.

      Key Benefits Achieved

      Learn which processes you need to focus on.

      Uncover underlying user satisfaction issues to address these areas.

      Understand where data issues are occurring so that you can mitigate this.

      Investigate your relationship with the vendor and product, including that relative to others.

      Identify any areas for cost optimization (optional).

      Activities

      3.1 Explore process gaps.

      3.2 Analyze user satisfaction.

      3.3 Assess data quality.

      3.4 Understand product satisfaction and vendor management.

      3.5 Look for CRM cost optimization opportunities (optional).

      Outputs

      CRM process optimization priorities

      CRM vendor optimization opportunities

      CRM cost optimization

      4 Build the Optimization Roadmap

      The Purpose

      Build the optimization roadmap.

      Key Benefits Achieved

      Understanding where you need to improve is the first step, now understand where to focus your optimization efforts.

      Activities

      4.1 Identify key optimization areas.

      4.2 Build your CRM optimization roadmap and next steps.

      Outputs

      CRM optimization roadmap

      Further reading

      Get the Most Out of Your CRM

      In today’s connected world, continuous optimization of enterprise applications to realize your digital strategy is key.

      Get the Most Out of Your CRM

      In today’s connected world, continuous optimization of enterprise applications to realize your digital strategy is key.

      EXECUTIVE BRIEF

      Analyst Perspective

      Focus optimization on organizational value delivery.

      Customer relationship management (CRM) systems are at the core of a customer-centric strategy to drive business results. They are critical to supporting marketing, sales, and customer service efforts.

      CRM systems are expensive, their benefits are difficult to quantify, and they often suffer from poor user satisfaction. Post implementation, technology evolves, organizational goals change, and the health of the system is not monitored. This is complicated in today’s digital landscape with multiple integration points, siloed data, and competing priorities.

      Too often organizations jump into the selection of replacement systems without understanding the health of their current systems. IT leaders need to stop reacting and take a proactive approach to continually monitor and optimize their enterprise applications. Strategically realign business goals, identify business application capabilities, complete a process assessment, evaluate user adoption, and create an optimization roadmap that will drive a cohesive technology strategy that delivers results.

      This is a picture of Lisa Highfield

      Lisa Highfield
      Research Director,
      Enterprise Applications
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      In today’s connected world, continuous optimization of enterprise applications to realize your digital strategy is key.

      Enterprise applications often involve large capital outlay and unquantified benefits.

      CRM application portfolios are often messy. Add to that poor processes, distributed data, and lack of training – business results and user dissatisfaction is common.

      Technology owners are often distributed across the business. Consolidation of optimization efforts is key.

      Common Obstacles

      Enterprise applications involve large numbers of processes and users. Without a clear focus on organizational needs, decisions about what and how to optimize can become complicated.

      Competing and conflicting priorities may undermine optimization value by focusing on the approaches that would only benefit one line of business rather than the entire organization.

      Teams do not have a framework to illustrate, communicate, and justify the optimization effort in the language your stakeholders understand.

      Info-Tech’s Approach

      Build an ongoing optimization team to conduct application improvements.

      Assess your CRM application(s) and the environment in which they exist. Take a business-first strategy to prioritize optimization efforts.

      Validate CRM capabilities, user satisfaction, issues around data, vendor management, and costs to build out an optimization strategy

      Pull this all together to develop a prioritized optimization roadmap.

      Info-Tech Insight

      CRM implementation should not be a one-and-done exercise. A properly optimized CRM ecosystem will reduce costs and increase productivity.

      This is an image of the thought model: Get the Most Out of Your CRM

      Insight Summary

      Continuous assessment and optimization of customer relationship management (CRM) systems is critical to their success.

      • Applications and the environments in which they live are constantly evolving.
      • Get the Most Out of Your CRM provides business and application managers a method to complete a health assessment on their CRM systems to identify areas for improvement and optimization.
      • Put optimization practices into effect by:
        • Aligning and prioritizing key business and technology drivers.
        • Identifying CRM process classification, and performing a gap analysis.
        • Measuring user satisfaction across key departments.
        • Evaluating vendor relations.
        • Understanding how data fits.
        • Pulling it all together into an optimization roadmap.

      CRM platforms are the applications that provide functional capabilities and data management around the customer experience (CX).

      Marketing, sales, and customer service are enabled through CRM technology.

      CRM technologies facilitate an organization’s relationships with customers, service users, employees, and suppliers.

      CRM technology is critical to managing the lifecycle of these relationships, from lead generation, to sales opportunities, to ongoing support and nurturing of these relationships.

      Customer experience management (CXM)

      CRM platforms sit at the core of a well-rounded customer experience management ecosystem.

      Customer Relationship Management

      • Web Experience Management Platform
      • E-Commerce & Point-of-Sale Solutions
      • Social Media Management Platform
      • Customer Intelligence Platform
      • Customer Service Management Tools
      • Marketing Management Suite

      Customer relationship management suites are one piece of the overall customer experience management ecosystem, alongside tools such as customer intelligence platforms and adjacent point solutions for sales, marketing, and customer service. Review Info-Tech’s CXM blueprint to build a complete, end-to-end customer interaction solution portfolio that encompasses CRM alongside other critical components. The CXM blueprint also allows you to develop strategic requirements for CRM based on customer personas and external market analysis.

      CRM by the numbers

      1/3

      Statistical analysis of CRM projects indicate failures vary from 18% to 69%. Taking an average of those analyst reports, about one-third of CRM projects are considered a failure.
      Source: CIO Magazine, 2017

      85%

      Companies that apply the principles of behavioral economics outperform their peers by 85% in sales growth and more than 25% in gross margin.
      Source: Gallup, 2012

      40%

      In 2019, 40% of executives name customer experience the top priority for their digital transformation.
      Source: CRM Magazine, 2019

      CRM dissatisfaction

      Drivers of Dissatisfaction

      Business Data People and Teams Technology
      • Misaligned objectives
      • Product fit
      • Changing priorities
      • Lack of metrics
      • Access to data
      • Data hygiene
      • Data literacy
      • One view of the customer
      • User adoption
      • Lack of IT support
      • Training (use of data and system)
      • Vendor relations
      • Systems integration
      • Multichannel complexity
      • Capability shortfall
      • Lack of product support

      Info-Tech Insight

      While technology is the key enabler of building strong customer experiences, there are many other drivers of dissatisfaction. IT must stand shoulder to shoulder with the business to develop a technology framework for customer relationship management.

      Marketing, Sales, and Customer Service, along with IT, can only optimize CRM with the full support of each other. The cooperation of the departments is crucial when trying to improve CRM technology capabilities and customer interaction.

      Application optimization is risky without a plan

      Avoid the common pitfalls.

      • Not considering application optimization as a business and IT partnership that requires continuous formal engagement of all participants.
      • Not having a good understanding of current state, including integration points and data.
      • Not adequately accommodating feedback and changes after digital applications are deployed and employed.
      • Not treating digital applications as a motivator for potential future IT optimization effort, and not incorporating digital assets in strategic business planning.
      • Not involving department leads, management, and other subject matter experts to facilitate the organizational change digital applications bring.

      “A successful application optimization strategy starts with the business need in mind and not from a technological point of view. No matter from which angle you look at it, modernizing a legacy application is a considerable undertaking that can’t be taken lightly. Your best approach is to begin the journey with baby steps.”
      – Ernese Norelus, Sreeni Pamidala, and Oliver Senti
      Medium, 2020

      Info-Tech’s methodology for Get the Most Out of Your CRM

      1. Map Current-State Capabilities 2. Assess Your Current State 3. Build Your Optimization Roadmap
      Phase Steps
      1. Identify stakeholders and build your CRM optimization team
      2. Build a CRM strategy model
      3. Inventory current system state
      4. Define business capabilities
      1. Conduct a gap analysis for CRM processes
      2. Assess user satisfaction
      3. Review your satisfaction with the vendor and product
      1. Identify key optimization areas
      2. Compile optimization assessment results
      Phase Outcomes
      1. Stakeholder map
      2. CRM optimization team
      3. CRM business model
      4. Strategy alignment
      5. Systems inventory and diagram
      6. Business capabilities map
      7. Key CRM processes list
      1. Gap analysis for CRM-related processes
      2. Understanding of user satisfaction across applications and processes
      3. Insight into CRM data quality
      4. Quantified satisfaction with the vendor and product
      1. Application optimization plan

      Get the Most Out of Your CRM Workbook

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals.

      Key deliverable:

      CRM Optimization Roadmap (Tab 8)

      This image contains a screenshot from Tab 9 of the Get the most out of your CRM WorkshopThis image contains a screenshot from Tab 9 of the Get the most out of your CRM Workshop

      Complete an assessment of processes, user satisfaction, data quality, and vendor management using the Workbook or the APA diagnostic.

      CRM Business Model (Tab 2)

      This image contains a screenshot from Tab 2 of the Get the most out of your CRM Workshop

      Align your business and technology goals and objectives in the current environment.

      Prioritized CRM Optimization Goals (Tab 3)

      This image contains a screenshot from Tab 3 of the Get the most out of your CRM Workshop

      Identify and prioritize your CRM optimization goals.

      Application Portfolio Assessment (APA)

      This image contains a screenshot of the Application Portfolio Assessment

      Assess IT-enabled user satisfaction across your CRM portfolio.

      Prioritized Process Assessment (Tab 5)

      This image contains a screenshot from Tab 5 of the Get the most out of your CRM Workshop

      Understand areas for improvement.

      Case Study

      Align strategy and technology to meet consumer demand.

      INDUSTRY - Entertainment
      SOURCE - Forbes, 2017

      Challenge

      Beginning as a mail-out service, Netflix offered subscribers a catalog of videos to select from and have mailed to them directly. Customers no longer had to go to a retail store to rent a video. However, the lack of immediacy of direct mail as the distribution channel resulted in slow adoption.

      Blockbuster was the industry leader in video retail but was lagging in its response to industry, consumer, and technology trends around customer experience

      Solution

      In response to the increasing presence of tech-savvy consumers on the internet, Netflix invested in developing its online platform as its primary distribution channel. The benefit of doing so was two-fold: passive brand advertising (by being present on the internet) and meeting customer demands for immediacy and convenience. Netflix also recognized the rising demand for personalized service and created an unprecedented, tailored customer experience.

      Results

      Netflix’s disruptive innovation is built on the foundation of great customer experience management. Netflix is now a $28-billion company, which is tenfold what Blockbuster was worth.

      Netflix used disruptive technologies to innovatively build a customer experience that put it ahead of the long-time, video rental industry leader, Blockbuster.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2:

      Build the CRM team.

      Align organizational goals.

      Call #4:

      Conduct gap analysis for CRM processes.

      Prepare application portfolio assessment.

      Call #5:

      Understand product satisfaction and vendor management.

      Look for CRM cost optimization opportunities (optional).

      Call #7:

      Identify key optimization areas.

      Build out optimization roadmap and next steps.

      Call #3:

      Map current state.

      Inventory CRM processes.

      Explore CRM-related costs.

      Call #6:

      Review APA results.

      A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5
      Define Your CRM Application Vision Map Current-State Capabilities Assess CRM Build the Optimization Roadmap Next Steps and Wrap-Up (offsite)

      Activities

      1.1 Determine your CRM optimization team

      1.2 Align organizational goals

      1.3 Inventory applications and interactions

      1.4 Define business capabilities

      1.5 Explore CRM-related costs

      2.1 Conduct gap analysis for CRM processes

      2.2 Perform an application portfolio assessment

      2.3 Review vendor satisfaction

      3.1 Explore process gaps

      3.2 Analyze user satisfaction

      3.3 Assess data quality

      3.4 Understand product satisfaction and vendor management

      3.5 Look for CRM cost optimization opportunities (optional)

      4.1 Identify key optimization areas

      4.2 Build your CRM optimization roadmap and next steps

      5.1 Complete in-progress deliverables from previous four days

      5.2 Set up review time for workshop deliverables and to discuss next steps

      Deliverables
      1. CRM optimization team
      2. CRM business model
      3. CRM optimization goals
      4. CRM system inventory and data flow
      5. CRM process list
      6. CRM and related costs
      1. CRM process gap analysis
      2. CRM application portfolio assessment
      3. CRM software reviews survey
      1. CRM process optimization priorities
      2. CRM vendor optimization opportunities
      3. CRM cost optimization
      1. CRM optimization roadmap

      Phase 1

      Map Current-State Capabilities

      • 1.1 Identify Stakeholders and Build Your Optimization Team
      • 1.2 Build a CRM Strategy Model
      • 1.3 Inventory Current System State
      • 1.4 Define Business Capabilities
      • 1.5 Understand CRM Costs

      Get the Most Out of Your CRM

      This phase will walk you through the following activities:

      • Align your organizational goals
      • Gain a firm understanding of your current state
      • Inventory CRM and related applications
      • Confirm the organization’s capabilities

      This phase involves the following participants:

      • Product Owners
      • CMO
      • Departmental leads – Sales, Marketing, Customer Service, or other
      • Applications Director
      • Senior Business Analyst
      • Senior Developer
      • Procurement Analysts

      Inventory of CRM and related systems

      Develop an integration map to specify which applications will interface with each other.

      This is an image of an integration map, integrating the following Terms to CRM: Telephony Systems; Directory Services; Email; Content Management; Point Solutions; ERP

      Integration is paramount: your CRM application often integrates with other applications within the organization. Create an integration map to reflect a system of record and the exchange of data. To increase customer engagement, channel integration is a must (i.e. with robust links to unified communications solutions, email, and VoIP telephony systems).

      CRM plays a key role in the more holistic customer experience framework. However, it is heavily influenced by and often interacts with many other platforms.

      Data is one key consideration that needs to be considered here. If customer information is fragmented, it will be nearly impossible to build a cohesive view of the customer. Points of integration (POIs) are the junctions between the CRM(s) and other applications where data is flowing to and from. They are essential to creating value, particularly in customer insight-focused and omnichannel-focused deployments.

      Customer expectations are on the rise

      CRM strategy is a critical component of customer experience (CX).

      CUSTOMER EXPERIENCE

      1. Thoughtfulness is in
        Connect with customers on a personal level
      2. Service over products
        The experience is more important than the product
      3. Culture is now number one
        Culture is the most overlooked piece of customer experience strategy
      4. Engineering and service finally join forces
        Companies are combining their technology and service efforts to create
        strong feedback loops
      5. The B2B world is inefficiently served
        B2B needs to step up with more tools and a greater emphasis placed on
        customer experience

      Source: Forbes, 2019

      Build a cohesive CRM strategy that aligns business goals with CRM capabilities.

      Info-Tech Insight

      Customers expect to interact with organizations through the channels of their choice. Now more than ever, you must enable your organization to provide tailored customer experiences.

      IT is critical to the success of your CRM strategy

      Today’s shared digital landscape of the CIO and CMO

      CIO

      • IT Operations
      • Service Delivery and Management
      • IT Support
      • IT Systems and Application
      • IT Strategy and Governance
      • Cybersecurity

      Collaboration and Partnership

      • Digital Strategy = Transformation
        Business Goals | Innovation | Leadership | Rationalization
      • Customer Experience
        Architecture | Design | Omnichannel Delivery | Management
      • Insight (Market Facing)
        Analytics | Business Intelligence | Machine Learning | AI
      • Marketing Integration + Operating Model
        Apps | Channels | Experiences | Data | Command Center
      • Master Data
        Customer | Audience | Industry | Digital Marketing Assets

      CMO

      • PEO Media
      • Brand Management
      • Campaign Management
      • Marketing Tech
      • Marketing Ops
      • Privacy, Trust, and Regulatory Requirements

      Info-Tech Insight

      Technology is the key enabler of building strong customer experiences: IT must stand shoulder to shoulder with the business to develop a technology framework for customer relationship management.

      Step 1.1

      Identify Stakeholders and Build Your Optimization Team

      Activities

      1.1.1 Identify the stakeholders whose support will be critical to success

      1.1.2 Select your CRM optimization team

      Map Current-State Capabilities

      This step will walk you through the following activities:

      • Identify CRM drivers and objectives.
      • Explore CRM challenges and pain points.
      • Discover CRM benefits and opportunities.
      • Align the CRM foundation with the corporate strategy.

      This step involves the following participants:

      • Stakeholders
      • Project sponsors and leaders

      Outcomes of this step

      • Stakeholder map
      • CRM optimization team composition

      CRM optimization stakeholders

      Understand the roles necessary to get the most out of your CRM.

      Understand the role of each player within your optimization initiative. Look for listed participants on the activity slides to determine when each player should be involved.

      Info-Tech Insight

      Do not limit input or participation. Include subject matter experts and internal stakeholders at stages within the optimization initiative. Such inputs can be solicited on a one-off basis as needed. This ensures you take a holistic approach to creating your CRM optimization strategy.

      Title

      Roles Within CRM Optimization Initiative

      Optimization Sponsor

      • Owns the project at the management/C-suite level
      • Responsible for breaking down barriers and ensuring alignment with organizational strategy
      • CMO, VP od Marketing, VP of Sales, VP of Customer Care, or similar

      Optimization Initiative Manager

      • Typically IT individual(s) that oversee day-to-day operations
      • Responsible for preparing and managing the project plan and monitoring the project team’s progress
      • Applications Manager or other IT Manager, Business Analyst, Business Process Owner, or similar

      Business Leads/
      Product Owners

      • Works alongside the Optimization Initiative Manager to ensure that the strategy is aligned with business needs
      • In this case, likely to be a marketing, sales, or customer service lead
      • Product Owners
      • Sales Director, Marketing Director, Customer Care Director, or similar

      CRM Optimization Team

      • Comprised of individuals whose knowledge and skills are crucial to optimization success
      • Responsible for driving day-to-day activities, coordinating communication, and making process and design decisions
      • Project Manager, Business Lead, CRM Manager, Integration Manager, Application SMEs, Developers, Business Process Architects, and/or similar SMEs

      Steering Committee

      • Comprised of C-suite/management level individuals that act as the CRM optimization decision makers.
      • Responsible for validating goals and priorities, defining the optimization scope, enabling adequate resourcing, and managing change
      • Project Sponsor, Project Manager, Business Lead, CMO, Business Unit SMEs, or similar

      1.1.1 Identify stakeholders critical to success

      1 hour

      1. Hold a meeting to identify the stakeholders that should be included in the project’s steering committee.
      2. Finalize selection of steering committee members.
      3. Contact members to ensure their willingness to participate.
      4. Document the steering committee members and the milestone/presentation expectations for reporting project progress and results.

      Input

      • Stakeholder interviews
      • Business process owners list

      Output

      • CRM optimization stakeholders
      • Steering committee members

      Materials

      • N/A

      Participants

      • Product Owners
      • CMO
      • Departmental Leads – Sales, Marketing, Customer Service (and others)
      • Applications Director
      • Senior Business Analyst
      • Senior Developer
      • Procurement Analyst

      The CRM optimization team

      Consider the core team functions when composing the CRM optimization team. Form a cross-functional team (i.e. across IT, Marketing, Sales, Service, Operations) to create a well-aligned CRM optimization strategy.

      Don’t let your core team become too large when trying to include all relevant stakeholders. Carefully limiting the size of the optimization team will enable effective decision making while still including functional business units such as Marketing, Sales, Service, and Customer Service.

      Required Skills/Knowledge

      Suggested Optimization Team Members

      Business

      • Understanding of the customer
      • Departmental processes
      • Sales Manager
      • Marketing Manager
      • Customer Service Manager

      IT

      • Product Owner
      • Application developers
      • Enterprise architects
      • CRM Application Manager
      • Business Process Manager
      • Data Stewards
      Other
      • Operations
      • Administrative
      • Change management
      • Operations Manager
      • CFO
      • Change Management Manager

      1.1.2 Select your CRM optimization team

      30 minutes

      1. Have the CMO and other key stakeholders discuss and determine who will be involved in the CRM optimization project.
        • Depending on the initiative and the size of the organization the size of the team will vary.
        • Key business leaders in key areas – Sales, Marketing, Customer Service, and IT – should be involved.
      2. Document the members of your optimization team in the Get the Most Out of Your CRM Workbook, tab “1. Optimization Team.”
        • Depending on your initiative and size of your organization, the size of this team will vary.

      Get the Most Out of Your CRM Workbook

      Input

      • Stakeholders

      Output

      • List of CRM Optimization Team members

      Materials

      • Get the Most Out of Your CRM Workbook

      Participants

      • Product Owners
      • CMO
      • Departmental Leads – Sales, Marketing, Customer Service
      • Applications Director
      • Senior Business Analyst
      • Senior Developer
      • Procurement Analyst

      Step 1.2

      Build a CRM Strategy Model

      Activities

      • 1.2.1 Explore environmental factors and technology drivers
      • 1.2.2 Discuss challenges and pain points
      • 1.2.3 Discuss opportunities and benefits
      • 1.2.4 Align CRM strategy with organizational goals

      Map Current-State Capabilities

      This step will walk you through the following activities:

      • Identify CRM drivers and objectives.
      • Explore CRM challenges and pain points.
      • Discover the CRM benefits and opportunities.
      • Align the CRM foundation with the corporate strategy.

      This step involves the following participants:

      • CRM Optimization Team

      Outcomes of this step

      • CRM business model
      • Strategy alignment

      Align the CRM strategy with the corporate strategy

      Corporate Strategy

      Your corporate strategy:

      • Conveys the current state of the organization and the path it wants to take.
      • Identifies future goals and business aspirations.
      • Communicates the initiatives that are critical for getting the organization from its current state to the future state.

      Unified Strategy

      • The CRM optimization can be and should be linked, with metrics, to the corporate strategy and ultimate business objectives.

      CRM Strategy

      Your CRM Strategy:

      • Communicates the organization’s budget and spending on CRM.
      • Identifies IT initiatives that will support the business and key CRM objectives.
      • Outlines staffing and resourcing for CRM initiatives.

      CRM projects are more successful when the management team understands the strategic importance and the criticality of alignment. Time needs to be spent upfront aligning business strategies with CRM capabilities. Effective alignment between Sales, Marketing, Customer Service, Operations, IT, and the business should happen daily. Alignment doesn’t just need to occur at the executive level but at each level of the organization.

      Sample CRM objectives

      Increase Revenue

      Enable lead scoring

      Deploy sales collateral management tools

      Improve average cost per lead via a marketing automation tool

      Enhance Market Share

      Enhance targeting effectiveness with a CRM

      Increase social media presence via an SMMP

      Architect customer intelligence analysis

      Improve Customer Satisfaction

      Reduce time-to-resolution via better routing

      Increase accessibility to customer service with live chat

      Improve first contact resolution with customer KB

      Increase Customer Retention

      Use a loyalty management application

      Improve channel options for existing customers

      Use customer analytics to drive targeted offers

      Create Customer-Centric Culture

      Ensure strong training and user adoption programs

      Use CRM to provide 360-degree view of all customer interactions

      Incorporate the voice of the customer into product development

      Identifying organizational objectives of high priority will assist in breaking down business needs and CRM objectives. This exercise will better align the CRM systems with the overall corporate strategy and achieve buy-in from key stakeholders.

      CRM business model Template

      This image contains a screenshot of the CRM business model template

      Understand objectives for creating a strong CRM strategy

      Business Needs

      Business Drivers

      Technology Drivers

      Environmental Factors

      Definition A business need is a requirement associated with a particular business process. Business drivers can be thought of as business-level goals. These are tangible benefits the business can measure such as employee retention, operation excellence, and financial performance. Technology drivers are technological changes that have created the need for a new CRM enablement strategy. Many organizations turn to technology systems to help them obtain a competitive edge. External considerations are factors taking place outside of the organization that are impacting the way business is conducted inside the organization. These are often outside the control of the business.

      Examples

      • Audit tracking
      • Authorization levels
      • Business rules
      • Data quality
      • Employee engagement
      • Productivity
      • Operational efficiency
      • Deployment model (i.e. SaaS)
      • Integration
      • Reporting capabilities
      • Fragmented technologies
      • Economic and political factors, the labor market
      • Competitive influencers
      • Compliance regulations

      Info-Tech Insight

      One of the biggest drivers for CRM adoption is the ability to make decisions through consolidated data. This driver is a result of external considerations. Many industries today are highly competitive, uncertain, and rapidly changing. To succeed under these pressures, there needs to be timely information and visibility into all components of the organization.

      1.2.1 Explore environmental factors and technology drivers

      30 minutes

      1. Identify business drivers that are contributing to the organization’s need for CRM.
      2. Understand how the company is running today and what the organization’s future will look like. Try to identify the purpose for becoming an integrated organization. Use a whiteboard and markers to capture key findings.
      3. Consider environmental factors: external considerations, organizational drivers, technology drivers, and key functional requirements.
      4. Use the Get the Most Out of Your CRM Workbook, tab “2. Business Model,” to complete this exercise.

      Get the Most Out of Your CRM Workbook

      This is a screenshot of the CRM Business Model the following boxes highlighted in purple boxes.  CRM business Needs; Environmental Factors; Technology Drivers

      External Considerations

      Organizational Drivers

      Technology Considerations

      Functional Requirements

      • Funding Constraints
      • Regulations
      • Compliance
      • Scalability
      • Operational Efficiency
      • Data Accuracy
      • Data Quality
      • Better Reporting
      • Information Availability
      • Integration Between Systems
      • Secure Data

      Create a realistic CRM foundation by identifying the challenges and barriers to the project

      There are several different factors that may stifle the success of an CRM portfolio. Organizations creating an CRM foundation must scan their current environment to identify internal barriers and challenges.

      Common Internal Barriers

      Management Support

      Organizational Culture

      Organizational Structure

      IT Readiness

      Definition The degree of understanding and acceptance towards CRM technology and systems. The collective shared values and beliefs. The functional relationships between people and departments in an organization. The degree to which the organization’s people and processes are prepared for new CRM system(s.)

      Questions

      • Is a CRM project recognized as a top priority?
      • Will management commit time to the project?
      • Are employees resistant to change?
      • Is the organization highly individualized?
      • Is the organization centralized?
      • Is the organization highly formalized?
      • Is there strong technical expertise?
      • Is there strong infrastructure?
      Impact
      • Funding
      • Resources
      • Knowledge sharing
      • User acceptance
      • Flow of knowledge
      • Poor implementation
      • Need for reliance on consultants

      1.2.2 Discuss challenges and pain points

      30 minutes

      1. Identify challenges with current systems and processes.
      2. Brainstorm potential barriers to success. Use a whiteboard and markers to capture key findings.
      3. Consider the project barriers: functional gaps, technical gaps, process gaps, and barriers to CRM success.
      4. Use the Get the Most Out of Your CRM Workbook, tab “2. Business Model,” to complete this exercise.

      Get the Most Out of Your CRM Workbook

      This is a screenshot of the CRM Business Model the following boxes highlighted in purple boxes.  Barriers

      Functional Gaps

      Technical Gaps

      Process Gaps

      Barriers to Success

      • No sales tracking within core CRM
      • Inconsistent reporting – data quality concerns
      • Duplication of data
      • Lack of system integration
      • Cultural mindset
      • Resistance to change
      • Lack of training
      • Funding

      1.2.3 Discuss opportunities and benefits

      30 minutes

      1. Identify opportunities and benefits from an integrated system.
      2. Brainstorm potential enablers for successful CRM enablement and the ideal portfolio.
      3. Consider the project enablers: business benefits, IT benefits, organizational benefits, and enablers of CRM success.
      4. Use the Get the Most Out of Your CRM Workbook, tab “2. Business Model,” to complete this exercise.
      This is a screenshot of the CRM Business Model the following boxes highlighted in purple boxes.  Enablers

      Business Benefits

      IT Benefits

      Organizational Benefits

      Enablers of Success

      • Business-IT alignment
      • Compliance
      • Scalability
      • Operational Efficiency
      • Data Accuracy
      • Data Quality
      • Better Reporting
      • Change Management
      • Training
      • Alignment to Strategic Objectives

      1.2.4 Align CRM strategy with organizational goals

      1 hour

      1. Discuss your corporate objectives (organizational goals). Choose three to five corporate objectives that are a priority for the organization in the current year.
      2. Break into groups and assign each group one corporate objective.
      3. For each objective, produce several ways an optimized CRM system will meet the given objective.
      4. Think about the modules and CRM functions that will help you realize these benefits.
      5. Use the Get the Most Out of Your CRM Workbook, tab “2. Business Model,” to complete this exercise.
      Increase Revenue

      CRM Benefits

      • Increase sales by 5%
      • Expand to new markets
      • Offer new product
      • Identify geographies underperforming
      • Build out global customer strategy
      • Allow for customer segmentation
      • Create targeted marketing campaigns

      Input

      • Organizational goals
      • CRM strategy model

      Output

      • Optimization benefits map

      Materials

      • Get the Most Out of Your CRM Workbook

      Participants

      • Product Owners
      • CMO
      • Departmental Leads – Sales, Marketing, Customer Service
      • Applications Director
      • Senior Business Analyst
      • Senior Developer
      • Procurement Analyst

      Download the Get the Most Out of Your CRM Workbook

      Step 1.3

      Inventory Current System State

      Activities

      1.3.1 Inventory applications and interactions

      Map Current-State Capabilities

      This step will walk you through the following activities:

      • Inventory applications
      • Map interactions between systems

      This step involves the following participants:

      • CRM Optimization Team
      • Enterprise Architect
      • Data Architect

      Outcomes of this step

      • Systems inventory
      • Systems diagram

      1.3.1 Inventory applications and interactions

      1-3 hours

      1. Individually list all electronic systems involved in the organization. This includes anything related to customer information and interactions, such as CRM, ERP, e-commerce, finance, email marketing, and social media, etc.
      2. Document data flows into and out of each system to the ERP. Refer to the example on the next slide (CRM data flow).
      3. Review the processes in place (e.g. reporting, marketing, data moving into and out of systems). Document manual processes. Identify integration points. If flowcharts exist for these processes, it may be useful to provide these to the participants.
      4. If possible, diagram the system. Include information direction flow. Use the sample CRM map, if needed.

      This image contains an example of a CRM Data Flow

      CRM data flow

      This image contains an example of a CRM Data Flow

      Be sure to include enterprise applications that are not included in the CRM application portfolio. Popular systems to consider for POIs include billing, directory services, content management, and collaboration tools.

      When assessing the current application portfolio that supports CRM, the tendency will be to focus on the applications under the CRM umbrella, relating mostly to Marketing, Sales, and Customer Service. Be sure to include systems that act as input to, or benefit due to outputs from, the CRM or similar applications.

      Sample CRM map

      This image contains an example of a CRM map

      Step 1.4

      Define Business Capabilities

      Activities

      1.4.1 Define business capabilities

      1.4.2 List your key CRM processes

      Map Current-State Capabilities

      This step will walk you through the following activities:

      • Define your business capabilities
      • List your key CRM processes

      This step involves the following participants:

      • CRM Optimization Team
      • Business Architect

      Outcomes of this step

      • Business capabilities map
      • Key CRM processes list

      Business capability map (Level 0)

      This image contains a screenshot of a business capability map.  an Arrow labeled CRM points to the Revenue Generation section. Revenue Generation: Marketing; Sales; Customer Service.

      In business architecture, the primary view of an organization is known as a business capability map.

      A business capability defines what a business does to enable value creation, rather than how.

      Business capabilities:

      • Represent stable business functions.
      • Are unique and independent of each other.
      • Typically will have a defined business outcome.

      A business capability map provides details that help the business architecture practitioner direct attention to a specific area of the business for further assessment.

      Capability vs. process vs. feature

      Understanding the difference

      When examining CRM optimization, it is important we approach this from the appropriate layer.

      Capability:

      • The ability of an entity (e.g. organization or department) to achieve its objectives (APQC, 2017).
      • An ability that an organization, person, or system possesses. Typically expressed in general and high-level terms and typically require a combination of organization, people, processes, and technology to achieve (TOGAF).

      Process:

      • Can be manual or technology enabled. A process is a series of interrelated activities that convert inputs into results (outputs). Processes consume resources, require standards for repeatable performance, and respond to control systems that direct the quality, rate, and cost of performance. The same process can be highly effective in one circumstance and poorly effective in another with different systems, tools, knowledge, and people (APQC, 2017).

      Feature:

      • Is a distinguishing characteristic of a software item (e.g. performance, portability, or functionality) (IEEE, 2005).

      In today’s complex organizations, it can be difficult to understand where inefficiencies stem from and how performance can be enhanced.
      To fix problems and maximize efficiencies business capabilities and processes need to be examined to determine gaps and areas of lagging performance.

      Info-Tech’s CRM framework and industry tools such as the APQC’s Process Classification Framework can help make sense of this.

      1.4.1 Define business capabilities

      1-3 hours

      1. Look at the major functions or processes within the scope of CRM.
      2. Compile an inventory of current systems that interact with the chosen processes. In its simplest form, document your application inventory in a spreadsheet (see tab 3 of the CRM Application Inventory Tool). For large organizations, interview representatives of business domains to help create your list of applications.
      3. Make sure to include any processes that are manual versus automated.
      4. Use your current state drawing from activity 1.3.1 to link processes to applications for further effect.

