COVID-19 Work Status Tracking Guide

  • Buy Link or Shortcode: {j2store}594|cart{/j2store}
  • member rating overall impact: N/A
  • member rating average dollars saved: N/A
  • member rating average days saved: N/A
  • Parent Category Name: Manage & Coach
  • Parent Category Link: /manage-coach
  • Keeping track of the multiple and frequently changing work arrangements on your team.
  • Ensuring you have a fast and easy way to keep an up-to-date record of where and how employees are working.

Our Advice

Critical Insight

  • During these critical times, keeping track of employees’ work status doesn’t have to be complicated – the right tool is one that does the job.
  • Keeping track of your employees is a health and safety issue – deployed well, it is an aid in keeping the business running and an additional communication channel, not a sign of lack of trust.

Impact and Result

  • An Excel spreadsheet is all you need to ensure you have a way to record work arrangements that can change by the day.
  • An easy-to-use tool means minimal administrative overhead to ensuring you have this critical information at hand.

COVID-19 Work Status Tracking Guide Research & Tools

Start here – read the Work Status Tracking Guide

Read our recommendations and use the accompanying tool to quickly get a handle on your team’s work arrangements.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

  • COVID-19 Work Status Tracking Guide Storyboard
  • COVID-19 Work Status Tracking Tool
[infographic]

Equip Managers to Effectively Manage Virtual Teams

  • Buy Link or Shortcode: {j2store}600|cart{/j2store}
  • member rating overall impact: 9.7/10 Overall Impact
  • member rating average dollars saved: $20,240 Average $ Saved
  • member rating average days saved: 4 Average Days Saved
  • Parent Category Name: Manage & Coach
  • Parent Category Link: /manage-coach
  • Virtual team members must rely upon collaboration technology to communicate and collaborate.
  • Management practices and approaches that work face to face do not always translate effectively in virtual contexts.
  • Managers cannot rely upon spontaneous social interactions that happen organically when people are colocated to build meaningful and trusting relationships. Space and time need to be created in a virtual environment for this to happen.
  • Observing an employee’s performance or development can be more difficult, and relying on others’ feedback becomes more critical for managing performance and development.

Our Advice

Critical Insight

  • Managing virtual teams does not require developing new manager competencies. Instead, managers need to “dial up” competencies they already have and adjust their approaches.
  • Setting clear expectations with virtual teams creates the foundation needed to manage them effectively.
  • Virtual employees crave more meaningful interactions about performance and development with their managers.

Impact and Result

  • Create a solid foundation for managing virtual teams by setting clear expectations and taking a more planful approach to managing performance and employee development.
  • Dial up key management competencies that you already have. Managers do not need to develop new competencies; they just need to adjust and refocus their approaches.

Equip Managers to Effectively Manage Virtual Teams Research & Tools

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Equip managers to effectively manage virtual teams

Equip managers to become more effective with managing remote teams.

The workbook serves as a reference guide participants will use to support formal training.

  • Training Deck: Equip Managers to Effectively Manage Virtual Teams
  • Workbook: Equip Managers to Effectively Manage Virtual Teams
  • Standard Participant Training Session Evaluation Template

2. Additional Resources

Many organizations are developing plans to allow employees more flexible work options, including remote work. Use these resources to help managers and employees make the most of remote work arrangements.

  • Work-From-Home Tips for Managers
  • Work-From-Home Tips for Employees
  • Health & Safety at Home Infographic
  • Wellness and Working From Home
  • Ergonomic Workspaces Infographic
[infographic]

Further reading

Equip Managers to Effectively Manage Virtual Teams

Learning objectives

Describe the benefits of virtual teams.

Create a plan for adopting effective management practices and setting clear expectations with virtual teams.

Identify potential solutions to the challenges of managing performance and developing members of virtual teams.

Create an action plan to increase effectiveness in managing virtual teams.

Target audience

People managers who manage or plan to manage virtual teams.

Training length

Two three-hour sessions

Training material

  • Use the speaker’s notes in the notes pane section of each slide to plan and practice the training session.
  • Activity slides are scattered throughout this training deck and are clearly numbered in the slide title.
  • Notes in italics are written to the facilitator and are not meant to be read aloud.
  • Download the Workbook for participants to use.

Suggested materials for activities:

  • Index cards or sticky notes
  • Markers
  • Whiteboard/large table space/flip chart

Agenda & activities

Section 1

Section 2

10 min

Welcome: Overview & Introductions

  • Introductions
10 min

Welcome: Overview & Introductions

  • Session 1 Review
  • Session 2 Overview
50 min

1.1 Introduction to virtual teams

  • What kind of virtual team do you lead?
  • Virtual team benefits and challenges
55 min

2.1 Managing wellbeing in a virtual team context

  • Share current practices and challenges regarding wellbeing in virtual teams
  • Identify and discuss proposed solutions
  • Develop draft action plan for managing wellbeing in a virtual team context
5 min

Break

5 min Break
45 min

1.2 Laying the foundation for a virtual team

  • Identify behaviors to better inform, interact with, and involve team members
60 min

2.2 Managing performance in a virtual team context

  • Share current performance management practices for virtual teams
  • Identify challenges of current practices and propose solutions
  • Develop draft action plan for managing performance in a virtual team context
10 min

Break

10 min Break
55 min

1.2 Laying the foundation for a virtual team

  • Identify and share ways you prefer to communicate for different activities
  • Develop draft action plan for laying the foundation for a virtual team
40 min

Action planning & conclusion

  • Refine consolidated action plan (three parts) and commit to implementing it
  • Key takeaways
5 min

Session 1 Wrap-Up

Recommended Customization

Review all slides and adjust the language or content as needed to suit your organizational context and culture.

The pencil icon to the left denotes slides requiring customization of the slide and/or the speaker’s notes, e.g. adding in an organization-specific process.

Customization instructions are found in the notes pane.

Tips

  • Adjust the speaker’s notes on the slides before (or after) any slides you modify or delete to ensure logical transitions between slides.
  • Update the agenda to reflect new timings if major modifications are made.
  • Even seasoned leaders need to be reminded of the basics now and again. Rather than delete more basic slides, cut back on the amount of time spent covering them and frame the content as a refresher.
  • Participant Workbooks
  • Relevant organization-specific documents (see side panel)
  • Training Session Feedback Form

Required Information

  • Communication guidelines for managers (e.g. cadence of manager interactions)
  • Performance management process and guidelines
  • Employee development guidelines
  • List of available resources (e.g. social collaboration tools)

Effectively Manage Virtual Teams

Section 1.1

Practical foundations for managing teams in a remote environment

Feasibility of virtual IT teams

Most organizations are planning some combination of remote and onsite work in 2022.

This is an image of a bar graph demonstrating the percentage of companies who have the following plans for return to work: Full work-from-home (All employees WFH permanently) - 4% ; No work-from-home permitted	9% ; Partial work-from-home team (Eligible employees can WFH for a certain portion of their work week)	23% ; Balanced work-from-home team (All employees can WFH for a certain portion of their work week)	28% ; Hybrid work-from-home team (Eligible employees WFH on a full-time basis)	37%

Source: IT Talent Trends, 2022; n=199

Speaker’s Notes:

Most organizations are planning some combination of remote and onsite work in 2022 – the highest reported plans for WFH were hybrid, balanced, and partial work-from-home. This builds on our findings in the IT Talent Trends 2022 report.

Feasibility of virtual IT teams

What percentage of roles in IT are capable of being performed remotely permanently?

Approximately what percentage of roles in IT are capable of being performed remotely permanently?

0% to less than 10%: 3%; 10% to less than 25%: 5%; 25% to less than 50%: 12%; 50% to less than 75%: 30%; 75% to 100%L 50%.

IT Talent Trends, 2022; n=207

Speaker’s Notes:

80% of respondents estimated that 50 to 100% of IT roles can be performed remotely.

Virtual teams take all kinds of forms

A virtual team is any team that has members that are not colocated and relies on technology for communications.

This image depicts the three levels of virtual teams, Municipal; National; Global.

Speaker’s Notes:

Before we start, it will be useful to review what we mean by the term “virtual team.” For our purposes we will be defining a virtual team as any team that has members that are not colocated and relies on technology for communications.

There are a wide variety of virtual work arrangements and a variety of terms used to describe them. For example, some common terms include:

  • “Flexible work arrangements”: Employees have the option to work where they see fit (within certain constraints). They may choose to work from the office, home, a shared office space, the road, etc.
  • “Remote work,” “work from home,” and “telecommuting”: These are just various ways of describing how or where people are working virtually. They all share the idea that these kinds of employees are not colocated.
  • “Multi-office team”: the team members all work in office environments, but they may not always be in the same office as their team members or manager.

Our definition of virtual work covers all of these terms. It is also distance neutral, meaning that it applies equally to teams that are dispersed globally or regionally or even those working in the same cities but dispersed throughout different buildings. Our definition also applies whether virtual employees work full time or part time.

The challenges facing managers arise as soon as some team members are not colocated and have to rely on technology to communicate and coordinate work. Greater distances between employees can complicate challenges (e.g. time zone coordination), but the core challenges of managing virtual teams are the same whether those workers are merely located in different buildings in the same city or in different buildings on different continents.

1.1 What kind of virtual team do you lead?

15 Minutes

Working on your own, take five minutes to figure out what kind of virtual team you lead.

  1. How many people on your team work virtually (all, most, or a small percentage)?
  2. How often and how regularly do they tend to work virtually (full time, part time regularly, or part time as needed)?
  3. What kinds of virtual work arrangements are there on your team (multi-site, work from home, mobile employees)?
  4. Where do your workers tend to be physically located (different offices but in the same city/region or globally dispersed)?
  5. Record this information in your workbook.
  6. Discuss as a group.

Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

Input

  • Size of virtual team
  • Current remote work practices

Output

  • Documented list of current state of remote work

Materials

  • Workbook: Equip Managers to Effectively Manage Virtual Teams

Participants

  • All managers with direct reports working virtually

Advantages

Benefits to the organization

Benefits to employees

Operational continuity in disaster situations that prevent employees from coming into the office.

Cost savings: Employees who WFH half the time can save $2,500 to $4,000 per year (Global Workplace Analytics, 2021).

Cost savings: Organizations save ~$11,000 annually per employee working from home half the time (Global Workplace Analytics, 2021).

Time savings: Employees who WFH half the time save on average 11 workdays per year (Global Workplace Analytics, 2021).

Increased attraction: 71% of employees would likely choose one employer over another based on WFH offerings (Owl Labs, 2021).

Improved wellbeing:

83% employees agree that WFH would make them happier.

80% agree that WFH would decrease their stress.

81% agree that WFH would improve their ability to manage their work-life balance.

(Owl Labs, 2021)

Increased retention: 74% of employees would be less likely to leave their employer if they could WFH (Owl Labs, 2021).

Increased flexibility: 32% of employees rated the “ability to have a flexible schedule” as the biggest benefit of WFH (OWL Labs, 2021).

Increased productivity: 50% of employees report they would maintain or increase their productivity while working from home (Glassdoor Team, 2020).

Increased engagement: Offsite employees tend to have higher overall engagement than onsite employees (McLean & Company Engagement Survey, 2020).

Speaker’s Notes:

Remote work arrangements are becoming more and more common, and for good reason: there are a lot of benefits to the organization – and to employees.

#1: Save Money

Perhaps one of the most common reasons for opting for remote-work arrangements is the potential cost savings. One study found that organizations could save about $11,000 per employee working from home half the time (Global Workplace Analytics, 2021).

#2 Increased Attraction

In addition, supporting remote-work arrangements can attract employees. One study found that 71% of employees would likely choose one employer over another based on WFH offerings (Owl Labs, 2019).

#3 Improve productivity.

There are also improvements to productivity. Fifty percent of employees report they would maintain or increase their productivity while working from home (Glassdoor Team, 2020).

Remote work also has benefits to employees.

#1: Save Money

As with organizations, employees also benefit financially from remote work arrangements, saving between $2,500 and $4,000 and on average 11 working days while working from home half of the time.

#2: Improved Wellbeing

Most employees agree that working from home makes them happier, reduces stress, and provides an improved work-life balance through increased flexibility.

Challenges

Organizations

  • Concerns that WFH may stifle innovation (Scientific American, 2021), likely due to the potential lack of collaboration and knowledge sharing.
  • Fewer organic opportunities for informal interaction between employees working from home means active efforts are required to foster organizational culture.

Leaders

  • 42% of managers believe that monitoring the productivity of their direct reports is a top challenge of WFH (Ultimate Software, 2019).
  • The lack of in-person supervision compounded with a lack of trust in employees leads many leaders to believe that WFH will result in a drop in productivity.

Employees

  • 20% of employees report collaboration/communication as their top struggle with WFH (Owl Labs, 2021).
  • Employees often experience burnout from working longer hours due to the lack of commute, blurring of work and home life, and the perceived need to prove their productivity.

Many of these barriers can be addressed by changing traditional mindsets and finding alternative ways of working, but the traditional approach to work is so entrenched that it has been hard to make the shift.

Speaker’s Notes:

Many organizations are still grappling with the challenges of remote work. Some are just perceived challenges, while others are quite real.

Limited innovation and a lack of informal interaction are a potential consequence of failing to properly adapt to the remote-work environment.

Leaders also face challenges with remote work. Losing in-person supervision has led to the lack of trust and a perceived drop in productivity.

A study conducted 2021 asked remote workers to identify their biggest struggle with working remotely. The top three struggles remote workers report facing are unplugging after work, loneliness, and collaborating and/or communicating.

Seeing the struggles remote workers identify is a good reminder that these employees have a unique set of challenges. They need their managers to help them set boundaries around their work; create feelings of connectedness to the organization, culture, and team; and be expert communicators.

1.2 Virtual teams: benefits and challenges

20 Minutes

  1. Discuss and list:
    1. Any positives you’ve experienced since managing virtual employees.
    2. Any challenges you’ve had to manage connected to managing virtual employees.
  2. Record information in the workbook.

Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

Input

  • Personal experiences managing remote teams

Output

  • List of benefits and challenges of remote work

Materials

  • Workbook: Equip Managers to Effectively Manage Virtual Teams

Participants

  • All managers with direct reports working virtually

Effectively Manage Virtual Teams

Section 1.2

Laying the foundations for a virtual team

The 3i’s: Inform, interact, and involve your way to effective management:

Inform

Interact Involve

↓ Down

Connect

↑ Up

Tell employees the whys

Get to know employees

Solicit input from employees

Speaker’s Notes:

Effectively managing a virtual team really comes down to adopting management approaches that will engage virtual employees.