      CRM Application Inventory Tool

      Input

      • Current systems
      • Key processes
      • APQC Framework
      • Organizational process map

      Output

      • List of key business processes

      Materials

      • CRM Application Inventory Tool
      • CRM APQC Framework
      • Whiteboard, PowerPoint, or flip charts
      • Pens/markers

      Participants

      • CRM Optimization Team

      CRM process mapping

      This image contains two screenshots.  one is of the business capability map seen earlier in this blueprint, and the other includes the following operating model: Objectives; Value Streams; Capabilities; Processes

      The operating model

      An operating model is a framework that drives operating decisions. It helps to set the parameters for the scope of CRM and the processes that will be supported. The operating model will serve to group core operational processes. These groupings represent a set of interrelated, consecutive processes aimed at generating a common output.

      The Value Stream

      Value Stream Defined

      Value Streams

      Design Product

      Produce Product

      Sell Product

      Customer Service

      • Manufacturers work proactively to design products and services that will meet consumer demand.
      • Products are driven by consumer demand and governmental regulations.
      • Production processes and labor costs are constantly analyzed for efficiencies and accuracies.
      • Quality of product and services are highly regulated through all levels of the supply chain.
      • Sales networks and sales staff deliver the product from the organization to the end consumer.
      • Marketing plays a key role throughout the value stream connecting consumers wants and needs to the product and services offered.
      • Relationships with consumers continue after the sale of a product and services.
      • Continued customer support and mining is important to revenue streams.

      Value streams connect business goals to the organization’s value realization activities in the marketplace. Those activities are dependent on the specific industry segment in which an organization operates.

      There are two types of value streams: core value streams and support value streams.

      • Core value streams are mostly externally facing. They deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map.
      • Support value streams are internally facing and provide the foundational support for an organization to operate.

      An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers.

      APQC Framework

      Help define your inventory of sales, marketing, and customer services processes.

      Operating Processes

      1. Develop Vision and Strategy
      2. Develop and Manage Products and Services
      3. Market and Sell Products and Services
      4. Deliver Physical Products
      5. Deliver Services

      Management and Support Processes

      1. Manage Customer Service
      2. Develop and Manage Human Capital
      3. Manage Information Technology (IT)
      4. Manage Financial Resources
      5. Acquire, Construct, and Manage Assets
      6. Manage Enterprise Risk, Compliance, Remediation, and Resiliency
      7. Manage External Relationships
      8. Develop and Manage Business Capabilities

      Source: APQC, 2020

      If you do not have a documented process model, you can use the APQC Framework to help define your inventory of sales business processes.

      APQC’s Process Classification Framework is a taxonomy of cross-functional business processes intended to allow the objective comparison of organizational performance within and among organizations.

      Go to this link

      Process mapping hierarchy

      This image includes explanations for the following PCF levels:  Level 1 - Category; Level 2 - Process Group; Level 3 - Process; Level 4 - Activity; Level 5 - Task

      APQC provides a process classification framework. It allows organizations to effectively define their processes and manage them appropriately.

      THE APQC PROCESS CLASSIFICATION FRAMEWORK (PCF)® was developed by non-profit APQC, a global resource for benchmarking and best practices, and its member companies as an open standard to facilitate improvement through process management and benchmarking, regardless of industry, size, or geography. The PCF organizes operating and management processes into 12 enterprise level categories, including process groups and over 1,000 processes and associated activities. To download the full PCF or industry-specific versions of the PCF as well as associated measures and benchmarking, visit www.apqc.org/pcf.

      Cross-industry classification framework

      Level 1 Level Level 3 Level 4

      Market and sell products and services

      Understand markets, customers, and capabilities Perform customer and market intelligence analysis Conduct customer and market research

      Market and sell products and services

      Develop sales strategy Develop sales forecast Gather current and historic order information

      Deliver services

      Manage service delivery resources Manage service delivery resource demand Develop baseline forecasts
      ? ? ? ?

      Info-Tech Insight

      Focus your initial assessment on the level 1 processes that matter to your organization. This allows you to target your scant resources on the areas of optimization that matter most to the organization and minimize the effort required from your business partners.

      You may need to iterate the assessment as challenges are identified. This allows you to be adaptive and deal with emerging issues more readily and become a more responsive partner to the business.

      1.4.2 List your key CRM processes

      1-3 hours

      1. Reflect on your organization’s CRM capabilities and processes.
      2. Refer to tab 4, “Process Importance,” in your Get the Most Out of Your CRM Workbook. You can use your own processes if you prefer. Consult tab 10. “Framework (Reference)” in the Workbook to explore additional capabilities.
      3. Use your CRM goals as a guide.

      Get the Most Out of Your CRM Workbook

      This is a screenshot from the APQC Cross-Industry Process Classification Framework, adapted to list key CRM processes

      *Adapted from the APQC Cross-Industry Process Classification Framework, 2019.

      Step 1.5

      Understand CRM Costs

      Activities

      1.5.1 List CRM-related costs (optional)

      Map Current-State Capabilities

      This step will walk you through the following activities:

      • Define your business capabilities
      • List your key CRM processes

      This step involves the following participants:

      • Finance Representatives
      • CRM Optimization Team

      Outcomes of this step

      • Current CRM and related operating costs

      1.5.1 List CRM-related costs (optional)

      3+ hours

      Before you can make changes and optimization decisions, you need to understand the high-level costs associated with your current application architecture. This activity will help you identify the types of technology and people costs associated with your current systems.

      1. Identify the types of technology costs associated with each current system:
        1. System Maintenance
        2. Annual Renewal
        3. Licensing
      2. Identify the cost of people associated with each current system:
        1. Full-Time Employees
        2. Application Support Staff
        3. Help Desk Tickets
      3. Use the Get the Most Out of Your CRM Workbook, tab “9. Costs (Optional),” to complete this exercise.

      This is a screenshot of an example of a table which lays out CRM and Associated Costs.

      Get the Most Out of Your CRM Workbook

      Phase 2

      Assess Your Current State

      • 2.1 Conduct a Gap Analysis for CRM Processes
      • 2.2 Assess User Satisfaction
      • 2.3 Review Your Satisfaction With the Vendor and Product

      Get the Most Out of Your CRM

      This phase will guide you through the following activities:

      • Determine process relevance
      • Perform a gap analysis
      • Perform a user satisfaction survey
      • Assess software and vendor satisfaction

      This phase involves the following participants:

      • CRM optimization team
      • Users across functional areas of your CRM and related technologies

      Step 2.1

      Conduct a Gap Analysis for CRM Processes

      Activities

      • 2.1.1 Determine process relevance
      • 2.1.2 Perform process gap analysis

      Assess Your Current State

      This step will walk you through the following activities:

      • Determine process relevance
      • Perform a gap analysis

      This step involves the following participants:

      • CRM optimization team

      Outcomes of this step

      • Gap analysis for CRM-related processes (current vs. desired state)

      2.1.1 Determine process relevance

      1-3 hours

      1. Open tab “4. Process Importance,” in the Get the Most Out of Your CRM Workbook.
      2. Rate each process for level of importance to your organization on the following scale:
        • Crucial
        • Important
        • Secondary
        • Unimportant
        • Not applicable

      This image contains a screenshot of tab 4 of the Get the most out of your CRM Workbook.

      Get the Most Out of Your CRM Workbook

      2.1.2 Perform process gap analysis

      1-3 hours

      1. Open tab “5. Process Assessment,” in the Get the Most Out of Your CRM Workbook.
      2. For each line item, identify your current state and your desired state on the following scale:
        • Not important
        • Poor
        • Moderate
        • Good
        • Excellent

      This is a screenshot of Tab 5 of the Get the Most Out of your CRM Workshop

      Get the Most Out of Your CRM Workbook

      Step 2.2

      Assess User Satisfaction

      Activities

      • 2.2.1 Prepare and complete a user satisfaction survey
      • 2.2.2 Enter user satisfaction

      Assess Your Current State

      This step will walk you through the following activities:

      • Preparation and completion of an application portfolio assessment (APA)
      • Entry of the user satisfaction scores into the workbook

      This step involves the following participants:

      • CRM optimization team
      • Users across functional areas of CRM and related technologies

      Outcomes of this step

      • Understanding of user satisfaction across applications and processes
      • Insight into CRM data quality

      Benefits of the Application Portfolio Assessment

      This is a screenshot of the application  Overview tab

      Assess the health of the application portfolio

      • Get a full 360-degree view of the effectiveness, criticality, and prevalence of all relevant applications to get a comprehensive view of the health of the applications portfolio.
      • Identify opportunities to drive more value from effective applications, retire nonessential applications, and immediately address at-risk applications that are not meeting expectations.

      This is a screenshot of the Finance Overview tab

      Provide targeted department feedback

      • Share end-user satisfaction and importance ratings for core IT services, IT communications, and business enablement to focus on the right end-user groups or lines of business, and ramp up satisfaction and productivity.

      This is a screenshot of the application  Overview tab

      Insight into the state of data quality

      • Data quality is one of the key issues causing poor CRM user satisfaction and business results. This can include the relevance, accuracy, timeliness, or usability of the organization’s data.
      • Targeted, open-ended feedback around data quality will provide insight into where optimization efforts should be focused.

      2.2.1 Prepare and complete a user satisfaction survey

      1 hour

      Option 1: Use Info-Tech’s Application Portfolio Assessment to generate your user satisfaction score. This tool not only measures application satisfaction but also elicits great feedback from users regarding support they receive from the IT team.

      1. Download the CRM Application Inventory Tool.
      2. Complete the “Demographics” tab (tab 2).
      3. Complete the “Inventory” tab (tab 3).
        1. Complete the inventory by treating each process within the organization as a separate row. Use the processes identified in the process gap analysis as a reference.
        2. Treat every department as a separate column in the department section. Feel free to add, remove, or modify department names to match your organization.
        3. Include data quality for all applications applicable.

      Option 2: Use the method of choice to elicit current user satisfaction for each of the processes identified as important to the organization.

      1. List processes identified as important (from the Get the Most Out of Your CRM Workbook, tab 4, “Process Importance”).
      2. Gather user contact information by department.
      3. Ask users to rate satisfaction: Extremely Satisfied, Satisfied, Neutral, Dissatisfied, and Extremely Dissatisfied (on Get the Most Out of Your CRM Workbook, tab 5. “Process Assessment”).

      This image contains a screenshot of the CRM Application Inventory Tool Tab

      Understand user satisfaction across capabilities and departments within your organization.

      Download the CRM Application Inventory Tool

      2.2.2 Enter user satisfaction

      20 minutes

      Using the results from the Application Portfolio Assessment or your own user survey:

      1. Open your Get the Most Out of Your CRM Workbook, tab “5. Process Assessment.”
      2. For each process, record up to three different department responses.
      3. Enter the answers to the survey for each line item using the drop-down options:
        • Extremely Satisfied
        • Satisfied
        • Neutral
        • Dissatisfied
        • Extremely Dissatisfied

      This is a screenshot of Tab 5 of the Get the most out of your CRM Workbook

      Understand user satisfaction across capabilities and departments within your organization.

      Get the Most Out of Your CRM Workbook

      Step 2.3

      Review Your Satisfaction With the Vendor and Product

      Activities

      2.3.1 Rate your vendor and product satisfaction

      2.3.2 Enter SoftwareReviews scores from your CRM Product Scorecard (optional)

      Assess Your Current State

      This step will walk you through the following activities:

      • Rate your vendor and product satisfaction
      • Compare with survey data from SoftwareReviews

      This step involves the following participants:

      • CRM Owner(s)
      • Procurement Representative
      • Vendor Contracts Manager

      Outcomes of this step

      • Quantified satisfaction with vendor and product

      Use a SoftwareReviews Product Scorecard to evaluate your satisfaction compared to other organizations.

      This is a screenshot of the SoftwareReviews Product Scorecard

      Source: SoftwareReviews, March 2019

      Where effective IT leaders spend their time

      This image contains two lists.  One list is where CIOs with  data-verified=80% satisfaction score, and the other list is CIOs with <80% satisfaction score.">

      Info-Tech Insight

      The data shows that effective IT leaders invest a significant amount of time (8%) on vendor management initiatives.

      Be proactive in managing you calendar and block time for these important tasks.

      CIOs who prioritize vendor management see improved results

      Analysis of CIOs’ calendars revealed that how CIOs spend their time has a correlation to both stakeholder IT satisfaction and CEO-CIO alignment.

      Those CIOs that prioritized vendor management were more likely to have a business satisfaction score greater than 80%.

      This image demonstrates that CIOs who spend time with the team members of their direct reports delegate management responsibilities to direct reports and spend less time micromanaging, and CIOs who spend time on vendor management align rapidly changing business needs with updated vendor offerings.

      2.3.1 Rate your vendor and product satisfaction

      30 minutes

      Use Info-Tech’s vendor satisfaction survey to identify optimization areas with your CRM product(s) and vendor(s).

      Option 1 (recommended): Conduct a satisfaction survey using SoftwareReviews. This option allows you to see your results in the context of the vendor landscape.

      Download the Get the Most Out of Your CRM Workbook

      Option 2: Use your Get the Most Out of Your CRM Workbook, tab “6. Vendor Optimization,” to review your satisfaction with your software.

      SoftwareReviews’ Customer Relationship Management

      This is a screenshot of tab 6 of the Get the most out of your CRM Workbook.

      2.3.2 Enter SoftwareReviews scores (optional)

      30 minutes

      1. Download the scorecard for your CRM product from the SoftwareReviews website. (Note: Not all products are represented or have sufficient data, so a scorecard may not be available.)
      2. Use your Get the Most Out of Your CRM Workbook, tab “6. Vendor Optimization,” to record the scorecard results.
      3. Use your Get the Most Out of Your CRM Workbook, tab “6. Vendor Optimization,” to flag areas where your score may be lower than the product scorecard. Brainstorm ideas for optimization.

      Download the Get the Most Out of Your CRM Workbook

      SoftwareReviews’ Customer Relationship Management

      This is a screenshot of the optional vendor optimization scorecard

      Phase 3

      Build Your Optimization Roadmap

      • 3.1 Identify Key Optimization Areas
      • 3.2 Compile Optimization Assessment Results

      Get the Most Out of Your CRM

      This phase will walk you through the following activities:

      • Identify key optimization areas
      • Create an optimization roadmap

      This phase involves the following participants:

      • CRM Optimization Team

      Build your optimization roadmap

      Address process gaps

      • CRM and related technologies are invaluable to sales, marketing, and customer service enablement, but they must have supported processes driven by business goals.
      • Identify areas where capabilities need to be improved and work towards.

      Support user satisfaction

      • The best technology in the world won’t deliver business results if it is not working for the users who need it.
      • Understand concerns, communicate improvements, and support users in all roles.

      Improve data quality

      • Data quality is unique to each business unit and requires tolerance, not perfection.
      • Implement a set of data quality initiatives that are aligned with overall business objectives and aimed at addressing data practices and the data itself.

      Proactively manage vendors

      • Vendor management is a critical component of technology enablement and IT satisfaction.
      • Assess your current satisfaction against those of your peers and work towards building a process that is best fit for your organization.

      Info-Tech Insight

      Enabling a high-performing, customer-centric sales, marketing, and customer service operations program requires excellent management practices and continuous optimization efforts.

      Technology portfolio and architecture is important, but we must go deeper. Taking a holistic view of CRM technologies in the environments in which they operate allows for the inclusion of people and process improvements – this is key to maximizing business results.

      Using a formal CRM optimization initiative will drive business-IT alignment, identify IT automation priorities, and dig deep into continuous process improvement.

      Step 3.1

      Identify Key Optimization Areas

      Activities

      • 3.1.1 Explore process gaps
      • 3.1.2 Analyze user satisfaction
      • 3.1.3 Assess data quality
      • 3.1.4 Analyze product satisfaction and vendor management

      Build Your Optimization Roadmap

      This step will guide you through the following activities:

      • Explore existing process gaps
      • Identify the impact of processes on user satisfaction
      • Identify the impact of data quality on user satisfaction
      • Review your overall product satisfaction and vendor management

      This step involves the following participants:

      • CRM Optimization Team

      Outcomes of this step

      • Application optimization plan

      3.1.1 Explore process gaps

      1 hour

      1. Review the compiled CRM Process Assessment in the Get the Most Out of Your CRM Workbook, tab “7. Process Prioritization.”
      2. These are processes you should prioritize.
      • The activities in the rest of Step 3.1 help you create optimization strategies for the different areas of improvement these processes relate to: user satisfaction, data quality, product satisfaction, and vendor management.
    • Consolidate your optimization strategies in the Get the Most Out of Your CRM Workbook, tab “8. Optimization Roadmap.” (See next slide for screenshot.)
    • This image consists of the CRM Process Importance Rankings

      Get the Most Out of Your CRM Workbook

      Plan your product optimization strategy for each area of improvement

      This is a screenshot from the Get the most out of your CRM Workbook, with the Areas of Improvement column  highlighted in a red box.

      3.1.2 Analyze user satisfaction

      1 hour

      1. Use the APA survey results from activity 2.2.1 (or your own internal survey) to identify areas where the organization is performing low in user satisfaction across the CRM portfolio.
        1. Understand application portfolio and IT service satisfaction.
        2. Identify cost savings opportunities from unused or unimportant apps.
        3. Build a roadmap for improving user IT services.
        4. Manage needs by department and seniority.
      2. Consolidate your optimization strategies in the Get the Most Out of Your CRM Workbook, tab “8. Optimization Roadmap.” (See next slide for screenshot.)

      this is an image of the Business & IT Communications Overview Tab from the Get the Most Out of Your CRM Workbook

      Get the Most Out of Your CRM Workbook

      Plan your user satisfaction optimization strategy

      This is a screenshot from the Get the most out of your CRM Workbook, with the Optimization Strategies column  highlighted in a red box.

      Next steps in improving your data quality

      Data Quality Management Effective Data Governance Data-Centric Integration Strategy Extensible Data Warehousing
      • Prevention is ten times cheaper than remediation. Stop fixing data quality with band-aid solutions and start fixing it by healing it at the source of the problem.
      • Data governance enables data-driven insight. Think of governance as a structure for making better use of data.
      • Every enterprise application involves data integration. Any change in the application and database ecosystem requires you to solve a data integration problem.
      • A data warehouse is a project; but successful data warehousing is a program. An effective data warehouse requires planning beyond the technology implementation.
      • Data quality is unique to each business unit and requires tolerance, not perfection. If the data allows the business to operate at the desired level, don’t waste time fixing data that may not need to be fixed.
      • Collaboration is critical. The business may own the data, but IT understands the data. Data governance will not work unless the business and IT work together.
      • Data integration is becoming more and more critical for downstream functions of data management and for business operations to be successful. Poor integration holds back these critical functions.
      • Governance, not technology, needs to be the core support system for enabling a data warehouse program.
      • Implement a set of data quality initiatives that are aligned with overall business objectives and aimed at addressing data practices and the data itself.
      • Data governance powers the organization up the data value chain through policies and procedures, master data management, data quality, and data architecture.
      • Build your data integration practice with a firm foundation in governance and reference architecture. Ensure your process is scalable and sustainable.
      • Leverage an approach that focuses on constructing a data warehouse foundation that can address a combination of operational, tactical, and ad hoc business needs.
      • Develop a prioritized data quality improvement project roadmap and long-term improvement strategy.
      • Create a roadmap to prioritize initiatives and delineate responsibilities among data stewards, data owners, and members of the data governance steering committee.
      • Support the flow of data through the organization and meet the organization’s requirements for data latency, availability, and relevancy.
      • Invest time and effort to put together pre-project governance to inform and provide guidance to your data warehouse implementation.
      • Build related practices with more confidence and less risk after achieving an appropriate level of data quality.
      • Ensure buy-in from the business and IT stakeholders. Communicate initiatives to end users and executives to reduce resistance.
      • Data availability must be frequently reviewed and repositioned to continue to grow with the business.
      • Select the most suitable architecture pattern to ensure the data warehouse is “built right” at the very beginning.

      Build Your Data Quality Program

      Establish Data Governance

      Build a Data Integration Strategy

      Build an Extensible Data Warehouse Foundation

      3.1.3 Assess data quality

      1 hour

      1. Use your APA survey results (if available) to identify areas where the organization is performing low in data quality initiatives. Common areas for improvement include:
        • Overall data quality management
        • Effective data governance
        • Poor data integration
        • The need to implement extensible data warehousing
      2. Consolidate your optimization strategies in the Get the Most Out of Your CRM Workbook, tab “8. Optimization Roadmap.” (See next slide for screenshot.)

      This is an image of the Business & IT Communications Overview tab from the Get the most out of your CRM Workbook

      Get the Most Out of Your CRM Workbook

      Plan your data quality optimization strategy

      This is a screenshot from the Get the most out of your CRM Workbook, with the Optimization Strategies column  highlighted in a red box.

      Use Info-Tech’s vendor management initiative (VMI)

      Create a right-size, right-fit strategy for managing the vendors relevant to your organization.

      A crowd chart is depicted, with quadrants for strategic value, and Vendor spend/switching cost.

      Info-Tech Insight

      A VMI is a formalized process within an organization, responsible for evaluating, selecting, managing, and optimizing third-party providers of goods and services.

      The amount of resources you assign to managing vendors depends on the number and value of your organization’s relationships. Before optimizing your vendor management program around the best practices presented in this blueprint, assess your current maturity and build the process around a model that reflects the needs of your organization.

      Info-Tech uses VMI interchangeably with the terms “vendor management office (VMO),” “vendor management function,” “vendor management process,” and “vendor management program.”

      Jump Start Your Vendor Management Initiative

      3.1.4 Analyze product satisfaction and vendor management

      1 hour

      1. Use the Get the Most Out of Your CRM Workbook, tab “6. Vendor Optimization.”
      2. Download the SoftwareReviews Vendor Scorecard.
      3. Using the scorecards, compare your results with those of your peers.
      4. Consolidate areas of improvement and optimization strategies in the Get the Most Out of Your CRM Workbook, tab “8. Optimization Roadmap.” (See next slide for screenshot.)

      See previous slide for help around implementing a vendor management initiative.

      This is a screenshot from the Get the most out of your CRM Workbook, with the Areas for Optimization column  highlighted in a red box.

      Get the Most Out of Your CRM Workbook

      Plan your vendor management optimization strategy

      This is a screenshot from the Get the most out of your CRM Workbook, with the Optimization Strategies column  highlighted in a red box.

      Step 3.2

      Compile Optimization Assessment Results

      Activities

      • 3.2.1 Identify key optimization areas

      Build Your Optimization Roadmap

      This step will guide you through the following activities:

      • Use your work from previous activities and prioritization to build your list of optimization activities and lay them out on a roadmap

      This step involves the following participants:

      • CRM Optimization Team

      Outcomes of this step

      • Application optimization plan

      3.2.1 Identify key optimization areas

      1-3 hours

      Before you can make changes and optimization decisions, you need to understand the high-level costs associated with your current application architecture. This activity will help you identify the types of technology and people costs associated with your current systems.

      1. Consolidate your findings and identify optimization priorities (Step 3.1).
      2. Prioritize those most critical to the organization, easiest to change, and whose impact will be highest.
      3. Use the information gathered from exercise 1.5.1 on Get the Most Out of Your CRM Workbook, tab “9. Costs (Optional).”
      4. These costs could affect the priority or timeline of the initiatives. Consolidate your thoughts on your Get the Most Out of Your CRM Workbook, tab 8, “Optimization Roadmap.” Note: There is no column specific to costs on tab 8.

      This is meant as a high-level roadmap. For formal, ongoing optimization project management, refer to “Build a Better Backlog” (Phase 2 of the Info-Tech blueprint Deliver on Your Digital Product Vision).

      This is a screenshot from the Get the most out of your CRM Workbook, with the Priority; Owner; and Timeline columns highlighted in a red box.

      Next steps: Manage your technical debt

      Use a holistic assessment of the “interest” paid on technical debt to quantify and prioritize risk and enable the business make better decisions.

      • Technical debt is an IT risk, which in turn is a category of business risk.
      • The business must decide how to manage business risk.
      • At the same time, business decision makers may not be aware of technical debt or be able to translate technical challenges into business risk. IT must help the business make decisions around IT risk by describing the risk of technical debt in business terms and by outlining the options available to address risk.
      • Measure the ongoing business impact (the “interest” paid on technical debt) to establish the business risk of technical debt. Consider a range of possible impacts including direct costs, lost goodwill, lost flexibility and resilience, and health, safety, and compliance impacts.
      • When weighing these impacts, the business may choose to accept the risk of technical debt if the cost of addressing the debt outweighs the benefit. But it’s critically important that the business accepts that risk – not IT.

      Manage Your Technical Debt

      Take it a step further…

      Deliver on Your Digital Product Vision

      Phase 2: Build a Better Product Backlog

      Build a structure for your backlog that supports your product vision.

      Deliver on Your Digital Product Vision

      Build a better backlog

      An ongoing CRM optimization effort is best facilitated through a continuous Agile process. Use info-Tech’s developed tools to build out your backlog.

      The key to a better backlog is a common structure and guiding principles that product owners and product teams can align to.

      Info-Tech Insight

      Exceptional customer value begins with a clearly defined backlog focused on items that will create the greatest human and business benefits.

      Activity Participants

      Backlog Activity

      Quality Filter

      Product Manager

      Product Owner

      Dev Team

      Scrum Master

      Business

      Architects

      Sprint

      Sprint Planning

      “Accepted”

      Ready

      Refine

      “Ready”

      Qualified

      Analysis

      “Qualified”

      Ideas

      Intake

      “Backlogged”

      A product owner and the product backlog are critical to realize the benefits of Agile development

      A product owner is accountable for defining and prioritizing the work that will be of the greatest value to the organization and its customers. The backlog is the key to facilitating this process and accomplishing the most fundamental goals of delivery.

      For more information on the role of a product owner, see Build a Better Product Owner.

      Highly effective Agile teams spend 28% of their time on product backlog management and roadmapping (Quantitative Software Management, 2015).

      1. Manage Stakeholders

      • Stakeholders need to be kept up to speed on what the future holds for a product, or at least they should be heard. This task falls to the product owner.

      2. Inform and Protect the Team

      • The product owner is a servant leader of the team. They need to protect the team from all the noise and give them the time they need to focus on what they do best: develop.

      3. Maximize Value to the Product

      • Sifting through all of these voices and determining what is valuable, or what is most valuable, falls to the product owner.

      A backlog stores and organizes PBIs at various stages of readiness.

      Your backlog must give you a holistic understanding of demand for change in the product

      A well-formed backlog can be thought of as a DEEP backlog:

      Detailed Appropriately: PBIs are broken down and refined as necessary.

      Emergent: The backlog grows and evolves over time as PBIs are added and removed.

      Estimated: The effort a PBI requires is estimated at each tier.

      Prioritized: The PBI’s value and priority are determined at each tier.

      Ideas; Qualified; Ready

      3 - IDEAS

      Composed of raw, vague, and potentially large ideas that have yet to go through any formal valuation.

      2 - QUALIFIED

      Researched and qualified PBIs awaiting refinement.

      1 - READY

      Discrete, refined PBIs that are ready to be placed in your development teams’ sprint plans.

      Summary of Accomplishment

      Get the Most Out of Your CRM

      CRM technology is critical to facilitate an organization’s relationships with customers, service users, employees, and suppliers. CRM implementation should not be a one-and-done exercise. There needs to be an ongoing optimization to enable business processes and optimal organizational results.

      Get the Most Out of Your CRM allows organizations to proactively implement continuous assessment and optimization of a customer relationship management system. This includes:

      • Alignment and prioritization of key business and technology drivers
      • Identification of CRM processes including classification and gap analysis
      • Measurement of user satisfaction across key departments
      • Improved vendor relations
      • Data quality initiatives

      This formal CRM optimization initiative will drive business-IT alignment, identify IT automation priorities, and dig deep into continuous process-improvement.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech Workshop.

      Contact your account representative for more information

      workshops@infotech.com
      1-866-670-8889

      Research Contributors

      Ben Dickie

      Ben Dickie
      Research Practice Lead
      Info-Tech Research Group

      Ben Dickie is a Research Practice Lead at Info-Tech Research Group. His areas of expertise include customer experience management, CRM platforms, and digital marketing. He has also led projects pertaining to enterprise collaboration and unified communications.

      Scott Bickley

      Scott Bickley
      Practice Lead & Principal Research Director
      Info-Tech Research Group

      Scott Bickley is a Practice Lead & Principal Research Director at Info-Tech Research Group focused on vendor management and contract review. He also has experience in the areas of IT asset management (ITAM), software asset management (SAM), and technology procurement, along with a deep background in operations, engineering, and quality systems management.

      Andy Neil

      Andy Neil
      Practice Lead, Applications
      Info-Tech Research Group

      Andy is Senior Research Director, Data Management and BI, at Info-Tech Research Group. He has over 15 years of experience in managing technical teams, information architecture, data modeling, and enterprise data strategy. He is an expert in enterprise data architecture, data integration, data standards, data strategy, big data, and the development of industry-standard data models.

      Bibliography

      Armel, Kate. “Data-driven Estimation, Management Lead to High Quality.” Quantitative Software Management Inc. 2015. Web.

      Chappuis, Bertil, and Brian Selby. “Looking beyond Technology to Drive Sales Operations.” McKinsey & Company, 24 June 2016. Web.

      Cross-Industry Process Classification Framework (PCF) Version 7.2.1. APQC, 26 Sept. 2019. Web.

      Fleming, John, and Hater, James. “The Next Discipline: Applying Behavioral Economics to Drive Growth and Profitability.” Gallup, 22 Sept. 2012. Accessed 6 Oct. 2020.

      Hinchcliffe, Dion. “The evolving role of the CIO and CMO in customer experience.” ZDNet, 22 Jan. 2020. Web.

      Karlsson, Johan. “Backlog Grooming: Must-Know Tips for High-Value Products.” Perforce. 18 May 2018. Web. Feb. 2019.

      Klie, L. “CRM Still Faces Challenges, Most Speakers Agree: CRM systems have been around for decades, but interoperability and data siloes still have to be overcome.” CRM Magazine, vol. 23, no. 5, 2019, pp. 13-14.

      Kumar, Sanjib, et al. “Improvement of CRM Using Data Mining: A Case Study at Corporate Telecom Sector.” International Journal of Computer Applications, vol. 178, no. 53, 2019, pp. 12-20, doi:10.5120/ijca2019919413.

      Morgan, Blake. “50 Stats That Prove The Value Of Customer Experience.” Forbes, 24 Sept. 2019. Web.

      Norelus, Ernese, et al. “An Approach to Application Modernization: Discovery and Assessment Phase.” IBM Garage, Medium, 24 Feb 2020. Accessed 4 Mar. 2020.

      “Process Frameworks.” APQC, 4 Nov. 2020. Web.

      “Process vs. Capability: Understanding the Difference.” APCQ, 2017. Web.

      Rubin, Kenneth S. "Essential Scrum: A Practical Guide to the Most Popular Agile Process." Pearson Education, 2012.

      Savolainen, Juha, et al. “Transitioning from Product Line Requirements to Product Line Architecture.” 29th Annual International Computer Software and Applications Conference (COMPSAC'05), IEEE, vol. 1, 2005, pp. 186-195, doi: 10.1109/COMPSAC.2005.160

      Smith, Anthony. “How To Create A Customer-Obsessed Company Like Netflix.” Forbes, 12 Dec. 2017. Web.

      “SOA Reference Architecture – Capabilities and the SOA RA.” The Open Group, TOGAF. Web.

      Taber, David. “What to Do When Your CRM Project Fails.” CIO Magazine, 18 Sept. 2017. Web.

      “Taudata Case Study.” Maximizer CRM Software, 17 Jan. 2020. Web.

      Select an ERP Implementation Partner

      • Buy Link or Shortcode: {j2store}591|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $77,174 Average $ Saved
      • member rating average days saved: 17 Average Days Saved
      • Parent Category Name: Enterprise Resource Planning
      • Parent Category Link: /enterprise-resource-planning
      • Enterprise application implementations are complex, and their success is critical to business operations.
      • Selecting the right software implementation partner is as important for the success of the ERP initiative as selecting the right software.
      • System implementation often thrusts the product into the spotlight, with the implementation partner being an afterthought, and all too often organizational needs are ignored altogether.

      Our Advice

      Critical Insight

      • ERP implementation is not a one-and-done exercise. Most often it is the start of a multi-year working relationship between the software vendor or systems integrator and your organization. Take the time to find the right fit to ensure success.
      • The conventional approach to ERP implementation partner selection puts the ERP vendor and systems integrators in the driver's seat with little regard to your specific needs as an organization. You need to take an eyes-wide-open approach to your organization’s strengths and weaknesses to properly select and manage the implementation partner relationship.
      • Self-assessment is the critical first step in a successful implementation. Every organization has a unique combination of critical success factors (CSFs) that will be required to unlock the potential of their ERP. You must find the right partner or partners whose strengths complement your weaknesses to ensure your success.
      • Before you start knocking on vendors’ doors, ensure you have a holistic request that encompasses the strategic, tactical, operational, and commodity factors required for the success of your ERP implementation.

      Impact and Result

      • Use Info-Tech’s implementation partner selection process to find the right fit for your organization.
      • Understand the enterprise application CSFs and determine the unique requirements of your organization through this lens.
      • Define your implementation partner requirements separately from your software requirements and allow vendors to respond to those specifically.
      • Use our assessment tools to score and assess the CSFs required to select the right software implementation partners.

      Select an ERP Implementation Partner Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should focus on selecting the right implementation partner, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify your strategic needs

      Review the CSFs that are of strategic importance. Evaluating the gaps in your organization's capabilities enables you to choose a partner that can properly support you in your project.

      • Select an ERP Implementation Partner Workbook

      2. Review your tactical, commodity, and operational needs

      Review the CSFs that are of tactical, commodity, and operational importance. Evaluating the gaps in your organization's capabilities enables you to choose a partner that can properly support you in your project.

      3. Build your RFx and evaluate the responses

      Review your RFx and build an initial list of vendor/implementors to reach out to. Finally, build your evaluation checklist to rate the incoming responses.

      • Short-Form RFP Template
      • Long-Form RFP Template
      • Lean RFP Template
      • Supplementary RFx Material
      • RFx Vendor Evaluation Tool
      [infographic]

      Workshop: Select an ERP Implementation Partner

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Organizational Strategic Needs

      The Purpose

      Review the critical success factors that are of strategic importance. Evaluating the gaps in your organization's capabilities enables you to choose a partner that can properly support you in your project.

      Key Benefits Achieved

      ERP strategy model defined

      Strategic needs identified

      Activities

      1.1 Review the business context.

      1.2 Build your ERP strategy model.

      1.3 Assess your strategic needs.

      Outputs

      ERP strategy model

      ERP strategy model

      Strategic needs analysis

      2 Review Your Tactical, Commodity, and Operational Needs

      The Purpose

      Review the critical success factors that are of tactical, commodity, and operational importance. Evaluating the gaps in your organization's capabilities enables you to choose a partner that can properly support you in your project.

      Key Benefits Achieved

      Tactical, commodity, and operational needs identified

      Activities

      2.1 Assess your tactical needs.

      2.2 Assess your commodity needs.

      2.3 Assess your operational needs.

      Outputs

      Tactical needs analysis

      Commodity needs analysis

      Operational needs analysis

      3 Build Your RFx

      The Purpose

      Review your RFx and build an initial list of vendor/implementors to reach out to. Finally, build your evaluation checklist to rate the incoming responses.

      Key Benefits Achieved

      Draft RFI or RFP

      Target vendor list

      Activities

      3.1 Decide on an RFI or RFP.

      3.2 Complete the RFx with the needs analysis.

      3.3 Build a list of targeted vendors

      Outputs

      Draft RFI or RFP

      Draft RFI or RFP

      Target vendor list

      4 Evaluate Vendors

      The Purpose

      Build a scoring template for use in vendor evaluation to ensure consistent comparison criteria are used.

      Key Benefits Achieved

      A consistent and efficient evaluation process

      Activities

      4.1 Assign weightings to the evaluation criteria.

      4.2 Run a vendor evaluation simulation to validate the process.

      Outputs

      Completed partner evaluation tool

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy

      • Buy Link or Shortcode: {j2store}563|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions
      • Organizations are unaware of the capabilities of web analytics tools and unsure how to leverage these new technologies to enhance their web experience.
      • Traditional solutions offer only information and data about the activity on the website. It is difficult for organizations to understand the customer motivations and behavioral patterns using the data.
      • In addition, there is an overwhelming number of vendors offering various solutions. Understanding which solution best fits your business needs is crucial to avoid overspending.

      Our Advice

      Critical Insight

      • Understanding organizational goals and business objectives is essential in effectively leveraging web analytics.
      • It is easy to get lost in a sea of expensive web analytical tools. Choosing tools that align with the business objectives will keep the costs of customer acquisition and retention to a minimum.
      • Beyond selection and implementation, leveraging web analytic tools requires commitment from the organization to continuously monitor key KPIs to ensure good customer web experience.

      Impact and Result

      • Understand what web analytic tools are and some key trends in the market space. Learn about top advanced analytic tools that help understand user behavior.
      • Discover top vendors in the market space and some of the top-level features they offer.
      • Understand how to use the metrics to gather critical insights about the website’s use and key initiatives for successful implementation.

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Research & Tools

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Storyboard – A deck outlining the importance of web analytic tools and how they can be leveraged to meet your business needs.

      This research offers insight into web analytic tools, key trends in the market space, and an introduction to advanced web analytics techniques. Follow our five-step initiative to successfully select and implement web analytics tools and identify which baseline metrics to measure and continuously monitor for best results.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Leverage Web Analytics to Reinforce Your Web Experience Management Strategy Storyboard
      [infographic]

      Further reading

      Leverage Web Analytics to Reinforce Your Web Experience Management Strategy

      Web analytics tools are the gateway to understanding customer behavior.

      EXECUTIVE BRIEF

      Analyst Perspective

      In today’s world, users want to consume concise content and information quickly. Websites have a limited time to prove their usefulness to a new user. Content needs to be as few clicks away from the user as possible. Analyzing user behavior using advanced analytics techniques can help website designers better understand their audience.

      Organizations need to implement sophisticated analytics tools to track user data from their website. However, simply extracting data is not enough to understand the user motivation. A successful implementation of a web analytics tool will comprise both understanding what a customer does on the website and why the customer does what they do.

      This research will introduce some fundamental and advanced analytics tools and provide insight into some of the vendors in the market space.

      Photo of Sai Krishna Rajaramagopalan, Research Specialist, Applications − Enterprise Applications, Info-Tech Research Group. Sai Krishna Rajaramagopalan
      Research Specialist, Applications − Enterprise Applications
      Info-Tech Research Group

      Executive Summary

      Your Challenge
      • Web analytics solutions have emerged as applications that provide extensive information and data about users visiting your webpage. However, many organizations are unaware of the capabilities of these tools and unsure how to leverage these new technologies to enhance user experience.
      Common Obstacles
      • Traditional solutions offer information and data about customers’ activity on the website but no insight into their motivations and behavioral patterns.
      • In addition, an overwhelming number of vendors are offering various solutions. Understanding which solution best fits your business needs is crucial to avoid overspending.
      Info-Tech’s Approach
      • This research is aimed to help you understand what web analytic tools are and some key trends in the market space. Learn about top advanced analytic tools that help you understand user behavior. Discover top vendors in the market space and some of the high-level features offered.
      • This research also explains techniques and metrics to gather critical insights about your website’s use and will aid in understanding users’ motivations and patterns and better predict their behavior on the website.

      Info-Tech Insight

      It is easy to get lost in a sea of expensive web analytics tools. Choose tools that align with your business objectives to keep the costs of customer acquisition and retention to a minimum.

      Ensure the success of your web analytics programs by following five simple steps

      1. ORGANIZATIONAL GOALS

      The first key step in implementing and succeeding with web analytics tools is to set clearly defined organizational goals, e.g. improving product sales.

      3. KPI METRICS

      Define key performance indicators (KPIs) that help track the organization’s performance, e.g. number of page visits, conversion rates, bounce rates.

      5. REVIEW

      Continuous improvement is essential to succeed in understanding customers. The world is a dynamic place, and you must constantly revise your organizational goals, business objectives, and KPIs to remain competitive.

      Centerpiece representing the five surrounding steps.

      2. BUSINESS OBJECTIVES

      The next step is to lay out business objectives that help to achieve the organization’s goals, e.g. to increase customer leads, increase customer transactions, increase web traffic.

      4. APPLICATION SELECTION

      Understand the web analytics tool space and which combination of tools and vendors best fits the organization’s goals.

      Web Analytics Introduction

      Understand traditional and advanced tools and their capabilities.

      Understanding web analytics

      • Web analytics is the branch of analytics that deals with the collection, reporting, and analysis of data generated by users visiting and interacting with a website.
      • The purpose of web analytics is to measure user behavior, optimize the website’s user experience and flow, and gain insights that help meet business objectives like increasing conversions and sales.
      • Web analytics allows you to see how your website is performing and how people are acting while on your website. What’s important is what you can do with this knowledge.
      • Data collected through web analytics may include traffic sources, referring sites, page views, paths taken, and conversion rates. The compiled data often forms a part of customer relationship management analytics to facilitate and streamline better business decisions.
      • Having strong web analytics is important in understanding customer behavior and fine-tuning marketing and product development approaches accordingly.
      Example of a web analytics dashboard.

      Why you should leverage web analytics

      Leveraging web analytics allows organizations to better understand their customers and achieve their business goals.

      The global web analytics market size is projected to reach US$5,156.3 million by 2026, from US$2,564 million in 2019, at a CAGR of 10.4% during 2021-2026. (Source: 360 Research Reports, 2021) Of the top 1 million websites with the highest traffic, there are over 3 million analytics technologies used. Google Analytics has the highest market share, with 50.3%. (Source: “Top 1 Million Sites,” BuiltWith, 2022)
      Of the 200 million active websites, 57.3% employ some form of web analytics tool. This trend is expected to grow as more sophisticated tools are readily available at a cheaper cost. (Source: “On the Entire Internet,” BuiltWith, 2022; Siteefy, 2022) A three-month study by Contentsquare showed a 6.9% increase in traffic, 11.8% increase in page views, 12.4% increase in transactions, and 3.6% increase in conversion rates through leveraging web analytics. (Source: Mordor Intelligence, 2022)

      Case Study

      Logo for Ryanair.
      INDUSTRY
      Aviation
      SOURCE
      AT Internet
      Web analytics

      Ryanair is a low-fare airline in Europe that receives nearly all of its bookings via its website. Unhappy with its current web analytics platform, which was difficult to understand and use, Ryanair was looking for a solution that could adapt to its requirements and provide continuous support and long-term collaboration.

      Ryanair chose AT Internet for its intuitive user interface that could effectively and easily manage all the online activity. AT was the ideal partner to work closely with the airline to strengthen strategic decision making over the long term, increase conversions in an increasingly competitive market, and increase transactions on the website.

      Results

      By using AT Internet Web Analytics to improve email campaigns and understand the behavior of website visitors, Ryanair was able to triple click-through rates, increase visitor traffic by 16%, and decrease bounce rate by 18%.

      Arrows denoting increases or decreases in certain metrics: '3x increase in click-through rates', '16% increase in visitor traffic', '18% decrease in bounce rate'.

      Use traditional web analytics tools to understand your consumer

      What does the customer do?
      • Traditional web analytics allows organizations to understand what is happening on their website and what customers are doing. These tools deliver hard data to measure the performance of a website. Some of the data measured through traditional web analytics are:
      • Visit count: The number of visits received by a webpage.
      • Bounce rate: The percentage of visitors that leave the website after only viewing the first page compared to total visitors.
      • Referrer: The previous website that sent the user traffic to a specific website.
      • CTA clicks: The number of times a user clicks on a call to action (CTA) button.
      • Conversion rate: Proportion of users that reach the final outcome of the website.
      Example of a traditional web analytics dashboard.

      Use advanced web analytics techniques to understand your consumer

      Why does the customer do what they do?
      • Traditional web analytic tools fail to explain the motivation of users. Advanced analytic techniques help organizations understand user behavior and measure user satisfaction. The techniques help answer questions like: Why did a user come to a webpage? Why did they leave? Did they find what they were looking for? Some of the advanced tools include:
      • Heatmapping: A visual representation of where the users click, scroll, and move on a webpage.
      • Recordings: A recording of the mouse movement and clicks for the entire duration of a user’s visit.
      • Feedback forms and surveys: Voice of the customer tools allowing users to give direct feedback about websites.
      • Funnel exploration: The ability to visualize the steps users take to complete tasks on your site or app.
      Example of an advanced web analytics dashboard.

      Apply industry-leading techniques to leverage web analytics

      Heatmapping
      • Heatmaps are used to visualize where users move their mouse, click, and scroll in a webpage.
      • Website heatmaps use a warm-to-cold color scheme to indicate user activity, with the warmest color indicating the highest visitor engagement and the coolest indicating the lowest visitor engagement.
      • Organizations can use this tool to evaluate the elements of the website that attract users and identify which sections require improvement to increase user engagement.
      • Website designers can make changes and compare the difference in user interaction to measure the effectiveness of the changes.
      • Scrollmaps help designers understand what the most popular scroll-depth of your webpage is – and that’s usually a prime spot for an important call to action.
      Example of a website with heatmapping overlaid.
      (Source: An example of a heatmap layered with a scrollmap from Crazy Egg, 2020)

      Apply industry-leading techniques to leverage web analytics

      Funneling

      • Funnels are graphical representations of a customer’s journey while navigating through the website.
      • Funnels help organizations identify which webpage users land on and where users drop off.
      • Organizations can capture every user step to find the unique challenges between entry and completion. Identifying what friction stands between browsing product grids and completing a transaction allows web designers to then eliminate it.
      • Designers can use A/B testing to experiment with different design philosophies to compare conversion statistics.
      • Funneling can be expanded to cross-channel analytics by incorporating referral data, cookies, and social media analytics.
      Example of a bar chart created through funneling.

      Apply industry-leading techniques to leverage web analytics

      Session recordings

      • Session recordings are playbacks of users’ interaction with the website on a single session. User interaction can vary between mouse clicks, keyboard input, and mouse scroll.
      • Recordings help organizations understand user motivation and help identify why users undertake certain tasks or actions on the webpage.
      • Playbacks can also be used to see if users are confused anywhere between the landing page and final transaction phase. This way, playbacks further help ensure visitors complete the funneling seamlessly.
      Example of a session recording featuring a line created by the mouse's journey.

      Apply industry-leading techniques to leverage web analytics

      Feedback and microsurveys

      • Feedback can be received directly from end users to help organizations improve the website.
      • Receiving feedback from users can be difficult, since not every user is willing to spend time to submit constructive and detailed feedback. Microsurveys are an excellent alternative.
      • Users can submit short feedback forms consisting of a single line or emojis or thumbs up or down.
      • Users can directly highlight sections of the page about which to submit feedback. This allows designers to quickly pinpoint areas for improvement. Additionally, web designers can play back recordings when feedback is submitted to get a clear idea about the challenges users face.
      Example of a website with a microsurvey in the corner.

      Market Overview

      Choose vendors and tools that best match your business needs.

      Top-level traditional features

      Feature Name

      Description

      Visitor Count Tracking Counts the number of visits received by a website or webpage.
      Geographic Analytics Uses location information to enable the organization to provide location-based services for various demographics.
      Conversion Tracking Measures the proportion of users that complete a certain task compared to total number of users.
      Device and Browser Analytics Captures and summarizes device and browser information.
      Bounce and Exit Tracking Calculates exit rate and bounce rate on a webpage.
      CTA Tracking Measures the number of times users click on a call to action (CTA) button.
      Audience Demographics Captures, analyzes, and displays customer demographic/firmographic data from different channels.
      Aggregate Traffic Reporting Works backward from a conversion or other key event to analyze the differences, trends, or patterns in the paths users took to get there.
      Social Media Analytics Captures information on social signals from popular services (Twitter, Facebook, LinkedIn, etc.).

      Top-level advanced features

      Feature Name

      Description

      HeatmappingShows where users have clicked on a page and how far they have scrolled down a page or displays the results of eye-tracking tests through the graphical representation of heatmaps.
      Funnel ExplorationVisualizes the steps users take to complete tasks on your site or app.
      A/B TestingEnables you to test the success of various website features.
      Customer Journey ModellingEffectively models and displays customer behaviors or journeys through multiple channels and touchpoints.
      Audience SegmentationCreates and analyzes discrete customer audience segments based on user-defined criteria or variables.
      Feedback and SurveysEnables users to give feedback and share their satisfaction and experience with website designers.
      Paid Search IntegrationIntegrates with popular search advertising services (i.e. AdWords) and can make predictive recommendations around areas like keywords.
      Search Engine OptimizationProvides targeted recommendations for improving and optimizing a page for organic search rankings (i.e. via A/B testing or multivariate testing).
      Session RecordingRecords playbacks of users scrolling, moving, u-turning, and rage clicking on your site.

      Evaluate software category leaders using SoftwareReviews’ vendor rankings and awards

      Logo for SoftwareReviews.
      Sample of SoftwareReviews' The Data Quadrant. The Data Quadrant is a thorough evaluation and ranking of all software in an individual category to compare platforms across multiple dimensions.

      Vendors are ranked by their Composite Score, based on individual feature evaluations, user satisfaction rankings, vendor capability comparisons, and likeliness to recommend the platform.

      Sample of SoftwareReviews' The Emotional Footprint. The Emotional Footprint is a powerful indicator of overall user sentiment toward the relationship with the vendor, capturing data across five dimensions.

      Vendors are ranked by their Customer Experience (CX) Score, which combines the overall Emotional Footprint rating with a measure of the value delivered by the solution.

      Speak with category experts to dive deeper into the vendor landscape

      Logo for SoftwareReviews.
      Fact-based reviews of business software from IT professionals. Top-tier data quality backed by a rigorous quality assurance process. CLICK HERE to ACCESS

      Comprehensive software reviews
      to make better IT decisions

      We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      Product and category reports with state-of-the-art data visualization. User-experience insight that reveals the intangibles of working with a vendor.

      SoftwareReviews is powered by Info-Tech

      Technology coverage is a priority for Info-Tech and SoftwareReviews provides the most comprehensive unbiased data on today’s technology. Combined with the insight of our expert analysts, our members receive unparalleled support in their buying journey.

      Top vendors in the web analytics space

      Logo for Google Analytics. Google Analytics provides comprehensive traditional analytics tools, free of charge, to understand the customer journey and improve marketing ROI. Twenty-four percent of all web analytical tools used on the internet are provided by Google analytics.
      Logo for Hotjar. Hotjar is a behavior analytics and product experience insights service that helps you empathize with and understand your users through their feedback via tools like heatmaps, session recordings, and surveys. Hotjar complements the data and insights you get from traditional web analytics tools like Google Analytics.
      Logo for Crazy Egg. Crazy Egg is a website analytics tool that helps you optimize your site to make it more user-friendly, more engaging, and more conversion-oriented. It does this through heatmaps and A/B testing, which allow you to see how people are interacting with your site.
      Logo for Amplitude Analytics. Amplitude Analytics provides intelligent insight into customer behavior. It offers basic functionalities like measuring conversion rate and engagement metrics and also provides more advanced tools like customer journey maps and predictive analytics capabilities through AI.

      Case Study

      Logo for Miller & Smith.
      INDUSTRY
      Real Estate
      SOURCE
      Crazy Egg

      Heatmaps and playback recordings

      Challenge

      Miller & Smith had just redesigned their website, but the organization wanted to make sure it was user-friendly as well as visually appealing. They needed an analytics platform that could provide information about where visitors were coming from and measure the effectiveness of the marketing campaigns.

      Solution

      Miller & Smith turned to Crazy Egg to obtain visual insights and track user behavior. They used heatmaps and playback recordings to see user activity within webpages and pinpoint any issues with user interface. In just a few weeks, Miller & Smith gained valuable data to work with: the session recordings helped them understand how users were navigating the site, and the heatmaps allowed them to see where users were clicking – and what they were skipping.

      Results

      Detailed reports generated by the solution allowed Miller & Smith team to convince key stakeholders and implement the changes easily. They were able to pinpoint what changes needed to be made and why these changes would improve their experience.

      Within few weeks, the bounce rate improved by 7.5% and goal conversion increased by 8.5% over a similar period the previous year.

      Operationalizing Web Analytics Tools

      Execute initiatives for successful implementation.

      Ensure success of your web analytics programs by following five simple steps

      1. ORGANIZATIONAL GOALS

      The first key step in implementing and succeeding with web analytics tools is to set clearly defined organizational goals, e.g. improving product sales.

      3. KPI METRICS

      Define key performance indicators (KPIs) that help track the organization’s performance, e.g. number of page visits, conversion rates, bounce rates.

      5. REVIEW

      Continuous improvement is essential to succeed in understanding customers. The world is a dynamic place, and you must constantly revise your organizational goals, business objectives, and KPIs to remain competitive.

      Centerpiece representing the five surrounding steps.

      2. BUSINESS OBJECTIVES

      The next step is to lay out business objectives that help to achieve the organization’s goals, e.g. to increase customer leads, increase customer transactions, increase web traffic.

      4. APPLICATION SELECTION

      Understand the web analytics tool space and which combination of tools and vendors best fits the organization’s goals.

      1.1 Understand your organization’s goals

      30 minutes

      Output: Organization’s goal list

      Materials: Whiteboard, Markers

      Participants: Core project team

      1. Identify the key organizational goals for both the short term and the long term.
      2. Arrange the goals in descending order of priority.

      Example table of goals ranked by priority and labeled short or long term.

      1.2 Align business objectives with organizational goals

      30 minutes

      Output: Business objectives

      Materials: Whiteboard, Markers

      Participants: Core project team

      1. Identify the key business objectives that help attain organization goals.
      2. Match each business objective with the corresponding organizational goals it helps achieve.
      3. Arrange the objectives in descending order of priority.

      Example table of business objectives ranked by priority and which organization goal they're linked to.

      Establish baseline metrics

      Baseline metrics will be improved through:

      1. Efficiently using website elements and CTA button placement
      2. Reducing friction between the landing page and end point
      3. Leveraging direct feedback from users to continuously improve customer experience

      1.3 Establish baseline metrics that you intend to improve via your web analytics tools

      30 minutes

      Example table with metrics, each with a current state and goal state.

      Accelerate your software selection project

      Vendor selection projects often demand extensive and unnecessary documentation.

      Software Selection Insight

      Balance the effort-to-information ratio required for a business impact assessment to keep stakeholders engaged. Use documentation that captures the key data points and critical requirements without taking days to complete. Stakeholders are more receptive to formal selection processes that are friction free.

      The Software Selection Workbook

      Work through the straightforward templates that tie to each phase of the Rapid Application Selection Framework, from assessing the business impact to requirements gathering.

      Sample of the Software Selection Workbook deliverable.

      The Vendor Evaluation Workbook

      Consolidate the vendor evaluation process into a single document. Easily compare vendors as you narrow the field to finalists.

      Sample of the Vendor Evaluation Workbook deliverable.

      The Guide to Software Selection: A Business Stakeholder Manual

      Quickly explain the Rapid Application Selection Framework to your team while also highlighting its benefits to stakeholders.

      Sample of the Guide to Software Selection: A Business Stakeholder Manual deliverable.

      Revisit the metrics you identified and revise your goals

      Track the post-deployment results, compare the metrics, and set new targets for the next fiscal year.

      Example table of 'Baseline Website Performance Metrics' with the column 'Revised Target' highlighted.

      Related Info-Tech Research

      Stock image of two people going over a contract. Modernize Your Corporate Website to Drive Business Value

      Drive higher user satisfaction and value through UX-driven websites.

      Stock image of a person using the cloud on their smartphone. Select and Implement a Web Experience Management Solution

      Your website is your company’s face to the world: select a best-of-breed platform to ensure you make a rock-star impression with your prospects and customers!

      Stock image of people studying analytics. Create an Effective Web Redesign Strategy

      Ninety percent of web redesign projects, executed without an effective strategy, fail to accomplish their goals.

      Bibliography

      "11 Essential Website Data Factors and What They Mean." CivicPlus, n.d. Accessed 26 July 2022.

      “Analytics Usage Distribution in the Top 1 Million Sites.” BuiltWith, 1 Nov. 2022. Accessed 26 July 2022.

      "Analytics Usage Distribution on the Entire Internet." BuiltWith, 1 Nov. 2022. Accessed 26 July 2022.

      Bell, Erica. “How Miller and Smith Used Crazy Egg to Create an Actionable Plan to Improve Website Usability.” Crazy Egg, n.d. Accessed 26 July 2022.

      Brannon, Jordan. "User Behavior Analytics | Enhance The Customer Journey." Coalition Technologies, 8 Nov 2021. Accessed 26 July 2022.

      Cardona, Mercedes. "7 Consumer Trends That Will Define The Digital Economy In 2021." Adobe Blog, 7 Dec 2020. Accessed 26 July 2022.

      “The Finer Points.“ Analytics Features. Google Marketing Platform, 2022. Accessed 26 July 2022.

      Fitzgerald, Anna. "A Beginner’s Guide to Web Analytics." HubSpot, 21 Sept 2022. Accessed 26 July 2022.

      "Form Abandonment: How to Avoid It and Increase Your Conversion Rates." Fullstory Blog, 7 April 2022. Accessed 26 July 2022.

      Fries, Dan. "Plug Sales Funnel Gaps by Identifying and Tracking Micro-Conversions." Clicky Blog, 9 Dec 2019. Accessed 7 July 2022.

      "Funnel Metrics in Saas: What to Track and How to Improve Them?" Userpilot Blog, 23 May 2022. Accessed 26 July 2022.

      Garg, Neha. "Digital Experimentation: 3 Key Steps to Building a Culture of Testing." Contentsquare, 21 June 2021. Accessed 26 July 2022.

      “Global Web Analytics Market Size, Status and Forecast 2021-2027.” 360 Research Reports, 25 Jan. 2021. Web.

      Hamilton, Stephanie. "5 Components of Successful Web Analytics." The Daily Egg, 2011. Accessed 26 July 2022.

      "Hammond, Patrick. "Step-by-Step Guide to Cohort Analysis & Reducing Churn Rate." Amplitude, 15 July 2022. Accessed 26 July 2022.

      Hawes, Carry. "What Is Session Replay? Discover User Pain Points With Session Recordings." Dynatrace, 20 Dec 2021. Accessed 26 July 2022.

      Huss, Nick. “How Many Websites Are There in the World?” Siteefy, 8 Oct. 2022. Web.

      Nelson, Hunter. "Establish Web Analytics and Conversion Tracking Foundations Using the Google Marketing Platform.” Tortoise & Hare Software, 29 Oct 2022. Accessed 26 July 2022.

      "Product Analytics Vs Product Experience Insights: What’s the Difference?" Hotjar, 14 Sept 2021. Accessed 26 July 2022.

      “Record and watch everything your visitors do." Inspectlet, n.d. Accessed 26 July 2022.

      “Ryanair: Using Web Analytics to Manage the Site’s Performance More Effectively and Improve Profitability." AT Internet, 1 April 2020. Accessed 26 July 2022.

      Sibor, Vojtech. "Introducing Cross-Platform Analytics.” Smartlook Blog, 5 Nov 2022. Accessed 26 July 2022.

      "Visualize Visitor Journeys Through Funnels.” VWO, n.d. Accessed 26 July 2022.

      "Web Analytics Market Share – Growth, Trends, COVID-19 Impact, and Forecasts (2022-2027)." Mordor Intelligence, 2022. Accessed 26 July 2022.

      “What is the Best Heatmap Tool for Real Results?” Crazy Egg, 27 April 2020. Web.

      "What Is Visitor Behavior Analysis?" VWO, 2022. Accessed 26 July 2022.

      Zheng, Jack G., and Svetlana Peltsverger. “Web Analytics Overview.” IGI Global, 2015. Accessed 26 July 2022.

      Enable Organization-Wide Collaboration by Scaling Agile

      • Buy Link or Shortcode: {j2store}174|cart{/j2store}
      • member rating overall impact: 8.3/10 Overall Impact
      • member rating average dollars saved: $12,989 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Your organization is realizing benefits from adopting Agile principles and practices in pockets of your organization.
      • You are starting to investigate opportunities to extend Agile beyond these pilot implementations into other areas of the organization. You are looking for a coordinated approach aligned to business priorities.

      Our Advice

      Critical Insight

      • Not all lessons from a pilot project are transferable. Pilot processes are tailored to a specific project’s scope, team, and tools, and they may not account for the diverse attributes in your organization.
      • Control may be necessary for coordination. More moving parts means enforcing consistent cadences, reporting, and communication is a must if teams are not disciplined or lack good governance.
      • Scale Agile in departments tolerable to change. Incrementally roll Agile out in departments where its principles are accepted (e.g. a culture of continuous improvement, embracing failures as lessons).

      Impact and Result

      • Complete an Agile capability assessment of your pilot functional group to gauge anticipated Agile benefits. Identify the business objectives and the group drivers that are motivating a scaled Agile implementation.
      • Understand the challenges that you may face when scaling Agile. Investigate the root causes of inefficiencies that can derail your scaling initiatives.
      • Brainstorm solutions to your scaling challenges and envision a target state for your growing Agile environment. Your target state will discover new opportunities to drive more business value and eliminate current activities driving down productivity.
      • Coordinate the implementation and execution of scaling Agile initiatives with a Scaling Agile Playbook. This organic and collaborative document will lay out the process, roles, goals, and objectives needed to successfully manage your Agile environment.

      Enable Organization-Wide Collaboration by Scaling Agile Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should scale up Agile, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Gauge readiness to scale up Agile

      Evaluate the readiness of the pilot functional group and Agile development processes to adopt scaled Agile practices.

      • Enable Organization-Wide Collaboration by Scaling Agile – Phase 1: Gauge Readiness to Scale Up Agile
      • Scaling Agile Playbook Template
      • Scrum Development Process Template

      2. Define scaled Agile target state

      Alleviate scaling issues and risks and introduce new opportunities to enhance business value delivery with Agile practices.

      • Enable Organization-Wide Collaboration by Scaling Agile – Phase 2: Define Scaled Agile Target State

      3. Create implementation plan

      Roll out scaling Agile initiatives in a gradual, iterative approach and define the right metrics to demonstrate success.

      • Enable Organization-Wide Collaboration by Scaling Agile – Phase 3: Create Implementation Plan
      [infographic]

      Workshop: Enable Organization-Wide Collaboration by Scaling Agile

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Gauge Your Readiness to Scale Up Agile

      The Purpose

      Identify the business objectives and functional group drivers for adopting Agile practices to gauge the fit of scaling Agile.

      Select the pilot project to demonstrate the value of scaling Agile.

      Review and evaluate your current Agile development process and functional group structure.

      Key Benefits Achieved

      Understanding of the notable business and functional group gaps that can derail the scaling of Agile.

      Selection of a pilot program that will be used to gather metrics to continuously improve implementation and obtain buy-in for wider rollout.

      Realization of the root causes behind functional group and process issues in the current Agile implementation.

      Activities

      1.1 Assess your pilot functional group

      Outputs

      Fit assessment of functional group to pilot Agile scaling

      Selection of pilot program

      List of critical success factors

      2 Define Your Scaled Agile Target State

      The Purpose

      Think of solutions to address the root causes of current communication and process issues that can derail scaling initiatives.

      Brainstorm opportunities to enhance the delivery of business value to customers.

      Generate a target state for your scaled Agile implementation.

      Key Benefits Achieved

      Defined Agile capabilities and services of your functional group.

      Optimized functional group team structure, development process, and program framework to support scaled Agile in your context.

      Identification and accommodation of the risks associated with implementing and executing Agile capabilities.

      Activities

      2.1 Define Agile capabilities at scale

      2.2 Build your scaled Agile target state

      Outputs

      Solutions to scaling issues and opportunities to deliver more business value

      Agile capability map

      Functional group team structure, Agile development process and program framework optimized to support scaled Agile

      Risk assessment of scaling Agile initiatives

      3 Create Your Implementation Plan

      The Purpose

      List metrics to gauge the success of your scaling Agile implementation.

      Define the initiatives to scale Agile in your organization and to prepare for a wider rollout.

      Key Benefits Achieved

      Strategic selection of the right metrics to demonstrate the value of scaling Agile initiatives.

      Scaling Agile implementation roadmap based on current resource capacities, task complexities, and business priorities.

      Activities

      3.1 Create your implementation plan

      Outputs

      List of metrics to gauge scaling Agile success

      Scaling Agile implementation roadmap

      Refine Your Estimation Practices With Top-Down Allocations

      • Buy Link or Shortcode: {j2store}434|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,599 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • As a portfolio manager, you’re expected to size projects for approval and intake before they have sufficient definition.
      • The consequences of initial sizing are felt throughout the project lifecycle.

      Our Advice

      Critical Insight

      • Your organization lacks strong organizational memory upon which assumptions and estimates can be made.
      • Definition is at a minimum not validated, untested, and is likely incomplete. It has the potential to be dangerously misleading.

      Impact and Result

      • Build project history and make more educated estimates – Projects usually start with a “ROM” or t-shirt size estimate, but if your estimates are consistently off, then it’s time to shift the scale.
      • Plan ahead – Projects face risks; similar projects face similar risks. Provide sponsors with estimates that account for as many risks as possible, so that if something goes wrong you have a plan to make it right.
      • Store and strengthen organizational memory – Each project is rich with lessons that can inform your next project to make it more effective and efficient, and ultimately help to avoid committing the same failures over and over again. Develop a process to catalogue project history and all of the failures and successes associated with those projects.

      Refine Your Estimation Practices With Top-Down Allocations Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should improve your estimation practices, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build organizational memory to inform early estimates

      Analyze your project history to identify and fill gaps in your estimation practices.