Managing a virtual team does not actually require a new management style. The basics of effective management are the same in both colocated and virtual teams; however, the emphasis on certain behaviors and actions we take often differs. Managing a virtual team requires much more thoughtfulness and planning in our everyday interactions with our teams as we cannot rely on the relative ease of face-to-face interactions available to colocated teams.

The 3i’s Engaging Management Model is useful when interacting with all employees and provides a handy framework for more planful interactions with virtual employees.

Think of your management responsibilities in these three buckets – they are the most important components of being an effective manager. We’re first going to look at inform and involve before moving on to interact.

Inform: Relay information down from senior management and leaders to employees. Communicate the rationale behind decisions and priorities, and always explain how they will directly affect employees.

Why is this important? According to McLean & Company’s Engagement Survey data, employees who say their managers keep them well informed about decisions that affect them are 3.4 times more likely to be engaged (Source: McLean & Company, 2020; N=77,363). Your first reaction to this might be “I already do this,” which may very well be the case. Keep in mind, though, we sometimes tend to communicate on a “need-to-know basis,” especially when we are stressed or short on time. Engaging employees takes more. Always focus on explaining the “why?” or the rationale behind business decisions.

It might seem like this domain should be the least affected, since important company announcements probably continue in a remote environment. But remember that information like that also flows informally. And even in formal settings, there are question-and-answer opportunities. Or maybe your employee might come to your office to ask for more details. Virtual team members can’t gather around the watercooler. They don’t have the same opportunities to hear information in passing as people who are colocated do, so managers need to make a concerted effort to share information with virtual team members in a clear and timely way.

Swinging over to the other end, we have involve: Involve your employees. Solicit information and feedback from employees and collaborate with them.

However, it’s not enough to just solicit their feedback and input; you also need to act on it.

Make sure you involve your employees in a meaningful way. Such collaboration makes employees feel like a valued part of the team. Not to mention that they often have information and perspectives that can help make your decisions stronger!

Employees who say their department leaders act on feedback from them are 3.9 times more likely to be engaged than those whose leaders don’t. (Source: McLean & Company, 2020; N=59,779). That is a huge difference!

Keeping virtual employees engaged and feeling connected and committed to the organization requires planful and regular application of the 3i’s model.

Finally, Interact: Connect with employees on a personal level; get to know them and understand who they are on a personal and professional level.

Why? Well, over and above the fact that it can be rewarding for you to build stronger relationships with your team, our data shows that human connection makes a significant difference with employees. Employees who believe their managers care about them as a person are 3.8 times more likely to be engaged than those who do not (Source: McLean & Company, 2017; N=70,927).

And you might find that in a remote environment, this is the area that suffers the most, since a lot of these interactions tend to be unscripted, unscheduled, and face to face.

Typically, if we weren’t in the midst of a pandemic, we’d emphasize the importance of allocating some budget to travel and get some face-to-face time with your staff. Meeting and interacting with team members face to face is crucial to building trusting relationships, and ultimately, an effective team, so given the context of our current circumstances, we recommend the use of video when interacting with your employees who are remote.

Relay information down from senior management to employees.

Ensure they’ve seen and understand any organization-wide communication.

Share any updates in a timely manner.

Connect with employees on a personal level.
Ask how they’re doing with the new work arrangement.
Express empathy for challenges (sick family member, COVID-19 diagnosis, etc.).
Ask how you can support them.
Schedule informal virtual coffee breaks a couple of times a week and talk about non-work topics.

Get information from employees and collaborate with them.
Invite their input (e.g. have a “winning remotely” brainstorming session).
Escalate any challenges you can’t address to your VP.
Give them as much autonomy over their work as possible – don’t micromanage.

1.3 Identify behaviors to inform, interact with, and involve team members

20 Minutes

Individually:

  1. Identify one behavior for each of Inform, Interact, and Involve to improve.
  2. Record information in the workbook.

As a group:

  1. Discuss behaviors to improve for each of Inform, Interact, and Involve and record new ideas to incorporate into your leadership practice.

Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

Input

  • 3i's Model
  • Current leadership behaviors to improve

Output

  • List of behaviors to better inform, interact, and involve team members

Materials

  • Workbook: Equip Managers to Effectively Manage Virtual Teams

Participants

  • All managers with direct reports working virtually

Laying the foundation: Set clear expectations

Tasks

  • What are the daily and weekly team activities? How do they affect one another?

Goals

  • Clarify any adjustments to strategy based on the situation; clarify metrics.

Communication

  • How often and when will you check in? What should they come to you for? What modalities will you use and when?

Roadblocks

  • Involve your team in deciding how to handle roadblocks and challenges.

Speaker’s Notes:

Clear expectations are important in any environment, remote or not. But it is much harder to do in a remote environment. The barrier to seeking clarification is so much higher (For example, email vs. catching someone in hallway, or you can’t notice that a colleague is struggling without them asking).

Communication – This is one area where the importance actually changes in a remote context. We’ve been talking about a lot of practices that are the same in importance whether you’re in an office or remote, and maybe you just enact them differently. But clarity around communication processes is actually tremendously more important in a remote environment.

Adopt a five-step process to set specific and documented expectations

  1. Check in with how your team member is doing on a daily basis. Don’t forget to ask how they are doing personally.
  2. Follow up on previously set expectations. Ask how things are going. Discuss if priorities or expectations have changed and update expectations accordingly.
  3. Ask if they are experiencing any roadblocks and collaborate to find solutions.
  4. Provide feedback and recognition as appropriate.
  5. Document newly set expectations – either through a collaboration tool or through email.

Speaker’s Notes:

Suggested best practices: Hold daily team check-ins and hold separate individual check-ins. Increase frequency of these.

During Check-in
  1. Set up a running Teams chat for your team.
  • This is your community. You must be the biggest cheerleader and keep the team feeling like they are contributing. Make sure everyone is involved.
  • Start each workday with a video scrum to discuss what’s coming today for your team.
    • Ask: What are you planning to work on today? Are there any roadblocks I can help with? Technology working OK?
  • Right after your team meeting, set up an “every morning video call” one-on-one meeting with each team member (5-10 minutes max).
    • Ask: What are you working on today? What will your momentum metrics be? What do you need from me?
  • Set up a separate video call at the end of the afternoon to review what everyone did (5 minutes max).
    • Ask: What went well? What went poorly? How can we improve?
  • After a Check-in
    1. Be accessible:
      • Ensure your team knows the best way to get in touch with you.
      • Email is not ideal for informal, frequent contact – use messaging instead.
    2. Be available:
      • Keep a running conversation going in Teams.
      • Respond in a timely manner; address issues quickly so that your team has what they need to succeed.
      • Let your team know if you’ll be away/offline for longer than an hour during the workday and ask them to do the same (e.g. for an appointment).
      • Help address roadblocks, answer questions, clarify priorities, etc.

    Define communication requirements

    • Set up an ongoing communication with your team.
      • E.g. a running conversation on Slack or Teams
    • Schedule daily virtual meetings and check-ins.
      • This can help to maintain a sense of normalcy and conduct a pulse check on your team.
    • Use video for important conversations.
      • Video chat creates better rapport, shows body language, and lessens feelings of isolation, but it can be taxing.
    • Set expectations about communication.
      • Differentiate between day-to-day communication and updates on the state of events.
    • Clearly communicate the collaboration toolkit.
      • What do we have available? What is the purpose of each?

    Speaker’s Notes:

    With organizational expectations set, we need to establish team expectations around how we collaborate and communicate.

    Today there is no lack of technology available to support our virtual communication. We can use the phone, conference calls, videoconferencing, Skype, instant messaging, [insert organization-specific technological tools.], etc.

    However, it is important to have a common understanding of which tools are most appropriate when and for what.

    What are some of the communication channel techniques you’ve found useful in your informal interactions with employees or that you’ve seen work well between employees?

    [Have participants share any technological tools they find useful and why.]

    Check in with your team on communication requirements

    • Should we share our calendars, hours of availability, and/or IM status?
    • How often should we meet as a team and one on one? Should we institute a time when we should not communicate virtually?
    • Which communication channel should we use in what context? How should we decide which communication method to use?
    • Should I share guidelines for email and meeting etiquette (or any other communication methods)?
    • Should we establish a new team charter?
    • What feedback does the team have regarding how we’ve been communicating?

    Speaker’s Notes:

    Whenever we interact, we make the following kinds of social exchanges. We exchange:

    • Information: Data or opinions
    • Emotions: Feelings and evaluations about the data or opinions
    • Motivations: What we feel like doing in response to data or opinions

    We need to make sure that these exchanges are happening as each team member intends. To do this, we have to be sensitive to what information is being conveyed, what emotions are involved in the interaction, and how we are motivating each other to act through the interaction. Every interaction will have intended and unintended effects on others. No one can pay attention to all of these aspects of communication all the time, but if we develop habits that are conducive to successful exchanges in all three areas, we can become more effective.

    In addition to being mindful of the exchange in our communication, as managers it is critical to build trusting relationships and rapport with employees as we saw in the 3i's model. However, in virtual teams we cannot rely on running into someone in the kitchen or hallway to have an informal conversation. We need to be thoughtful and deliberate in our interactions with employees. We need to find alternative ways to build these relationships with and between employees that are both easy and accepted by ourselves and employees. Because of that, it is important to set communication norms and really understand each other’s preferences. For example:

    • Timing of responses. Set the expectation that emails should be responded to within X hours/days unless otherwise noted in the actual email.
    • When it’s appropriate to send an email vs. using instant messaging.
    • A team charter – the team’s objectives, individual roles and responsibilities, and communication and collaboration guidelines.

    1.4 Identify and share ways you prefer to communicate for different activities

    20 Minutes

    1. Brainstorm and list the different types of exchanges you have with your virtual employees and they have with each other.
    2. List the various communication tools in use on your team.
    3. Assign a preferred communication method for each type of exchange

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Current types of exchanges on team
    • Communication methods used

    Output

    • Defined ways to communicate for each communication method

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Effectively Manage Virtual Teams

    Section 2.1
    Balancing wellbeing and performance in a virtual team context

    The pandemic has taken a significant toll on employees’ mental wellbeing

    44% of employees reported declined mental wellbeing since the start of the pandemic.

    • 44% of those who work from home.
    • 34% of those who have other work arrangements (i.e. onsite).
      (Qualtrics, 2020)

    "If one of our colleagues were to fall, break their leg, and get a cast, colleagues would probably rally around that person signing their cast. But, really, we don’t view the health of our brain the same as we do the health of our body."
    – Centre for Addiction and Mental Health (CAMH) Employee

    Speaker’s Notes:

    Despite being over two years into the pandemic, we are still seeing its effect on the physical and mental health of employees.

    The mental health aspect has been often overlooked by organizations, but in order to have a safe, happy, and productive team, you need to give mental health the same level of focus as physical heath. This requires a change in mindset in order for you as a leader to support your team's mental wellbeing during the pandemic and beyond.

    Employees are reporting several key mental wellbeing challenges

    Stress: 67%

    Employees report increasingly high levels of stress from the onset of COVID-19, stating that it has been the most stressful time in their careers.
    (Qualtrics, 2020)

    Anxiety: 57%

    Similarly, employees’ anxiety levels have peaked because of the pandemic and the uncertainty it brings.
    (Qualtrics, 2020)

    Four main themes surrounding stress & anxiety

    • Fear of contracting COVID-19
    • Financial pressures
    • Job security and uncertainty
    • Loneliness caused by social isolation

    Speaker’s Notes:

    The stress and uncertainty about the future caused by the pandemic and its fallout are posing the biggest challenges to employees.

    Organizations shutting down operations, moving to fully remote, or requiring some of their employees to be on site based on the current situation causes a lot of anxiety as employees are not able to plan for what is coming next.

    Adding in the loss of social networks and in-person interactions exacerbates the problem employees are facing. As leaders, it is your job to understand and mitigate these challenges wherever possible.

    Re-examine your workplace barriers to mental wellbeing

    New Barriers

    Old Barriers

    • Childcare/eldercare responsibilities
    • Fear of workplace health risks
    • Work location
    • Lost support networks
    • Changed work schedules
    • Social distancing
    • Workload
    • Fear of stigma
    • Benefits limits
    • Limits to paid time off
    • Lack of manager knowledge

    Key considerations:

    • Work Environment
      • Accessibility of mental wellbeing programs and initiatives
    • Organizational Culture
      • Modeling of wellbeing
      • Paid time off
      • Discussions around mental wellbeing
    • Total Rewards
      • Benefits coverage
      • Employee assistance programs (EAPs)
      • Manager knowledge

    Speaker’s Notes:

    Organizational barriers to mental wellbeing are sadly not new. Workloads, stigma around mental health, lack of sick days, and limits to benefits for mental health supports were challenges before the pandemic. Adding in the new barriers can very easily result in a tipping point for many employees who are simply not equipped to deal with or supported in dealing with the added burden of remote work in a post-pandemic world.

    To provide the needed support to your employees, it’s important to be mindful of the key considerations.

    Holistic employee wellbeing has never been more critical than it is right now

    Employee Wellbeing

    Physical

    The physical body; ensuring a person has the freedom, opportunities, and resources needed to sustainably maintain bodily health.

    Mental

    The psychological ability to cope with information, emotions, desires, and stressors (e.g. change, threats, etc.) in a healthy and balanced way. Essential for day-to-day living and functioning.

    Social

    The state of personal and professional relationships, including personal and community engagement. The capability for genuine, authentic, and mutually affirming interactions with others.

    Financial

    The state of a person’s finances; ensuring that a person feels capable to handle their financial situation and behaviors. The ability to live productively without the weight of financial stress.

    Speaker’s Notes:

    As a manager, you need to be mindful of all of these. Create an atmosphere where people are able to come to you for help if they are struggling in one of these areas. For example, some people might be more comfortable raising physical safety or comfort concerns (personal protective equipment, ergonomics) than concerns about mental health. Or they might feel like their feelings of loneliness are not appropriate to bring into their professional life.

    Wellbeing is a delicate subject, and most of the time, people are reluctant to talk about it. It requires vulnerability. And here’s the thing about it: Your staff will not drive a change in your team around making these topics more acceptable. It has to be the manager. You have to be the one to not just tell but show them that it’s OK to talk about this

    Encourage human-centered workplace behaviors

    Promote empathy as a focus value

    • Listen and show compassion.
    • Allow room for emotions.

    Encourage social connection

    • Leverage networks.
    • Infuse fun where possible.
    • Encourage community and sense of joint purpose.

    Cultivate a growth mindset

    • Encourage mindfulness and resilience.
    • Express gratitude.