      • Refine Your Estimation Practices With Top-Down Allocations – Phase 1: Build Organizational Memory to Inform Early Estimations
      • PMO Organizational Memory Tool
      • T-Shirt Sizing Health Check Lite
      • Project Estimation Playbook

      2. Develop and refine a reliable estimate with top-down allocations

      Allocate time across project phases to validate and refine estimates and estimate assumptions.

      • Refine Your Estimation Practices With Top-Down Allocations – Phase 2: Develop and Refine a Reliable Estimate With Top-Down Allocations
      • Planning-Level Estimate Calculator

      3. Implement a new estimation process

      Implement a lessons learned process to provide transparency to your sponsors and confidence to your teams.

      • Refine Your Estimation Practices With Top-Down Allocations – Phase 3: Implement a New Estimation Process
      • Project Lessons Learned Template
      [infographic]

      Workshop: Refine Your Estimation Practices With Top-Down Allocations

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Develop the Foundations of Organizational Memory

      The Purpose

      Track key performance indicators on past projects to inform goals for future projects.

      Key Benefits Achieved

      Developed Project History List.

      Refined starting estimates that can be adjusted accurately from project to project.

      Activities

      1.1 Build project history.

      1.2 Analyze estimation capabilities.

      1.3 Identify estimation goals.

      Outputs

      Project History List

      T-Shirt Sizing Health Check

      Estimate Tracking Plan

      2 Define a Requirements Gathering Process

      The Purpose

      Outline the common attributes required to complete projects.

      Identify the commonly forgotten attributes to ensure comprehensive scoping early on.

      Key Benefits Achieved

      Refined initial estimate based on high-level insights into work required and resources available.

      Activities

      2.1 Develop a list of in-scope project attributes.

      2.2 Identify leadership priorities for deliverables and attributes.

      2.3 Track team and skill responsibilities for attributes.

      Outputs

      Identified list or store of past project attributes and costs

      Attribute List and Estimated Cost

      Required Skills List

      3 Build an Estimation Process

      The Purpose

      Set clear processes for tracking the health of your estimate to ensure it is always as accurate as possible.

      Define check-in points to evaluate risks and challenges to the project and identify trigger conditions.

      Key Benefits Achieved

      An estimation process rooted in organizational memory and lessons learned.

      Project estimates that are consistently reevaluated to predict and correct challenges before they can drastically affect your projects.

      Activities

      3.1 Determine Milestone Check-In Points.

      3.2 Develop Lessons Learned Meeting Agendas.

      3.3 Identify common risks and past lessons learned.

      3.4 Develop contingency tracking capabilities.

      Outputs

      Project Lessons Learned Template

      Historic Risks and Lessons Learned Master Template

      Contingency Reserve and Risk Registers

      4 Improve Business Alignment With Your Estimation Plan

      The Purpose

      Bridge the gap between death march projects and bloated and uncertain estimates by communicating expectations and assumptions clearly to your sponsors.

      Key Benefits Achieved

      Clear estimation criteria and assumptions aligned with business priorities.

      Post-mortem discussion items crucial to improving project history knowledge for next time.

      Activities

      4.1 Identify leadership risk priorities.

      4.2 Develop IT business alignment.

      4.3 Develop hand-off procedures and milestone approval methods.

      4.4 Create a list of post-mortem priorities.

      Outputs

      Estimation Quotation

      Risk Priority Rankings

      Hand-Off Procedures

      Post-mortem agenda planning

      Redesign Your IT Organizational Structure

      • Buy Link or Shortcode: {j2store}275|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $71,830 Average $ Saved
      • member rating average days saved: 25 Average Days Saved
      • Parent Category Name: Organizational Design
      • Parent Category Link: /organizational-design

      Most organizations go through an organizational redesign to:

      • Better align to the strategic objectives of the organization.
      • Increase the effectiveness of IT as a function.
      • Provide employees with clarity in their roles and responsibilities.
      • Support new capabilities.
      • Better align IT capabilities to suit the vision.
      • Ensure the IT organization can support transformation initiatives.

      Our Advice

      Critical Insight

      • Organizational redesign is only as successful as the process leaders engage in. It shapes a story framed in a strong foundation of need and a method to successfully implement and adopt the new structure.
      • Benchmarking your organizational redesign to other organizations will not work. Other organizations have different strategies, drivers, and context. It’s important to focus on your organization, not someone else's.
      • You could have the best IT employees in the world, but if they aren’t structured well your organization will still fail in reaching its vision.

      Impact and Result

      • We are often unsuccessful in organizational redesign because we lack an understanding of why this initiative is required or fail to recognize that it is a change initiative.
      • Successful organizational design requires a clear understanding of why it is needed and what will be achieved by operating in a new structure.
      • Additionally, understanding the impact of the change initiative can lead to greater adoption by core stakeholders.

      Redesign Your IT Organizational Structure Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Redesign Your IT Organizational Structure Deck – A defined method of redesigning your IT structure that is founded by clear drivers and consistently considering change management practices.

      The purpose of this storyboard is to provide a four-phased approach to organizational redesign.

      • Redesign Your IT Organizational Structure – Phases 1-4

      2. Communication Deck – A method to communicate the new organizational structure to critical stakeholders to gain buy-in and define the need.

      Use this templated Communication Deck to ensure impacted stakeholders have a clear understanding of why the new organizational structure is needed and what that structure will look like.

      • Organizational Design Communications Deck

      3. Redesign Your IT Organizational Structure Executive Summary Template – A template to secure executive leadership buy-in and financial support for the new organizational structure to be implemented.

      This template provides IT leaders with an opportunity to present their case for a change in organizational structure and roles to secure the funding and buy-in required to operate in the new structure.

      • Redesign Your IT Organizational Structure Executive Summary

      4. Redesign Your IT Organizational Structure Workbook – A method to document decisions made and rationale to support working through each phase of the process.

      This Workbook allows IT and business leadership to work through the steps required to complete the organizational redesign process and document key rationale for those decisions.

      • Redesign Your IT Organizational Structure Workbook

      5. Redesign Your IT Organizational Structure Operating Models and Capability Definitions – A tool that can be used to provide clarity on the different types of operating models that exist as well as the process definitions of each capability.

      Refer to this tool when working through the redesign process to better understand the operating model sketches and the capability definitions. Each capability has been tied back to core frameworks that exist within the information and technology space.

      • Redesign Your IT Organizational Structure Operating Models and Capability Definitions

      Infographic

      Workshop: Redesign Your IT Organizational Structure

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the Organizational Design Foundation

      The Purpose

      Lay the foundation for your organizational redesign by establishing a set of organizational design principles that will guide the redesign process.

      Key Benefits Achieved

      Clearly articulate why this organizational redesign is needed and the implications the strategies and context will have on your structure.

      Activities

      1.1 Define the org design drivers.

      1.2 Document and define the implications of the business context.

      1.3 Align the structure to support the strategy.

      1.4 Establish guidelines to direct the organizational design process.

      Outputs

      Clear definition of the need to redesign the organizational structure

      Understanding of the business context implications on the organizational structure creation.

      Strategic impact of strategies on organizational design.

      Customized Design Principles to rationalize and guide the organizational design process.

      2 Create the Operating Model Sketch

      The Purpose

      Select and customize an operating model sketch that will accurately reflect the future state your organization is striving towards. Consider how capabilities will be sourced, gaps in delivery, and alignment.

      Key Benefits Achieved

      A customized operating model sketch that informs what capabilities will make up your IT organization and how those capabilities will align to deliver value to your organization.

      Activities

      2.1 Augmented list of IT capabilities.

      2.2 Capability gap analysis

      2.3 Identified capabilities for outsourcing.

      2.4 Select a base operating model sketch.

      2.5 Customize the IT operating model sketch.

      Outputs

      Customized list of IT processes that make up your organization.

      Analysis of which capabilities require dedicated focus in order to meet goals.

      Definition of why capabilities will be outsourced and the method of outsourcing used to deliver the most value.

      Customized IT operating model reflecting sourcing, centralization, and intended delivery of value.

      3 Formalize the Organizational Structure

      The Purpose

      Translate the operating model sketch into a formal structure with defined functional teams, roles, reporting structure, and responsibilities.

      Key Benefits Achieved

      A detailed organizational chart reflecting team structures, reporting structures, and role responsibilities.

      Activities

      3.1 Categorize your IT capabilities within your defined functional work units.

      3.2 Create a mandate statement for each work unit.

      3.3 Define roles inside the work units and assign accountability and responsibility.

      3.4 Finalize your organizational structure.

      Outputs

      Capabilities Organized Into Functional Groups

      Functional Work Unit Mandates

      Organizational Chart

      4 Plan for the Implementation & Change

      The Purpose

      Ensure the successful implementation of the new organizational structure by strategically communicating and involving stakeholders.

      Key Benefits Achieved

      A clear plan of action on how to transition to the new structure, communicate the new organizational structure, and measure the effectiveness of the new structure.

      Activities

      4.1 Identify and mitigate key org design risks.

      4.2 Define the transition plan.

      4.3 Create the change communication message.

      4.4 Create a standard set of FAQs.

      4.5 Align sustainment metrics back to core drivers.

      Outputs

      Risk Mitigation Plan

      Change Communication Message

      Standard FAQs

      Implementation and sustainment metrics.

      Further reading

      Redesign Your IT Organizational Structure

      Designing an IT structure that will enable your strategic vision is not about an org chart – it’s about how you work.

      EXECUTIVE BRIEF

      Analyst Perspective

      Structure enables strategy.

      The image contains a picture of Allison Straker.

      Allison Straker

      Research Director,

      Organizational Transformation

      The image contains a picture of Brittany Lutes.

      Brittany Lutes

      Senior Research Analyst,

      Organizational Transformation

      An organizational structure is much more than a chart with titles and names. It defines the way that the organization operates on a day-to-day basis to enable the successful delivery of the organization’s information and technology objectives. Moreover, organizational design sees beyond the people that might be performing a specific role. People and role titles will and often do change frequently. Those are the dynamic elements of organizational design that allow your organization to scale and meet specific objectives at defined points of time. Capabilities, on the other hand, are focused and related to specific IT processes.

      Redesigning an IT organizational structure can be a small or large change transformation for your organization. Create a structure that is equally mindful of the opportunities and the constraints that might exist and ensure it will drive the organization towards its vision with a successful implementation. If everyone understands why the IT organization needs to be structured that way, they are more likely to support and adopt the behaviors required to operate in the new structure.

      Executive Summary

      Your Challenge

      Your organization needs to reorganize itself because:

      • The current IT structure does not align to the strategic objectives of the organization.
      • There are inefficiencies in how the IT function is currently operating.
      • IT employees are unclear about their role and responsibilities, leading to inconsistencies.
      • New capabilities or a change in how the capabilities are organized is required to support the transformation.

      Common Obstacles

      Many organizations struggle when it comes redesigning their IT organizational structure because they:

      • Jump right into creating the new organizational chart.
      • Do not include the members of the IT leadership team in the changes.
      • Do not include the business in the changes.
      • Consider the context in which the change will take place and how to enable successful adoption.

      Info-Tech’s Approach

      Successful IT organization redesign includes:

      • Understanding the drivers, context, and strategies that will inform the structure.
      • Remaining objective by focusing on capabilities over people or roles.
      • Identifying gaps in delivery, sourcing strategies, customers, and degrees of centralization.
      • Remembering that organizational design is a change initiative and will require buy-in.

      Info-Tech Insight

      A successful redesign requires a strong foundation and a plan to ensure successful adoption. Without these, the organizational chart has little meaning or value.

      Your challenge

      This research is designed to help organizations who are looking to:

      • Redesign the IT structure to align to the strategic objectives of the enterprise.
      • Increase the effectiveness in how the IT function is operating in the organization.
      • Provide clarity to employees around their roles and responsibilities.
      • Ensure there is an ability to support new IT capabilities and/or align capabilities to better support the direction of the organization.
      • Align the IT organization to support a business transformation such as becoming digitally enabled or engaging in M&A activities.

      Organizational design is a challenge for many IT and digital executives

      69% of digital executives surveyed indicated challenges related to structure, team silos, business-IT alignment, and required roles when executing on a digital strategy.

      Source: MIT Sloan, 2020

      Common obstacles

      These barriers make IT organizational redesign difficult to address for many organizations:

      • Confuse organizational design and organizational charts as the same thing.
      • Start with the organizational chart, not taking into consideration the foundational elements that will make that chart successful.
      • Fail to treat organizational redesign as a change management initiative and follow through with the change.
      • Exclude impacted or influential IT leaders and/or business stakeholders from the redesign process.
      • Leverage an operating model because it is trending.

      To overcome these barriers:

      • Understand the context in which the changes will take place.
      • Communicate the changes to those impacted to enable successful adoption and implementation of a new organizational structure.
      • Understand that organizational design is for more than just HR leaders now; IT executives should be driving this change.

      Succeed in Organizational Redesign

      75% The percentage of change efforts that fail.

      Source: TLNT, 2019

      55% The percentage of practitioners who identify how information flows between work units as a challenge for their organization.

      Source: Journal of Organizational Design, 2019

      Organizational design defined

      If your IT strategy is your map, your IT organizational design represents the optimal path to get there.

      IT organizational design refers to the process of aligning the organization’s structure, processes, metrics, and talent to the organization’s strategic plan to drive efficiency and effectiveness.

      Why is the right IT organizational design so critical to success?

      Adaptability is at the core of staying competitive today

      Structure is not just an organizational chart

      Organizational design is a never-ending process

      Digital technology and information transparency are driving organizations to reorganize around customer responsiveness. To remain relevant and competitive, your organizational design must be forward looking and ready to adapt to rapid pivots in technology or customer demand.

      The design of your organization dictates how roles function. If not aligned to the strategic direction, the structure will act as a bungee cord and pull the organization back toward its old strategic direction (ResearchGate.net, 2014). Structure supports strategy, but strategy also follows structure.

      Organization design is not a one-time project but a continuous, dynamic process of organizational self-learning and continuous improvement. Landing on the right operating model will provide a solid foundation to build upon as the organization adapts to new challenges and opportunities.

      Understand the organizational differences

      Organizational Design

      Organizational design the process in which you intentionally align the organizational structure to the strategy. It considers the way in which the organization should operate and purposely aligns to the enterprise vision. This process often considers centralization, sourcing, span of control, specialization, authority, and how those all impact or are impacted by the strategic goals.

      Operating Model

      Operating models provide an architectural blueprint of how IT capabilities are organized to deliver value. The placement of the capabilities can alter the culture, delivery of the strategic vision, governance model, team focus, role responsibility, and more. Operating model sketches should be foundational to the organizational design process, providing consistency through org chart changes.

      Organizational Structure

      The organizational structure is the chosen way of aligning the core processes to deliver. This can be strategic, or it can be ad hoc. We recommend you take a strategic approach unless ad hoc aligns to your culture and delivery method. A good organizational structure will include: “someone with authority to make the decisions, a division of labor and a set of rules by which the organization operates” (Bizfluent, 2019).

      Organizational Chart

      The capstone of this change initiative is an easy-to-read chart that visualizes the roles and reporting structure. Most organizations use this to depict where individuals fit into the organization and if there are vacancies. While this should be informed by the structure it does not necessarily depict workflows that will take place. Moreover, this is the output of the organizational design process.

      Sources: Bizfluent, 2019; Strategy & Business, 2015; SHRM, 2021

      The Technology Value Trinity

      The image contains a diagram of the Technology Value Trinity as described in the text below.

      All three elements of the Technology Value Trinity work in harmony to delivery business value and achieve strategic needs. As one changes, the others need to change as well.

      How do these three elements relate?

      • Digital and IT strategy tells you what you need to achieve to be successful.
      • Operating model and organizational design align resources to deliver on your strategy and priorities. This is done by strategically structuring IT capabilities in a way that enables the organizations vision and considers the context in which the structure will operate.
      • I&T governance is the confirmation of IT’s goals and strategy, which ensures the alignment of IT and business strategy and is the mechanism by which you continuously prioritize work to ensure that what is delivered is in line with the strategy.

      Too often strategy, organizational design, and governance are considered separate practices – strategies are defined without teams and resources to support. Structure must follow strategy.

      Info-Tech’s approach to organizational design

      Like a story, a strategy without a structure to deliver on it is simply words on paper.

      Books begin by setting the foundation of the story.

      Introduce your story by:

      • Defining the need(s) that are driving this initiative forward.
      • Introducing the business context in which the organizational redesign must take place.
      • Outlining what’s needed in the redesign to support the organization in reaching its strategic IT goals.

      The plot cannot thicken without the foundation. Your organizational structure and chart should not exist without one either.

      The steps to establish your organizational chart - with functional teams, reporting structure, roles, and responsibilities defined – cannot occur without a clear definition of goals, need, and context. An organizational chart alone won’t provide the insight required to obtain buy-in or realize the necessary changes.

      Conclude your story through change management and communication.

      Good stories don’t end without referencing what happened before. Use the literary technique of foreshadowing – your change management must be embedded throughout the organizational redesign process. This will increase the likelihood that the organizational structure can be communicated, implemented, and reinforced by stakeholders.

      Info-Tech uses a capability-based approach to help you design your organizational structure

      Once your IT strategy is defined, it is critical to identify the capabilities that are required to deliver on those strategic initiatives. Each initiative will require a combination of these capabilities that are only supported through the appropriate organization of roles, skills, and team structures.

      The image contains a diagram of the various services and blueprints that Info-Tech has to offer.

      Embed change management into organizational design

      Change management practices are needed from the onset to ensure the implementation of an organizational structure.

      For each phase of this blueprint, its important to consider change management. These are the points when you need to communicate the structure changes:

      • Phase 1: Begin to socialize the idea of new organizational structure with executive leadership and explain how it might be impactful to the context of the organization. For example, a new control, governance model, or sourcing approach could be considered.
      • Phase 2: The chosen operating model will influence your relationships with the business and can create/eliminate silos. Ensure IT and business leaders have insight into these possible changes and a willingness to move forward.
      • Phase 3: The new organizational structure could create or eliminate teams, reduce or increase role responsibilities, and create different reporting structures than before. It’s time to communicate these changes with those most impacted and be able to highlight the positive outcomes of the various changes.
      • Phase 4: Should consider the change management practices holistically. This includes the type of change and length of time to reach the end state, communication, addressing active resistors, acquiring the right skills, and measuring the success of the new structure and its adoption.

      Info-Tech Insight

      Do not undertake an organizational redesign initiative if you will not engage in change management practices that are required to ensure its successful adoption.

      Measure the value of the IT organizational redesign

      Given that the organizational redesign is intended to align with the overall vision and objectives of the business, many of the metrics that support its success will be tied to the business. Adapt the key performance indicators (KPIs) that the business is using to track its success and demonstrate how IT can enable the business and improve its ability to reach those targets.

      Strategic Resources

      The percentage of resources dedicated to strategic priorities and initiatives supported by IT operating model. While operational resources are necessary, ensuring people are allocating time to strategic initiatives as well will drive the business towards its goal state. Leverage Info-Tech’s IT Staffing Assessment diagnostic to benchmark your IT resource allocation.

      Business Satisfaction

      Assess the improvement in business satisfaction overall with IT year over year to ensure the new structure continues to drive satisfaction across all business functions. Leverage Info-Tech’s CIO Business Vision diagnostic to see how your IT organization is perceived.

      Role Clarity

      The degree of clarity that IT employees have around their role and its core responsibilities can lead to employee engagement and retention. Consider measuring this core job driver by leveraging Info-Tech’s Employee Engagement Program.

      Customer & User Satisfaction

      Measure customer satisfaction with technology-enabled business services or products and improvements in technology-enabled client acquisition or retention processes. Assess the percentage of users satisfied with the quality of IT service delivery and leverage Info-Tech’s End-User Satisfaction Survey to determine improvements.

      Info-Tech’s methodology for Redesigning Your IT Organization

      Phase

      1. Establish the Organizational Design Foundation

      2. Create the Operating Model Sketch

      3. Formalize the Organizational Structure

      4. Plan for Implementation and Change

      Phase Outcomes

      Lay the foundation for your organizational redesign by establishing a set of organizational design principles that will guide the redesign process.

      Select and customize an operating model sketch that will accurately reflect the future state your organization is striving towards. Consider how capabilities will be sourced, gaps in delivery, and alignment.

      Translate the operating model sketch into a formal structure with defined functional teams, roles, reporting structure, and responsibilities.

      Ensure the successful implementation of the new organizational structure by strategically communicating and involving stakeholders.

      Insight summary

      Overarching insight

      Organizational redesign processes focus on defining the ways in which you want to operate and deliver on your strategy – something an organizational chart will never be able to convey.

      Phase 1 insight

      Focus on your organization, not someone else's’. Benchmarking your organizational redesign to other organizations will not work. Other organizations have different strategies, drivers, and context.

      Phase 2 insight

      An operating model sketch that is customized to your organization’s specific situation and objectives will significantly increase the chances of creating a purposeful organizational structure.

      Phase 3 insight

      If you follow the steps outlined in the first three phases, creating your new organizational chart should be one of the fastest activities.

      Phase 4 insight

      Throughout the creation of a new organizational design structure, it is critical to involve the individuals and teams that will be impacted.

      Tactical insight

      You could have the best IT employees in the world, but if they aren’t structured well your organization will still fail in reaching its vision.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:


      Communication Deck

      Communicate the changes to other key stakeholders such as peers, managers, and staff.

      Workbook

      As you work through each of the activities, use this workbook as a place to document decisions and rationale.

      Reference Deck

      Definitions for every capability, base operating model sketches, and sample organizational charts aligned to those operating models.

      Job Descriptions

      Key deliverable:

      Executive Presentation

      Leverage this presentation deck to gain executive buy-in for your new organizational structure.

      Blueprint benefits

      IT Benefits

      • Create an organizational structure that aligns to the strategic goals of IT and the business.
      • Provide IT employees with clarity on their roles and responsibilities to ensure the successful delivery of IT capabilities.
      • Highlight and sufficiently staff IT capabilities that are critical to the organization.
      • Define a sourcing strategy for IT capabilities.
      • Increase employee morale and empowerment.

      Business Benefits

      • IT can carry out the organization’s strategic mission and vision of all technical and digital initiatives.
      • Business has clarity on who and where to direct concerns or questions.
      • Reduce the likelihood of turnover costs as IT employees understand their roles and its importance.
      • Create a method to communicate how the organizational structure aligns with the strategic initiatives of IT.
      • Increase ability to innovate the organization.

      Executive Brief Case Study

      IT design needs to support organizational and business objectives, not just IT needs.

      INDUSTRY: Government

      SOURCE: Analyst Interviews and Working Sessions

      Situation

      IT was tasked with providing equality to the different business functions through the delivery of shared IT services. The government created a new IT organizational structure with a focus on two areas in particular: strategic and operational support capabilities.

      Challenge

      When creating the new IT structure, an understanding of the complex and differing needs of the business functions was not reflected in the shared services model.

      Outcome

      As a result, the new organizational structure for IT did not ensure adequate meeting of business needs. Only the operational support structure was successfully adopted by the organization as it aligned to the individual business objectives. The strategic capabilities aspect was not aligned to how the various business lines viewed themselves and their objectives, causing some partners to feel neglected.

      Info-Tech offers various levels of support to best suit your needs.

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      Phase 1

      Call #1: Define the process, understand the need, and create a plan of action.

      Phase 2

      Call #2: Define org. design drivers and business context.

      Call #3: Understand strategic influences and create customized design principles.

      Call #4: Customize, analyze gaps, and define sourcing strategy for IT capabilities.

      Call #5: Select and customize the IT operating model sketch.

      Phase 3

      Call #6: Establish functional work units and their mandates.

      Call #7: Translate the functional organizational chart to an operational organizational chart with defined roles.

      Phase 4

      Call #8: Consider risks and mitigation tactics associated with the new structure and select a transition plan.

      Call #9: Create your change message, FAQs, and metrics to support the implementation plan.

      Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Day 1

      Day 2

      Day 3

      Day 4

      Day 5

      Establish the Organizational Redesign Foundation

      Create the Operating Model Sketch

      Formalize the Organizational Structure

      Plan for Implementation and Change

      Next Steps and
      Wrap-Up (offsite)

      Activities

      1.1 Define the org. design drivers.

      1.2 Document and define the implications of the business context.

      1.3 Align the structure to support the strategy.

      1.4 Establish guidelines to direct the organizational design process.

      2.1 Augment list of IT capabilities.

      2.2 Analyze capability gaps.

      2.3 Identify capabilities for outsourcing.

      2.4 Select a base operating model sketch.

      2.5 Customize the IT operating model sketch.

      3.1 Categorize your IT capabilities within your defined functional work units.

      3.2 Create a mandate statement for each work unit.

      3.3 Define roles inside the work units and assign accountability and responsibility.

      3.4 Finalize your organizational structure.

      4.1 Identify and mitigate key org. design risks.

      4.2 Define the transition plan.

      4.3 Create the change communication message.

      4.4 Create a standard set of FAQs.

      4.5 Align sustainment metrics back to core drivers.

      5.1 Complete in-progress deliverables from previous four days.

      5.2 Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. Foundational components to the organizational design
      2. Customized design principles
      1. Heat mapped IT capabilities
      2. Defined outsourcing strategy
      3. Customized operating model
      1. Capabilities organized into functional groups
      2. Functional work unit mandates
      3. Organizational chart
      1. Risk mitigation plan
      2. Change communication message
      3. Standard FAQs
      4. Implementation and sustainment metrics
      1. Completed organizational design communications deck

      This blueprint is part one of a three-phase approach to organizational transformation

      PART 1: DESIGN

      PART 2: STRUCTURE

      PART 3: IMPLEMENT

      IT Organizational Architecture

      Organizational Sketch

      Organizational Structure

      Organizational Chart

      Transition Strategy

      Implement Structure

      1. Define the organizational design drivers, business context, and strategic alignment.

      2. Create customized design principles.

      3. Develop and customize a strategically aligned operating model sketch.

      4. Define the future-state work units.

      5. Create future-state work unit mandates.

      6. Define roles by work unit.

      7. Turn roles into jobs with clear capability accountabilities and responsibilities.

      8. Define reporting relationships between jobs.

      9. Assess options and select go-forward organizational sketch.

      11. Validate organizational sketch.

      12. Analyze workforce utilization.

      13. Define competency framework.

      14. Identify competencies required for jobs.

      15. Determine number of positions per job

      16. Conduct competency assessment.

      17. Assign staff to jobs.

      18. Build a workforce and staffing plan.

      19. Form an OD implementation team.

      20. Develop change vision.

      21. Build communication presentation.

      22. Identify and plan change projects.

      23. Develop organizational transition plan.

      24. Train managers to lead through change.

      25. Define and implement stakeholder engagement plan.

      26. Develop individual transition plans.

      27. Implement transition plans.

      Risk Management: Create, implement, and monitor risk management plan.

      HR Management: Develop job descriptions, conduct job evaluation, and develop compensation packages.

      Monitor and Sustain Stakeholder Engagement

      Phase 1

      Establish the Organizational Redesign Foundation

      This phase will walk you through the following activities:

      1.1 Define the organizational redesign driver(s)

      1.2 Create design principles based on the business context

      1.3a (Optional Exercise) Identify the capabilities from your value stream

      1.3b Identify the capabilities required to deliver on your strategies

      1.4 Finalize your list of design principles

      This phase involves the following participants:

      • CIO
      • IT Leadership
      • Business Leadership

      Embed change management into the organizational design process

      Articulate the Why

      Changes are most successful when leaders clearly articulate the reason for the change – the rationale for the organizational redesign of the IT function. Providing both staff and executive leaders with an understanding for this change is imperative to its success. Despite the potential benefits to a redesign, they can be disruptive. If you are unable to answer the reason why, a redesign might not be the right initiative for your organization.

      Employees who understand the rationale behind decisions made by executive leaders are 3.6 times more likely to be engaged.

      McLean & Company Engagement Survey Database, 2021; N=123,188

      Info-Tech Insight

      Successful adoption of the new organizational design requires change management from the beginning. Start considering how you will convey the need for organizational change within your IT organization.

      The foundation of your organizational design brings together drivers, context, and strategic implications

      All aspects of your IT organization’s structure should be designed with the business’ context and strategic direction in mind.

      Use the following set of slides to extract the key components of your drivers, business context, and strategic direction to land on a future structure that aligns with the larger strategic direction.

      REDESIGN DRIVERS

      Driver(s) can originate from within the IT organization or externally. Ensuring the driver(s) are easy to understand and articulate will increase the successful adoption of the new organizational structure.

      BUSINESS CONTEXT

      Defines the interactions that occur throughout the organization and between the organization and external stakeholders. The context provides insight into the environment by both defining the purpose of the organization and the values that frame how it operates.

      STRATEGY IMPLICATIONS

      The IT strategy should be aligned to the overall business strategy, providing insight into the types of capabilities required to deliver on key IT initiatives.

      Understand IT’s desired maturity level, alignment with business expectations, and capabilities of IT

      Where are we today?

      Determine the current overall maturity level of the IT organization.

      Where do we want to be as an organization?

      Use the inputs from Info-Tech’s diagnostic data to determine where the organization should be after its reorganization.

      How can you leverage these results?

      The result of these diagnostics will inform the design principles that you’ll create in this phase.

      Leverage Info-Tech’s diagnostics to provide an understanding of critical areas your redesign can support:

      CIO Business Vision Diagnostic

      Management & Governance Diagnostic

      IT Staffing Diagnostic

      The image contains a picture of Info-Tech's maturity ladder.

      Consider the organizational design drivers

      Consider organizational redesign if …

      Effectiveness is a concern:

      • Insufficient resources to meet demand
      • Misalignment to IT (and business) strategies
      • Lack of clarity around role responsibility or accountability
      • IT functions operating in silos

      New capabilities are needed:

      • Organization is taking on new capabilities (digital, transformation, M&A)
      • Limited innovation
      • Gaps in the capabilities/services of IT
      • Other external environmental influences or changes in strategic direction

      Lack of business understanding

      • Misalignment between business and IT or how the organization does business
      • Unhappy customers (internal or external)

      Workforce challenges

      • Frequent turnover or inability to attract new skills
      • Low morale or employee empowerment

      These are not good enough reasons …

      • New IT leader looking to make a change for the sake of change or looking to make their legacy known
      • To work with specific/hand-picked leaders over others
      • To “shake things up” to see what happens
      • To force the organization to see IT differently

      Info-Tech Insight

      Avoid change for change’s sake. Restructuring could completely miss the root cause of the problem and merely create a series of new ones.

      1.1 Define the organizational redesign driver(s)

      1-2 hours

      1. As a group, brainstorm a list of current pain points or inhibitors in the current organizational structure, along with a set of opportunities that can be realized during your restructuring. Group these pain points and opportunities into themes.
      2. Leverage the pain points and opportunities to help further define why this initiative is something you’re driving towards. Consider how you would justify this initiative to different stakeholders in the organization.
      3. Questions to consider:
        1. Who is asking for this initiative?
        2. What are the primary benefits this is intended to produce?
        3. What are you optimizing for?
        4. What are we capable of achieving as an IT organization?
        5. Are the drivers coming from inside or outside the IT organization?
      4. Once you’ve determined the drivers for redesigning the IT organization, prioritize those drivers to ensure there is clarity when communicating why this is something you are focusing time and effort on.

      Input

      Output

      • Knowledge of the current organization
      • Pain point and opportunity themes
      • Defined drivers of the initiative

      Materials

      Participants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Frame the organizational design within the context of the business

      Workforce Considerations:

      • How does your organization view its people resources? Does it have the capacity to increase the number of resources?
      • Do you currently have sufficient staff to meet the demands of the organization? Are you able to outsource resources when demand requires it?
      • Are the members of your IT organization unionized?
      • Is your workforce distributed? Do time zones impact how your team can collaborate?

      Business Context Consideration

      IT Org. Design Implication

      Culture:

      Culture, "the way we do things here,” has huge implications for executing strategy, driving engagement, and providing a guiding force that ensures organizations can work together toward common goals.

      • What is the culture of your organization? Is it cooperative, traditional, competitive, or innovative? (See appendix for details.)
      • Is this the target culture or a stepping-stone to the ideal culture?
      • How do the attitudes and behaviors of senior leaders in the organization reinforce this culture?

      Consider whether your organization’s culture can accept the operating model and organizational structure changes that make sense on paper.

      Certain cultures may lean toward particular operating models. For example, the demand-develop-service operating model may be supported by a cooperative culture. A traditional organization may lean towards the plan-build-run operating model.

      Ensure you have considered your current culture and added exercises to support it.

      If more capacity is required to accomplish the goals of the organization, you’ll want to prepare the leaders and explain the need in your design principles (to reflect training, upskilling, or outsourcing). Unionized environments require additional consideration. They may necessitate less structural changes, and so your principles will need to reflect other alternatives (hiring additional resources, creative options) to support organizational needs. Hybrid or fully remote workforces may impact how your organization interacts.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Control & Governance:

      It is important to consider how your organization is governed, how decisions are made, and who has authority to make decisions.

      Strategy tells what you do, governance validates you’re doing the right things, and structure is how you execute on what’s been approved.

      • How do decisions get considered and approved in your organization? Are there specific influences that impact the priorities of the organization?
      • Are those in the organization willing to release decision-making authority around specific IT components?
      • Should the organization take on greater accountability for specific IT components?

      Organizations that require more controls may lean toward more centralized governance. Organizations that are looking to better enable and empower their divisions (products, groups, regions, etc.) may look to embed governance in these parts of the organization.

      For enterprise organizations, consider where IT has authority to make decisions (at the global, local, or system level). Appropriate governance needs to be built into the appropriate levels.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Financial Constraints:

      Follow the money: You may need to align your IT organization according to the funding model.

      • Do partners come to IT with their budgets, or does IT have a central pool that they use to fund initiatives from all partners?
      • Are you able to request finances to support key initiatives/roles prioritized by the organization?
      • How is funding aligned: technology, data, digital, etc.? Is your organization business-line funded? Pooled?
      • Are there special products or digital transformation initiatives with resources outside IT? Product ownership funding?
      • How are regulatory changes funded?
      • Do you have the flexibility to adjust your budget throughout the fiscal year?
      • Are chargebacks in place? Are certain services charged back to business units

      Determine if you can move forward with a new model or if you can adjust your existing one to suit the financial constraints.

      If you have no say over your funding, pre-work may be required to build a business case to change your funding model before you look at your organizational structure – without this, you might have to rule out centralized and focus on hybrid/centralized. If you don’t control the budget (funding comes from your partners), it will be difficult to move to a more centralized model.

      A federated business organization may require additional IT governance to help prioritize across the different areas.

      Budgets for digital transformation might come from specific areas of the business, so resources may need to be aligned to support that. You’ll have to consider how you will work with those areas. This may also impact the roles that are going to exist within your IT organization – product owners or division owners might have more say.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Business Perspective of IT:

      How the business perceives IT and how IT perceives itself are sometimes not aligned. Make sure the business’ goals for IT are well understood.

      • Are your business partners satisfied if IT is an order taker? Do they agree with the need for IT to become a business partner? Is IT expected to innovate and transform the organization?
      • Is what the business needs from IT the same as what IT is providing currently?

      Business Organization Structure and Growth:

      • How is the overall organization structured: Centralized/decentralized? Functionally aligned? Divided by regions?
      • In what areas does the organization prioritize investments?
      • Is the organization located across a diverse geography?
      • How big is the organization?
      • How is the organization growing and changing – by mergers and acquisitions?

      If IT needs to become more of a business partner, you’ll want to define what that means to your organization and focus on the capabilities to enable this. Educating your partners might also be required if you’re not aligned.

      For many organizations, this will include stakeholder management, innovation, and product/project management. If IT and its business partners are satisfied with an order-taker relationship, be prepared for the consequences of that.

      A global organization will require different IT needs than a single location. Specifically, site reliability engineering (SRE) or IT support services might be deployed in each region. Organizations growing through mergers and acquisitions can be structured differently depending on what the organization needs from the transaction. A more centralized organization may be appropriate if the driver is reuse for a more holistic approach, or the organization may need a more decentralized organization if the acquisitions need to be handled uniquely.

      Business context considerations

      Business Context Consideration

      IT Org. Design Implication

      Sourcing Strategy:

      • What are the drivers for sourcing? Staff augmentation, best practices, time zone support, or another reason?
      • What is your strategy for sourcing?
      • Does IT do all of your technology work, or are parts being done by business or other units?
      • Are we willing/able to outsource, and will that place us into non-compliance (regulations)?
      • Do you have vendor management capabilities in areas that you might outsource?
      • How cloud-driven is your organization?
      • Do you have global operations?

      Change Tolerance:

      • What’s your organization’s tolerance to make changes around organizational design?
      • What's the appetite and threshold for risk?

      Your sourcing strategy affects your organizational structure, including what capabilities you group together. Since managing outsourced capabilities also includes the need for vendor management, you’ll need to ensure there aren’t too many capabilities required per leader. Look closely at what can be achieved through your operating model if IT is done through other groups. Even though these groups may not be in scope of your organization changes, you need to ensure your IT team works with them effectively.

      If your organization is going to push back if there are big structural changes, consider whether the changes are truly necessary. It may be preferred to take baby steps – use an incremental versus big-bang approach.

      A need for incremental change might mean not making a major operating model change.

      Business context considerations

      Business Context Consideration

      IT Org Design. Implication

      Stakeholder Engagement & Focus:

      Identify who your customers and stakeholders are; clarify their needs and engagement model.

      • Who is the customer for IT products and services?
      • Is your customer internal? External? Both?
      • How much of a priority is customer focus for your organization?
      • How will IT interact with customers, end users, and partners? What is the engagement model desired?

      Business Vision, Services, and Products:

      Articulate what your organization was built to do.

      • What does the organization create or provide?
      • Are these products and services changing?
      • What are the most critical capabilities to your organization?
      • What makes your organization a success? What are critical success factors of the organization and how are they measuring this to determine success?

      For a customer or user focus, ensure capabilities related to understanding needs (stakeholder, UX, etc.) are prioritized. Hybrid, decentralized, or demand-develop-service models often have more of a focus on customer needs.

      Outsourcing the service desk might be a consideration if there’s a high demand for the service. A differentiation between these users might mean there’s a different demand for services.

      Think broadly in terms of your organizational vision, not just the tactical (widget creation). You might need to choose an operating model that supports vision.

      Do you need to align your organization with your value stream? Do you need to decentralize specific capabilities to enable prioritization of the key capabilities?

      1.2 Create design principles based on the business context

      1-3 hours

      1. Discuss the business context in which the IT organizational redesign will be taking place. Consider the following standard components of the business context; include other relevant components specific to your organization:
      • Culture
      • Workforce Considerations
      • Control and Governance
      • Financial Constraints
      • Business Perspective of IT
      • Business Organization Structure and Growth
      • Sourcing Strategy
      • Change Tolerance
      • Stakeholder Engagement and Focus
      • Business Vision, Services, and Products
    • Different stakeholders can have different perspectives on these questions. Be sure to consider a holistic approach and engage these individuals.
    • Capture your findings and use them to create initial design principles.
    • Input

      Output

      • Business context
      • Design principles reflecting how the business context influences the organizational redesign for IT

      Materials

      Participants

      • Whiteboard/flip charts (physical or electronic)
      • List of Context Questions
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      How your IT organization is structured needs to reflect what it must be built to do

      Structure follows strategy – the way you design will impact what your organization can produce.

      Designing your IT organization requires an assessment of what it needs to be built to do:

      • What are the most critical capabilities that you need to deliver, and what does success look like in those different areas?
      • What are the most important things that you deliver overall in your organization?

      The IT organization must reflect your business needs:

      • Understand your value stream and/or your prioritized business goals.
      • Understand the impact of your strategies – these can include your overall digital strategy and/or your IT strategy

      1.3a (Optional Exercise) Identify the capabilities from your value stream

      1 hour

      1. Identify your organization’s value stream – what your overall organization needs to do from supplier to consumer to provide value. Leverage Info-Tech’s industry reference architectures if you haven’t identified your value stream, or use the Document Your Business Architecture blueprint to create yours.
      2. For each item in your value stream, list capabilities that are critical to your organizational strategy and IT needs to further invest in to enable growth.
      3. Also, list those that need further support, e.g. those that lead to long wait times, rework time, re-tooling, down-time, unnecessary processes, unvaluable processes.*
      4. Capture the IT capabilities required to enable your business in your draft principles.
      The image contains a screenshot of the above activity: Sampling Manufacturing Business Capabilities.
      Source: Six Sigma Study Guide, 2014
      Input Output
      • Organization’s value stream
      • List of IT capabilities required to support the IT strategy
      Materials Participants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Your strategy will help you decide on your structure

      Ensure that you have a clear view of the goals and initiatives that are needed in your organization. Your IT, digital, business, and/or other strategies will surface the IT capabilities your organization needs to develop. Identify the goals of your organization and the initiatives that are required to deliver on them. What capabilities are required to enable these? These capabilities will need to be reflected in your design principles.

      Sample initiatives and capabilities from an organization’s strategies

      The image contains a screenshot of sample initiatives and capabilities from an organization's strategies.

      1.3b Identify the capabilities required to deliver on your strategies

      1 hour

      1. For each IT goal, there may be one or more initiatives that your organization will need to complete in order to be successful.
      2. Document those goals and infinitives. For each initiative, consider which core IT capabilities will be required to deliver on that goal. There might be one IT capability or there might be several.
      3. Identify which capabilities are being repeated across the different initiatives. Consider whether you are currently investing in those capabilities in your current organizational structure.
      4. Highlight the capabilities that require IT investment in your design principles.
      InputOutput
      • IT goals
      • IT initiatives
      • IT, digital, and business strategies
      • List of IT capabilities required to support the IT strategy
      MaterialsParticipants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Create your organizational design principles

      Your organizational design principles should define a set of loose rules that can be used to design your organizational structure to the specific needs of the work that needs to be done. These rules will guide you through the selection of the appropriate operating model that will meet your business needs. There are multiple ways you can hypothetically organize yourself to meet these needs, and the design principles will point you in the direction of which solution is the most appropriate as well as explain to your stakeholders the rationale behind organizing in a specific way. This foundational step is critical: one of the key reasons for organizational design failure is a lack of requisite time spent on the front-end understanding what is the best fit.

      The image contains an example of organizing design principles as described above.

      1.4 Finalize your list of design principles

      1-3 hours

      1. As a group, review the key outputs from your data collection exercises and their implications.
      2. Consider each of the previous exercises – where does your organization stand from a maturity perspective, what is driving the redesign, what is the business context, and what are the key IT capabilities requiring support. Identify how each will have an implication on your organizational redesign. Leverage this conversation to generate design principles.
      3. Vote on a finalized list of eight to ten design principles that will guide the selection of your operating model. Have everyone leave the meeting with these design principles so they can review them in more detail with their work units or functional areas and elicit any necessary feedback.
      4. Reconvene the group that was originally gathered to create the list of design principles and make any final amendments to the list as necessary. Use this opportunity to define exactly what each design principle means in the context of your organization so everyone has the same understanding of what this means moving forward.
      InputOutput
      • Organizational redesign drivers
      • Business context
      • IT strategy capabilities
      • Organizational design principles to help inform the selection of the right operating model sketch
      MaterialsParticipants
      • Whiteboard/flip charts (physical or electronic)
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Communications Deck

      Example design principles

      Your eight to ten design principles will be those that are most relevant to YOUR organization. Below are samples that other organizations have created, but yours will not be the same.

      Design Principle

      Description

      Decision making

      We will centralize decision making around the prioritization of projects to ensure that the initiatives driving the most value for the organization as a whole are executed.

      Fit for purpose

      We will build and maintain fit-for-purpose solutions based on business units’ unique needs.

      Reduction of duplication

      We will reduce role and application duplication through centralized management of assets and clearly differentiated roles that allow individuals to focus within key capability areas.

      Managed security

      We will manage security enterprise-wide and implement compliance and security governance policies.

      Reuse > buy > build

      We will maximize reuse of existing assets by developing a centralized application portfolio management function and approach.

      Managed data

      We will create a specialized data office to provide data initiatives with the focus they need to enable our strategy.

      Design Principle

      Description

      Controlled technical diversity

      We will control the variety of technology platforms we use to allow for increased operability and reduction of costs.

      Innovation

      R&D and innovation are critical – we will build an innovation team into our structure to help us meet our digital agenda.

      Resourcing

      We will separate our project and maintenance activities to ensure each are given the dedicated support they need for success and to reduce the firefighting mentality.

      Customer centricity

      The new structure will be directly aligned with customer needs – we will have dedicated roles around relationship management, requirements, and strategic roadmapping for business units.

      Interoperability

      We will strengthen our enterprise architecture practices to best prepare for future mergers and acquisitions.

      Cloud services

      We will move toward hosted versus on-premises infrastructure solutions, retrain our data center team in cloud best practices, and build roles around effective vendor management, cloud provisioning, and architecture.

      Phase 2

      Create the Operating Model Sketch

      This phase will walk you through the following activities:

      2.1 Augment the capability list

      2.2 Heatmap capabilities to determine gaps in service

      2.3 Identify the target state of sourcing for your IT capabilities

      2.4 Review and select a base operating model sketch

      2.5 Customize the selected overlay to reflect the desired future state

      This phase involves the following participants:

      • CIO
      • IT Leadership

      Embed change management into the organizational design process

      Gain Buy-In

      Obtain desire from stakeholders to move forward with organizational redesign initiative by involving them in the process to gain interest. This will provide the stakeholders with assurance that their concerns are being heard and will help them to understand the benefits that can be anticipated from the new organizational structure.

      “You’re more likely to get buy-in if you have good reason for the proposed changes – and the key is to emphasize the benefits of an organizational redesign.”

      Source: Lucid Chart

      Info-Tech Insight

      Just because people are aware does not mean they agree. Help different stakeholders understand how the change in the organizational structure is a benefit by specifically stating the benefit to them.

      Info-Tech uses capabilities in your organizational design

      We differentiate between capabilities and competencies.

      Capabilities

      • Capabilities are focused on the entire system that would be in place to satisfy a particular need. This includes the people who are competent to complete a specific task and also the technology, processes, and resources to deliver.
      • Capabilities work in a systematic way to deliver on specific need(s).
      • A functional area is often made up of one or more capabilities that support its ability to deliver on that function.
      • Focusing on capabilities rather then the individuals in organizational redesign enables a more objective and holistic view of what your organization is striving toward.

      Competencies

      • Competencies on the other hand are specific to an individual. It determines if the individual poses the skills or ability to perform.
      • Competencies are rooted in the term competent, which looks to understand if you are proficient enough to complete the specific task at hand.
      • Source: The People Development Magazine, 2020

      Use our IT capabilities to establish your IT organization design

      The image contains a diagram of the various services and blueprints that Info-Tech has to offer.

      2.1 Augment the capability list

      1-3 hours

      1. Using the capability list on the previous slide, go through each of the IT capabilities and remove any capabilities for which your IT organization is not responsible and/or accountable. Refer to the Operating Model and Capability Definition List for descriptions of each of the IT capabilities.
      2. Augment the language of specific capabilities that you feel are not directly reflective of what is being done within your organizational context or that you feel need to be changed to reflect more specifically how work is being done in your organization.
      • For example, some organizations may refer to their service desk capability as help desk or regional support. Use a descriptive term that most accurately reflects the terminology used inside the organization today.
    • Add any core capabilities from your organization that are missing from the provided IT capability list.
      • For example, organizations that leverage DevOps capabilities for their product development may desire to designate this in their operating model.
    • Document the rationale for decisions made for future reference.
    • Input Output
      • Baseline list of IT capabilities
      • IT capabilities required to support IT strategy
      • Customized list of IT capabilities
      Materials Participants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Gaps in delivery

      Identify areas that require greater focus and attention.

      Assess the gaps between where you currently are and where you need to be. Evaluate how critical and how effective your capabilities are:

      • Criticality = Importance
        • Try to focus on those which are highly critical to the organization.
        • These may be capabilities that have been identified in your strategies as areas to focus on.
      • Effectiveness = Performance
        • Identify those where the process or system is broken or ineffective, preventing the team from delivering on the capability.
        • Effectiveness could take into consideration how scalable, adaptable, or sustainable each capability is.
        • Focus on the capabilities that are low or medium in effectiveness but highly critical. Addressing the delivery of these capabilities will lead to the most positive outcomes in your organization.

      Remember to identify what allows the highly effective capabilities to perform at the capacity they are. Leverage this when increasing effectiveness elsewhere.

      High Gap

      There is little to no effectiveness (high gap) and the capability is highly important to your organization.

      Medium Gap

      Current ability is medium in effectiveness (medium gap) and there might be some priority for that capability in your organization.

      Low Gap

      Current ability is highly effective (low gap) and the capability is not necessarily a priority for your organization.

      2.2 Heatmap capabilities to determine gaps in delivery

      1-3 hours

      1. At this point, you should have identified what capabilities you need to have to deliver on your organization's goals and initiatives.
      2. Convene a group of the key stakeholders involved in the IT organizational design initiative.
      3. Review your IT capabilities and color each capability border according to the effectiveness and criticality of that capability, creating a heat map.
      • Green indicates current ability is highly effective (low gap) and the capability is not necessarily a priority for your organization.
      • Yellow indicates current ability is medium in effectiveness (medium gap) and there might be some priority for that capability in your organization.
      • Red indicates that there is little to no effectiveness (high gap) and the capability is highly important to your organization.
      Input Output
      • Selected capabilities from activity 2.1
      • Gap analysis in delivery of capabilities currently
      Materials Participants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Don’t forget the why: why are you considering outsourcing?

      There are a few different “types” of outsourcing:

      1. Competitive Advantage – Working with a third-party organization for the knowledge, insights, and best practices they can bring to your organization.
      2. Managed Service– The third party manages a capability or function for your organization.
      3. Staff Augmentation – Your organization brings in contractors and third-party organizations to fill specific skills gaps.

      Weigh which sourcing model(s) will best align with the needed capabilities to deliver effectively

      Insourcing

      Staff Augmentation

      Managed Service

      Competitive Advantage

      Description

      The organization maintains full responsibility for the management and delivery of the IT capability or service.

      Vendor provides specialized skills and enables the IT capability or service together with the organization to meet demand.

      Vendor completely manages the delivery of value for the IT capability, product or service.

      Vendor has unique skills, insights, and best practices that can be taught to staff to enable insourced capability and competency.

      Benefits

      • Retains in-house control over proprietary knowledge and assets that provide competitive or operational advantage.
      • Gains efficiency due to integration into the organization’s processes.
      • Provision of unique skills.
      • Addresses variation in demand for resources.
      • Labor cost savings.
      • Improves use of internal resources.
      • Improves effectiveness due to narrow specialization.
      • Labor cost savings.
      • Gain insights into aspects that could provide your organization with advantages over competitors.
      • Long-term labor cost savings.
      • Short-term outsourcing required.
      • Increase in-house competencies.

      Drawbacks

      • Quality of services/capabilities might not be as high due to lack of specialization.
      • No labor cost savings.
      • Potentially inefficient distribution of labor for the delivery of services/capabilities.
      • Potential conflicts in management or delivery of IT services and capabilities.
      • Negative impact on staff morale.
      • Limited control over services/capabilities.
      • Limited integration into organization’s processes.
      • Short-term labor expenses.
      • Requires a culture of continuous learning and improvement.

      Your strategy for outsourcing will vary with capability and capacity

      The image contains a diagram to show the Develop Vendor Management Capabilities, as described in the text below.

      Capability

      Capacity

      Outsourcing Model

      Low

      Low

      Your solutions may be with you for a long time, so it doesn’t matter whether it is a strategic decision to outsource development or if you are not able to attract the talent required to deliver in your market. Look for a studio, agency, or development shop that has a proven reputation for long-term partnership with its clients.

      Low

      High

      Your team has capacity but needs to develop new skills to be successful. Look for a studio, agency, or development shop that has a track record of developing its customers and delivering solutions.

      High

      Low

      Your organization knows what it is doing but is strapped for people. Look at “body shops” and recruiting agencies that will support short-term development contracts that can be converted to full-time staff or even a wholesale development shop acquisition.

      High

      High

      You have capability and capacity for delivering on your everyday demands but need to rise to the challenge of a significant, short-term rise in demand on a critical initiative. Look for a major system integrator or development shop with the specific expertise in the appropriate technology.

      Use these criteria to inform your right sourcing strategy

      Sourcing Criteria

      Description

      Determine whether you’ll outsource using these criteria

      1. Critical or commodity

      Determine whether the component to be sourced is critical to your organization or if it is a commodity. Commodity components, which are either not strategic in nature or related to planning functions, are likely candidates for outsourcing. Will you need to own the intellectual property created by the third party? Are you ok if they reuse that for their other clients?

      2. Readiness to outsource

      Identify how easy it would be to outsource a particular IT component. Consider factors such as knowledge transfer, workforce reassignment or reduction, and level of integration with other components.

      Vendor management readiness – ensuring that you have sufficient capabilities to manage vendors – should also be considered here.

      3. In-house capabilities

      Determine if you have the capability to deliver the IT solutions in-house. This will help you establish how easy it would be to insource an IT component.

      4. Ability to attract resources (internal vs. outsourced)

      Determine if the capability is one that is easily sourced with full-time, internal staff or if it is a specialty skill that is best left for a third-party to source.

      Determine your sourcing model using these criteria

      5. Cost

      Consider the total cost (investment and ongoing costs) of the delivery of the IT component for each of the potential sourcing models for a component.

      6. Quality

      Define the potential impact on the quality of the IT component being sourced by the possible sourcing models.

      7. Compliance

      Determine whether the sourcing model would fit with regulations in your industry. For example, a healthcare provider would only go for a cloud option if that provider is HIPAA compliant.

      8. Security

      Identify the extent to which each sourcing option would leave your organization open to security threats.

      9. Flexibility

      Determine the extent to which the sourcing model will allow your organization to scale up or down as demand changes.

      2.3 Identify capabilities that could be outsourced

      1-3 hours

      1. For each of the capabilities that will be in your future-state operating model, determine if it could be outsourced. Review the sourcing criteria available on the previous slide to help inform which sourcing strategy you will use for each capability.
      2. When looking to outsource or co-source capabilities, consider why that capability would be outsourced:
      • Competitive Advantage – Work with a third-party organization for the knowledge, insights, and best practices they can bring to your organization.
      • Managed Service – The third party manages a capability or function for your organization.
      • Staff Augmentation – Your organization brings in contractors and third-party organizations to fill specific skills gaps.
    • Place an asterisk (*) around the capabilities that will be leveraging one of the three previous sourcing options.
    • InputOutput
      • Customized IT capabilities
      • Sourcing strategy for each IT capability
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      What is an operating model?

      Leverage a cohesive operating model throughout the organizational design process.

      An IT operating model sketch is a visual representation of the way your IT organization needs to be designed and the capabilities it requires to deliver on the business mission, strategic objectives, and technological ambitions. It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint.

      The visual should be the optimization and alignment of the IT organization’s structure to deliver the capabilities required to achieve business goals. Additionally, it should clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization. Investing time in the front end getting the operating model right is critical. This will give you a framework to rationalize future organizational changes, allowing you to be more iterative and your model to change as the business changes.

      The image contains an example of an operating model as described in the text above.

      Info-Tech Insight

      Every structure decision you make should be based on an identified need, not on a trend.Build your IT organization to enable the priorities of the organization.

      Each IT operating model is characterized by a variety of advantages and disadvantages

      Centralized

      Hybrid

      Decentralized

      Advantages
      • Maximum flexibility to allocate IT resources across business units.
      • Low-cost delivery model and greatest economies of scale.
      • Control and consistency offers opportunity for technological rationalization and standardization and volume purchasing at the highest degree.
      • Centralizes processes and services that require consistency across the organization.
      • Decentralizes processes and services that need to be responsive to local market conditions.
      • Eliminates duplication and redundancy by allowing effective use of common resources (e.g. shared services, standardization).
      • Goals are aligned to the distinct business units or functions.
      • Greater flexibility and more timely delivery of services.
      • Development resources are highly knowledgeable about business-unit-specific applications.
      • Business unit has greatest control over IT resources and can set and change priorities as needed.

      Disadvantages

      • Less able to respond quickly to local requirements with flexibility.
      • IT can be resistant to change and unwilling to address the unique needs of end users.
      • Business units can be frustrated by perception of lack of control over resources.
      • Development of special business knowledge can be limited.
      • Requires the most disciplined governance structure and the unwavering commitment of the business; therefore, it can be the most difficult to maintain.
      • Requires new processes as pooled resources must be staffed to approved projects.
      • Redundancies, conflicts, and incompatible technologies can result from business units having differentiated services and applications – increasing cost.
      • Ability to share IT resources is low due to lack of common approaches.
      • Lack of integration limits the communication of data between businesses and reduces common reporting.

      Decentralization can take many forms – define what it means to your organization

      Decentralization can take a number of different forms depending on the products the organization supports and how the organization is geographically distributed. Use the following set of explanations to understand the different types of decentralization possible and when they may make sense for supporting your organizational objectives.

      Line of Business

      Decentralization by lines of business (LoB) aligns decision making with business operating units based on related functions or value streams. Localized priorities focus the decision making from the CIO or IT leadership team. This form of decentralization is beneficial in settings where each line of business has a unique set of products or services that require specific expertise or flexible resourcing staffing between the teams.

      Product Line

      Decentralization by product line organizes your team into operationally aligned product families to improve delivery throughput, quality, and resource flexibility within the family. By adopting this approach, you create stable product teams with the right balance between flexibility and resource sharing. This reinforces value delivery and alignment to enterprise goals within the product lines.

      Geographical

      Geographical decentralization reflects a shift from centralized to regional influences. When teams are in different locations, they can experience a number of roadblocks to effective communication (e.g. time zones, regulatory differences in different countries) that may necessitate separating those groups in the organizational structure, so they have the autonomy needed to make critical decisions.

      Functional

      Functional decentralization allows the IT organization to be separated by specialty areas. Organizations structured by functional specialization can often be organized into shared service teams or centers of excellence whereby people are grouped based on their technical, domain, or functional area within IT (Applications, Data, Infrastructure, Security, etc.). This allows people to develop specialized knowledge and skills but can also reinforce silos between teams.

      2.4 Review and select a base operating model sketch

      1 hour

      1. Review the set of base operating model sketches available on the following slides.
      2. For each operating model sketch, there are benefits and risks to be considered. Make an informed selection by understanding the risks that your organization might be taking on by adopting that particular operating model.
      3. If at any point in the selection process the group is unsure about which operating model will be the right fit, refer back to your design principles established in activity 1.4. These should guide you in the selection of the right operating model and eliminate those which will not serve the organization.
      InputOutput
      • Organizational design principles
      • Customized list of IT capabilities
      • Operating model sketch examples
      • Selected operating model sketch
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Centralized Operating Model #1: Plan-Build-Run

      I want to…

      • Establish a formalized governance process that takes direction from the organization on which initiatives should be prioritized by IT.
      • Ensure there is a clear separation between teams that are involved in strategic planning, building solutions, and delivering operational support.
      • Be able to plan long term by understanding the initiatives that are coming down the pipeline and aligning to an infrequent budgeting plan.

      BENEFITS

      • Effective at implementing long-term plans efficiently; separates maintenance and projects to allow each to have the appropriate focus.
      • More oversight over financials; better suited for fixed budgets.
      • Works across centralized technology domains to better align with the business’ strategic objectives – allows for a top-down approach to decision making.
      • Allows for economies of scale and expertise pooling to improve IT’s efficiency.
      • Well-suited for a project-driven environment that employs waterfall or a hybrid project management methodology that is less iterative.

      RISKS

      • Creates artificial silos between the build (developers) and run (operations staff) teams, as both teams focus on their own responsibilities and often fail to see the bigger picture.
      • Miss opportunities to deliver value to the organization or innovate due to an inability to support unpredictable/shifting project demands as decision making is centralized in the plan function.
      • The portfolio of initiatives being pursued is often determined before requirements analysis takes place, meaning the initiative might be solving the wrong need or problem.
      • Depends on strong hand-off processes to be defined and strong knowledge transfer from build to run functions in order to be successful.
      The image contains an example of a Centralized Operating Model: Plan-Build-Run.

      Centralized Operating Model #2: Demand-Develop-Service

      I want to…

      • Listen to the business to understand new initiatives or service enhancements being requested.
      • Enable development and operations to work together to seamlessly deliver in a DevOps culture.
      • Govern and confirm that initiatives being requested by the business are still aligned to IT’s overarching strategy and roadmap before prioritizing those initiatives.

      BENEFITS

      • Aligns well with an end-to-end services model; constant attention to customer demand and service supply.
      • Centralizes service operations under one functional area to serve shared needs across lines of business.
      • Allows for economies of scale and expertise pooling to improve IT’s efficiency.
      • Elevates sourcing and vendor management as its own strategic function; lends well to managed service and digital initiatives.
      • Development and operations housed together; lends well to DevOps-related initiatives and reduces the silos between these two core groups.

      RISKS

      • IT prioritizes the initiatives it thinks are a priority to the business based on how well it establishes good stakeholder relations and communications.
      • Depends on good governance to prevent enhancements and demands from being prioritized without approval from those with accountability and authority.
      • This model thrives in a DevOps culture but does not mean it ensures your organization is a “DevOps” organization. Be sure you're encouraging the right behaviors and attitudes.

      The image contains an example of a Centralized Operating Model: Demand, Develop, Service.

      Hybrid Operating Model #1: LOB/Functional Aligned

      I want to…

      • Better understand the various needs of the organization to align IT priorities and ensure the right services can be delivered.
      • Keep all IT decisions centralized to ensure they align with the overarching strategy and roadmap that IT has set.
      • Organize your shared services in a strategic manner that enables delivery of those services in a way that fits the culture of the organization and the desired method of operating.

      BENEFITS

      • Best of both worlds of centralization and decentralization; attempts to channel benefits from both centralized and decentralized models.
      • Embeds key IT functions that require business knowledge within functional areas, allowing for critical feedback and the ability to understand those business needs.
      • Places IT in a position to not just be “order takers” but to be more involved with the different business units and promote the value of IT.
      • Achieves economies of scale where necessary through the delivery of shared services that can be requested by the function.
      • Shared services can be organized to deliver in the best way that suits the organization.

      RISKS

      • Different business units may bypass governance to get their specific needs met by functions – to alleviate this, IT must have strong governance and prioritize amongst demand.
      • Decentralized role can be viewed as an order taker by the business if not properly embedded and matured.
      • No guaranteed synergy and integration across functions; requires strong communication, collaboration, and steering.
      • Cannot meet every business unit’s needs – can cause tension from varying effectiveness of the IT functions.

      The image contains an example of a Hybrid Operating Model: LOB/Functional Aligned.

      Hybrid Model #2: Product-Aligned Operating Model

      I want to…

      • Align my IT organization into core products (services) that IT provides to the organization and establish a relationship with those in the organization that have alignment to that product.
      • Have roles dedicated to the lifecycle of their product and ensure the product can continuously deliver value to the organization.
      • Maintain centralized set of standards as it applies to overall IT strategy, security, and architecture to ensure consistency across products and reduce silos.

      BENEFITS

      • Focus is on the full lifecycle of a product – takes a strategic view of how technology enables the organization.
      • Promotes centralized backlog around a specific value creator, rather than a traditional project focus that is more transactional.
      • Dedicated teams around the product family ensure you have all of the resources required to deliver on your product roadmap.
      • Reduces barriers between IT and business stakeholders; focuses on technology as a key strategic enabler.
      • Delivery is largely done through frequent releases that can deliver value.

      RISKS

      • If there is little or no business involvement, it could prevent IT from truly understanding business demand and prioritizing the wrong work.
      • A lack of formal governance can create silos between the IT products, causing duplication of efforts, missed opportunities for collaboration, and redundancies in application or vendor contracts.
      • Members of each product can interpret the definition of standards (e.g. architecture, security) differently.

      The image contains an example of the Hybrid Operating Model: Product-Aligned Operating Model.

      Hybrid Operating Model #3: Service-Aligned Operating Model

      I want to…

      • Decentralize the IT organization by the various IT services it offers to the organization while remaining centralized with IT strategy, governance, security and operational services.
      • Ensure IT services are defined and people resources are aligned to deliver on those services.
      • Enable each of IT’s services to have the autonomy to understand the business needs and be able to manage the operational and new project initiatives with a dedicated service owner or business relationship manager.

      BENEFITS

      • Strong enabler of agility as each service has the autonomy to make decisions around operational work versus project work based on their understanding of the business demand.
      • Individuals in similar roles that are decentralized across services are given coaching to provide common direction.
      • Allows teams to efficiently scale with service demand.
      • This is a structurally baseline DevOps model. Each group will have services built within that have their own dedicated teams that will handle the full gambit of responsibilities, from new features to enhancements and maintenance.

      RISKS

      • Service owners require a method to collaborate to avoid duplication of efforts or projects that conflict with the efforts of other IT services.
      • May result in excessive cost through role redundancies across different services, as each will focus on components like integration, stakeholder management, project management, and user experiences.
      • Silos cause a high degree of specialization, making it more difficult for team members to imagine moving to another defined service group, limiting potential career advancement opportunities.
      • The level of complex knowledge required by shared services (e.g. help desk) is often beyond what they can provide, causing them to rely on and escalate to defined service groups more than with other operating models.

      The image contains an example of the Hybrid Operating Model: Service-Aligned Operating Model.

      Decentralized Model: Division Decentralization (LoB, Geography, Function, Product)

      I want to…

      • Decentralize the IT organization to enable greater autonomy within specific groups that have differing customer demands and levels of support.
      • Maintain a standard level of service that can be provided by IT for all divisions.
      • Ensure each division has access to critical data and reports that supports informed decision making.