    Empower others

    • Ask employees what they need and co-create solutions.
    • Integrate needs of personal and family life with work life.
    • Be clear on accountability.

    Speaker’s Notes:

    As a leader, your focus should be on encouraging the right behaviors on your team and in yourself.
    Show empathy; allowing room for emotion and showing you are willing and able to listen goes a long way to establishing trust.

    A growth mindset applies to resilience too. A person with a growth mindset is more likely to believe that even though they’re struggling now, they will get through it.

    Infuse fun – schedule social check-ins. This is not wasted time, or time off work – it is an integral part of the workday. We have less of it now organically, so you must bring it back deliberately. Remember that theme? We are deliberately reinfusing important organic elements into the workday.

    The last item, empowerment, is interesting – being clear on accountability. Have clear performance expectations. It might sound like telling people what to do would be disempowering, but it’s the opposite. By clarifying the goals of what they need to achieve, you empower them to invent their own “how,” because you and they are both sure they will arrive at the place that you agreed on. We will talk more about this in performance management.

    Emphasize the importance of wellbeing by setting the tone for the team

    Managers must…

    • LEAD BY EXAMPLE
      • Employees look to their managers for cues about how to react in a crisis. If the manager reacts with stress and fear, the team will follow.
    • ENCOURAGE OPEN COMMUNICATION
      • Frequent check-ins and transparent communication are essential during a time of crisis, especially when working remotely.
    • ACKNOWLEDGE THE SITUATION
      • Recognizing the stress that teams may be facing and expressing confidence in them goes a long way.
    • PROMOTE WELLBEING
      • Managers who take care of themselves can better support their teams and encourage them to practice good self-care too.
    • REDUCE STIGMA
      • Reducing stigma around mental health encourages people to come forward with their struggles and get the support they need.

    Speaker’s Notes:

    Emphasize the importance of wellbeing with what you do. If you do not model self-care behavior, people will follow what you do, not what you say.

    Lead by example – Live the behaviors you want to see in your employees. If you show confidence, positivity, and resiliency, it will filter down to your team.

    Encourage open communication – Have regular meetings where your team is able to set the agenda, or allow one-on-ones to be guided by the employee. Make sure these are scheduled and keep them a priority.

    Acknowledge the situation – Pretending things are normal doesn’t help the situation. Talk about the stress that the team is facing and express confidence that you will get through it together.

    Promote wellbeing – Take time off, don’t work when you’re sick, and you will be better able to support your team!

    Reduce stigma – Call it out when you see it and be sure to remind people of and provide access to any supports that the organization has.

    Conduct dedicated conversations around wellbeing

    1. Check in with how each team member is doing frequently and ask how they are doing personally.
    2. Discuss how things are going. Ask: “How is your work situation working out for you so far? Do you feel supported? How are you taking care of yourself in these circumstances?”
    3. Ask if there are any stressors or roadblocks that they have experienced and collaborate to find solutions.
    4. Provide reassurance of your support and confidence in them.
    5. Document the plan for managing stressors and roadblocks – either through a collaboration tool or through email.

    Speaker’s Notes:

    Going back to the idea of a growth mindset – this may be uncomfortable for you as a manager. So here’s a step-by-step guide that over time you can morph into your own style.

    With your team – be prepared to share first and to show it is OK to be vulnerable and address wellbeing seriously.

    1. Make sure you make time for the personal. Ask about their lives and show compassion.
    2. Give opportunities for them to bring up things that might stay hidden otherwise. Ask questions that show you care.
    3. Help identify areas they are struggling with and work with them to move past those areas.
    4. Make sure they feel supported in what they are going through and reassured of their place on the team.
    5. Roll wellbeing into your planning process. This signals to team that you see wellbeing as important, not just a checklist to cover during a team meeting, and are ready to follow through on it.

    Recognize when professional help is needed

    SIGNS OF BURNOUT: Overwhelmed; Frequent personal disclosure; Trouble sleeping and focusing; Frequent time off; Strained relationships; Substance abuse; Poor work performance

    Speaker’s Notes:

    As a leader, it is important to be on the lookout for warning signs of burnout and know when to step in and direct individuals to professional help.

    Poor work performance – They struggle to maintain work performance, even after you’ve worked with them to create coping strategies.

    Overwhelmed – They repeatedly tell you that they feel overwhelmed, very stressed, or physically unwell.

    Frequent personal disclosure – They want to discuss their personal struggles at length on a regular basis.

    Trouble sleeping and focusing – They tell you that they are not sleeping properly and are unable to focus on work.

    Frequent time off – They feel the need to take time off more frequently.

    Strained relationships – They have difficulty communicating effectively with coworkers; relationships are strained.

    Substance abuse – They show signs of substance abuse (e.g. drunk/high while working, social media posts about drinking during the day).

    Keeping an eye out for these signs and being able to step in before they become unmanageable can mean the difference between keeping and losing an employee experiencing burnout.

    Remember: Managers also need support

    • Added burden
    • Lead by example
    • Self-care

    Speaker’s Notes:

    If you’ve got managers under you, be mindful of their unique stressors. Don’t forget to check in with them, too.

    If you are a manager, remember to take care of yourself and check in with your own manager about your own wellbeing.

    2.1 Balance wellbeing and performance in a virtual team context

    30 Minutes

    1. Brainstorm and list current practices and challenges connected to wellbeing on your teams.
    2. Choose one or two wellbeing challenges that are most relevant for your team.
    3. Discuss as a group and identify one solution for each challenge that you can put into action with your own virtual team. Document this under “Action plan to move forward” on the workbook slide “2.1 Balancing wellbeing and performance in a virtual team context.”

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Current practices and challenges connected to wellbeing

    Output

    • Action plan for each challenge listed

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Effectively Manage Virtual Teams

    Section 2.2

    Managing performance in a virtual team context

    Virtual employees are craving more meaningful interactions with their managers

    A survey indicated that, overall, remote employees showed less satisfaction with manager interactions compared to other non-remote employees.

    1. 16% less likely to strongly agree their manager involves them in setting goals at work.
    2. 28% less likely to strongly agree they continually work with their manager to clarify work priorities.
    3. 29% less likely to strongly agree they have reviewed their greatest successes with their manager in the last six months.
    4. 30% less likely to strongly agree they have talked with their manager about progress toward goals in the last six months.

    Speaker’s Notes:

    In many cases, we have put people into virtual roles because they are self-directed and self-motivated workers who can thrive with the kind of autonomy and flexibility that comes with virtual work. As managers, we should expect many of these workers to be proactively interested in how they are performing and in developing their careers.

    It would be a mistake to take a hands-off approach when managing virtual workers. A recent survey indicated that, overall, remote employees showed less satisfaction with manager interactions compared to other non-remote employees. It was also one of the aspects of their work experience they were least satisfied with overall (Gallup, State of the American Workplace, 2017). Simply put, virtual employees are craving more meaningful conversations with their managers.

    While conversations about performance and development are important for all employees (virtual or non-virtual), managers of remote teams can have a significant positive impact on their virtual employees’ experience and engagement at work by making efforts to improve their involvement and support in these areas.

    During this module we will work together to identify ways that each of us can improve how we manage the performance of our virtual employees. At the end of the module everyone will create an action plan that they can put in place with their own teams. In the next module, we go through a similar set of activities to create an action plan for our interactions with employees about their development.

    Building blocks of performance management

    • Goal Setting

    • Setting Expectations

    • Measuring Progress

    • Feedback & Coaching

    Speaker’s Notes:

    [Include a visualization of your existing performance management process in the slide. Walk the participants through the process to remind them of what is expected. While the managers participating in the training should know this, there may be different understandings of it, or it might just be the case that it’s been a while since people looked at the official process. The intention here is merely to ensure everyone is on the same page for the purposes of the activities that follow.]

    Now that we’ve reviewed performance management at a high level, let’s dive into what is currently happening with the performance management of virtual teams.

    I know that you have some fairly extensive material at your organization around how to manage performance. This is fantastic. And we’re going to focus mainly on how things change in a virtual context.

    When measuring progress, how do you as a manager make sure that you are comfortable not seeing your team physically at their desks? This is the biggest challenge for remote managers.

    2.2 Share current performance management practices for virtual teams

    30 Minutes

    1. Brainstorm and list current high-level performance management practices connected to each building block. Record in your workbook.
    2. Discuss current challenges connected to implementing the building blocks with virtual employees.

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Current performance management practices
    • Challenges surrounding performance management

    Output

    • Current state of virtual performance management defined

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Communicate the “why”: Cascade organizational goals

    This image depicts the Cascade of Why- organizational goals. Organizational Mission; Organizational Values; Organizational Goals; Department Goals; Team Goals; Individual Goals

    Speaker’s Notes:

    When assisting your employees with their goals, think about the organization’s overall mission and goals to help you determine team and individual goals.

    • Organizational goals: Employee goals should align with organizational goals. Goals may cascade down through the organization.
    • Department or team goals: Create a clear strategy based on high-level goals for the year so employees can link short-term goals to the larger picture.
    • Individual goals: Employees should draw on their individual development plan to help set performance goals.

    Sometimes it’s difficult to get employees thinking about goals and they need assistance from managers. It’s also important to be clear on team goals to help guide employees in setting individual ones.

    The basic idea is to show people how their individual day-to-day work contributes to the overall success of the organization. It gives them a sense of purpose and a rationale, which translates to motivation. And also helps them problem solve with more autonomy.

    You’re giving people a sense of the importance of their own contribution.

    How to set clear expectations for job performance

    Ensure employees have a clear understanding of what’s expected for their role:

    1. Review their metrics so they understand how they’re being evaluated.
    2. Outline daily, weekly, monthly, and quarterly goals.
    3. If needed, help them plan when and how each part of their job should be done and what to prioritize.
    4. Ask them to come to you early if they experience a roadblock so that you can help rather than having them flounder on their own.
    5. Document instances where employees aren’t meeting role or performance expectations.

    Speaker’s Notes:

    Tailor performance goals to address any root causes of poor performance.

    For example:

    • If personal factors are getting in the way, work with the employee (and HR if necessary) to create a strategy to address any impediments to performing in the role.

    Tips for managing performance remotely

    • Reflect on one key question: What needs to happen for my direct reports to continue their work while working remotely?
    • Manage for results – not employee visibility at the office.
    • Use metrics to measure performance. If you don’t have any, define tasks and deliverables as clearly as possible and conduct regular check-ins.
    • Work with the employee to set goals and metrics to measure progress.

    Focus on results: Be flexible about how and when work gets done, as long as team members are hitting their targets.

    • For example, if they have childcare duties from 3 to 5pm during school closures and want to work later in the evening to make up the time, that’s fine – as long as the work gets done.
    • Set clear expectations about which work must be done during normal work hours (e.g. attend team meetings, client calls) and which can be done at other hours.
    • Team members must arrange with you any nonstandard working hours before they start using an altered schedule. It is your responsibility to keep track of hours and any alternate arrangements.
    • Don’t make team members feel constantly monitored (i.e. “Where were you from 10 to 11am?”); trust them until you have reason not to.

    Encourage your team members to unplug: If they’re sending you emails late at night and they haven’t made an alternate work hours agreement with you, encourage them to take time away from work.

    • It’s harder to unplug when working at home, and everyone needs a break to stay productive.

    Avoid micromanagement with holistic performance measures

    Quality

    How well tasks are accomplished

    Behavior

    Related to specific employee actions, skills, or attitudes

    Quantity

    How much work gets done

    Holistic measures demonstrate all the components required for optimal performance. This is the biggest driver in having comfort as a manager of a remote team and avoiding micromanagement. Typically these are set at the organizational level. You may need to adjust for individual roles, etc.

    Speaker's Notes:

    Metrics come in different types. One way to ensure your metrics capture the full picture is to use a mix of different kinds of metrics.

    Some metrics are quantitative: they describe quantifiable or numerical aspects of the goal. This includes timeliness. On the other hand, qualitative metrics have to do with the final outcome or product. And behavioral metrics have to do with employees' actions, skills, or attitudes. Using different kinds of metrics together helps you set holistic measures, which capture all the components of optimal performance toward your goal and prevent gaming the system.

    Let's take an example:

    A courier might have an objective to do a good job delivering packages. An example of a quantitative measure might be that the courier is required to deliver X number of packages per day on time. The accompanying metrics would be the number of packages delivered per day and the ratio of packages delivered on time vs. late.

    Can you see a problem if we use only these quantitative measures to evaluate the courier's performance?

    Wait to see if anyone volunteers an answer. Discuss suggestions.

    That's right, if the courier's only goal is to deliver more packages, they might start to rush, may ruin the packages, and may offer poor customer service. We can help to guard against this by implementing qualitative and behavioral measures as well. For example, a qualitative measure might be that the courier is required to deliver the packages in mint condition. And the metric would be the number of customer complaints about damaged packages or ratings on a satisfaction survey related to package condition.

    For the behavioral aspect, the courier might be required to provide customer-centric service with a positive attitude. The metrics could be ratings on customer satisfaction surveys related to the courier's demeanor or observations by the manager.

    Managing poor performance virtually: Look for key signs

    It’s crucial to acknowledge that an employee might have an “off week” or need time to balance work and life – things that can be addressed with performance management (PM) techniques. Managers should move into the process for performance improvement when:

    1. Performance fluctuates frequently or significantly.
    2. Performance has dropped for an extended period of time.
    3. Expectations are consistently not being met.

    Key signs to look for:

    • PM data/performance-related assessments
    • Continual absences
    • Decreased quality or quantity of output
    • Frequent excuses (e.g. repeated internet outages)
    • Lack of effort or follow-through
    • Missed deadlines
    • Poor communication or lack of responsiveness
    • Failure to improve

    Speaker’s notes:

    • Let’s talk more about identifying low performance.
    • Everybody has off days or weeks. And what if they are new to the role or new to working remotely? Their performance may be low because they need time to adjust. These sort of situations should be managed, but they don’t require moving into the process for performance improvement.
    • When managing employees who are remote or working in a hybrid situation, it is important to be alert to these signs and check in with your employees on a regular basis. Aim to identify and work with employees on addressing performance issues as they arise rather than waiting until it’s too late. Depending on your availability, the needs of the employee, and the complexity of their role, check-ins could occur daily, weekly, and/or monthly. As I mentioned, for remote employees, it’s often better to check-in more frequently but for a shorter period of time.
    • You want to be present in their work life and available to help them manage through roadblocks and stay on track, but try to avoid over-monitoring employees. Micromanaging can impact the manager-employee relationship and lead to the employee feeling that there is a lack of trust. Remember, the employee needs to be responsible for their own performance and improvement.
    • Check-ins should not just be about the work either. Take some time to check in personally. This is particularly important when managing remotely. It enables you to build a personal relationship with the employee and also keeps you aware if there are other personal issues at play that are impacting their work.
    • So, how do you know what does require performance improvement? There are three key things that you should look for that are clear signals that performance improvement is necessary:
      1. Their performance is fluctuating frequently or significantly.
      2. Their performance has dropped for an extended period of time.
      3. Expectations are consistently not being met.
    • What do you think are some key signs to look for that indicate a performance issue is occurring?