      BENEFITS

      • Organization around functions allows for diversity in approach in how areas are run to best serve a specific business unit’s needs.
      • Each functional line exists largely independently, with full capacity and control to deliver service at the committed SLAs.
      • Highly responsive to shifting needs and demands with direct connection to customers and all stages of the solution development lifecycle.
      • Accelerates decision making by delegating authority lower into the function.
      • Promotes a flatter organization with less hierarchy and more direct communication with the CIO.

      RISKS

      • Requires risk and security to be centralized and have oversight of each division to prevent the decisions of one division from negatively impacting other divisions or the enterprise.
      • Less synergy and integration across what different lines of business are doing can result in redundancies and unnecessary complexity.
      • Higher overall cost to the IT group due to role and technology duplication across different divisions.
      • It will be difficult to centralize aspects of IT in the future, as divisions adopt to a culture of IT autonomy.

      The image contains an example of the Decentralized Model: Division Decentralization.

      Enterprise Model: Multi-Modal

      I want to…

      • Have an organizational structure that leverages several different operating models based on the needs and requirements of the different divisions.
      • Provide autonomy and authority to the different divisions so they can make informed and necessary changes as they see fit without seeking approval from a centralized IT group.
      • Support the different initiatives the enterprise is focused on delivering and ensure the right model is adopted based on those initiatives.

      BENEFITS

      • Allows for the organization to work in ways that best support individual areas; for example, areas that support legacy systems can be supported through traditional operating models while areas that support digital transformations may be supported through more flexible operating models.
      • Enables a specialization of knowledge related to each division.

      RISKS

      • Inconsistency across the organization can lead to confusion on how the organization should operate.
      • Parts of the organization that work in more traditional operating models may feel limited in career growth and innovation.
      • Cross-division initiatives may require greater oversight and a method to enable operations between the different focus areas.

      The image contains an example of the Enterprise Model: Multi-Modal.

      Create enabling teams that bridge your divisions

      The following bridges might be necessary to augment your divisions:

      • Specialized augmentation: There might not be a sufficient number of resources to support each division. These teams will be leveraged across the divisions; this means that the capabilities needed for each division will exist in this bridge team, rather than in the division.
      • Centers of Excellence: Capabilities that exist within divisions can benefit from shared knowledge across the enterprise. Your organization might set up centers of excellence to support best practices in capabilities organization wide. These are Forums in the unfix model, or communities of practice and support capability development rather than deliveries of each division.
      • Facilitation teams might be required to support divisions through coaching. This might include Agile or other coaches who can help teams adopt practices and embed learnings.
      • Holistic teams provide an enterprise view as they work with various divisions. This can include capabilities like user experience, which can benefit from the holistic perspective rather than a siloed one. People with these capabilities augment the divisions on an as-needed basis.
      The image contains a diagram to demonstrate the use of bridges on divisions.

      2.5 Customize the selected sketch to reflect the desired future state

      1-3 hours

      1. Using the baseline operating model sketch, walk through each of the IT capabilities. Based on the outputs from activity 2.1:
        1. Remove any capabilities for which your IT organization is not responsible and/or accountable.
        2. Augment the language of specific capabilities that you feel are not directly reflective of what is being done within your organizational context or that you feel need to be changed to reflect more specifically how work is being done in your organization.
        3. Add any core capabilities from your organization that are missing from the provided IT capability list.
      2. Move capabilities to the right places in the operating model to reflect how each of the core IT processes should interact with one another.
      3. Add bridges as needed to support the divisions in your organization. Identify which capabilities will sit in these bridges and define how they will enable the operating model sketch to deliver.
      InputOutput
      • Selected base operating model sketch
      • Customized list of IT capabilities
      • Understanding of outsourcing and gaps
      • Customized operating model sketch
      MaterialsParticipants
      • Whiteboard/flip charts
      • Operating model sketch examples
      • CIO
      • IT Leadership

      Record the results in the Organizational Design Workbook

      Document the final operating model sketch in the Communications Deck

      Phase 3

      Formalize the Organizational Structure

      This phase will walk you through the following activities:

      3.1 Create work units

      3.2 Create work unit mandates

      3.3 Define roles inside the work units

      3.4 Finalize the organizational chart

      3.5 Identify and mitigate key risks

      This phase involves the following participants:

      • CIO
      • IT Leadership
      • Business Leadership

      Embed change management into the organizational design process

      Enable adoption of the new structure.

      You don’t have to make the change in one big bang. You can adopt alternative transition plans such as increments or pilots. This allows people to see the benefits of why you are undergoing the change, allows the change message to be repeated and applied to the individuals impacted, and provides people with time to understand their role in making the new organizational structure successful.

      “Transformational change can be invigorating for some employees but also highly disruptive and stressful for others.”

      Source: OpenStax, 2019

      Info-Tech Insight

      Without considering the individual impact of the new organizational structure on each of your employees, the change will undoubtedly fail in meeting its intended goals and your organization will likely fall back into old structured habits.

      Use a top-down approach to build your target-state IT organizational sketch

      The organizational sketch is the outline of the organization that encompasses the work units and depicts the relationships among them. It’s important that you create the structure that’s right for your organization, not one that simply fits with your current staff’s skills and knowledge. This is why Info-Tech encourages you to use your operating model as a mode of guidance for structuring your future-state organizational sketch.

      The organizational sketch is made up of unique work units. Work units are the foundational building blocks on which you will define the work that IT needs to get done. The number of work units you require and their names will not match your operating model one to one. Certain functional areas will need to be broken down into smaller work units to ensure appropriate leadership and span of control.

      Use your customized operating model to build your work units

      WHAT ARE WORK UNITS?

      A work unit is a functional group or division that has a discrete set of processes or capabilities that it is responsible for, which don’t overlap with any others. Your customized list of IT capabilities will form the building blocks of your work units. Step one in the process of building your structure is grouping IT capabilities together that are similar or that need to be done in concert in the case of more complex work products. The second step is to iterate on these work units based on the organizational design principles from Phase 1 to ensure that the future-state structure is aligned with enablement of the organization’s objectives.

      Work Unit Examples

      Here is a list of example work units you can use to brainstorm what your organization’s could look like. Some of these overlap in functionality but should provide a strong starting point and hint at some potential alternatives to your current way of organizing.

      • Office of the CIO
      • Strategy and Architecture
      • Architecture and Design
      • Business Relationship Management
      • Projection and Portfolio Management
      • Solution Development
      • Solution Delivery
      • DevOps
      • Infrastructure and Operations
      • Enterprise Information Security
      • Security, Risk & Compliance
      • Data and Analytics

      Example of work units

      The image contains an example of work units.

      3.1 Create functional work units

      1-3 hours

      1. Using a whiteboard or large tabletop, list each capability from your operating model on a sticky note and recreate your operating model. Use one color for centralized activities and a second color for decentralized activities.
      2. With the group of key IT stakeholders, review the operating model and any important definitions and rationale for decisions made.
      3. Starting with your centralized capabilities, review each in turn and begin to form logical groups of compatible capabilities. Review the decentralized capabilities and repeat the process, writing additional sticky notes for capabilities that will be repeated in decentralized units.
      4. Note: Not all capabilities need to be grouped. If you believe that a capability has a high enough priority, has a lot of work, or is significantly divergent from others put this capability by itself.
      5. Define a working title for each new work unit, and discuss the pros and cons of the model. Ensure the work units still align with the operating model and make any changes to the operating model needed.
      6. Review your design principles and ensure that they are aligned with your new work units.
      InputOutput
      • Organizational business objectives
      • Customized operating model
      • Defined work units
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Group formation

      Understand the impact of the functional groups you create.

      A group consists of two or more individuals who are working toward a common goal. Group formation is how those individuals are organized to deliver on that common goal. It should take into consideration the levels of hierarchy in your structure, the level of focus you give to processes, and where power is dispersed within your organizational design.

      Importance: Balance highly important capabilities with lower priority capabilities

      Specialization: The scope of each role will be influenced by specialized knowledge and a dedicated leader

      Effectiveness: Group capabilities that increase their efficacy

      Span of Control: Identify the right number of employees reporting to a single leader

      Choose the degree of specialization required

      Be mindful of the number of hats you’re placing on any one role.

      • Specialization exists when individuals in an organization are dedicated to performing specific tasks associated with a common goal and requiring a particular skill set. Aligning the competencies required to carry out the specific tasks based on the degree of complexity associated with those tasks ensures the right people and number of people can be assigned.
      • When people are organized by their specialties, it reduces the likelihood of task switching, reduces the time spent training or cross-training, and increases the focus employees can provide to their dedicated area of specialty.
      • There are disadvantages associated with aligning teams by their specialization, such as becoming bored and seeing the tasks they are performing as monotonous. Specialization doesn’t come without its problems. Monitor employee motivation

      Info-Tech Insight

      Smaller organizations will require less specialization simply out of necessity. To function and deliver on critical processes, some people might be asked to wear several hats.

      Avoid overloading the cognitive capacity of employees

      Cognitive load refers to the number of responsibilities that one can successfully take on.

      • When employees are assigned an appropriate number of responsibilities this leads to:
        • Engaged employees
        • Less task switching
        • Increased effectiveness on assigned responsibilities
        • Reduced bottlenecks
      • While this cognitive load can differ from employee to employee, when assigning role responsibilities, ensure each role isn’t being overburdened and spreading their focus thin.
      • Moreover, capable does not equal successful. Just because someone has the capability to take on more responsibilities doesn’t mean they will be successful.
      • Leverage the cognitive load being placed on your team to help create boundaries between teams and demonstrate clear role expectations.
      Source: IT Revolution, 2021

      Info-Tech Insight

      When you say you are looking for a team that is a “jack of all trades,” you are likely exceeding appropriate cognitive loads for your staff and losing productivity to task switching.

      Factors to consider for span of control

      Too many and too few direct reports have negative impacts on the organization.

      Complexity: More complex work should have fewer direct reports. This often means the leader will need to provide lots of support, even engaging in the work directly at times.

      Demand: Dynamic shifts in demand require more managerial involvement and therefore should have a smaller span of control. Especially if this demand is to support a 24/7 operation.

      Competency Level: Skilled employees should require less hands-on assistance and will be in a better position to support the business as a member of a larger team than those who are new to the role.

      Purpose: Strategic leaders are less involved in the day-to-day operations of their teams, while operational leaders tend to provide hands-on support, specifically when short-staffed.

      Group formation will influence communication structure

      Pick your poison…

      It’s important to understand the impacts that team design has on your services and products. The solutions that a team is capable of producing is highly dependent on how teams are structured. For example, Conway’s Law tells us that small distributed software delivery teams are more likely to produce modular service architecture, where large collocated teams are better able to create monolithic architecture. This doesn’t just apply to software delivery but also other products and services that IT creates. Note that small distributed teams are not the only way to produce quality products as they can create their own silos.

      Sources: Forbes, 2017

      Create mandates for each of your identified work units

      WHAT ARE WORK UNIT MANDATES?

      The work unit mandate should provide a quick overview of the work unit and be clear enough that any reader can understand why the work unit exists, what it does, and what it is accountable for.

      Each work unit will have a unique mandate. Each mandate should be distinguishable enough from your other work units to make it clear why the work is grouped in this specific way, rather than an alternative option. The mandate will vary by organization based on the agreed upon work units, design archetype, and priorities.

      Don’t just adopt an example mandate from another organization or continue use of the organization’s pre-existing mandate – take the time to ensure it accurately depicts what that group is doing so that its value-added activities are clear to the larger organization.

      Examples of Work Unit Mandates

      The Office of the CIO will be a strategic enabler of the IT organization, driving IT organizational performance through improved IT management and governance. A central priority of the Office of the CIO is to ensure that IT is able to respond to evolving environments and challenges through strategic foresight and a centralized view of what is best for the organization.

      The Project Management Office will provide standardized and effective project management practices across the IT landscape, including an identified project management methodology, tools and resources, project prioritization, and all steps from project initiation through to evaluation, as well as education and development for project managers across IT.

      The Solutions Development Group will be responsible for the high-quality development and delivery of new solutions and improvements and the production of customized business reports. Through this function, IT will have improved agility to respond to new initiatives and will be able to deliver high-quality services and insights in a consistent manner.

      3.2 Create work unit mandates

      1-3 hours

      1. Break into teams of three to four people and assign an equal number of work units to each team.
      2. Have each team create a set of statements that describe the overall purpose of that working group. Each mandate statement should:
      • Be clear enough that any reader can understand.
      • Explain why the work unit exists, what it does, and what it is accountable for.
      • Be distinguishable enough from your other work units to make it clear why the work is grouped in this specific way, rather than an alternative option.
    • Have each group present their work unit mandates and make changes wherever necessary.
    • InputOutput
      • Work units
      • Work unit mandates
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Identify the key roles and responsibilities for the target IT organization

      Now that you have identified the main units of work in the target IT organization, it is time to identify the roles that will perform that work. At the end of this step, the key roles will be identified, the purpose statement will be built, and accountability and responsibility for roles will be clearly defined. Make sure that accountability for each task is assigned to one role only. If there are challenges with a role, change the role to address them (e.g. split roles or shift responsibilities).

      The image contains an example of two work units: Enterprise Architecture and PMO. It then lists the roles of the two work units.

      Info-Tech Insight

      Do not bias your role design by focusing on your existing staff’s competencies. If you begin to focus on your existing team members, you run the risk of artificially narrowing the scope of work or skewing the responsibilities of individuals based on the way it is, rather than the way it should be.

      3.3 Define roles inside the work units

      1-3 hours

      1. Select a work unit from the organizational sketch.
      2. Describe the most senior role in that work unit by asking, “what would the leader of this group be accountable or responsible for?” Define this role and move the capabilities they will be accountable for under that leader. Repeat this activity for the capabilities this leader would be responsible for.
      3. Continue to define each role that will be required in that work unit to deliver or provide oversight related to those capabilities.
      4. Continue until key roles are identified and the capabilities each role will be accountable or responsible for are clarified.
      5. Remember, only one role can have accountability for each capability but several can have responsibility.
      6. For each role, use the list of capabilities that the position will be accountable, responsible, or accountable and responsible for to create a job description. Leverage your own internal job descriptions or visit our Job Descriptions page.
      InputOutput
      • Work units
      • Work unit mandates
      • Responsibilities
      • Accountabilities
      • Roles with clarified responsibilities and accountabilities
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Delivery model for product or solution development

      Can add additional complexity or clarity

      • Certain organizational structures will require a specific type of resourcing model to meet expectations and deliver on the development or sustainment of core products and solutions.
      • There are four common methods that we see in IT organizations:
        • Functional Roles: Completed work is handed off from functional team to functional team sequentially as outlined in the organization’s SDLC.
        • Shared Service & Resource Pools (Matrix): Resources are pulled whenever the work requires specific skills or pushed to areas where product demand is high.
        • Product or System: Work is directly sent to the teams who are directly managing the product or directly supporting the requestor.
        • Skills & Competencies: Work is directly sent to the teams who have the IT and business skills and competencies to complete the work.
      • Each of these will lead to a difference in how the functional team is skilled. They could have a great understanding of their customer, the product, the solution, or their service.

      Info-Tech Insight

      Despite popular belief, there is no such thing as the Spotify model, and organizations that structured themselves based on the original Spotify drawing might be missing out on key opportunities to obtain productivity from employees.

      Sources: Indeed, 2020; Agility Scales

      There can be different patterns to structure and resource your product delivery teams

      The primary goal of any product delivery team is to improve the delivery of value for customers and the business based on your product definition and each product’s demand. Each organization will have different priorities and constraints, so your team structure may take on a combination of patterns or may take on one pattern and then transform into another.

      Delivery Team Structure Patterns

      How Are Resources and Work Allocated?

      Functional Roles

      Teams are divided by functional responsibilities (e.g. developers, testers, business analysts, operations, help desk) and arranged according to their placement in the software development lifecycle (SDLC).

      Completed work is handed off from team to team sequentially as outlined in the organization’s SDLC.

      Shared Service and Resource Pools

      Teams are created by pulling the necessary resources from pools (e.g. developers, testers, business analysts, operations, help desk).

      Resources are pulled whenever the work requires specific skills or pushed to areas where product demand is high.

      Product or System

      Teams are dedicated to the development, support, and management of specific products or systems.

      Work is directly sent to the teams who are directly managing the product or directly supporting the requester.

      Skills and Competencies

      Teams are grouped based on skills and competencies related to technology (e.g. Java, mobile, web) or familiarity with business capabilities (e.g. HR, Finance).

      Work is directly sent to the teams who have the IT and business skills and competencies to complete the work.

      Delivery teams will be structured according to resource and development needs

      Functional Roles

      Shared Service and Resource Pools

      Product or System

      Skills and Competencies

      When your people are specialists versus having cross-functional skills

      Leveraged when specialists such as Security or Operations will not have full-time work on the product

      When you have people with cross-functional skills who can self-organize around a product’s needs

      When you have a significant investment in a specific technology stack

      The image contains a diagram of functional roles.The image contains a diagram of shared service and resource pools.The image contains a diagram of product or system.The image contains a diagram of skills and competencies.

      For more information about delivering in a product operating model, refer to our Deliver Digital Products at Scale blueprint.

      3.4 Finalize the organizational chart

      1-3 hours

      1. Import each of your work units and the target-state roles that were identified for each.
      2. In the place of the name of each work unit in your organizational sketch, replace the work unit name with the prospective role name for the leader of that group.
      3. Under each of the leadership roles, import the names of team members that were part of each respective work unit.
      4. Validate the final structure as a group to ensure each of the work units includes all the necessary roles and responsibilities and that there is clear delineation of accountabilities between the work units.

      Input

      Output

      • Work units
      • Work unit mandates
      • Roles with accountabilities and responsibilities
      • Finalized organizational chart

      Materials

      Participants

      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook & Executive Communications Deck

      Proactively consider and mitigate redesign risks

      Every organizational structure will include certain risks that should have been considered and accepted when choosing the base operating model sketch. Now that the final organizational structure has been created, consider if those risks were mitigated by the final organizational structure that was created. For those risks that weren’t mitigated, have a tactic to control risks that remain present.

      3.5 Identify and mitigate key risks

      1-3 hours

      1. For each of the operating model sketch options, there are specific risks that should have been considered when selecting that model.
      2. Take those risks and transfer them into the correct slide of the Organizational Design Workbook.
      3. Consider if there are additional risks that need to be considered with the new organizational structure based on the customizations made.
      4. For each risk, rank the severity of that risk on a scale of low, medium, or high.
      5. Determine one or more mitigation tactic(s) for each of the risks identified. This tactic should reduce the likelihood or impact of the risk event happening.
      InputOutput
      • Final organizational structure
      • Operating model sketch benefits and risks
      • Redesign risk mitigation plan
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Phase 4

      Plan for Implementation & Change

      This phase will walk you through the following activities:

      4.1 Select a transition plan

      4.2 Establish the change communication messages

      4.3 Be consistent with a standard set of FAQs

      4.4 Define org. redesign resistors

      4.5 Create a sustainment plan

      This phase involves the following participants:

      • CIO
      • IT Leadership
      • Business Leadership
      • HR Business Partners

      All changes require change management

      Change management is:

      Managing a change that requires replanning and reorganizing and that causes people to feel like they have lost control over aspects of their jobs.

      – Padar et al., 2017
      People Process Technology

      Embedding change management into organizational design

      PREPARE A

      Awareness: Establish the need for organizational redesign and ensure this is communicated well.

      This blueprint is mostly focused on the prepare and transition components.

      D

      Desire: Ensure the new structure is something people are seeking and will lead to individual benefits for all.

      TRANSITION K

      Knowledge: Provide stakeholders with the tools and resources to function in their new roles and reporting structure.

      A

      Ability: Support employees through the implementation and into new roles or teams.

      FUTURE R

      Reinforcement: Emphasize and reward positive behaviors and attitudes related to the new organizational structure.

      Implementing the new organizational structure

      Implementing the organizational structure can be the most difficult part of the process.

      • To succeed in the process, consider creating an implementation plan that adequately considers these five components.
      • Each of these are critical to supporting the final organizational structure that was established during the redesign process.

      Implementation Plan

      Transition Plan: Identify the appropriate approach to making the transition, and ensure the transition plan works within the context of the business.

      Communication Strategy: Create a method to ensure consistent, clear, and concise information can be provided to all relevant stakeholders.

      Plan to Address Resistance: Given that not everyone will be happy to move forward with the new organizational changes, ensure you have a method to hear feedback and demonstrate concerns have been heard.

      Employee Development Plan: Provide employees with tools, resources, and the ability to demonstrate these new competencies as they adjust to their new roles.

      Monitor and Sustain the Change: Establish metrics that inform if the implementation of the new organizational structure was successful and reinforce positive behaviors.

      Define the type of change the organizational structure will be

      As a result, your organization must adopt OCM practices to better support the acceptance and longevity of the changes being pursued.

      Incremental Change

      Transformational Change

      Organizational change management is highly recommended and beneficial for projects that require people to:

      • Adopt new tools and workflows.
      • Learn new skills.
      • Comply with new policies and procedures.
      • Stop using old tools and workflows.

      Organizational change management is required for projects that require people to:

      • Move into different roles, reporting structures, and career paths.
      • Embrace new responsibilities, goals, reward systems, and values.
      • Grow out of old habits, ideas, and behaviors.
      • Lose stature in the organization.

      Info-Tech Insight

      How you transition to the new organizational structure can be heavily influenced by HR. This is the time to be including them and leveraging their expertise to support the transition “how.”

      Transition Plan Options

      Description

      Pros

      Cons

      Example

      Big Bang Change

      Change that needs to happen immediately – “ripping the bandage off.”

      • It puts an immediate stop to the current way of operating.
      • Occurs quickly.
      • More risky.
      • People may not buy into the change immediately.
      • May not receive the training needed to adjust to the change.

      A tsunami in Japan stopped all imports and exports. Auto manufacturers were unable to get parts shipped and had to immediately find an alternative supplier.

      Incremental Change

      The change can be rolled out slower, in phases.

      • Can ensure that people are bought in along the way through the change process, allowing time to adjust and align with the change.
      • There is time to ensure training takes place.
      • It can be a timely process.
      • If the change is dragged on for too long (over several years) the environment may change and the rationale and desired outcome for the change may no longer be relevant.

      A change in technology, such as HRIS, might be rolled out one application at a time to ensure that people have time to learn and adjust to the new system.

      Pilot Change

      The change is rolled out for only a select group, to test and determine if it is suitable to roll out to all impacted stakeholders.

      • Able to test the success of the change initiative and the implementation process.
      • Able to make corrections before rolling it out wider, to aid a smooth change.
      • Use the pilot group as an example of successful change.
      • Able to gain buy-in and create change champions from the pilot group who have experienced it and see the benefits.
      • Able to prevent an inappropriate change from impacting the entire organization.
      • Lengthy process.
      • Takes time to ensure the change has been fully worked through.

      A retail store is implementing a new incentive plan to increase product sales. They will pilot the new incentive plan at select stores, before rolling it out broadly.

      4.1 Select a transition plan approach

      1-3 hours

      1. List each of the changes required to move from your current structure to the new structure. Consider:
        1. Changes in reporting structure
        2. Hiring new members
        3. Eliminating positions
        4. Developing key competencies for staff
      2. Once you’ve defined all the changes required, consider the three different transition plan approaches: big bang, incremental, and pilot. Each of the transition plan approaches will have drawbacks and benefits. Use the list of changes to inform the best approach.
      3. If you are proceeding with the incremental or the pilot, determine the order in which you will proceed with the changes or the groups that will pilot the new structure first.
      InputOutput
      • Customized operating model sketch
      • New org. chart
      • Current org. chart
      • List of changes to move from current to future state
      • Transition plan to support changes
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • HR Business Partners

      Record the results in the Organizational Design Workbook

      Make a plan to effectively manage and communicate the change

      Success of your new organizational structure hinges on adequate preparation and effective communication.

      The top challenge facing organizations in completing the organizational redesign is their organizational culture and acceptance of change. Effective planning for the implementation and communication throughout the change is pivotal. Make sure you understand how the change will impact staff and create tailored plans for communication.

      65% of managers believe the organizational change is effective when provided with frequent and clear communication.

      Source: SHRM, 2021

      Communicate reasons for organizational structure changes and how they will be implemented

      Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state, and that makes the change concrete and meaningful to staff.

      The organizational change message should:

      • Explain why the change is needed.
      • Summarize what will stay the same.
      • Highlight what will be left behind.
      • Emphasize what is being changed.
      • Explain how change will be implemented.
      • Address how change will affect various roles in the organization.
      • Discuss the staff’s role in making the change successful.

      Five elements of communicating change

      • What is the change?
      • Why are we doing it?
      • How are we going to go about it?
      • How long will it take us to do it?
      • What will the role be for each department and individual?
      Source: Cornelius & Associates, 2010

      4.2 Establish the change communication messages

      2 hours

      1. The purpose of this activity is to establish a change communication message you can leverage when talking to stakeholders about the new organizational structure.
      2. Review the questions in the Organizational Design Workbook.
      3. Establish a clear message around the expected changes that will have to take place to help realize the new organizational structure.
      InputOutput
      • Customized operating model sketch
      • New org. chart
      • Current org. chart
      • List of changes
      • Transition plan
      • Change communication message for new organizational structure
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Apply the following communication principles to make your IT organization redesign changes relevant to stakeholders

      Be Clear

      • Say what you mean and mean what you say.
      • Choice of language is important: “Do you think this is a good idea? I think we could really benefit from your insights and experience here.” Or do you mean: “I think we should do this. I need you to do this to make it happen.”
      • Don’t use jargon.

      Be Consistent

      • The core message must be consistent regardless of audience, channel, or medium.
      • Test your communication with your team or colleagues to obtain feedback before delivering to a broader audience.
      • A lack of consistency can be interpreted as an attempt at deception. This can hurt credibility and trust.

      Be Concise

      • Keep communication short and to the point so key messages are not lost in the noise.
      • There is a risk of diluting your key message if you include too many other details.

      Be Relevant

      • Talk about what matters to the stakeholder.
      • Talk about what matters to the initiative.
      • Tailor the details of the message to each stakeholder’s specific concerns.
      • IT thinks in processes but stakeholders only care about results: talk in terms of results.
      • IT wants to be understood but this does not matter to stakeholders. Think: “what’s in it for them?”
      • Communicate truthfully; do not make false promises or hide bad news.

      Frequently asked questions (FAQs) provide a chance to anticipate concerns and address them

      As a starting point for building an IT organizational design implementation, look at implementing an FAQ that will address the following:

      • The what, who, when, why, and where
      • The transition process
      • What discussions should be held with clients in business units
      • HR-centric questions

      Questions to consider answering:

      • What is the objective of the IT organization?
      • What are the primary changes to the IT organization?
      • What does the new organizational structure look like?
      • What are the benefits to our IT staff and to our business partners?
      • How will the IT management team share new information with me?
      • What is my role during the transition?
      • What impact is there to my reporting relationship within my department?
      • What are the key dates I should know about?

      4.3 Be consistent with a standard set of FAQs

      1 hour

      1. Beyond the completed communications plans, brainstorm a list of answers to the key “whats” of your organizational design initiative:
      • What is the objective of the IT organization?
      • What are the primary changes to the IT organization?
      • What does the new organizational structure look like?
      • What are the benefits to our IT staff and to our business partners?
    • Think about any key questions that may rise around the transition:
      • How will the IT management team share new information with me?
      • What is my role during the transition?
      • What impact is there to my reporting relationship within my department?
      • What are the key dates I should know about?
    • Determine the best means of socializing this information. If you have an internal wiki or knowledge-sharing platform, this would be a useful place to host the information.
    • InputOutput
      • Driver(s) for the new organizational structure
      • List of changes to move from current to future state
      • Change communication message
      • FAQs to provide to staff about the organizational design changes
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      The change reaction model

      The image contains a picture of the change reaction model. The model includes a double arrow pointing in both directions of left and right. On top of the arrow are 4 circles spread out on the arrow. They are labelled: Active Resistance, Detachment, Questioning, Acceptance.

      (Adapted from Cynthia Wittig)

      Info-Tech Insight

      People resist changes for many reasons. When it comes to organizational redesign changes, some of the most common reasons people resist change include a lack of understanding, a lack of involvement in the process, and fear.

      Include employees in the employee development planning process

      Prioritize

      Assess employee to determine competency levels and interests.

      Draft

      Employee drafts development goals; manager reviews.

      Select

      Manager helps with selection of development activities.

      Check In

      Manager provides ongoing check-ins, coaching, and feedback.

      Consider core and supplementary components that will sustain the new organizational structure

      Supplementary sustainment components:

      • Tools & Resources
      • Structure
      • Skills
      • Work Environment
      • Tasks
      • Disincentives

      Core sustainment components:

      • Empowerment
      • Measurement
      • Leadership
      • Communication
      • Incentives

      Sustainment Plan

      Sustain the change by following through with stakeholders, gathering feedback, and ensuring that the change rationale and impacts are clearly understood. Failure to so increases the potential that the change initiative will fail or be a painful experience and cost the organization in terms of loss of productivity or increase in turnover rates.

      Support sustainment with clear measurements

      • Measurement is one of the most important components of monitoring and sustaining the new organizational structure as it provides insight into where the change is succeeding and where further support should be added.
      • There should be two different types of measurements:
      1. Standard Change Management Metrics
      2. Organizational Redesign Metrics
    • When gathering data around metrics, consider other forms of measurement (qualitative) that can provide insights on opportunities to enhance the success of the organizational redesign change.
      1. Every measurement should be rooted to a goal. Many of the goals related to organizational design will be founded in the driver of this change initiative
      2. Once the goals have been defined, create one or more measurements that determines if the goal was successful.
      3. Use specific key performance indicators (KPIs) that contain a metric that is being measured and the frequency of that measurement.

      Info-Tech Insight

      Obtaining qualitative feedback from employees, customers, and business partners can provide insight into where the new organizational structure is operating optimally versus where there are further adjustments that could be made to support the change.

      4.4 Consider sustainment metrics

      1 hour

      1. Establish metrics that bring the entire process together and that will ensure the new organizational design is a success.
      2. Go back to your driver(s) for the organizational redesign. Use these drivers to help inform a particular measurement that can be used to determine if the new organizational design will be successful. Each measurement should be related to the positive benefits of the organization, an individual, or the change itself.
      3. Once you have a list of measurements, use these to determine the specific KPI that can be qualified through a metric. Often you are looking for an increase or decrease of a particular measurement by a dollar or percentage within a set time frame.
      4. Use the example metrics in the workbook and update them to reflect your organization’s drivers.
      InputOutput
      • Driver(s) for the new organizational structure
      • List of changes to move from current to future state
      • Change communication message
      • Sustainment metrics
      MaterialsParticipants
      • Whiteboard/Flip Charts
      • CIO
      • IT Leadership
      • Business Leadership

      Record the results in the Organizational Design Workbook

      Related Info-Tech Research

      Build a Strategic IT Workforce Plan

      • Continue into the second phase of the organizational redesign process by defining the required workforce to deliver.
      • Leveraging trends, data, and feedback from your employees, define the competencies needed to deliver on the defined roles.

      Implement a New IT Organizational Structure

      • Organizational design implementations can be highly disruptive for IT staff and business partners.
      • Without a structured approach, IT leaders may experience high turnover, decreased productivity, and resistance to the change.

      Define the Role of Project Management in Agile and Product-Centric Delivery

      • There are many voices with different opinions on the role of project management. This causes confusion and unnecessary churn.
      • Project management and product management naturally align to different time horizons. Harmonizing their viewpoints can take significant work.

      Research Contributors and Experts

      The image contains a picture of Jardena London.

      Jardena London

      Transformation Catalyst, Rosetta Technology Group

      The image contains a picture of Jodie Goulden.

      Jodie Goulden

      Consultant | Founder, OrgDesign Works

      The image contains a picture of Shan Pretheshan.

      Shan Pretheshan

      Director, SUPA-IT Consulting

      The image contains a picture of Chris Briley.

      Chris Briley

      CIO, Manning & Napier

      The image contains a picture of Dean Meyer.

      Dean Meyer

      President N. Dean Meyer and Associates Inc.

      The image contains a picture of Jimmy Williams.

      Jimmy Williams

      CIO, Chocktaw Nation of Oklahoma

      Info-Tech Research Group

      Cole Cioran, Managing Partner

      Dana Daher, Research Director

      Hans Eckman, Principal Research Director

      Ugbad Farah, Research Director

      Ari Glaizel, Practice Lead

      Valence Howden, Principal Research Director

      Youssef Kamar, Senior Manager, Consulting

      Carlene McCubbin, Practice Lead

      Baird Miller, Executive Counsellor

      Josh Mori, Research Director

      Rajesh Parab, Research Director

      Gary Rietz, Executive Counsellor

      Bibliography

      “A Cheat Sheet for HR Professionals: The Organizational Development Process.” AIHR, 2021. Web.

      Acharya, Ashwin, Roni Lieber, Lissa Seem, and Tom Welchman. “How to identify the right ‘spans of control’ for your organization.” McKinsey, 21 December 2017. Web.