    Managing poor performance virtually: Conducting remote performance conversations

    Video calling

    Always use video calls instead of phone calls when possible so that you don’t lose physical cues and body language.

    Meeting invitations

    Adding HR/your leader to a meeting invite about performance may cause undue stress. Think through who needs to participate and whether they need to be included in the invite itself.

    Communication

    Ensure there are no misunderstandings by setting context for each discussion and having the employee reiterate the takeaways back to you.

    Focus on behavior

    Don’t assume the intent behind the behavior(s) being discussed. Instead, just focus on the behavior itself.

    Policies

    Be sure to adhere to any relevant HR policies and support systems. Working with HR throughout the process will ensure none are overlooked.

    Speaker’s notes:

    There are a few best practices you should follow when having performance conversations:

    • First, if you are in a different work environment than your employee, always use video calls instead of phone calls whenever possible so that you don’t miss out on physical cues and body language. If videoconferencing isn’t the norm, encourage them to turn on their video. Be empathic that it can feel awkward but explain the benefits, and you will both have an easier time communicating and understanding each other.
    • As I’ve mentioned, be considerate of the environment they are in. If they are in the office and you are working remotely, be sure to book a private meeting room for them to go to for the conversation. If they are working from home, be sure to check that they are prepared and able to focus on the conversation.
    • Next, carefully consider who you are adding to the meeting invite and whether it’s necessary for them to be there. Adding HR or your leader to a meeting invite may cause undue stress for the employee.
    • Consider the timing of the invite. Don’t send it out weeks in advance. When a performance problem exists, you’ll want to address it as soon as possible. A day or two of notice would be an ideal approach because it gives them a heads up but will not cause them extended stress or worrying.
    • Be considerate about the timing of the meeting and what else they may have scheduled. For example, a Friday afternoon before they are heading off on vacation or right before they are leading an important client call would not be appropriate timing.
    • As we just mentioned clear communication is critical. Ensure there are no misunderstandings by setting context for each discussion and having the employee reiterate takeaways back to you.
    • Focus on the behavior and don’t assume their intent. It can be tempting to say, “I know you didn’t mean to miss the deadline,” but you don’t know what they intended. Often people are not aware of the impact their behavior can have on others.
    • Lastly, be sure to adhere to any relevant HR policies and support systems. Working with HR throughout the process will ensure nothing is overlooked.

    2.3 Identify challenges of current practices and propose solutions

    30 Minutes

    1. Select one or two challenges from the previous activity.
    2. Identify one solution for each challenge that you can put into action with your own virtual team. Document in the workbook.

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Current performance management practices
    • Challenges surrounding performance management

    Output

    • Action plan to move forward

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Effectively Manage Virtual Teams

    Optional Section

    Employee development in a virtual team setting

    There are three main development approaches for both colocated and virtual employees

    Formal Training; Relational Learning; Experimental Learning

    Speaker’s Notes:

    As we have seen, our virtual employees crave more meaningful interactions with their managers. In addition to performance conversations, managers should also be having regular discussions with their employees about their employee development plans. One key component of these discussions is career planning. Whether you are thinking shorter term – how to become better at their current role – or longer term – how to advance beyond their current role – discussions about employee development are a great way to engage employees. Employees are ultimately responsible for creating and executing their own development plans, but managers are responsible for making sure that employees have thought through these plans and helping employees identify opportunities for executing those plans.

    To help us think about our own employee development practices, identify challenges they pose when working with virtual employees, and create solutions to these challenges, it is useful to think about employee development opportunities according to three types:

    1. The first kind of development opportunity is formal training. Formal training is organized and has a clearly defined curriculum and desired outcome. It usually takes the form of a group training session (like this one) or training videos or materials that employees can watch individually and on their own time. These opportunities usually end with a test or assignment that can be used to evaluate the degree to which the participant achieved the desired learning outcomes.
    2. The second kind of development opportunity is relational learning. Perhaps the most common form of this type of learning is coaching or mentoring. By establishing a long-term work relationship, checking in with employees about their daily work and development goals, and sharing their own experiences and knowledge, mentors help employees reflect and draw out learning from everyday, on-the-job development activities. Other examples include a peer support group or communities of practice. In these group settings peers share best practices and work together to overcome challenges.
    3. The third kind of development opportunity is experiential learning. This kind of opportunity provides employees the chance to work on real work problems, and the output of the development work can directly benefit the organization. Most people learn best by doing. On-the-job experiences that are challenging or new can force people to use and develop new skills and knowledge based on what worked effectively and what failed. Examples of experiential learning are on-the-job learning for new hires, stretch assignments, or special projects that take the employee beyond their daily routine and allow them to try new activities and develop competencies that they would not have the chance to develop as part of their regular job.

    According to McLean & Company, organizations should use the “70-20-10” rule as a rough guideline when working with employees to create their development plans: 10% of the plan should be dedicated to formal training opportunities, 20% to relational learning, and 70% to experiential learning. Managers should work with employees to identify their performance and career goals, ensure that their development plans are aligned with these goals, and include an appropriate mixture of all three kinds of development opportunities.

    To help identify challenges and solutions, think about how virtual work arrangements will impact the employee’s ability to leverage each type of opportunity at our organization.

    Here are some examples that can help us start thinking about the kinds of challenges virtual employees on our team face:

    Career Planning

    • One challenge can be identifying a career path that is consistent with working virtually. If switching from a virtual arrangement to an onsite arrangement is not a viable option for an employee, some career paths may not feasibly be open to them (at least as the company is currently organized). For example, if an employee would eventually like to be promoted to a senior leadership role in their business function but all senior leaders are required to work onsite at corporate headquarters, the employee will need to consider whether such a move is possible for them. In some cases employees may be willing to do this, but in others they may not. The important thing is to have these conversations with virtual employees and avoid the assumption that all career paths can be done virtually, since that might not be the case

    Formal Training

    • This is probably the least problematic form of employee development for virtual employees. In many cases this kind of training is scheduled well in advance, so virtual employees may be able to join non-virtual employees in person for some group training. When this is not possible (due to distance, budget, or time zone), many forms of group training can be recorded and watched by virtual employees later. Training videos and training materials can also easily be shared with virtual employees using existing collaboration software.

    Relational Learning

    • One major challenge here is developing a mentoring relationship virtually. As we discussed in the module on performance management, developing relationships virtually can be challenging because people cannot rely upon the kind of informal and spontaneous interactions that occur when people are located in the same office. Mentors and mentees will have to put in more effort and planning to get to know each other and they will have to schedule frequent check-ins so that employees can reflect upon their progress and experience (with the help of their mentors) more often.
    • Time zones and technology may pose potential barriers for certain candidates to be mentors. In some cases, employees that are best qualified to be mentors may not be as comfortable with collaborative software as other mentors or their mentees. If there are large time zone differences, some people who would otherwise be interested in acting as a mentor may be dissuaded. Managers need to take this into consideration if they are connecting employees with mentors or if they are thinking of taking on the mentor role themselves.

    Experiential Learning

    • Virtual employees risk being overlooked for special projects due to the “out of sight, out of mind” bias: When special projects come up, the temptation is to look around the room and see who is the best fit. The problem is, however, that in some cases the highest performers or best fit may not physically be in the room. In these cases it is important for managers to take on an advocate role for their employees and remind other managers that they have good virtual employees on their team that should be included or contacted. It is also important for managers to keep their team informed about these opportunities as often as possible.
    • Sometimes certain projects or certain kinds of work just cannot be done virtually in a company for a variety of reasons. The experiential learning opportunities will not be open to virtual employees. If such opportunities are open to the majority of other workers in this role (potentially putting virtual employees’ career development at a disadvantage relative to their peers), managers should work with their virtual employees to identify alternative experiences. Managers may also want to consider advocating for more or for higher quality experiential learning opportunities at the organization.

    Now that we have considered some general examples of challenges and solutions, let’s look at our own employee development practices and think about the practical steps we can take as managers to improve employee development for our virtual employees.

    Employee development basics

    • Career planning & performance improvement
    • Formal training
    • Relational learning
    • Experiential learning

    Speaker’s Notes:

    [Customize this slide according to your organization’s own policies and processes for employee development. Provide useful images that outline this on the slide, and in these notes describe the processes/policies that are in place. Note: In some cases policies or processes may not be designed with virtual employees or virtual teams in mind. That is okay for the purposes of this training module. In the following activities participants will discuss how they apply these policies and processes with their virtual teams. If your organization is interested in adapting its policies/processes to better support virtual workers, it may be useful to record those conversations to supplement existing policies later.]

    Now that we have considered some general examples of challenges and solutions, let’s look at our own employee development practices and think about the practical steps we can take as managers to improve employee development for our virtual employees.

    2.4 Share current practices for developing employees on a virtual team

    30 Minutes

    1. Brainstorm and list current high-level employee development practices. Record in your workbook.
    2. Discuss current challenges connected to developing virtual employees. Record in your workbook.
    3. Identify one solution for each challenge that you can put into action with your own virtual team.
    4. Discuss as a group.

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Current employee development practices
    • Challenges surrounding employee development

    Output

    • Action plan to move forward

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Refine Action Plans

    2.5 Refine your action plan and commit to implementing it

    30 Minutes

    1. Review your action plans for consistency and overlap. Highlight any parts you may struggle to complete.
    2. Meeting with your group, summarize your plans to each other. Provide feedback and discuss each other’s action plans.
    3. Discuss how you can hold each other accountable.

    Download the Workbook: Equip Managers to Effectively Manage Virtual Teams

    Input

    • Action items from previous activities.

    Output

    • Action plan to move forward

    Materials

    • Workbook: Equip Managers to Effectively Manage Virtual Teams

    Participants

    • All managers with direct reports working virtually

    Summary of Accomplishment

    • We do not need to go out and learn a new set of manager responsibilities to better manage our virtual teams; rather, we have to “dial up” certain responsibilities we already have or adjust certain approaches that we already take.
    • It is important to set clear expectations. While managers are ultimately responsible for making sure expectations are set and are clearly communicated, they are not the only ones with responsibilities. Employees and managers need to work together to overcome the challenges that virtual work involves.
    • Virtual employees crave meaningful interactions with their managers and team. Managers must take charge in fostering an atmosphere of openness around wellbeing and establish effective performance management strategies. By being proactive with our virtual teams’ wellness and mindful of our performance management habits, we can take significant steps toward keeping these employees engaged and productive.
    • Effective management in virtual contexts requires being more deliberate than is typical in non-virtual contexts. By working as a group to identify challenges and propose solutions, we have helped each other create action plans that we can use going forward to continually improve our management practices.

    If you would like additional support, have our analysts guide you through an info-tech workshop or guided implementation.

    Contact your account representative for more information

    workshops@infotech.com

    1-888-670-8889

    Speaker’s Notes:

    First, let’s take a moment to summarize the key things we have learned today:

    1. We do not need to go out and learn a new set of manager competencies to better manage our virtual teams; rather, we have to “dial up” certain competencies we already have or adjust certain approaches that we already take. In many cases we just need to be more aware of the challenges that virtual communication poses and be more planful in our approaches.
    2. It is important to set clear expectations. While managers are ultimately responsible for making sure expectations are set and clearly communicated, they are not the only ones with responsibilities. Employees and managers need to work together to overcome the challenges that virtual work involves. Making sure that teams have meaningful conversations about expectations, come to a shared understanding of them, and record them will create a firm foundation for all other interactions on the virtual team.
    3. Virtual employees crave meaningful interactions with their managers related to performance and employee development. By creating action plans for improving these kinds of interactions with our teams, we can take significant steps toward keeping these employees engaged and productive.
    4. Effective performance management and employee development in virtual contexts require more planfulness than is required in non-virtual contexts. By working as a group to identify challenges and propose solutions, we have helped each other create action plans that we can use going forward to continually improve our management practices.

    Is there anything that anyone has learned that is not on this list and that they would like to share with the group?

    Finally, were there any challenges identified today that were not addressed?

    [Note to facilitator: Take note of any challenges not addressed and commit to getting back to the participants with some suggested solutions.]

    Additional resources

    Manager Training: Lead Through Change

    Train managers to navigate the interpersonal challenges associated with change management and develop their communication and leadership skills. Upload this LMS module into your learning management system to enable online training.

    Manager Training: Build a Better Manager: Manage Your People

    Management skills training is needed, but organizations are struggling to provide training that makes a long-term difference in the skills managers use in their day to day.

    Many training programs are ineffective because they offer the wrong content, deliver it in a way that is not memorable, and are not aligned with the IT department’s business objectives.

    Blueprint: Manage Poor Performance While Working From Home

    Assess and improve remote work performance with our ready-to-use tools.

    Works Cited

    April, Richard. “10 KPIs Every Sales Manager Should Measure in 2019.” HubSpot, 24 June 2019. Web.

    Banerjea, Peter. “5 Powerful Strategies for Managing a Remote Sales Team.” Badger - Maps for field sales, n.d. Web.

    Bibby, Adrianne. “5 Employers’ Awesome Quotes about Work Flexibility.” FlexJobs, 9 January 2017. Web.

    Brogie, Frank. “The 14 KPIs every field sales rep should strive to improve.” Repsly, 2018. Web.

    Dunn, Julie. “5 smart tips for leading field sales teams.” LevelEleven, March 2015. Web.

    Edinger, Scott. “How great sales leaders coach.” Forbes, 2013. Web.

    “Employee Outlook: Employee Views on Working Life.” CIPD, April 2016. Web.

    Hall, Becki. “The 5 biggest challenges facing remote workers (and how to solve them).” interact, 7 July 2017. Web.

    Hofstede, Geert. “National Cultural Dimensions.” Hofstede Insights, 2012. Web.

    “Inventory of U.S. Greenhouse Gas Emissions and Sinks: 1990-2014 (EPA 430-R-16-002).” Environmental Protection Agency (EPA), 15 April 2016.

    “Latest Telecommuting Statistics.” Global Workplace Analytics, June 2021. Web.

    Knight, Rebecca. “How to manage remote direct reports.” Harvard Business Review, 2015. Web.

    “Rewards and Recognition: 5 ways to show remote worker appreciation.” FurstPerson, 2019. Web.

    Palay, Jonathan. "How to build your sales management cadence." CommercialTribe, 22 March 2018. Web.

    “Sales Activity Management Matrix.” Asian Sales Guru, 2019. Web.

    Smith, Simone. “9 Things to Consider When Recognizing Remote Employees.” hppy, 2018. Web.

    “State of Remote Work 2017.” OWL Labs, 2021. Web.

    “State of the American Workplace.” Gallup, 2017. Web.

    “Telework Savings Potential.” Global Workplace Analytics, June 2021. Web.

    “The Future of Jobs Employment Trends.” World Economic Forum, 2016. Web.

    “The other COVID-19 crisis: Mental health.” Qualtrics, 14 April 2020. Web.

    Thompson, Dan. “The straightforward truth about effective sales leadership.” Sales Hacker, 2017. Web.

    Tsipursky, Gleb. “Remote Work Can Be Better for Innovation Than In-Person Meetings.” Scientific American, 14 Oct. 2021. Web.

    Walsh, Kim. “New sales manager? Follow this guide to crush your first quarter.” HubSpot, May 2019. Web.

    “What Leaders Need to Know about Remote Workers: Surprising Differences in Workplace Happiness and Relationships.” TINYpulse, 2016.

    Zenger, Jack, and Joe Folkman. “Feedback: The Leadership Conundrum.” Talent Quarterly: The Feedback Issue, 2015.

    Contributors

    Anonymous CAMH Employee

    Release management

    • Buy Link or Shortcode: {j2store}9|cart{/j2store}
    • Related Products: {j2store}9|crosssells{/j2store}
    • Up-Sell: {j2store}9|upsells{/j2store}
    • member rating overall impact: 10.0/10
    • member rating average dollars saved: $35,731
    • member rating average days saved: 20
    • Parent Category Name: Infra and Operations
    • Parent Category Link: /infra-and-operations
    Today's world requires frequent and fast deployments. Stay in control with release management.

    Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind

    • Buy Link or Shortcode: {j2store}416|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $38,999 Average $ Saved
    • member rating average days saved: 17 Average Days Saved
    • Parent Category Name: DR and Business Continuity
    • Parent Category Link: /business-continuity
    • Writing SOPs is the last thing most people want to do, so the work gets pushed down the priority list and the documents become dated.
    • Most organizations know it is good practice to have SOPs as it improves consistency, facilitates process improvement, and contributes to efficient operations.
    • Though the benefits are understood, many organizations don't have SOPs and those that do don't maintain them.

    Our Advice

    Critical Insight

    • Create visual documents, not dense SOP manuals.
    • Start with high-impact SOPs, and identify the most critical undocumented SOPs and address them first.
    • Integrate SOP creation into project requirements and create SOP approval steps to ensure documentation is reviewed and completed in a timely fashion.

    Impact and Result

    • Create visual documents that can be scanned. Flowcharts, checklists, and diagrams are quicker to create, take less time to update, and are ultimately more usable than a dense manual.
    • Use simple but effective document management practices.
    • Make SOPs part of your project deliverables rather than an afterthought. That includes checking documentation status as part of your change management process.

    Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind – Make SOPs work for you with visual documents that are easier to create and more effective for process management and optimization.

    Learn best practices for creating, maintaining, publishing, and managing effective SOP documentation.

    • Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind – Phases 1-3

    2. Standard Operating Procedures Workbook and Document Management Checklist – Prioritize, optimize, and document critical SOPs.

    Identify required documentation and prioritize them according to urgency and impact.

    • Standard Operating Procedures Workbook
    • Document Management Checklist

    3. Process Templates and Examples – Review and assess templates to find samples that are fit for purpose.

    Review the wide variety of samples to see what works best for your needs.

    • Standard Operating Procedures Project Roadmap Tool
    • System Recovery Procedures Template
    • Application Development Process – AppDev Example (Visio)
    • Application Development Process – AppDev Example (PDF)
    • Network Backup for Atlanta Data Center – Backups Example
    • DRP Recovery Workflow Template (PDF)
    • DRP Recovery Workflow Template (Visio)
    • Employee Termination Process Checklist – IT Security Example
    • Sales Process for New Clients – Sales Example (Visio)
    • Sales Process for New Clients – Sales Example (PDF)
    • Incident and Service Management Procedures – Service Desk Example (Visio)
    • Incident and Service Management Procedures – Service Desk Example (PDF)
    [infographic]

    Further reading

    Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind

    Change your focus from satisfying auditors to driving process optimization, consistent IT operations, and effective knowledge transfer.

    Project Outline

    Two flowcharts are depicted. The first is labelled 'Executive Brief' and the second is labelled 'Tools and Templates Roadmap'. Both outline the following project.

    ANALYST PERSPECTIVE

    Do your SOPs drive process optimization?

    "Most organizations struggle to document and maintain SOPs as required, leading to process inconsistencies and inefficiencies. These breakdowns directly impact the performance of IT operations. Effective SOPs streamline training and knowledge transfer, improve transparency and compliance, enable automation, and ultimately decrease costs as processes improve and expensive breakdowns are avoided. Documenting SOPs is not just good practice; it directly impacts IT efficiency and your bottom line."

    Frank Trovato, Senior Manager, Infrastructure Research Info-Tech Research Group

    Our understanding of the problem

    This Research Is Designed For:

    • IT Process Owners
    • IT Infrastructure Managers
    • IT Service Managers
    • System Administrators
    • And more…

    This Research Will Help You:

    • Identify, prioritize, and document SOPs for critical business processes.
    • Discover opportunities for overall process optimization by documenting SOPs.
    • Develop documentation best practices that support ongoing maintenance and review.

    This Research Will Also Assist:

    • CTOs
    • Business unit leaders

    This Research Will Help Them:

    • Understand the need for and value of documenting SOPs in a usable format.
    • Help set expectations around documentation best practices.
    • Extend IT best practices to other parts of the business.

    Executive summary

    Situation

    • Most organizations know it is good practice to have SOPs as it improves consistency, facilitates process improvement, and contributes to efficient operations.
    • Though the benefits are understood, many organizations don't have SOPs and those that do don't maintain them.

    Complication

    • Writing SOPs is the last thing most people want to do, so the work gets pushed down the priority list and the documents become dated.
    • Promoting the use of SOPs can also face staff resistance as the documentation is seen as time consuming to develop and maintain, too convoluted to be useful, and generally out of date.

    Resolution

    • Overcome staff resistance while implementing a sustainable SOP documentation approach by doing the following:
      • Create visual documents that can be scanned. Flowcharts, checklists, and diagrams are quicker to create, take less time to update, and are ultimately more usable than a dense manual.
      • Use simple, but effective document management practices.
      • Make SOPs part of your project deliverables rather than an afterthought. That includes checking documentation status as part of your change management process.
    • Extend these principles to other areas of IT and business processes. The survey data and examples in this report include application development and business processes as well as IT operations.

    Info-Tech Insight

    1. Create visual documents, not dense SOP manuals.
    2. Start with high-impact SOPs. Identify the most critical undocumented SOPs and document them first.
    3. Integrate SOP creation into project requirements and create SOP approval steps to ensure documentation is reviewed and completed in a timely fashion.

    Most organizations struggle to create and maintain SOP documents, especially in North America, despite the benefits

    North American companies are traditionally more technology focused than process focused, and that is reflected in the approach to documenting SOPs.

    • An ad hoc approach to SOPs almost certainly means documents will be out of date and ineffective. The same is also true when updating SOPs as part of periodic concerted efforts to prepare for an audit, annual review, or certification process, and this makes the task more imposing.
    • Incorporating SOP updates as part of regular change management processes ensures documents are up to date and usable. This can also make reviews and audits much more manageable.

    'It isn’t unusual for us to see infrastructure or operations documentation that is wildly out of date. We’re talking months, even years. Often it was produced as one big effort and then not reliably maintained.'

    – Gary Patterson, Consultant, Quorum Resources

    Organizations are most likely to update documents on an ad hoc basis or via periodic formal reviews. Less than 25% keep SOPs updated as needed.

    Graph depicting North America versus Asia and Europe practices of document updates

    Source: Info-Tech Research Group; N=104

    Document SOPs to improve knowledge transfer, optimize processes, and ultimately save money

    Benefits of documented SOPs Impact of undocumented/undefined SOPs
    Improved training and knowledge transfer: Routine tasks can be delegated to junior staff (freeing senior staff to work on higher priority tasks). Without documented SOPs: Tasks will be difficult to delegate, key staff become a bottleneck, knowledge transfer is inconsistent, and there is a longer onboarding process for new staff.
    IT automation, process optimization, and consistent operations: Defining, documenting, and then optimizing processes enables IT automation to be built on sound processes, so consistent positive results can be achieved. Without documented SOPs: IT automation built on poorly defined, unoptimized processes leads to inconsistent results.
    Compliance: Compliance audits are more manageable because the documentation is already in place. Without documented SOPs: Documenting SOPs to prepare for an audit becomes a major time-intensive project.
    Transparency: Visually documented processes answer the common business question of “why does that take so long?” Without documented SOPs: Other areas of the organization may not understand how IT operates, which can lead to confusion and unrealistic expectations.
    Cost savings: Work can be assigned to the lowest level of support cost, IT operations achieve greater efficiency, and expensive breakdowns are avoided. Without documented SOPs: Work may be distributed uneconomically, money may be wasted through inefficient processes, and the organization is vulnerable to costly disruptions.

    COBIT, ISO, and ITIL aren’t a complete solution

    "Being ITIL and ISO compliant hasn’t solved our documentation problem. We’re still struggling."

    – Vendor Relationship Manager, Financial Services Industry

    • Adopting a framework such as ITIL, COBIT, or ISO doesn’t always mean that SOP documents are accurate, effective, or up to date.
    • Although these frameworks emphasize the importance of documenting processes, they tend to focus more on process development and requirements than on actual documentation. In other words, they deal more with what needs to be done than with how to do it.
    • This research will focus more on the documentation process itself – so how to go about creating, updating, optimizing, managing, and distributing SOP documents.

    Inadequate SOPs lead to major data loss and over $99,000 in recovery costs

    CASE STUDY 1

    Company A mid-sized US organization with over 1,000 employees

    Source Info-Tech Interview

    Situation

    • IT supports storage nodes replicated across two data centers. SOPs for backup procedures did not include an escalation procedure for failed backups or a step to communicate successful backups. Management was not aware of the issue and therefore could not address it before a failure occurred.

    Incident

    • Primary storage had a catastrophic failure, and that put pressure on the secondary storage, which then also failed. All active storage failed and the data corrupted. Daily backups were failing due to lack of disk space on the backup device. The organization had to resort to monthly tape backups.

    Impact

    • Lost 1 month of data (had to go back to the last tape backup).
    • Recovery also took much longer because recovery procedures were also not documented.
    • Key steps such as notifying impacted customers were overlooked. Customers were left unhappy not only with the outage and data loss but also the lack of communication.
    Hard dollar recovery costs
    Backup specialist (vendor) to assist with restoring data from tape $12,000
    Temps to re-enter 1 month of data $5,000
    Weekend OT for 4 people (approximately 24 hours per person) $5,538
    Productivity cost for affected employees for 1 day of downtime $76,923
    Total $99,462

    Intangible costs

    High “goodwill” impact for internal staff and customers.

    "The data loss pointed out a glaring hole in our processes – the lack of an escalation procedure. If I knew backups weren’t being completed, I would have done something about that immediately."

    – Senior Division Manager, Information Technology Division

    IT services company optimizes its SOPs using “Lean” approach

    CASE STUDY 2

    Company Atrion

    SourceInfo-Tech Interview

    Lean and SOPs

    • Standardized work is important to Lean’s philosophy of continuous improvement. SOPs allow for replication of the current best practices and become the baseline standard for member collaboration toward further improvements.
    • For more on Lean’s approach to SOPs, see “Lean Six Sigma Quality Transformation Toolkit (LSSQTT) Tool #17.”

    Atrion’s approach

    • Atrion is focused on documenting high-level processes that improve the client and employee experience or which can be used for training.
    • Cross-functional teams collaborate to document a process and find ways to optimize that SOP.
    • Atrion leverages visual documentation as much as possible: flowcharts, illustrations, video screen captures, etc.

    Outcomes

    • Large increase in usable, up-to-date documentation.
    • Process and efficiency improvements realized and made repeatable.
    • Success has been so significant that Atrion is planning to offer SOP optimization training and support as a service for its clients in the future.

    Atrion

    • Atrion provides IT services, solutions, and leadership to clients in the 250+ user range.
    • After adopting the Lean framework for its organization, it has deliberately focussed on optimizing its documentation.

    When we initiated a formal process efficiency program a little over a year ago and began striving towards a culture of continuous improvement, documenting our SOPs became key. We capture how we do things today and how to make that process more efficient. We call it current state and future state mapping of any process.

    – Michelle Pope, COO, Atrion Networking Corp.

    Strategies to overcome common documentation challenges

    Use Info-Tech’s methodology to streamline the SOP documentation process.

    Common documentation challenges Info-Tech’s methodology
    Where to start. For organizations with very few (if any) documented SOPs, the challenge is where to start. Apply a client focus to prioritize SOPs. Start with mission-critical operations, service management, and disaster recovery.
    Lack of time. Writing SOPs is viewed as an onerous task, and IT staff typically do not like to write documentation or lack the time. Use flowcharts, checklists, and diagrams over traditional dense manuals. Flowcharts, checklists, and diagrams take less time to create and maintain, and the output is far more usable than traditional manuals.
    Inconsistent document management. Documents are unorganized, e.g. hard to find documents, or you don’t know if you have the correct, latest version. Keep it simple. You don’t need a full-time SOP librarian if you stick to a simple, but consistent approach to documentation management. Simple is easier to follow (therefore, be consistent).
    Documentation is not maintained. More urgent tasks displace documentation efforts. There is little real motivation for staff to keep documents current. Ensure accountability at the individual and project level. Incorporate documentation requirements into performance evaluations, project planning, and change control procedures.

    Use this blueprint as a building block to complete these other Info-Tech projects

    Improve IT-Business Alignment Through an Internal SLA

    Understand business requirements, clarify capabilities, and close gaps.

    Standardize the Service Desk – Module 2 & 3

    Improve reporting and management of incidents and build service request workflows.

    Create a Right-Sized Disaster Recovery Plan

    Define appropriate objectives for DR, build a roadmap to close gaps, and document your incident response plan.