      Anand. N., and Jean-Louis Barsoux. “What everyone gets wrong about change management. Harvard Business Review, December 2017. Web.

      Atiken, Chris. “Operating model design-first principles.” From Here On, 24 August 2018. Web.

      “Avoid common digital transformation challenges: Address your IT Operating Model Now.” Sofigate, 5 May 2020. Web.

      Baumann, Oliver, and Brian Wu. “The many dimensions of research on designing flat firms.” Journal of Organizational Design, no. 3, vol. 4. 09 May 2022.Web.

      Bertha, Michael. “Cross the project to product chasm.” CIO, 1 May 2020. Web.

      Blenko, Marcia, and James Root. “Design Principles for a Robust Operating Model.” Bain & Company, 8 April 2015. Web.

      Blenko, Marcia, Leslie Mackrell, and Kevin Rosenberg. “Operating models: How non-profits get from strategy to results.” The Bridge Span Group, 15 August 2019. Web.

      Boulton, Clint. “PVH finds perfect fit in hybrid IT operating model amid pandemic.” CIO, 19 July 2021. Web.

      Boulton, Clint. “Why digital disruption leaves no room for bimodal IT.” CIO, 11 May 2017. Web.

      Bright, David, et al. “Chapter 10: Organizational Structure & Change.” Principles of Management, OpenStax, Rice University, 20 March 2019. Book.

      Campbell, Andrew. “Design Principles: How to manage them.” Ashridge Operating Models. 1 January 2022. Web.

      D., Maria. “3 Types of IT Outsourcing Models and How to Choose Between Them.” Cleveroad, 29 April 2022. Web.

      Devaney, Eric. “9 Types of Organizational Structure Every Company Should Consider.” HubSpot, 11 February 2022. Web.

      Devaney, Erik. “The six building blocks of organizational structure.” Hubspot, 3 June 2020. Web.

      Eisenman, M., S. Paruchuri, and P. Puranam. “The design of emergence in organizations.” Journal of Organization Design, vol. 9, 2020. Web.

      Forbes Business Development Council. “15 Clear Signs It’s Time to Restructure the Business.” Forbes, 10 February 2020. Web.

      Freed, Joseph. “Why Cognitive Load Could Be The Most Important Employee Experience Metric In The Next 10 Years.” Forbes, 30 June 2020. Web.

      Galibraith, Jay. “The Star Model.” JayGalbraith.com, n.d. Web.

      Girod, Stéphane, and Samina Karim. “Restructure or reconfigure?” Harvard Business Review, April 2017. Web.

      Goldman, Sharon. “The need for a new IT Operating Model: Why now?” CIO, 27 August 2019. Web.

      Halapeth, Milind. “New age IT Operating Model: Creating harmony between the old and the new.” Wirpo, n.d. Web.

      Harvey, Michelle. “Why a common operating model is efficient for business productivity.” CMC, 10 May 2020. Web.

      Helfand, Heidi. “Dynamic Reteaming.” O’Reilly Media, 7 July 2020. Book.

      JHeller, Martha. “How Microsoft CIO Jim DuBois changed the IT Operating Model.” CIO, 2 February 2016. Web.

      Heller, Martha. “How Stryker IT Shifted to a global operating model.” CIO, 19 May 2021. Web.

      Heller, Michelle. “Inside blue Shields of California’s IT operating model overhaul.” CIO, 24 February 2021. Web.

      Hessing, Ted. “Value Stream Mapping.” Six Sigma Study Guide, 11 April 2014. Web.

      Huber, George, P. “What is Organization Design.” Organizational Design Community, n.d. Web.

      Indeed Editorial Team. “5 Advantages and Disadvantages of the Matrix Organizational Structure.” Indeed, 23 November 2020. Web.

      Indeed Editorial Team. “How to plan an effective organization restructure.” Indeed, 10 June 2021. Web.

      “Insourcing vs Outsourcing vs Co-Sourcing.” YML Group, n.d. Web.

      “Investing in more strategic roles.” CAPS Research, 3 February 2022. Web.

      Jain, Gagan. “Product IT Operating Model: The next-gen model for a digital work.” DevOps, 22 July 2019. Web.

      Kane, Gerald, D. Plamer, and Anh Phillips. “Accelerating Digital Innovation Inside and Out.” Deloitte Insights, 4 June 2019. Web.

      Krush, Alesia. “IT companies with ‘flat’ structures: utopia or innovative approach?” Object Style, 18 October 2018. Web.

      Law, Michael. “Adaptive Design: Increasing Customer Value in Your Organisation.” Business Agility Institute, 5 October 2020. Web.

      LucidContent Team. “How to get buy-in for changes to your organizational structure.” Lucid Chart, n.d. Web.

      Matthews, Paul. “Do you know the difference between competence and capability?” The People Development Magazine, 25 September 2020. Web.

      Meyer, Dean N. “Analysis: Common symptoms of organizational structure problems.” NDMA, n.d. Web.

      Meyer, N. Dean. “Principle-based Organizational Structure.” NDMA Publishing, 2020. Web.

      Morales Pedraza, Jorge. Answer to posting, “What is the relationship between structure and strategy?” ResearchGate.net, 5 March 2014. Web.

      Nanjad, Len. “Five non-negotiables for effective organization design change.” MNP, 01 October 2021. Web.

      Neilson, Gary, Jaime Estupiñán, and Bhushan Sethi. “10 Principles of Organizational Design.” Strategy & Business, 23 March 2015. Web.

      Nicastro, Dom. “Understanding the Foundational Concepts of Organizational Design.” Reworked, 24 September 2020. Web.

      Obwegeser, Nikolaus, Tomoko Yokoi, Michael Wade, and Tom Voskes. “7 Key Principles to Govern Digital Initiatives.” MIT Sloan, 1 April 2020. Web.

      “Operating Models and Tools.” Business Technology Standard, 23 February 2021. Web.

      “Organizational Design Agility: Journey to a combined community.” ODF-BAI How Space, Organizational Design Forum, 2022. Web.

      “Organizational Design: Understanding and getting started.” Ingentis, 20 January 2021. Web.

      Padar, Katalin, et al. “Bringing project and change management roles into sync.” Journal of Change Management, 2017. Web.

      Partridge, Chris. “Evolve your Operating Model- It will drive everything.” CIO, 30 July 2021. Web.

      Pijnacker, Lieke. “HR Analytics: role clarity impacts performance.” Effectory, 25 September 2019. Web.

      Pressgrove, Jed. “Centralized vs. Federated: Breaking down IT Structures.” Government Technology, March 2020. Web.

      Sherman, Fraser. “Differences between Organizational Structure and Design.” Bizfluent, 20 September 2019. Web.

      Skelton, Matthew, and Manual Pais. “Team Cognitive Load.” IT Revolution, 19 January 2021. Web.

      Skelton, Matthew, and Manual Pais. Team Topologies. IT Revolution Press, 19 September 2019. Book

      Spencer, Janet, and Michael Watkins. “Why organizational change fails.” TLNT, 26 November 2019. Web.

      Storbakken, Mandy. “The Cloud Operating Model.” VMware, 27 January 2020. Web.

      "The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2010. Web.

      “Understanding Organizational Structures.” SHRM, 31 August 2021. Web.

      "unfix Pattern: Base.” AgilityScales, n.d. Web.

      Walker, Alex. “Half-Life: Alyx helped change Valve’s Approach to Development.” Kotaku, 10 July 2020. Web.

      "Why Change Management.” Prosci, n.d. Web.

      Wittig, Cynthia. “Employees' Reactions to Organizational Change.” OD Practioner, vol. 44, no. 2, 2012. Web.

      Woods, Dan. “How Platforms are neutralizing Conway’s Law.” Forbes, 15 August 2017. Web.

      Worren, Nicolay, Jeroen van Bree, and William Zybach. “Organization Design Challenges. Results from a practitioner survey.” Journal of Organizational Design, vol. 8, 25 July 2019. Web.

      Appendix

      IT Culture Framework

      This framework leverages McLean & Company’s adaptation of Quinn and Rohrbaugh’s Competing Values Approach.

      The image contains a diagram of the IT Culture Framework. The framework is divided into four sections: Competitive, Innovative, Traditional, and Cooperative, each with their own list of descriptors.

      Map Your Business Architecture to Define Your Strategy

      • Buy Link or Shortcode: {j2store}579|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $357,799 Average $ Saved
      • member rating average days saved: 30 Average Days Saved
      • Parent Category Name: Strategy & Operating Model
      • Parent Category Link: /strategy-and-operating-model
      • Organizations need to innovate rapidly to respond to the changing forces in their industry, but their IT initiatives often fail to deliver meaningful outcomes.
      • Planners face challenges in understanding the relationships between the important customer-focused innovations they’re trying to introduce and the resources (capabilities) that make them possible, including applications, human resources, information, and processes. For example, are we risking the success of a new service offering by underpinning it with a legacy or manual solution?

      Our Advice

      Critical Insight

      Successful execution of business strategy requires planning that:

      1. Accurately reflects organizational capabilities.
      2. Is traceable so all levels can understand how decisions are made.
      3. Makes efficient use of organizational resources.

      To accomplish this, the business architect must engage stakeholders, model the business, and drive planning with business architecture.

      • Business architecture is often regarded as an IT function when its role and tools should be fixtures within the business planning and innovation practice.
      • Any size of organization – from start-ups to global enterprises -- can benefit from using a common language and modeling rigor to identify the opportunities that will produce the greatest impact and value.
      • You don’t need sophisticated modeling software to build an effective business architecture knowledgebase. In fact, the best format for engaging business stakeholders is intuitive visuals using business language.

      Impact and Result

      • Execute more quickly on innovation and transformation initiatives.
      • More effectively target investments in resources and IT according to what goals and requirements are most important.
      • Identify problematic areas (e.g. legacy applications, manual processes) that hinder the business strategy and create inefficiencies in our information technology operation.

      Map Your Business Architecture to Define Your Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Map Your Business Architecture Deck – A step-by-step document that walks you through how to properly engage business and IT in applying a common language and process rigor to build key capabilities required to achieve innovation and growth goals.

      Build a structured, repeatable framework for both IT and business stakeholders to appraise the activities that deliver value to consumers; and assess the readiness of their capabilities to enable them.

      • Map Your Business Architecture to Define Your Strategy – Phases 1-3

      2. Stakeholder Engagement Strategy Template – A best-of-breed template to help you build a clear, concise, and compelling strategy document for identifying and engaging stakeholders.

      This template helps you ensure that your business architecture practice receives the resources, visibility, and support it needs to be successful, by helping you develop a strategy to engage the key stakeholders involved.

      • Stakeholder Engagement Strategy Template

      3. Value Stream Map Template – A template to walk through the value streams that are tied to your strategic goals.

      Record the complete value stream and decompose it into stages. Add a description of the expected outcome of the value stream and metrics for each stage.

      • Value Stream Map Template

      4. Value Stream Capability Mapping Template – A template to define capabilities and align them to selected value streams.

      Build a business capability model for the organization and map capabilities to the selected value stream.

      • Value Stream – Capability Mapping Template
      [infographic]

      Workshop: Map Your Business Architecture to Define Your Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Discover the Business Context

      The Purpose

      Identify and consult stakeholders to discover the business goals and value proposition for the customer.

      Key Benefits Achieved

      Engage stakeholders and SMEs in describing the business and its priorities and culture.

      Identify focus for the areas we will analyze and work on.

      Activities

      1.1 Select key stakeholders

      1.2 Plan for engaging stakeholders

      1.3 Gather business goals and priorities

      Outputs

      Stakeholder roles

      Engagement plan

      Business strategy, value proposition

      2 Define Value Streams

      The Purpose

      Describe the main value-adding activities of the business from the consumer’s point of view, e.g. provide product or service.

      Key Benefits Achieved

      Shared understanding of why we build resources and do what we do.

      Starting point for analyzing resources and investing in innovation.

      Activities

      2.1 Define or update value streams

      2.2 Decompose selected value stream(s) into value stages and identify problematic areas and opportunities

      Outputs

      Value streams for the enterprise

      Value stages breakdown for selected value stream(s)

      3 Build Business Capability Map

      The Purpose

      Describe all the capabilities that make up an organization and enable the important customer-facing activities in the value streams.

      Key Benefits Achieved

      Basis for understanding what resources the organization has and their ability to support its growth and success.

      Activities

      3.1 Define and describe all business capabilities (Level 1)

      3.2 Decompose and analyze capabilities for a selected priority value stream.

      Outputs

      Business Capability Map (Level 1)

      Business Capabilities Level 2 for selected value stream

      4 Develop a Roadmap

      The Purpose

      Use the Business Capability Map to identify key capabilities (e.g. cost advantage creator), and look more closely at what applications or information or business processes are doing to support or hinder that critical capability.

      Key Benefits Achieved

      Basis for developing a roadmap of IT initiatives, focused on key business capabilities and business priorities.

      Activities

      4.1 Identify key capabilities (cost advantage creators, competitive advantage creators)

      4.2 Assess capabilities with the perspective of how well applications, business processes, or information support the capability and identify gaps

      4.3 Apply analysis tool to rank initiatives

      Outputs

      Business Capability Map with key capabilities: cost advantage creators and competitive advantage creators

      Assessment of applications or business processes or information for key capabilities

      Roadmap of IT initiatives

      Further reading

      Map Your Business Architecture to Define Your Strategy

      Plan your organization’s capabilities for best impact and value.

      Info-Tech Research Group

      Info-Tech is a provider of best-practice IT research advisory services that make every IT leader’s job easier.

      35,000 members sharing best practices you can leverage Millions spent developing tools and templates annually Leverage direct access to over 100 analysts as an extension of your team Use our massive database of benchmarks and vendor assessments Get up to speed in a fraction of the time

      Analyst perspective

      Know your organization’s capabilities to build a digital and customer-driven culture.

      Business architecture provides a holistic and unified view of:

      • All the organization’s activities that provide value to their clients (value streams).
      • The resources that make them possible and effective (capabilities, i.e. its employees, software, processes, information).
      • How they inter-relate, i.e. depend on and impact each other to help deliver value.

      Without a business architecture it is difficult to see the connections between the business’s activities for the customer and the IT resources supporting them – to demonstrate that what we do in IT is customer-driven.

      As a map of your business, the business architecture is an essential input to the digital strategy:

      • Develop a plan to transform the business by investing in the most important capabilities.
      • Ensure project initiatives are aligned with business goals as they evolve.
      • Respond more quickly to customer requirements and to disruptions in the industry by streamlining operations and information sharing across the enterprise.

      Crystal Singh, Research Director, Data and Analytics

      Crystal Singh
      Research Director, Data and Analytics
      Info-Tech Research Group

      Andrea Malick, Research Director, Data and Analytics

      Andrea Malick
      Research Director, Data and Analytics
      Info-Tech Research Group

      Executive summary

      Your Challenge Common Obstacles Info-Tech’s Approach

      Organizations need to innovate rapidly to respond to ever-changing forces and demands in their industry. But they often fail to deliver meaningful outcomes from their IT initiatives within a reasonable time.

      Successful companies are transforming, i.e. adopting fluid strategies that direct their resources to customer-driven initiatives and execute more quickly on those initiatives. In a responsive and digital organization, strategies, capabilities, information, people, and technology are all aligned, so work and investment are consistently allocated to deliver maximum value.

      You don’t have a complete reference map of your organization’s capabilities on which to base strategic decisions.

      You don’t know how to prioritize and identify the capabilities that are essential for achieving the organization’s customer-driven objectives.

      You don’t have a shared enterprise vision, where everyone understands how the organization delivers value and to whom.

      Begin important business decisions with a map of your organization – a business reference architecture. Model the business in the form of architectural blueprints.

      Engage your stakeholders. Recognize the opportunity for mapping work, and identify and engage the right stakeholders.

      Drive business architecture forward to promote real value to the organization. Assess your current projects to determine if you are investing in the right capabilities. Conduct business capability assessments to identify opportunities and prioritize projects.

      Info-Tech Insight
      Business architecture is the set of strategic planning techniques that connects organization strategy to execution in a manner that is accurate and traceable and promotes the efficient use of organizational resources.

      Blueprint activities summary

      Phase Purpose Activity Outcome
      1. Business context:
      Identify organization goals, industry drivers, and regulatory requirements in consultation with business stakeholders.
      Identify forces within and outside the organization to consider when planning the focus and timing of digital growth, through conducting interviews and surveys and reviewing existing strategies. Business value canvas, business strategy on a page, customer journey
      2. Customer activities (value stream):
      What is the customer doing? What is our reason for being as a company? What products and services are we trying to deliver?
      Define or update value streams, e.g. purchase product from supplier, customer order, and deliver product to customer. Value streams enterprise-wide (there may be more than one set of value streams, e.g. a medical school and community clinic)
      Prioritize value streams:
      Select key value streams for deeper analysis and focus.
      Assess value streams. Priority value streams
      Value stages:
      Break down the selected value stream into its stages.
      Define stages for selected value streams. Selected value stream stages
      3. Business capability map, level 1 enterprise:
      What resources and capabilities at a high level do we have to support the value streams?
      Define or update the business capabilities that align with and support the value streams. Business capability map, enterprise-wide capabilities level 1
      Business capability map, level 2 for selected area:
      List resources and capabilities that we have at a more detailed level.
      Define or update business capabilities for selected value stream to level 2. Business capability map, selected value stream, capability level 2
      Heatmap Business Capability Map: Flag focus areas in supporting technology, applications, data and information.

      Info-Tech’s workshop methodology

      Day 1: Discover Business Context Day 2: Define Value Streams Day 3: Build Business Capability Map Day 4: Roadmap Business Architecture
      Phase Steps

      1.1 Collect corporate goals and strategies

      1.2 Identify stakeholders

      2.1 Build or update value streams

      2.2 Decompose selected value stream into value stages and analyze for opportunities

      3.1 Update business capabilities to level 1 for enterprise

      3.2 For selected value streams, break down level 1 to level 2

      3.3 Use business architecture to heatmap focus areas: technology, information, and processes

      3.4 Build roadmap of future business architecture initiatives

      Phase Outcomes
      • Organizational context and goals
      • Business strategy on a page, customer journey map, business model canvas
      • Roles and responsibilities
      • Value stream map and definitions
      • Selected value stream(s) decomposed into value stages
      • Enterprise business capabilities map to level 1
      • Business architecture to level 2 for prioritized value stream
      • Heatmap business architecture
      • Business architecture roadmap, select additional initiatives

      Key concepts for this blueprint

      INDUSTRY VALUE CHAIN DIGITAL TRANSFORMATION BUSINESS ARCHITECTURE
      A high-level analysis of how the industry creates value for the consumer as an overall end-to-end process. The adoption of digital technologies to innovate and re-invent existing business, talent ,and operating models to drive growth, business value, and improved customer experience. A holistic, multidimensional business view of capabilities, end-to-end value, and operating model in relation to the business strategy.
      INDUSTRY VALUE STREAM STRATEGIC OBJECTIVES CAPABILITY ASSESSMENTS
      A set of activities, tasks, and processes undertaken by a business or a business unit across the entire end-to-end business function to realize value. A set of standard objectives that most industry players will feature in their corporate plans. A heat-mapping effort to analyze the maturity and priority of each capability relative to the strategic priorities that they serve.

      Info-Tech’s approach

      1 Understand the business context and drivers
      Deepen your understanding of the organization’s priorities by gathering business strategies and goals. Talking to key stakeholders will allow you to get a holistic view of the business strategy and forces shaping the strategy, e.g. economy, workforce, and compliance.
      2 Define value streams; understand the value you provide
      Work with senior leadership to understand your customers’ experience with you and the ways your industry provides value to them.
      Assess the value streams for areas to explore and focus on.
      3 Customize the industry business architecture; develop business capability map
      Work with business architects and enterprise architects to customize Info-Tech’s business architecture for your industry as an enterprise-wide map of the organization and its capabilities.
      Extend the business capability map to more detail (Level 2) for the value stream stages you select to focus on.

      Business architecture is a planning function that connects strategy to execution

      Business architecture provides a framework that connects business strategy and IT strategy to project execution through a set of models that provide clarity and actionable insights. How well do you know your business?

      Business architecture is:

      • Inter-disciplinary: Business architecture is a core planning activity that supports all important decisions in the organization, for example, organizational resources planning. It’s not just about IT.
      • Foundational: The best way to answer the question, “Where do we start?” or “Where is our investment best directed?”, comes from knowing your organization, what its core functions and capabilities are (i.e. what’s important to us as an organization), and where there is work to do.
      • Connecting: Digital transformation and modernization cannot work with siloes. Connecting siloes means first knowing the organization and its functions and recognizing where the siloes are not communicating.

      Business architecture must be branded as a front-end planning function to be appropriately embedded in the organization’s planning process.

      Brand business architecture as an early planning pre-requisite on the basis of maintaining clarity of communication and spreading an accurate awareness of how strategic decisions are being made.

      As an organization moves from strategy toward execution, it is often unclear as to exactly how decisions pertaining to execution are being made, why priority is given to certain areas, and how the planning function operates.

      The business architect’s primary role is to model this process and document it.

      In doing so, the business architect creates a unified view as to how strategy connects to execution so it is clearly understood by all levels of the organization.

      Business architecture is part of the enterprise architecture framework

      Business Architecture
      Business strategy map Business model canvas Value streams
      Business capability map Business process flows Service portfolio
      Data Architecture Application Architecture Infrastructure Architecture
      Conceptual data model Application portfolio catalog Technology standards catalog
      Logical data model Application capability map Technology landscape
      Physical data model Application communication model Environments location model
      Data flow diagram Interface catalog Platform decomposition diagram
      Data lifecycle diagram Application use-case diagram Network computing / hardware diagram
      Security Architecture
      Enterprise security model Data security model Application security model

      Business architecture is a set of shared and practical views of the enterprise

      The key characteristic of the business architecture is that it represents real-world aspects of a business, along with how they interact.

      Many different views of an organization are typically developed. Each view is a diagram that illustrates a way of understanding the enterprise by highlighting specific information about it:

      • Business strategy view captures the tactical and strategic goals that drive an organization forward.
      • Business capabilities view describes the primary business functions of an enterprise and the pieces of the organization that perform those functions.
      • Value stream view defines the end-to-end set of activities that deliver value to external and internal stakeholders.
      • Business knowledge view establishes the shared semantics (e.g. customer, order, and supplier) within an organization and relationships between those semantics (e.g. customer name, order date, supplier name) – an information map.
      • Organizational view captures the relationships among roles, capabilities, and business units, the decomposition of those business units into subunits, and the internal or external management of those units.

      Business architect connects all the pieces

      The business owns the strategy and operating model; the business architect connects all the pieces together.

      R Business Architect (Responsible)
      A Business Unit Leads (Accountable)
      C Subject Matter Experts (Consulted)
      – Business Lines, Operations, Data, Technology Systems & Infrastructure Leads
      I Business Operators (Informed)
      – Process, Data, Technology Systems & Infrastructure

      Choose a key business challenge to address with business architecture

       Choose a key business challenge to address with business architecture

      Picking the right project is critical to setting the tone for business architecture work in the organization.

      Best practices for business architecture success

      Consider these best practices to maintain a high level of engagement from key stakeholders throughout the process of establishing or applying business architecture.

      Balance short-term cost savings with long-term benefits

      Participate in project governance to facilitate compliance

      Create a center of excellence to foster dialogue

      Identify strategic business objectives

      Value streams: Understand how you deliver value today

      It is important to understand the different value-generating activities that deliver an outcome for and from your customers.

      We do this by looking at value streams, which refer to the specific set of activities an industry player undertakes to create and capture value for and from the end consumer (and so the question to ask is, how do you make money as an organization?).

      Our approach helps you to strengthen and transform those value streams that generate the most value for your organization.

      Understand how you deliver value today

      An organization can have more than one set of streams.
      For example, an enterprise can provide both retail shopping and financial services, such as credit cards.

      Define the organization’s value streams

      • Value streams connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities. Those activities are dependent on the specific industry segment an organization operates within. Value streams can extend beyond the organization into the supporting ecosystem, whereas business processes are contained within and the organization has complete control over them.
      • There are two types of value streams: core value streams and support value streams. Core value streams are mostly externally facing: they deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map. Support value streams are internally facing and provide the foundational support for an organization to operate.
      • An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers. Info-Tech recommends identifying and organizing the value streams with customers and partners as end-value receivers.

      Example: Value stream descriptions for the retail industry

      Value Streams Create or Purchase the Product Manage Inventory Distribute Product Sell Product, Make Product Available to Customers
      • Product is developed before company sells it.
      • Make these products by obtaining raw materials from external suppliers or using their own resources.
      • Retailers purchase the products they are going to sell to customers from manufacturers or wholesale distributors.
      • Retailer success depends on its ability to source products that customers want and are willing to buy.
      • Inventory products are tracked as they arrive in the warehouse, counted, stored, and prepared for delivery.
      • Estimate the value of your inventory using retail inventory management software.
      • Optimizing distribution activities is an important capability for retailers. The right inventory needs to be at a particular store in the right quantities exactly when it is needed. This helps to maximize sales and minimize how much cash is held up in inventory.
      • Proper supply chain management can not only reduce costs for retailers but drive revenues by enhancing shopping experiences.
      • Once produced, retailers need to sell the products. This is done through many channels including physical stores, online, the mail, or catalogs.
      • After the sale, retailers typically have to deliver the product, provide customer care, and manage complaints.
      • Retailers can use loyalty programs, pricing, and promotions to foster repeat business.

      Value streams describe your core business

      Value streams describe your core business

      Value streams – the activities we do to provide value to customers – require business capabilities.

      Value streams are broken down further into value stages, for example, the Sell Product value stream has value stages Evaluate Options, Place Order, and Make Payment.

      Think of value streams as the core operations: the reason for your organization’s being. A professional consulting organization may have a legal team but it does not brand itself as a law firm. A core value stream is providing research products and services; a business capability that supports it is legal counsel.

      Decompose the value stream into stages

      The stages of a value stream are usually action-oriented statements or verbs that make up the individual steps involved throughout the scope of the value stream, e.g. Place Order or Make Payment.

      Each value stream should have a trigger or starting point and an end result for a client or receiver.

      Decompose the value stream into stages

      There should be measurable value or benefits at each stage. These are key performance indicators (KPIs). Spot problem areas in the stream.

      Value streams usually fall into one of these categories:

      1. Fulfillment of products and services
      2. Manufacturing
      3. Software products
      4. Supporting value streams (procurement of supplies, product planning)

      Value streams need capabilities

      • Value streams connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities.
      • There are two types of value streams: core value streams and support value streams. Core value streams are mostly externally facing: they deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map. Support value streams are internally facing and provide the foundational support for an organization to operate.
      • There can be different end-value receivers. Info-Tech recommends identifying and organizing the value streams with customers and partners as end-value receivers.

      Value streams need business capabilities

      Business capabilities are built up to allow the business to perform the activities that bring value to customers. Map capabilities to the value-add activities in the value stream. Business capabilities lie at the top layer of the business architecture:

      • They are the most stable reference for planning organizations.
      • They make strategy more tangible.
      • If properly defined, they can help overcome organizational silos.

      Value streams need business capabilities

      Example business capability map – Higher Education

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Example business capability map for: Higher Education

      Example business capability map for Higher Education

      Example business capability map – Local Government

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

      Example business capability map for: Local Government

      Example business capability map for Local Government

      Value streams need business capabilities

      Value streams – the activities we do to provide value to customers – require business capabilities. Value streams are broken down further into value stages.

      Business capabilities are built up to allow the business to perform the activities that bring value to customers. Map capabilities to the activities in the value stage to spot opportunities and problems in delivering services and value.

      Business processes fulfill capabilities. They are a step-by-step description of who is performing what to achieve a goal. Capabilities consist of networks of processes and the resources – people, technology, materials – to execute them.

      Capability = Processes + Software, Infrastructure + People

      Prioritize a value stream and identify its supporting capabilities

      Prioritize your improvement objectives and business goals and identify a value stream to transform.

      Align the business objectives of your organization to your value streams (the critical actions that take place within your organization to add value to a customer).

      Prioritize a value stream to transform based on the number of priorities aligned to a value stream, and/or the business value (e.g. revenue, EBITDA earnings, competitive differentiation, or cost efficiency).

      Decompose the selected value stream into value stages.

      Align capabilities level 1 and 2 to value stages. One capability may support several value stages in the stream.

      Build a business architecture for the prioritized value stream with a map of business capabilities up to level 2.

      NOTE: We can’t map all capabilities all at once: business architecture is an ongoing practice; select key mapping initiatives each year based on business goals.

      Prioritize a value stream and identify its supporting capabilities

      Map business capabilities to Level 2

       Map business capabilities to Level 2

      Map capabilities to value stage

      Map capabilities to value stage

      Business value realization

      Business value defines the success criteria of an organization as manifested through organizational goals and outcomes, and it is interpreted from four perspectives:

      • Profit generation: The revenue generated from a business capability with a product that is enabled with modern technologies.
      • Cost reduction: The cost reduction when performing business capabilities with a product that is enabled with modern technologies.
      • Service enablement: The productivity and efficiency gains of internal business operations from products and capabilities enhanced with modern technologies.
      • Customer and market reach: The improved reach and insights of the business in existing or new markets.

      Business Value Matrix

      Value, goals, and outcomes cannot be achieved without business capabilities

      Break down your business goals into strategic and achievable initiatives focused on specific value streams and business capabilities.

      Business goals and outcomes

      Accelerate the process with an industry business architecture

      It’s never a good idea to start with a blank page.

      The business capability map available from Info-Tech and with industry standard models can be used as an accelerator. Assemble the relevant stakeholders – business unit leads and product/service owners – and modify the business capability map to suit your organization’s context.

      Acceleration path: Customize generic capability maps with the assistance of our industry analysts.

      Accelerate the process with an industry business architecture

      Identify goals and drivers

      Consider organizational goals and industry forces when planning.

      Business context Define value streams Build business capability map
      1.1 Select key stakeholders
      1.2 Collect and understand corporate goals
      2.1 Update or define value streams
      2.2 Decompose and analyze selected value stream
      3.1 Build level 1 capability map
      3.2 Build level 2 capability map
      3.3 Heatmap capability map
      3.4 Roadmap

      Use inputs from business goals and strategies to understand priorities.

      It is not necessary to have a comprehensive business strategy document to start – with key stakeholders, the business architect should be able to gather a one-page business value canvas or customer journey.

      Determine how the organization creates value

      Begin the process by identifying and locating the business mission and vision statements.

      What is business context?

      “The business context encompasses an understanding of the factors impacting the business from various perspectives, including how decisions are made and what the business is ultimately trying to achieve. The business context is used by IT to identify key implications for the execution of its strategic initiatives.”

      Source: Businesswire, 2018

      Identify the key stakeholders who can help you promote the value of business architecture

      First, as the CIO, you must engage executive stakeholders and secure their support.
      Focus on key players who have high power and high interest in business architecture.

      Engage the stakeholders who are impacted the most and have the power to impede the success of business architecture.

      For example, if the CFO – who has the power to block funding – is disengaged, business architecture will be put at risk.

      Use Info-Tech’s Stakeholder Power Map Template to help prioritize time spent with stakeholders.

      Sample power map

      Identify the key stakeholders concerned with the business architecture project

      A business architecture project may involve the following stakeholders:

      Business architecture project stakeholders

      You must identify who the stakeholders are for your business architecture work.

      Think about:

      • Who are the decision makers and key influencers?
      • Who will impact the business architecture work? Who will the work impact?
      • Who has vested interest in the success or failure of the practice?
      • Who has the skills and competencies necessary to help us be successful?

      Avoid these common mistakes:

      • Don’t focus on the organizational structure and hierarchy. Often stakeholder groups don’t fit the traditional structure.
      • Don’t ignore subject-matter experts on either the business or IT side. You will need to consider both.

      1.1 Identify and assemble key stakeholders

      1-3 hours

      Build an accurate depiction of the business.

      1. It is important to make sure the right stakeholders participate in this exercise. The exercise of identifying capabilities for an organization is very introspective and requires deep analysis.
      2. Consider:
        1. Who are the decision makers and key influencers?
        2. Who will impact the business capability work? Who has a vested interest in the success or failure of the outcome?
        3. Who has the skills and competencies necessary to help you be successful?
      3. Avoid:
        1. Don’t focus on the organizational structure and hierarchy. Often stakeholder groups don’t fit the traditional structure.
        2. Don’t ignore subject matter experts on either the business or IT side. You will need to consider both.
      Input Output
      • List of who is accountable for key business areas and decisions
      • Organizational chart
      • List of who has decision-making authority
      • A list of the key stakeholders
      Materials Participants
      • Whiteboard/Flip Charts
      • Modeling software (e.g. Visio, ArchiMate)
      • Business capability map industry models
      • CIO
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • Departmental Executives & Senior Managers

      Conduct interviews with the business to gather intelligence for strategy

      Talking to key stakeholders will allow you to get a holistic view of the business strategy.