    Extend the Service Desk to the Enterprise

    Position IT as an innovator.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Create Visual SOP Documents – project overview

    1. Prioritize, optimize, and document critical SOPs 2. Establish a sustainable documentation process 3. Identify a content management solution
    Best-Practice Toolkit

    1.1 Identify and prioritize undocumented/outdated critical processes

    1.2 Reduce effort and improve usability with visual documentation

    1.3 Optimize and document critical processes

    2.1 Establish guidelines for identifying and organizing SOPs

    2.2 Write an SOP for creating and maintaining SOPs

    2.3 Plan SOP working sessions to put a dent into your documentation backlog

    3.1 Understand the options when it comes to content management solutions

    3.2 Use Info-Tech’s evaluation tool to determine the right approach for you

    Guided Implementations
    • Identify undocumented critical SOPs.
    • Understand the benefits of a visual approach.
    • Work through a tabletop exercise to document two visual SOP documents.
    • Establish documentation information guidelines.
    • Identify opportunities to create a culture that fosters SOP creation.
    • Address outstanding undocumented SOPs by working through process issues together.
    • Review your current approach to content management and discuss possible alternatives.
    • Evaluate options for a content management strategy, in the context of your own environment.
    Onsite Workshop Module 1:

    Identify undocumented critical processes and review the SOP mapping process.

    Module 2:

    Review and improve your documentation process and address your documentation backlog.

    Module 3:

    Evaluate strategies for publishing and managing SOP documentation.

    Phase 1 Outcome:
      Review and implement the process for creating usable SOPs.
    Phase 2 Outcome:
      Optimize your SOP maintenance processes.
    Phase 3 Outcome:
      Choose a content management solution that meets your needs.

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Workshop Prep Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4
    Activities Scope the SOP pilot and secure resources
    • Identify the scope of the pilot project.
    • Develop a list of processes to document.
    • Ensure required resources are available.
    Prioritize SOPs and review methodology

    1.1 Prioritize undocumented SOPs.

    1.2 Review the visual approach to SOP planning.

    1.3 Conduct a tabletop planning exercise.

    Review SOPs and identify process gaps

    2.1 Continue the tabletop planning exercise with other critical processes.

    2.2 Conduct a gap analysis to identify solutions to issues discovered during SOP mapping.

    Identify projects to meet process gaps

    3.1 Develop a prioritized project roadmap to address gaps.

    3.2 Define a process for documenting and maintaining SOPs.

    3.3 Identify and assign actions to improve SOP management and maintenance.

    Set next steps and put a dent in your backlog

    4.1 Run an SOP working session with experts and process owners to put a dent in the documentation backlog.

    4.2 Identify an appropriate content management solution.

    Deliverables
    1. Defined scope for the workshop.
    2. A longlist of key processes.
    1. Undocumented SOPs prioritized according to business criticality and current state.
    2. One or more documented SOPs.
    1. One or more documented SOPs.
    2. Gap analysis.
    1. SOP Project Roadmap.
    2. Publishing and Document Management Solution Evaluation Tool.
    1. Multiple documented SOPs.
    2. Action steps to improve SOP management and maintenance.

    Measured value for Guided Implementations (GIs)

    Engaging in GIs doesn’t just offer valuable project advice, it also results in significant cost savings.

    GI Measured Value
    Phase 1: Prioritize, optimize, and document critical SOPs
    • Time, value, and resources saved using Info-Tech’s methodology to prioritize and document SOPs in the ideal visual format.
    • For example, 4 FTEs*4 days*$80,000/year = $5,120
    Phase 2: Establish a sustainable documentation process
    • Time, value, and resources saved using our tools and methodology to implement a process to ensure SOPs are maintained, accessible, and up to date.
    • For example: 4 FTEs*5 days*$80,000/year = $6,400
    Phase 3: Identify a content management solution
    • Time, value, and resources saved using our best-practice guidance and tools to select an approach and solution to manage your organization’s SOPs.
    • For example: 2 FTEs*5 days*$80,000/year = $3,200
    Total Savings $14,720

    Note: Documenting SOPs provides additional benefits that are more difficult to quantify: reducing the time spent by staff to find or execute processes, improving transparency and accountability, presenting opportunities for automation, etc.

    Phase 1

    Prioritize, Optimize, and Document Critical SOPs

    Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind

    Phase 1 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Prioritize, optimize, and document critical SOPs

    Proposed Time to Completion (in weeks): 2 weeks

    Step 1.1: Prioritize SOPs

    Start with an analyst kick off call:

    • Apply a client focus to critical IT services.
    • Identify undocumented, critical SOPs.

    Then complete these activities…

    • Rank and prioritize your SOP documentation needs.

    With this template:

    Standard Operating Procedures Workbook

    Step 1.2: Develop visual documentation

    Review findings with analyst:

    • Understand the benefits of a visual approach.
    • Review possibilities for visual documentation.

    Then complete these activities…

    • Identify formats that can improve your SOP documentation.

    With these templates:

    • Example DRP Process Flows
    • Example App Dev Process And more…

    Step 1.3: Optimize and document critical processes

    Finalize phase deliverable:

    • Two visual SOP documents, mapped using a tabletop exercise.

    Then complete these activities…

    • Create the visual SOP.
    • Review and optimize the process.

    With this tool:

    SOP Project Roadmap Tool

    Phase 1 Results & Insights:

    Identify opportunities to deploy visual documentation, and follow Info-Tech’s process to capture steps, gaps, and opportunities to improve IT processes.

    Focus first on client-facing and high-impact SOPs

    IT’s number one obligation to internal and external customers is to keep critical services running – that points to mission-critical operations, service management, and disaster recovery.

    Topic Description
    Mission-critical operations
    • Maintenance processes for mission-critical systems (e.g. upgrade procedures, batch processing, etc.).
    • Client-facing services with either formal or informal SLAs.
    • Change management – especially for mission-critical systems, change management is more about minimizing risk of downtime than expediting change.
    Service management
    • Service desk procedures (e.g. ticket assignment and issue response).
    • Escalation procedures for critical outages.
    • System monitoring.
    Disaster recovery procedures
    • Management-level incident response plans, notification procedures, and high-level failover procedures (e.g. which systems must come up first, second, third).
    • Recovery or failover procedures for individual systems.
    • Backup and restore procedures – to ensure backups are available if needed.

    Understand what makes an application or service mission critical

    When email or a shared drive goes down, it may impact productivity, but may not be a significant impact to the business. Ask these questions when assessing whether an application or service is mission critical.

    Criteria Description
    Is there a hard-dollar impact from downtime?
    • For example, when an online catalog system goes down, it impacts sales and therefore revenue. Without determining the actual financial impact, you can make an immediate assessment that this is a Gold system.
    • By contrast, loss of email may impact productivity but may not affect revenue streams, depending on your business. A classification of Silver is most likely appropriate.
    Impact on goodwill/customer trust?
    • If downtime means delays in service delivery or otherwise impacts goodwill, there is an intangible impact on revenue that may make the associated systems Gold status.
    Is regulatory compliance a factor?
    • If a system requires redundancy and/or high availability due to legal or regulatory compliance requirements, it may need to be classified as a Gold system.
    Is there a health or safety risk?
    • For example, police and medical organizations have systems that are mission critical due to their impact on health and safety rather than revenue or cost, and therefore are classified as Gold systems. Are there similar considerations in your organization?

    "Email and other Windows-based applications are important for our day-to-day operations, but they aren’t critical. We can still manufacture and ship clothing without them. However, our manufacturing systems, those are absolutely critical"

    – Bob James, Technical Architect, Carhartt, Inc.

    Create a high-level risk and benefit scale

    1.1a

    15 minutes

    Define criteria for high, medium, and low risks and benefits, as shown in the example below. These criteria will be used in the upcoming exercises to rank SOPs.

    Note: The goal in this section is to provide high-level indicators of which SOPs should be documented first, so a high-level set of criteria is used. To conduct a detailed business impact analysis, see Info-Tech’s Create a Right-Sized Disaster Recovery Plan.

    Materials

    • Whiteboard

    Participants

    • Process Owners
    • SMEs
    Risk to the business Score
    Low: Affects ad hoc activities or non-critical data. 1
    Moderate: Impacts productivity and internal goodwill. 2
    High: Impacts revenue, safety, and external goodwill. 3
    Benefit (e.g. productivity improvement) Score
    Low: Minimal impact. 1
    Moderate: Items with short-term or occasional applicability, so limited benefit. 2
    High: Save time for common or ongoing processes, and extensive improvement to training/knowledge transfer. 3

    Identify and prioritize undocumented mission-critical operations

    1.1b

    15 minutes

    1. To navigate to this exercise, open Info-Tech’s Standard Operating Procedures Workbook.
    2. List your top three–five mission critical applications or services.
    3. Identify relevant SOPs that support those applications or services.
    4. Indicate SOP status: Green = up to date and complete, Yellow = out-of-date or incomplete, Red = undocumented.
    5. Assign risk and benefit scores (3=high, 1=low) to Yellow and Red SOPs based on potential impact if those processes failed (risk) and opportunity for process improvement (benefit).

    OUTPUT

    • Analysis of SOPs supporting mission-critical operations

    Materials

    • Whiteboard

    Participants

    • Process Owners
    • SMEs
    Application SOPs Status Risk Benefit
    Enterprise Resource Planning (ERP)
    • System administration (user administration, adding projects, etc.).
    Red 1 2
    • System upgrades (including OS upgrades and patches).
    Red 2 2
    • Report generation.
    Green n/a n/a
    Network services
    • Network monitoring (including fault detection).
    Yellow 3 2
    • Network upgrades.
    Red 2 1
    • Backup procedures.
    Yellow 3 1

    Identify and prioritize undocumented service management procedures

    1.1c

    15 minutes

    1. To navigate to this exercise, open Info-Tech’s Standard Operating Procedures Workbook.
    2. Identify service management SOPs.
    3. Indicate SOP status: Green = up to date and complete, Yellow = out-of-date or incomplete, Red = undocumented.
    4. Assign risk and benefit scores (3=high, 1=low) to Yellow and Red SOPs based on potential impact if those processes failed (risk) and opportunity for process improvement (benefit).

    OUTPUT

    • Analysis of SOPs supporting service management

    Materials

    • Whiteboard

    Participants

    • Process Owners
    • SMEs
    Service Type SOPs Status Risk Benefit
    Service Request
    • Software install
    Red 3 1
    • Software update
    Yellow 3 1
    • New hardware
    Green n/a n/a
    Incident Management
    • Ticket entry and triage
    Yellow 3 2
    • Ticket escalation
    Red 2 1
    • Notification for critical issues
    Yellow 3 1

    Identify and prioritize undocumented DR procedures

    1.1d

    20 minutes

    1. To navigate to this exercise, open Info-Tech’s Standard Operating Procedures Workbook.
    2. Identify DR SOPs.
    3. Indicate SOP status: Green = up to date and complete, Yellow = out-of-date or incomplete, Red = undocumented.
    4. Assign risk and benefit scores (3=high, 1=low) to Yellow and Red SOPs based on potential impact if those processes failed (risk) and opportunity for process improvement (benefit).

    OUTPUT

    • Analysis of SOPs supporting DR

    Materials

    • Whiteboard

    Participants

    • Process Owners
    • SMEs
    DR Phase SOPs Status Risk Benefit
    Discovery and Declaration
    • Initial detection and escalation
    Red 3 1
    • Notification procedures to Emergency Response Team (ERT)
    Yellow 3 1
    • Notification procedures to staff
    Green n/a n/a
    Recover Gold Systems
    • ERP recovery procedures
    Red 2 2
    • Corporate website recovery procedures
    Yellow 3 2
    Recover Silver Systems
    • MS Exchange recovery procedures
    Red 2 1

    Select the SOPs to focus on for the first round of documentation

    1.1e

    20 minutes

    1. Identify two significantly different priority 1 SOPs to document during this workshop. It’s important to get a sense of how the Info-Tech templates and methodology can be applied to different types of SOPs.
    2. Rank the remaining SOPs that you still need to address post-workshop by priority level within each topic area.

    INPUT

    • SOP analysis from activities 1.1 and 1.2

    OUTPUT

    • A shortlist of critical, undocumented SOPs to review later in this phase

    Materials

    • Whiteboard

    Participants

    • Process Owners
    • SMEs
    Category Area SOPs Status Risk Benefit
    Disaster Recovery Procedures Discovery and Declaration
    • Initial detection and escalation
    Red 3 1
    • Notification procedures to ERT
    Yellow 3 1
    Mission-Critical Operations Network Services
    • Network monitoring (including fault detection)
    Yellow 3 2
    Service Management Procedures Incident Management
    • Ticket entry and triage
    Yellow 3 2

    Change the format of your documentation

    Which document is more effective? Which is more likely to be used?

    "The end result for most SOPs is a 100-page document that makes anyone but the author want to stab themselves rather than read it. Even worse is when you finally decide to waste an hour of your life reading it only to be told afterwards that it might not be quite right because Bob or Stan needed to make some changes last year but never got around to it."

    – Peter Church, Solutions Architect

    Create visual-based documentation to improve usability and effectiveness

    "Without question, 300-page DRPs are not effective. I mean, auditors love them because of the detail, but give me a 10-page DRP with contact lists, process flows, diagrams, and recovery checklists that are easy to follow."

    – Bernard Jones, MBCI, CBCP, CORP, Manager Disaster Recovery/BCP, ActiveHealth Management

    SOPs, including those that support your disaster recovery plan (DRP), are often created to meet certification requirements. However, this often leads to lengthy overly detailed documentation that is geared to auditors and business leaders, not IT staff trying to execute a procedure in a high-pressure, time-sensitive scenario.

    Staff don’t have time to flip through a 300-page manual, let alone read lengthy instructions, so organizations are transforming monster manuals into shorter, visual-based documentation. Benefits include:

    • Quicker to create than lengthy manuals.
    • Easier to be absorb, so they are more usable.
    • More likely to stay up to date because they are easier to maintain.

    Example: DRPs that include visual SOPs are easier to use — that leads to shorter recovery times and fewer mistakes.

    Chart is depicted showing the success rates of traditional manuals versus visual documentation.

    Use flowcharts for process flows or a high-level view of more detailed procedures

    • Flowcharts depict who does what and when; they provide an at-a-glance view that is easy to follow and makes task ownership clear.
    • Use swim lanes, as in this example, to indicate process stages and task ownership.
    • For experienced staff, a high-level reminder of process flows or key steps is sufficient.
    • Where more detail is required, include links to supporting documentation (which could include checklists, vendor documentation, other flowcharts, etc.).

    See Info-Tech’s Incident and Service Management Procedures – Service Desk Example.

    "Flowcharts are more effective when you have to explain status and next steps to upper management."

    – Assistant Director-IT Operations, Healthcare Industry

    Example: SOP in flowchart format

    A flowchart is depicted as an example flowchart. This one is an SOP flowchart labelled 'Triage Process - Incidents'

    Review your options for diagramming software

    Many organizations look for an option that easily integrates with the MS Office suite. The default option is often Microsoft Visio.

    Pros:

    • Easy to learn and use.
    • Has a wide range of features and capabilities.
    • Comes equipped with a large collection of stencils and templates.
    • Offers the convenience of fluid integration with the MS Office Suite.

    Cons:

    • Isn’t included in any version of the MS Office Suite and can be quite expensive to license.
    • Not available for Mac or Linux environments.

    Consider the options below if you’re looking for an alternative to Microsoft Visio:

    Desktop Solutions

    • Dia Diagram Editor
    • Diagram Designer
    • LibreOffice Draw
    • Pencil Project
    • yEd Graph Editor

    • Draw.io
    • Creately
    • Gliffy
    • LucidChart

    Note: No preference or recommendation is implied from the ordering of the options above.

    This list is not intended to be comprehensive.

    Evaluate different solutions to identify one that works for you

    Use the criteria below to identify a flowchart software that fits your needs.

    Criteria Description
    Platform What platform(s) can run the software?
    Description What use cases are identified by the vendor – and do these cover your needs for documenting your SOPs? Is the software open source?
    Features What are the noteworthy features and characteristics?
    Usability How easy is the program to use? What’s the learning curve like? How intuitive is the design?
    Templates and Stencils Availability of templates and stencils.
    Portability Can the solution integrate with other pieces of software? Consider whether other tools can view, open, and/or edit documents; what file formats can be published, etc.
    Cost Cost of the software to purchase or license.

    Use checklists to streamline step-by-step procedures

    • Checklists are ideal when staff just need a reminder of what to do, not how to do it.
    • Remember your audience. You aren’t pulling in a novice to run a complex procedure, so all you really need here are a series of reminders.
    • Where more detail is required, include links to supporting documentation.
    • Note that a flowchart can often be used instead of a checklist, depending on preference.

    For two different examples of a checklist template, see:

    Image depicting an example checklist. This checklist depicts an employee termination checklist

    Use topology diagrams to capture network layout, integrations, and system information

    • Organizations commonly have network topology diagrams for reference purposes, so this is just a re-use of existing resources.
    • Physically label real world equipment to correspond to topology diagrams. While these labels will be redundant for most IT employees, they help give clarity and confidence when changes are being made.
    • If your topology diagrams are housed in a tool such as a systems management product, then export the diagrams so they can be included in your SOP documentation suite.

    "Our network engineers came to me and said our standard SOP template didn't work for them. They're now using a lot of diagrams and flowcharts, and that has worked out better for them."

    The image shows a topology organization diagram as an example network layout

    Use screen captures and tutorials to facilitate training for applications and SOPs

    • Screen capture tutorials or videos are effective for training staff on applications. For example, create a screen capture tutorial to train staff on the use of a help desk application and your company’s specific process for using that tool.
    • Similarly, create tutorials to train end users on straightforward “technical” tasks (e.g. setting up their VPN connection) to reduce the demand on IT staff.
    • Tutorials can be created quickly and easily with affordable software such as Snag-It, ScreenHunter Pro, HyperSnap, PicPick, FastStone, Ashampoo Snap 6, and many others.

    "When contractors come onboard, they usually don't have a lot of time to learn about the organization, and we have a lot of unique requirements. Creating SOP documents with screenshots has made the process quicker and more accurate."

    – Susan Bellamore, Business Analyst, Public Guardian and Trustee of British Columbia

    The image is an example of a screen caption tutorial, depicting desktop icons and a password login

    Example: Disaster recovery notification and declaration procedure

    1. Swim lanes indicate task ownership and process stages.
    2. Links to supporting documentation (which could include checklists, vendor documentation, other flowcharts, etc.) are included where necessary.
    3. Additional DR SOPs are captured within the same spreadsheet for convenient, centralized access.

    Review Info-Tech’s Incident Response and Recovery Process Flows – DRP Example.

    Example: DRP flowchart with links to supporting documents

    The image is an example of an DRP flowchart labelled 'Initial Discovery/Notification and Declaration Procedures'

    Establish flowcharting standards

    If you don’t have existing flowchart standards, then keep it simple and stick to basic flowcharting conventions as described below.

    Start, End, and Connector. Traditional flowcharting standards reserve this shape for connectors to other flowcharts or other points in the existing flowchart. Unified Modeling Language (UML) also uses the circle for start and end points.

    Start, End. Traditional flowcharting standards use this for start and end. However, Info-Tech recommends using the circle shape to reduce the number of shapes and avoid confusion with other similar shapes.

    Process Step. Individual process steps or activities (e.g. create ticket or escalate ticket). If it’s a series of steps, then use the sub-process symbol and flowchart the sub-process separately.

    Sub-Process. A series of steps. For example, a critical incident SOP might reference a recovery process as one of the possible actions. Marking it as a sub-process, rather than listing each step within the critical incident SOP, streamlines the flowchart and avoids overlap with other flowcharts (e.g. the recovery process).

    Decision. Represents decision points, typically with Yes/No branches, but you could have other branches depending on the question (e.g. a “Priority?” question could branch into separate streams for Priority 1, 2, 3, 4, and 5 issues).

    Document/Report Output. For example, the output from a backup process might include an error log.

    Conduct a tabletop planning exercise to build an SOP

    1.3a

    20 minutes

    Tabletop planning is a paper-based exercise where your team walks through a particular process and maps out what happens at each stage.

    1. For this exercise, choose one particular process to document.
    2. Document each step of the process using cue cards, which can be arranged on the table in sequence.
    3. Be sure to include task ownership in your steps.
    4. Map out the process as it currently happens – we’ll think about how to improve it later.
    5. Keep focused. Stay on task and on time.

    OUTPUT

    • Steps in the current process for one SOP

    Materials

    • Tabletop, pen, and cue cards

    Participants

    • Process Owners
    • SMEs

    Info-Tech Insight

    Don’t get weighed down by tools. Relying on software or other technological tools can detract from the exercise. Use simple tools such as cue cards to record steps so that you can easily rearrange steps or insert steps based on input from the group.

    The image depicts three cue cards labelled steps 3 to 5. The cue cards are examples of the tabletop planning exercise.

    Collaborate to optimize the SOP

    1.3b

    20 minutes

    Review the tabletop exercise. What gaps exist in current processes?

    How can the process be made better? What are the outputs and checkpoints?

    The image depicts five cue cards, two of which are examples on how to improve the process. This is an example of the tabletop exercise.

    OUTPUT

    • Identify steps to optimize the SOP

    Materials

    • Tabletop, pen, and cue cards

    Participants

    • Process Owners
    • SMEs

    A note on colors: Use white cards to record steps. Record gaps on yellow cards (e.g. a process step not documented) and risks on red cards (e.g. only one person knows how to execute a step) to highlight your gaps/to-dos and risks to be mitigated or accepted.

    If it’s necessary to clarify complex process flows during the exercise, also use green cards for decision diamonds, purple for document/report outputs, and blue for sub-processes.

    Capture opportunities to improve processes in the Standard Operating Procedures Project Roadmap Tool

    1.3

    Rank and track projects to close gaps you discover in your processes.

    1. As a group, identify potential solutions to close the gaps in your processes that you’ve uncovered through the tabletop mapping exercise.
    2. Add these project names to the Standard Operating Procedures Project Roadmap Tool on the “Project Scoring” tab.
    3. Review and adjust the criteria for evaluating the benefits and costs of different projects on the “Scoring Criteria” tab.
    4. Return to the “Project Scoring” tab, and assign weights at the top of each scoring column. Use the drop-down menus to adjust the scores for each project category. The tool will automatically rank the projects based on your input, but you can adjust the ranks as needed.
    5. Assign dates and descriptions to the projects on the “Implementation Schedule” tab, below.
    The image depicts a graph showing an example of ranked and tracked projects.

    Identify gaps to improve process performance and make SOP documentation a priority

    CASE STUDY

    Industry Government (700+ FTEs)
    Source Info-Tech Workshop

    Challenge

    • Tabletop planning revealed a 77-hour gap between current and desired RTO for critical systems.
    • Similarly, the current achievable RPO gap was up to one week, but the desired RPO was one hour.
    • A DR site was available but not yet set up with the necessary equipment.
    • Lack of documented standard operating procedures (SOPs) was identified as a risk since that increased the dependence on two or three key SMEs.

    Solution

    • Potential projects to close RTO/RPO gaps were identified, including:
      • Deploy servers that were decommissioned (as a result of a server refresh) to the DR site as warm standby servers.
      • Implement site-to-site data replication.
      • Document SOPs to enable tasks to be delegated and minimize resourcing risks.

    Results

    • A DR project implementation schedule was defined.
    • Many of the projects required no further investment, but rather deployment of existing equipment that could function as standby equipment at the DR site.
    • The DR risk from a lack of SOPs enabled SOPs to be made a priority. An expected side benefit is the ability to review and optimize processes and improve consistency in IT operations.

    Document the SOPs from the tabletop exercise

    1.3c

    20 minutes

    Document the results from the tabletop exercise in the appropriate format.

    1. Identify an appropriate visual format for the high-level SOP as well as for any sub-processes or supporting documentation.
    2. Break into groups of two or three.
    3. Each group will be responsible for creating part of the SOP. Include both the high-level SOP itself and any supporting documentation such as checklists, sign-off forms, sub-processes, etc.
    4. Once your document is complete, exchange it with that of another group. Review each other’s documents to check for clarity and completeness.

    OUTPUT

    • Output from activities 1.4 and 1.5

    Materials

    • Flowcharting software, laptops

    Participants

    • Process Owners
    • SMEs

    This image has four cue cards, and an arrow pointing to a flowchart, depicting the transfer of the information on the cue cards into a flowchart software

    Repeat the tabletop exercise for the second process

    Come back together as a large group. Choose a process that is significantly different from the one you’ve just documented, and repeat the tabletop exercise.

    As a reminder, the steps are:

    1. Use the tabletop exercise to map out a current SOP.
    2. Collaborate to optimize the SOP.
    3. Decide on appropriate formats for the SOP and its supporting documents.
    4. Divide into small groups to create the SOP and its supporting documents.
    5. Repeat the steps above as needed for your initial review of critical processes.

    Info-Tech Insight

    If you plan to document more than two or three SOPs at once, consider making it an SOP “party” to add momentum and levity to an otherwise dry process. Review section 2.3 to find out how.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    1.1a-e

    Get started by prioritizing SOPs

    Ensure the SOP project remains business focused, and kick off the project by analyzing critical business services. Identify key IT services that support the relevant business services. Conduct a benefit/risk analysis to prioritize which SOPs should become the focus of the workshop.

    1.3a-c

    Document the SOPs from the tabletop exercise

    Leverage a tabletop planning exercise to walk the team through the SOP. During the exercise, focus on identifying timelines, current gaps, and potential risks. Document the steps via que cards first and transpose the hard copies to an electronic version.

    Phase 2

    Establish a Sustainable Documentation Process

    Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind

    Phase 2 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Establish a sustainable SOP documentation process

    Proposed Time to Completion (in weeks): 4 weeks

    Step 2.1: Establish guidelines for identifying and organizing SOPs

    Start with an analyst call:

    • Establish documentation information guidelines.
    • Review version control best practices.

    Then complete these activities…

    • Implement best practices to identify and organize your SOPs.

    With these tools & templates:

    • SOP Workbook

    Step 2.2: Define a process to document and maintain SOPs

    Review findings with analyst:

    • Identify opportunities to create a culture that fosters SOP creation.

    Then complete these activities…

    • Create a plan to address SOP documentation gaps.

    With these tools & templates:

    • Document Management Checklist

    Step 2.3: Plan time with experts to put a dent in your documentation backlog

    Finalize phase deliverable:

    • Address outstanding undocumented SOPs by working through process issues together.

    Then complete these activities…

    • Organize and run a working session to document and optimize processes.

    With these tools & templates:

    • SOP Workbook
    • SOP Project Roadmap Tool

    Phase 2 Results & Insights:

    Improve the process for documenting and maintaining your SOPs, while putting a dent in your documentation backlog and gaining buy-in with staff.

    Identify current content management practices and opportunities for improvement

    DISCUSS

    What is the current state of your content management practices?

    Are you using a content management system? If not, where are documents kept?

    Are your organizational or departmental SOPs easy to find?

    Is version control a problem? What about file naming standards?

    Get everyone on the same page on the current state of your SOP document management system, using the questions above as the starting point.

    Keep document management simple for better adoption and consistency

    If there is too much complexity and staff can’t easily find what they need, you won’t get buy-in and you won’t get consistency.

    Whether you store SOPs in a sophisticated content management system (CMS) or on a shared network drive, keep it simple and focus on these primary goals:

    • Enable staff to find the right document.
    • Know if a document is the latest, approved version.
    • Minimize document management effort to encourage buy-in and consistency.

    If users can’t easily find what they need, it leads to bad practices. For example:

    • Users maintain their own local copies of commonly used documents to avoid searching for them. The risk is that local copies will not be automatically updated when the SOP changes.
    • Separate teams will implement their own document management system and repository. Now you have duplication of effort and company resources, multiple copies of documents (where each group needs their own version), and no centralized control over potentially sensitive documents.
    • Users will ignore documented SOPs or ask a colleague who might also be following the above bad practices.

    Insert a document information block on the first page of every document to identify key attributes

    Include a document information block on the first page of every document to identify key attributes. This strategy is as much about minimizing resistance as it is ensuring key attributes are captured.

    • A consistent document information block saves time (e.g. vs. customized approaches per document). If some fields don’t apply, enter “n/a.”
    • It provides key information about the document without having to check soft copy metadata, especially if you work with hard copies.
    • It’s a built-in reminder of what to capture and easier than updating document properties or header/footer information or entering metadata into a CMS.

    Note: The Info-Tech templates in this blueprint include a copy of the document information block shown in this example. Add more fields if necessary for your organization’s needs.

    For an example of a completed document information block, see Network Backup for Atlanta Data Center – Backups Example

    Info-Tech Insight

    For organizations with more advanced document management requirements, consider more sophisticated strategies (e.g. using metadata) as described in Info-Tech’s Use SharePoint for Enterprise Content Management and Reintroduce the Information Lifecycle to the Content Management Strategy. However, the basic concepts above still apply: establish standard attributes you need to capture and do so in a consistent manner.