      Stakeholder interviews provide holistic view of business strategy

      Build a strategy on a page through executive interviews and document reviews

      Understanding the business mandate and priorities ensures alignment across the enterprise.

      A business strategy must articulate the long-term destination the business is moving into. This illustration shapes all the strategies and activities in every other part of the business, including what IT capabilities and resources are required to support business goals. Ultimately, the benefits of a well-defined business strategy increase as the organization scales and as business units or functions are better equipped to align the strategic planning process in a manner that reflects the complexity of the organization.

      Using the Business Strategy on a Page canvas, consider the questions in each bucket to elicit the overall strategic context of the organization and uncover the right information to build your digital strategy. Interview key executives including your CEO, CIO, CMO, COO, CFO, and CRO, and review documents from your board or overall organizational strategy to uncover insights.

      Info-Tech Insight
      A well-articulated and clear business strategy helps different functional and business units work together and ensures that individual decisions support the overall direction of the business.

      Focus on business value and establish a common goal

      Business architecture is a strategic planning function and the focus must be on delivering business value.

      Examples business objectives:

      • Digitally transform the business, redefining its customer interactions.
      • Identify the root cause for escalating customer complaints and eroding satisfaction.
      • Identify reuse opportunities to increase operational efficiency.
      • Identify capabilities to efficiently leverage suppliers to handle demand fluctuations.

      Info-Tech Insight
      CIOs are ideally positioned to be the sponsors of business architecture given that their current top priorities are digital transformation, innovation catalyzation, and business alignment.

      1.2 Collect and understand business objectives

      1-3 hours

      Having a clear understanding of the business is crucial to executing on the strategic IT initiatives.

      1. Discover the strategic CIO initiatives your organization will pursue:
      • Schedule interviews.
      • Use the CIO Business Vision diagnostic or Business Context Discovery Tool.
    • Document the business goals.
    • Update and finalize business goals.
    • InputOutput
      • Existing business goals and strategies
      • Existing IT strategies
      • Interview findings
      • Diagnostic results
      • List of business goals
      • Strategy on a page
      • Business model canvas
      • Customer journey
      MaterialsParticipants
      • CIO Business Vision diagnostic
      • Interview questionnaire
      • CIO
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • Departmental Executives & Senior Managers

      CIO Business Vision Diagnostic

      CEO

      Vision

      Where do you want to go?
      What is the problem your organization is addressing?

      Mission/Mandate

      What do you do?
      How do you do?
      Whom do you do it for?

      Value Streams

      Why are you in business? What do you do?
      What products and services do you provide?
      Where has your business seen persistent demand?

      Key Products & Services

      What are your top three to five products and services?

      Key Customer Segments

      Who are you trying to serve or target?
      What are the customer segments that decide your value proposition?

      Value Proposition

      What is the value you deliver to your customers?

      Future Value Proposition

      What is your value proposition in three to five years’ time?

      Digital Experience Aspirations

      How can you create a more effective value stream?
      For example, greater value to customers or better supplier relationships.

      Business Resilience Aspirations

      How can you reduce business risks?
      For example, compliance, operational, security, or reputational.

      Sustainability (or ESG) Aspirations

      How can you deliver ESG and sustainability goals?

      Interview the following executives for each business goal area.

      CEO
      CRO
      COO

      Core Business Goals

      What are the core business goals to meet business objectives?

      Top Priorities & Initiatives

      What are the top initiatives and priorities over the planning horizon?

      Performance Insights/Metrics

      What do we need to achieve?
      How can the success be measured?

      CMO
      COO
      CFO

      Shared Business Goals

      What are the shared (operational) business goals to meet business objectives?

      Top Priorities & Initiatives

      What are the top initiatives and priorities over the planning horizon?

      Performance Insights/Metrics

      What do we need to achieve?
      How can the success be measured?

      CFO
      CIO
      COO
      CHRO

      Enabling Business Goals

      What are the enabling (supporting/enterprise) business goals to meet business objectives?

      Top Priorities & Initiatives

      What are the top initiatives and priorities over the planning horizon?

      Performance Insights/Metrics

      What do we need to achieve?
      How can the success be measured?

      Craft a strategy to increase stakeholder support and participation

      The BA practice’s supporters are potential champions who will help you market the value of BA; engage with them first to create positive momentum. Map out the concerns of each group of stakeholders so you can develop marketing tactics and communications vehicles to address them.

      Example Communication Strategy

      Stakeholder Concerns Tactics to Address Concerns Communication Vehicles Frequency
      Supporters
      (High Priority)
      • Build ability to execute BA techniques
      • Build executive support
      • Build understanding of how they can contribute to the success of the BA practice
      • Communicate the secured executive support
      • Help them apply BA techniques in their projects
      • Show examples of BA work (case studies)
      • Personalized meetings and interviews
      • Department/functional meetings
      • Communities of practice or centers of excellent (education and case studies)
      Bi-Monthly
      Indifferent
      (Medium Priority)
      • Build awareness and/or confidence
      • Feel like BA has nothing to do with them
      • Show quick wins and case studies
      • Centers of excellence (education and case studies
      • Use the support of the champions
      Quarterly
      Resistors
      (Medium Priority)
      • BA will cause delays
      • BA will step in their territory
      • BA’s scope is too broad
      • Lack of understanding
      • Prove the value of BA – case studies and metrics
      • Educate how BA complements their work
      • Educate them on the changes resulting from the BA practice’s work, and involve them in crafting the process
      • Individual meetings and interviews
      • Political jockeying
      • Use the support of the champions
      Tailored to individual groups

      1.3 Craft a strategy to increase stakeholder support and participation

      1-2 hours

      Now that you have organized and categorized your stakeholders based on their power, influence, interest, and knowledge of business architecture, it is time to brainstorm how you are going to gain their support and participation.

      Think about the following:

      • What are your stakeholders’ concerns?
      • How can you address them?
      • How will you deliver the message?
      • How often will you deliver the message?

      Avoid these common mistakes:

      • Your communication strategy development should be an iterative process. Do not assume to know the absolute best way to get through to every resistor right away. Instead, engage with your supporters for their input on how to communicate to resistors and repeat the process for indifferent stakeholders as well.
      Input Output
    • Stakeholder Engagement Map
      • Stakeholder Communications Strategy
      Materials Participants
      • Stakeholder Engagement Strategy Template
      • A computer
      • A whiteboard and markers CIO
      • Business Architect
      • IT Department Leads

      Download the Stakeholder Engagement Strategy Template for this project.

      Engaging the right stakeholders

      CASE STUDY

      Industry
      Financial - Banking

      Source
      Anonymous

      Situation Complication Result

      To achieve success with the business architecture initiative, the bank’s CIO needed to put together a plan to engage the right stakeholders in the process.

      Without the right stakeholders, the initiative would suffer from inadequate information and thus would run the risk of delivering an ineffective solution.

      The bank’s culture was resistant to change and each business unit had its own understanding of the business strategy. This was a big part of the problem that led to decreasing customer satisfaction.

      The CIO needed a unified vision for the business architecture practice involving people, process, and technology that all stakeholders could support.

      Starting with enlisting executive support in the form of a business sponsor, the CIO identified the rest of the key stakeholders, in this case, the business unit heads, who were necessary to engage for the initiative.

      Once identified, the CIO promoted the benefits of business architecture to each of the business unit heads while taking stock of their individual needs.

      1.4 Develop a plan to engage key stakeholders

      1 hour

      Using your stakeholder power map as a starting point, focus on the three most important quadrants: those that contain stakeholders you must keep informed, those to keep satisfied, and the key players.

      Plot the stakeholders from those quadrants on a stakeholder engagement map.

      Think about the following:

      • Who are your resistors? These individuals will actively detract from project’s success if you don’t address their concerns.
      • Who is indifferent? These individuals need to be educated more on the benefits of business architecture to have an opinion either way.
      • Who are your supporters? These individuals will support you and spread your message if you equip them to do so.

      Avoid these common mistakes:

      • Do not jump to addressing resistor concerns first. Instead, equip your supporters with the info they need to help your cause and gain positive momentum before approaching resistors.
      InputOutput
      • Stakeholder Engagement Map
      • Stakeholder Communications Strategy
      MaterialsParticipants
      • Stakeholder Engagement Strategy Template
      • A computer
      • A whiteboard and markers
      • CIO
      • Business Architect
      • IT Department Leads

      Download the Stakeholder Engagement Strategy Template for this project.

      1.5 Craft a strategy to increase stakeholder support and participation

      1-2 hours

      Now that you have organized and categorized your stakeholders based on their power, influence, interest, and knowledge of business architecture, it is time to brainstorm how you are going to gain their support and participation.

      Think about the following:

      • What are your stakeholders’ concerns?
      • How can you address them?
      • How will you deliver the message?
      • How often will you deliver the message?

      Avoid these common mistakes:

      • Your communication strategy development should be an iterative process. Do not assume to know the absolute best way to get through to every resistor right away. Instead, engage with your supporters for their input on how to communicate to resistors and repeat the process for indifferent stakeholders as well.
      InputOutput
      • Stakeholder Engagement Map
      • Stakeholder Communications Strategy
      MaterialsParticipants
      • Stakeholder Engagement Strategy Template
      • A computer
      • A whiteboard and markers
      • CIO
      • Business Architect
      • IT Department Leads

      Download the Stakeholder Engagement Strategy Template for this project.

      Define value streams

      Identify the core activities your organization does to provide value to your customers.

      Business context Define value streams Build business capability map

      1.1 Select key stakeholders
      1.2 Collect and understand corporate goals

      2.1 Update or define value streams
      2.2 Decompose and analyze selected value stream

      3.1 Build Level 1 capability map
      3.2 Build Level 2 capability map
      3.3 Heatmap capability map
      3.4 Roadmap

      This phase will walk you through the following activities:

      • Note: It is recommended that you gather and leverage relevant industry standard business architecture models you may have available to you. Example: Info-Tech Industry Business Architecture, BIZBOK, APQC.
      • Defining or updating the organization’s value streams.
      • Selecting priority value streams for deeper analysis.

      This phase involves the following participants:

      • Business Architect, Enterprise Architect
      • Relevant Business Stakeholder(s): Business Unit Leads, Departmental Executives, Senior Mangers, Business Analysts

      Define the organization’s value streams

      • Value streams connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the marketplace by engaging in a set of interconnected activities. Those activities are dependent on the specific industry segment an organization operates within. Value streams can extend beyond the organization into the supporting ecosystem, whereas business processes are contained within and the organization has complete control over them.
      • There are two types of value streams: core value streams and support value streams. Core value streams are mostly externally facing: they deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map. Support value streams are internally facing and provide the foundational support for an organization to operate.
      • An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers. Info-Tech recommends identifying and organizing the value streams with customers and partners as end-value receivers.

      Connect business goals to value streams

      Example strategy map and value stream

      Identifying value streams

      Value streams connect business goals to organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities.

      There are several key questions to ask when endeavoring to identify value streams.

      Key Questions
      • Who are your customers?
      • What are the benefits we deliver to them?
      • How do we deliver those benefits?
      • How does the customer receive the benefits?

      Example: Value stream descriptions for the retail industry

      Value StreamsCreate or Purchase ProductManage InventoryDistribute ProductSell Product
      • Retailers need to purchase the products they are going to sell to customers from manufacturers or wholesale distributors.
      • A retailer’s success depends on its ability to source products that customers want and are willing to buy.
      • In addition, they need to purchase the right amount and assortment of products based on anticipated demand.
      • The right inventory needs to be at a particular store in the right quantities exactly when it is needed. This helps to maximize sales and minimize how much cash is held up in inventory.
      • Inventory management includes tracking, ordering, and stocking products, e.g. raw materials, finished products, buffer inventory.
      • Optimizing distribution activities is important for retailers.
      • Proper supply chain management can not only reduce costs for retailers but also drive revenues by enhancing shopping experiences.
      • Distribution includes transportation, packaging and delivery.
      • As business becomes global, it is important to ensure the whole distribution channel is effective.
      • Once produced, retailers need to sell the products. This is done through many channels including physical stores, online, the mail, or catalogs.
      • After the sale, retailers typically have to deliver the product, provide customer care, and manage complaints.
      • Retailers can use loyalty programs, pricing, and promotions to foster repeat business.

      Value streams describe your core business

      Value streams – the activities we do to provide value to customers – require business capabilities.

      Value streams are broken down further into value stages, for example, Sell Product value stream has value stages Evaluate Options, Place Order, and Make Payment.

      Think of value streams as the core operations, the reason for our organization’s being. A professional consulting organization may have a legal team but it does not brand itself as a law firm. A core value stream is providing research products and services – a business capability that supports it is legal counsel.

      2.1 Define value streams

      1-3 hours

      Unify the organization’s perspective on how it creates value.

      1. Write a short description of the value stream that includes a statement about the value provided and a clear start and end for the value stream. Validate the accuracy of the descriptions with your key stakeholders.
      2. Consider:
        1. How does the organization deliver those benefits?
        2. How does the customer receive the benefits?
        3. What is the scope of your value stream? What will trigger the stream to start and what will the final value be?
      3. Avoid: Don’t start with a blank page. Use Info-Tech’s business architecture models for sample value streams.
      Input Output
      • Business strategy or goals
      • Financial statements
      • Info-Tech’s industry-specific business architecture
      • List of organizational specific value streams
      • Detailed value stream definition(s)
      Materials Participants
      • Whiteboard / Kanban Board
      • Reference Architecture Template – See your Account Representative for details
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Info-Tech Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      See your Info-Tech Account Representative for access to the Reference Architecture Template

      Decompose the value stream into stages

      The stages of a value stream are usually action-oriented statements or verbs that make up the individual steps involved throughout the scope of the value stream, e.g. Place Order or Make Payment.

      Each value stream should have a trigger or starting point and an end result for a client or receiver.

      Decompose the value stream into stages

      There should be measurable value or benefits at each stage.
      These are key performance indicators (KPIs).
      Spot problem areas in the stream.

      Value streams usually fall into one of these categories:

      1. Fulfillment of products and services
      2. Manufacturing
      3. Software products
      4. Supporting value streams (procurement of supplies, product planning)

      Value stream and value stages examples

      Customer Acquisitions
      Identify Prospects > Contact Prospects > Verify Interests

      Sell Product
      Identify Options > Evaluate Options > Negotiate Price and Delivery Date > Place Order > Get Invoice > Make Payment

      Product Delivery
      Confirm Order > Plan Load > Receive Warehouse > Fill Order > Ship Order > Deliver Order > Invoice Customer

      Product Financing
      Initiate Loan Application > Decide on Application > Submit Documents > Review & Satisfy T&C > Finalize Documents > Conduct Funding > Conduct Funding Audits

      Product Release
      Ideate > Design > Build > Release

      Sell Product is a value stream, made up of value stages Identify options, Evaluate options, and so on.

      2.2 Decompose selected value streams

      1-3 hours

      Once we have a good understanding of our value streams, we need to decide which ones to focus on for deeper analysis and modeling, e.g. extend the business architecture to more detailed level 2 capabilities.

      Organization has goals and delivers products or services.

      1. Identify which value propositions are most important, e.g. be more productive or manage money more simply.
      2. Identify the value stream(s) that create the value proposition.
      3. Break the selected value stream into value stages.
      4. Analyze value stages for opportunities.

      Practical Guide to Agile Strategy Execution

      InputOutput
      • Value stream maps and definitions
      • Business goals, business model canvas, customer journey (value proposition) Selected value streams decomposed into value stages
      • Analysis of selected value streams for opportunities
      • Value stream map
      MaterialsParticipants
      • Whiteboard / Kanban Board
      • Reference Architecture Template – See your Account Representative for details
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Build your value stream one layer at a time to ensure clarity and comprehensiveness

      The first step of creating a value stream is defining it.

      • In this step, you create the parameters around the value stream and document them in a list format.
      • This allows you to know where each value stream starts and ends and the unique value it provides.

      The second step is the value stream mapping.

      • The majority of the mapping is done here where you break down your value stream into each of its component stages.
      • Analysis of these stages allows for a deeper understanding of the value stream.
      • The mapping layer connects the value stream to organizational capabilities.

      Define the value streams that are tied to your strategic goals and document them in a list

      Title

      • Create a title for your value stream that indicates the value it achieves.
      • Ensure your title is clear and will be understood the same way across the organization.
      • The common naming convention for value streams is to use nouns, e.g. product purchase.

      Scope

      • Determine the scope of your value stream by defining the trigger to start the value stream and final value delivered to end the value stream.
      • Be precise with your trigger to ensure you do not mistakenly include actions that would not trigger your value stream.
      • A useful tip is creating a decision tree and outlining the path that results in your trigger.

      Objectives

      • Determine the objectives of the value stream by highlighting the outcome it delivers.
      • Identify the desired outcomes of the value stream from the perspective of your organization.

      Example Value Streams List

      Title Scope Objectives
      Sell Product From option identification to payment Revenue Growth

      Create a value stream map

      A Decompose the Value Stream Into Stages B Add the Customer Perspective
      • Determine the different stages that comprise the value stream.
      • Place the stages in the correct order.
      • Outline the likely sentiment and meaningful needs of the customer at each value stage.
      C Add the Expected Outcome D Define the Entry and Exit Criteria
      • Define the desired outcome of each stage from the perspective of the organization.
      • Define both the entry and exit criteria for each stage.
      • Note that the entry criteria of the first stage is what triggers the value stream.
      E Outline the Metrics F Assess the Stages
      • For each stage of the value stream, outline the metrics the organization can use to identify its ability to attain the desired outcome.
      • Assess how well each stage of the value stream is performing against its target metrics and use this as the basis to drill down into how/where improvements can be made.

      Decompose the value stream into its value stages

      The first step in creating a value stream map is breaking it up into its component stages.

      The stages of a value stream are usually action-oriented statements or verbs that make up the individual steps involved throughout the scope of the value stream.

      Illustration of decomposing value stream into its value stages

      The Benefit
      Segmenting your value stream into individual stages will give you a better understanding of the steps involved in creating value.

      Connect the stages of the value stream to a specific customer perspective

      Example of a sell product value stream

      The Benefit
      Adding the customer’s perspective will inform you of their priorities at each stage of the value stream.

      Connect the stages of the value stream to a desired outcome

      Example of a sell product value stream

      The Benefit
      Understanding the organization’s desired outcome at each stage of the value stream will help set objectives and establish metrics.

      Define the entry and exit criteria of each stage

      Example of entry and exit criteria for each stage

      The Benefit
      Establishing the entry and exit criteria for each stage will help you understand how the customer experience flows from one end of the stream to the other.

      Outline the key metric(s) for each stage

      Outline the key metrics for each stage

      The Benefit
      Setting metrics for each stage will facilitate the tracking of success and inform the business architecture practitioner of where investments should be made.

      Example value stream map: Sell Product

      Assess the stages of your value stream map to determine which capabilities to examine further

      To determine which specific business capabilities you should seek to assess and potentially refine, you must review performance toward target metrics at each stage of the value stream.

      Stages that are not performing to their targets should be examined further by assessing the capabilities that enable them.

      Value Stage Metric Description Metric Target Current Measure Meets Objective?
      Evaluate Options Number of Product Demonstrations 12,000/month 9,000/month No
      Identify Options Google Searches 100K/month 100K/month Yes
      Identify Options Product Mentions 1M/month 1M/month Yes
      Website Traffic (Hits)
      Average Deal Size
      Number of Deals
      Time to Complete an Order
      Percentage of Invoices Without Error
      Average Time to Acquire Payment in Full

      Determine the business capabilities that support the value stage corresponding with the failing metric

      Sell Product

      Identify Options > Evaluate Options > Negotiate Price and Delivery Date > Place Order > Get Invoice > Make Payment

      The value stage(s) that doesn’t meet its objective metrics should be examined further.

      • This is done through business capability mapping and assessment.
      • Starting at the highest level (level 0) view of a business, the business architecture practitioner must drill down into the lower level capabilities that support the specific value stage to diagnose/improve an issue.

      Info-Tech Insight
      In the absence of tangible metrics, you will have to make a qualitative judgement about which stage(s) of the value stream warrant further examination for problems and opportunities.

      Build business capability map

      Align supporting capabilities to priority activities.

      Business context Define value streams Build business capability map
      1.1 Select key stakeholders
      1.2 Collect and understand corporate goals
      2.1 Update or define value streams
      2.2 Decompose and analyze selected value stream
      3.1 Build Level 1 capability map
      3.2 Build Level 2 capability map
      3.3 Heatmap capability map
      3.4 Roadmap

      This step will walk you through the following activities:

      • Determine which business capabilities support value streams
      • Accelerate the process with an industry reference architecture
      • Validate the business capability map
      • Establish level 2 capability

      This step involves the following participants:

      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Outcomes of this step

    • A validated level 1 business capability map
    • Level 2 capabilities for selected value stream(s)
    • Heatmapped business capability map
    • Business architecture initiatives roadmap
    • Develop a business capability map – level 1

      • Business architecture consists of a set of techniques to create multiple views of an organization; the primary view is known as a business capability map.
      • A business capability defines what a business does to enable value creation and achieve outcomes, rather than how. Business capabilities are business terms defined using descriptive nouns such as “Marketing” or “Research and Development.” They represent stable business functions, are unique and independent of each other, and typically will have a defined business outcome. Business capabilities should not be defined as organizational units and are typically longer lasting than organizational structures.
      • A business capability mapping process should begin at the highest-level view of an organization, the level 1, which presents the entire business on a page.
      • An effective method of organizing business capabilities is to split them into logical groupings or categories. At the highest level, capabilities are either “core” (customer-facing functions) or “enabling” (supporting functions).
      • As a best practice, Info-Tech recommends dividing business capabilities into the categories illustrated to the right.

      The Business Capability Map is the primary visual representation of the organization’s key abilities or services that are delivered to stakeholders. This model forms the basis of strategic planning discussions.

      Example of a business capability map

      Example business capability map – Higher Education

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Example business capability map for: Higher Education

      Example business capability map for higher education

      Example business capability map – Local Government

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Example business capability map for: Local Government

      Example business capability map for local government

      Map capabilities to value stage

      Example of a value stage

      Source: Lambert, “Practical Guide to Agile Strategy Execution”

      3.1 Build level 1 business capability map

      1-3 hours

      1. Analyze the value streams to identify and describe the organization’s capabilities that support them. This stage requires a good understanding of the business and will be a critical foundation for the business capability map. Use the reference business architecture’s business capability map for your industry for examples of level 1 and 2 business capabilities and the capability map template to work in.
      2. Avoid:
        1. Don’t repeat capabilities. Capabilities are typically mutually exclusive activities.
        2. Don’t include temporary initiatives. Capabilities should be stable over time. The people, processes, and technologies that support capabilities will change continuously.

      Ensure you engage with the right stakeholders:

      Don’t waste your efforts building an inaccurate depiction of the business: The exercise of identifying capabilities for an organization is very introspective and requires deep analysis.

      It is challenging to develop a common language that everyone will understand and be able to apply. Invest in the time to ensure the right stakeholders are brought into the fold and bring their business area expertise and understanding to the table.

      InputOutput
      • Existing business capability maps
      • Value stream map
      • Info-Tech’s industry-specific business architecture
      • Level 1 business capability map for enterprise
      MaterialsParticipants
      • Whiteboard
      • Reference Architecture Template – See your Account Representative for details
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Prioritize one value stream and build a business architecture to level 2 capabilities

      Prioritize your innovation objectives and business goals, and identify a value stream to transform.

      Align the innovation goals and business objectives of your organization to your value streams (the critical actions that take place within your organization to add value to a customer).
      Prioritize a value stream to transform based on the number of priorities aligned to a value stream and/or the business value (e.g. revenue, EBITDA earnings, competitive differentiation, or cost efficiency).
      Working alongside a business or enterprise architect, build a reference architecture for the prioritized value stream up to level 2.

      Example of a value stream to business architecture level 2 capabilities

      Info-Tech Insight
      To produce maximum impact, focus on value streams that provide two-thirds of your enterprise value (EBITDA earnings).

      From level 1 to level 2 business capabilities

      Example moving from level 1 to level 2 business capabilities

      3.2 Build level 2 business capability map

      1-3 hours

      It is only at level 2 and further that we can pinpoint the business capabilities – the exact resources, whether applications or data or processes – that we need to focus on to realize improvements in the organization’s performance and customer experience.

      1. Gather industry reference models and any existing business capability maps.
      2. For the selected value stream, further break down its level 1 business capabilities into level 2 capabilities.
      3. You can often represent the business capabilities on a single page, providing a holistic visual for decision makers.
      4. Use meaningful names for business capabilities so that planners, stakeholders, and subject matter experts can easily search the map.
      InputOutput
      • Existing business capability maps
      • Value stream map
      • Info-Tech’s industry-specific business architecture
      • Level 1 business capability map
      • Level 2 Business Capability Map for selected Value Stream
      MaterialsParticipants
      • Whiteboard
      • Reference Architecture Template – See your Account Representative for details.
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Download: See your Account Representative for access to Info-Tech’s Reference Architecture Template

      3.3 Heatmap business capability map

      1-3 hours

      Determine the organization’s key capabilities.

      1. Determine cost advantage creators. If your organization has a cost advantage over competitors, the capabilities that enable it should be identified and prioritized. Highlight these capabilities and prioritize the programs that support them.
      2. Determine competitive advantage creators. If your organization does not have a cost advantage over competitors, determine if it can deliver differentiated end-customer experiences. Once you have identified the competitive advantages, understand which capabilities enable them. These capabilities are critical to the success of the organization and should be highly supported.
      3. Define key future state capabilities. In addition to the current and competitive advantage creators, the organization may have the intention to enhance new capabilities. Discuss and select the capabilities that will help drive the attainment of future goals.
      4. Assess how well information, applications, and processes support capabilities.
      InputOutput
      • Business capability map
      • Cost advantage creators
      • Competitive advantage creators
      • IT and business assessments
      • Key business capabilities
      • Business process review
      • Information assessment
      • Application assessment
      • List of IT implications
      MaterialsParticipants
      • Whiteboard
      • Reference Architecture Template – See your Account Representative for details.
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Download: See your Account Representative for access to Info-Tech’s Reference Architecture Template

      Business capability map: Education

      Illustrative example of a business capability map for education

      Define key capabilities

      Illustrative example of Define key capabilities

      Note: Illustrative Example

      Business process review

      Illustrative example of a business process review

      Note: Illustrative Example

      Information assessment

       Illustrative example of an Information assessment

      Note: Illustrative Example

      Application assessment

       Illustrative example of an Application assessment

      Note: Illustrative Example

      MoSCoW analysis for business capabilities

       Illustrative example of a MoSCoW analysis for business capabilities

      Note: Illustrative Example

      Ranked list of IT implications

      MoSCoW Rank IT Implication Value Stream Impacted Comments/Actions
      M [Implication] [Value Stream]
      M [Implication] [Value Stream]
      M [Implication] [Value Stream]
      S [Implication] [Value Stream]
      S [Implication] [Value Stream]
      S [Implication] [Value Stream]
      C [Implication] [Value Stream]
      C [Implication] [Value Stream]
      C [Implication] [Value Stream]
      W [Implication] [Value Stream]
      W [Implication] [Value Stream]
      W [Implication] [Value Stream]

      3.4 Roadmap business architecture initiatives

      1-3 hours

      Unify the organization’s perspective on how it creates value.

      1. Write a short description of the value stream that includes a statement about the value provided and a clear start and end for the value stream. Validate the accuracy of the descriptions with your key stakeholders.
      2. Consider:
        1. How does the organization deliver those benefits?
        2. How does the customer receive the benefits?
        3. What is the scope of your value stream? What will trigger the stream to start and what will the final value be?
      3. Don’t start with a blank page. Use Info-Tech’s business architecture models for sample value streams.
      InputOutput
      • Existing business capability maps
      • Value stream map
      • Info-Tech’s industry-specific business architecture
      • Level 1 business capability map
      • Heatmapped business capability map
      MaterialsParticipants
      • Whiteboard
      • Reference Architecture Template – See your Account Representative for details.
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Download: See your Account Representative for access to Info-Tech’s Reference Architecture Template

      Example: Business architecture deliverables

      Enterprise Architecture Domain Architectural View Selection
      Business Architecture Business strategy map Required
      Business Architecture Business model canvas Optional
      Business Architecture Value streams Required
      Business Architecture Business capability map Not Used
      Business Architecture Business process flows
      Business Architecture Service portfolio
      Data Architecture Conceptual data model
      Data Architecture Logical data model
      Data Architecture Physical data model
      Data Architecture Data flow diagram
      Data Architecture Data lineage diagram

      Tools and templates to compile and communicate your business architecture work

      The Industry Business Reference Architecture Template for your industry is a place for you to collect all of the activity outputs and outcomes you’ve completed for use in next-steps.

      Download the Industry Business Reference Architecture Template for your industry

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit Guided Implementation Workshop Consulting
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options

      Research Contributors and Experts

      Name Role Organization
      Ibrahim Abdel-Kader Research Analyst, Data & Analytics Info-Tech Research Group
      Ben Abrishami-Shirazi Technical Counselor, Enterprise Architecture Info-Tech Research Group
      Andrew Bailey Consulting, Manager Info-Tech Research Group
      Dana Dahar Research & Advisory Director, CIO / Digital Business Strategy Info-Tech Research Group
      Larry Fretz VP Info-Tech Research Group
      Shibly Hamidur Enterprise Architect Toronto Transit Commission (TTC)
      Rahul Jaiswal Principal Research Director, Industry Info-Tech Research Group
      John Kemp Executive Counselor, Executive Services Info-Tech Research Group
      Gerald Khoury Senior Executive Advisor Info-Tech Research Group
      Igor Ikonnikov Principal Advisory Director, Data & Analytics Info-Tech Research Group
      Daniel Lambert VP Benchmark Consulting
      Milena Litoiu Principal Research Director, Enterprise Architecture Info-Tech Research Group
      Andy Neill AVP Data & Analytics, Chief Enterprise Architect Info-Tech Research Group
      Rajesh Parab Research Director, Data & Analytics Info-Tech Research Group
      Rick Pittman VP, Research Info-Tech Research Group
      Irina Sedenko Research Director, Data & Analytics Info-Tech Research Group

      Bibliography

      Andriole, Steve. “Why No One Understands Enterprise Architecture & Why Technology Abstractions Always Fail.” Forbes, 18 September 2020. Web.

      “APQC Process Classification Framework (PCF) – Retail.” American Productivity & Quality Center, 9 January 2019. Web.

      Brose, Cari. “Who’s on First? Architecture Roles and Responsibilities in SAFe.” Business Architecture Guild, 9 March 2017. Web.

      Burlton, Roger, Jim Ryne, and Daniel St. George. “Value Streams and Business Processes: The Business Architecture Perspective.” Business Architecture Guild, December 2019. Web.

      “Business Architecture: An overview of the business architecture professional.” Capstera, 5 January 2022. Web.

      Business Architecture Guild. “What is Business Architecture?” Business Analyst Mentor, 18 November 2022. Web.

      “Business Architecture Overview.” The Business Architecture Working Group of the Object Management Group (OMG), n.d. Web.

      “Delivering on your strategic vision.” The Business Architecture Guild, n.d. Web.

      Ecker, Grant. “Deploying business architecture.” LinkedIn, 11 November 2021. (Presentation)

      IRIS. “Retail Business Architecture Framework and Examples.” IRIS Business Architect, n.d. Web.

      IRIS. “What Is Business Architecture?” IRIS Business Architect, 8 May 2014. Web.

      IRIS. “Your Enterprise Architecture Practice Maturity 2021 Assessment.” IRIS Business Architect, 17 May 2021. Web.

      Khuen, Whynde. “How Business Architecture Breaks Down and Bridges Silos.” Biz Arch Mastery, January 2020. Web.

      Lambert, Daniel. “Practical Guide to Agile Strategy Execution.” 18 February 2020.

      Lankhorst, Marc, and Bernd Ihnen. “Mapping the BIZBOK Metamodel to the ArchiMate Language.” Bizzdesign, 2 September 2021. Web.

      Ramias, Alan, and Andrew Spanyi, “Demystifying the Relationship Between Processes and Capabilities: A Modest Proposal.” BPTrends, 2 February 2015. Web.

      Newman, Daniel. “NRF 2022: 4 Key Trends From This Year’s Big Show.” Forbes, 20 January 2022. Web.

      Research and Markets. “Define the Business Context Needed to Complete Strategic IT Initiatives: 2018 Blueprint.” Business Wire, 1 February 2018. Web.

      Sabanoglu, Tugba. “Retail market worldwide - Statistics & Facts.” Statista, 21 April 2022. Web.

      Spacey, John. “Capability vs Process.” Simplicable, 18 November 2016. Web.

      “The Definitive Guide to Business Capabilities.” LeanIX, n.d. Web.

      TOGAF 9. Version 9.1. The Open Group, 2011. Web.

      “What is Business Architecture?” STA Group, 2017. PDF.

      Whittie, Ralph. “The Business Architecture, Value Streams and Value Chains.” BA Institute, n.d. Web.