    Modify the Info-Tech document information block to meet your requirements

    2.1a

    15 minutes

    1. Review “Guidelines and Template for the Document Information Block” in the Standard Operating Procedures Workbook. Determine if any changes are required, such as additional fields.
    2. Identify which fields you want to standardize and then establish standard terms. Balance the needs for simplicity and consistency – don’t force consistency where it isn’t a good fit.
    3. Pre-fill the document information block with standard terms and examples and add it to an SOP template that’s stored in your content management system.

    Educate staff by pre-filling the document

    • Providing examples built into the templates provides in-context, just-in-time training which is far more effective and easier than formal education efforts.
    • Focus your training on communicating when the template or standard terms change so that staff know to obtain the new version. Otherwise, the tendency for many staff will be to use one of their existing documents as their template.

    OUTPUT

    • Completed document information block

    Materials

    • Laptop
    • Projector

    Participants

    • Process Owners
    • SMEs

    Leverage the document information block to create consistent filenames that facilitate searching

    Use the following filename format to create consistent, searchable, and descriptive filenames:

    Topic – Document Title – Document Type – Version Date

    Filename Component Purpose
    Topic
    • Functions as a filename prefix to group related documents but is also a probable search term. For project work, use a project name/number.
    Document Title
    • The title should be fairly descriptive of the content (if it isn’t, it’s not a good title) so it will help make the file easily identifiable and will include more probable search terms.
    Document Type Further distinguishes similar files (e.g. Maintenance SOP vs. a Maintenance Checklist).
    Version Date (for local files or if not using a CMS)
    • If it’s necessary to work on a file locally, include the version date at the end of the filename. The date is a more recognizable indicator of whether it’s the latest version or an old copy.
    • Establish a standard date format. Although MM-DD-YY is common in the US, the format YYYY-MM-DD reduces confusion between the month and day.

    For example:

    • ERP – System Administration Monthly Maintenance Tasks – Checklist – 2016-01-15.docx
    • ERP – System Administration Monthly Maintenance Tasks – SOP – 2017-01-10.docx
    • Backups – Network Backup Procedure for Atlanta Data Center – SOP – 2017-03-06.docx
    • PROJ437 – CRM Business Requirements – BRD – 2017-02-01.xlsx
    • DRP – Notification Procedures – SOP – 2016-09-14.docx
    • DRP – Emergency Response Team Roles and Responsibilities – Reference – 2018-03-10.xlsx

    Apply filename and document information block guidelines to existing SOPs

    2.1b

    15 minutes

    1. Review the SOPs created during the earlier exercises.
    2. Update the filenames and document information block based on guidelines in this section.
    3. Apply these guidelines to other select existing SOPs to see if additional modifications are required (e.g. additional standard terms).

    INPUT

    • Document Information Block

    OUTPUT

    • Updated filenames and document information blocks

    Materials

    • Laptop and projector

    Participants

    • Process Owners
    • SMEs

    Implement version control policies for local files as well as those in your content management system (CMS)

    1. Version Control in Your CMS

    2. Always keep one master version of a document:

    • When uploading a new copy of an existing SOP (or any other document), ensure the filenames are identical so that you are just adding a new version rather than a separate new file.
    • Do not include version information in the filename (which would create a new separate file in your CMS). Allow your CMS to handle version numbering.
  • Version Control for Local Files

  • Ideally, staff would never keep local copies of files. However, there are times when it is practical or preferable to work from a local copy: for example, when creating or updating an SOP, or when working remotely if the CMS is not easily accessible.

    Implement the following policies to govern these circumstances:

    • Add the version date to the end of the filename while the document is local, as shown in the slide on filenames.
    • Remove the date when uploading it to a CMS that tracks date and version. If you leave the date in the filename, you will end up with multiple copies in your CMS.
    • When distributing copies for review, upload a copy to the CMS and send the link. Do not attach a physical file.
  • Minimize the Need for Version Updates

  • Reduce the need for version updates by isolating volatile information in a separate, linked document. For example:

    • Use Policy documents to establish high-level expectations and goals, and use SOPs to capture workflow, but put volatile details in a separate reference document. For example, for Backup procedures, put offsite storage vendor details such as contact information, pick up times, and approved couriers in a separate document.
    • Similarly, for DRP Notification procedures, reference a separate contacts list.

    Modify the Info-Tech Document Management Checklist to meet your requirements

    2.1c

    15 minutes

    1. Review the Info-Tech Document Management Checklist.
    2. Add or remove checklist items.
    3. Update the document information block.

    OUTPUT

    • Completed document management checklist

    Materials

    • Laptop, projector

    Participants

    • Process Owners
    • SMEs

    See Info-Tech’s Document Management Checklist.

    If you aren’t going to keep your SOPs current, then you’re potentially doing more harm than good

    An outdated SOP can be just as dangerous as having no SOP at all. When a process is documented, it’s trusted to be accurate.

    • Disaster recovery depends as much on supporting SOPs – such as backup and restore procedures – as it does on a master incident response plan.
    • For disaster scenarios, the ability to meet recovery point objectives (i.e. minimize data loss) and recovery time objectives (i.e. minimize downtime) depends on smoothly executed recovery procedures and on having well-defined and up-to-date DR documentation and supporting SOPs. For example:
      • Recovery point (data loss) objectives are directly impacted by your backup procedures.
      • Recovery time is minimized by a well-defined restore procedure that reduces the risk of human error during recovery which could lead to data loss or a delay in the recovery.
      • Similarly, a clearly documented configuration procedure will reduce the time to bring a standby system online.
    A graph depicting the much faster recovery time of up-to-date SOPs versus out-of-date SOPs.

    Follow Info-Tech best practices to keep SOPs current and drive consistent, efficient IT operations

    The following best practices were measured in this chart, and will be discussed further in this section:

    1. Identify documentation requirements as part of project planning.
    2. Require a manager or supervisor to review and approve SOPs.
    3. Check documentation status as part of change management.
    4. Hold staff accountable.
    Higher adoption of Info-Tech best practices leads to more effective SOPs and greater benefits in areas such as training and process improvement.

    Graph depicting the efficiency of adopting Info-Tech practices regarding SOPs. Four categories of 'Training', 'process improvement', 'IT automation', and 'consistent IT operations' are shown increasing in efficiency with a high adoption of Info-Tech strategies.

    Info-Tech Insight

    Audits for compliance requirements have little impact on getting SOPs done in a timely manner or the actual usefulness of those SOPs, because the focus is on passing the audit instead of creating SOPs that improve operations. The frantic annual push to complete SOPs in time for an audit is also typically a much greater effort than maintaining documents as part of ongoing change management.

    Identify documentation requirements as part of project planning

    DISCUSS

    When are documentation requirements captured, including required changes to SOPs?

    Make documentation requirements a clearly defined deliverable. As with any other task, this should include:

    • Owner: The person ultimately responsible for the documentation.
    • Assigned resource: The person who will actually put pen to paper. This could be the same person as the owner, or the owner could be a reviewer.
    • Deadlines: Include documentation deliverables in project milestones.
    • Verification process: Validate completion and accuracy. This could be a peer review or management review.
    Example: Implement a new service desk application.
    • Service desk SOP documentation requirements: SOP for monitoring and managing tickets will require changes to leverage new automation features.
    • Owner: Service Desk Lead.
    • Assigned resource: John Smith (service desk technician).
    • Deadline: Align with “ready for QA testing.”
    • Verification process: Service Desk Lead document review and signoff.

    Info-Tech Insight

    Realistically, documentation will typically be a far less urgent task than the actual application or system changes. However, if you want the necessary documentation to be ultimately completed, even if it’s done after more urgent tasks, it must be tracked.

    Implement document approval steps at the individual and project level

    DISCUSS

    How do you currently review and validate SOP documents?

    Require a manager or supervisor to review and approve SOPs.

    • Avoid a bureaucratic review process involving multiple parties. The goal is to ensure accuracy and not just provide administrative protection.
    • A review by the immediate supervisor or manager is often sufficient. Their feedback and the implied accountability improve the quality and usefulness of the SOPs.

    Check documentation status as part of change management.

    • Including a documentation status check holds the project leaders and management accountable.
    • If SOPs are not critical to the project deliverable, then realistically the deliverable is not held back. However, keep the project open until relevant documents are updated so those tasks can’t be swept under the rug until the next audit.

    SOP reviews, change management, and identifying requirements led to benefits such as training and process improvement.

    A chart depicting the impact and benefits of SOP reviews, change management and identifying requirements. The chart is accompanied by a key for the grey to blue colours depicted

    "Our directors and our CIO have tied SOP work to performance evaluations and SOP status is reviewed during management meetings. People have now found time to get this work done."

    – Assistant Director-IT Operations, Healthcare Industry

    Review SOPs regularly and assign a process owner to avoid reinforcing silos

    CASE STUDY

    Industry

    Public service organization

    Source

    Info-Tech client engagement

    Situation

    • The organization’s IT department consists of five heavily siloed units.
    • Without communication or workflow accountability across units, each had developed incompatible workflows, making estimates of “time to resolution” for service requests difficult.
    • The IT service manager purchases a new service desk tool, attempting to standardize requests across IT to improve efficiency, accountability, and transparency.

    Complication

    • The IT service manager implements the tool and creates standardized workflows without consulting stakeholders in the different service units.
    • The separate units immediately rebel against the service manager and try to undermine the implementation of the new tool.

    Results

    • Info-Tech analysts helped to facilitate a solution between experts in the different units.
    • In order to develop a common workflow and ticket categorization scheme, Info-Tech recommended that each service process should have a single approver.

    The bottom line: ensure that there’s one approver per process to drive process efficiency and accountability and avoid problems down the road.

    Hold staff accountable to encourage SOP work to be completed in a timely manner

    DISCUSS

    Are SOP updates treated as optional or “when I have time” work?

    Hold staff directly accountable for SOP work.

    Holding staff accountable is really about emphasizing the importance of ensuring SOPs stay current. If management doesn’t treat SOPs as a priority, then neither will your staff. Strategies include:

    • Include SOP work in performance appraisals.
    • Keep relevant tickets open until documentation is completed.
    • Ensure documents are reviewed, as discussed earlier.
    • Identify and assign documentation tasks as part of project planning efforts, as discussed earlier.

    Holding staff accountable minimizes procrastination and therefore maintenance effort.

    Chart depicting the impact on reducing SOP maintenance effort followed by a key defining the colours on the chart

    Info-Tech Insight

    Holding staff accountable does not by itself make a significant impact on SOP quality (and therefore the typical benefits of SOPs), but it minimizes procrastination, so the work is ultimately done in a more timely manner. This ensures SOPs are current and usable, so they can drive benefits such as consistent operations, improved training, and so on.

    Assign action items to address SOP documentation process challenges

    2.2

    1. Discuss the challenges mentioned at the start of this section, and other challenges highlighted by the strategies discussed in this section. For example:
    • Are documentation requirements included in project planning?
    • Are SOPs and other documentation deliverables reviewed?
    • Are staff held accountable for documentation?
  • Document the challenges in your copy of the Standard Operating Procedures Workbook and assign action items to address those challenges.
  • Challenge Action Items Action Item Owner
    Documentation requirements are identified at the end of a project.
    • Modify project planning templates and checklists to include “identify documentation requirements.”
    Bob Ryan
    SOPs are not reviewed.
    • When assigning documentation tasks, also assign an owner who will be responsible for reviewing and approving the deliverable.
    • Create a mechanism for officially signing off on the document (e.g. email approval or create a signoff form).
    Susan Jones

    An “SOP party” fosters a collaborative approach and can add some levity to an otherwise dry exercise

    What is an SOP party?

    • An SOP party is a working session, bringing together process owners and key staff to define current SOPs and collaborate to identify optimization opportunities.
    • The party aspect is really just about how you market the event. Order in food or build in a cooking contest (e.g. a chilli cook-off or dessert bake-off) to add some fun to what can be a dry activity.

    Why does this work?

    • Process owners become so familiar with their tasks that many of the steps essentially live in their heads. Questions from colleagues draw out those unwritten steps and get them down on paper so another sufficiently qualified employee could carry out the same steps.
    • Once the processes are defined (e.g. via a tabletop exercise), input from colleagues can help identify risks and optimization opportunities, and process questions can be quickly answered because the key people are all present.
    • The group approach also promotes consistency and enables you to set expectations (e.g. visual-based approach, standards, level of detail, etc.).

    When is collaboration necessary (e.g. via tabletop planning)?

    • Tabletop planning is ideal for complex processes as well as processes that span multiple tasks, people, and/or systems.
    • For processes with a narrow focus (e.g. recovery steps for a specific server), assign these to the SME to document. Then ensure the SOP is reviewed to draw out the unwritten steps as described above.
    • For example, if you use tabletop planning to document a high-level DR plan, sub-processes might include recovery procedures for individual systems; those SOPs can then be assigned to individual SMEs.

    Schedule SOP working sessions until critical processes are documented

    Ultimately, it’s more efficient to create and update SOPs as needed but dedicated working sessions will help address immediate critical needs.

    Organize the working session:
    1. Book a full-day meeting in an out of the way meeting room, invite key staff (system and process owners who ultimately need to be SOP owners), and order in lunch so no one has to leave.
    2. Prioritize SOPs (see Phase 1) and set goals (e.g. complete the top 6 SOPs during this session).
    3. Alternate between collaborative efforts and documenting the SOPs. For example:
      1. Tabletop or flowchart the current SOP. Take a picture of the current state for reference purposes.
      2. Look for process improvements. If you have the authority in the room to enable process changes, then modify the tabletop/flowchart accordingly and capture this desired future state (e.g. take a picture). Otherwise, identify action items to follow up on proposed changes.
      3. Identify all related documentation deliverables (e.g. sub-processes, checklists, approval forms, etc.).
      4. Create the identified documentation deliverables (divide the work among the team). Then repeat the above.
    4. Repeat these working sessions on a monthly or quarterly basis, depending on your requirements, until critical SOPs are completed.
    5. When the SOP backlog is cleared, conduct quarterly or semi-annual refreshers for ongoing review and optimization of key processes.

    Assign action items to capture next steps after SOP working sessions

    2.3

    1. Review the SOPs documented during this workshop. Identify action items to complete and validate those SOPs and related documents. For example, do the SOPs require further approval or testing?
    2. Similarly, review the document management checklist and identify action items to complete, expand, and/or validate proposed standards.
    3. For SOP working sessions, decide on a date, time, and who should be there based on the guidelines in this section. If the SOP party approach does not meet your requirements, then at the very least assign owners for the identified critical SOPs and set deadlines for completing those SOPs. Document these extra action items in your copy of the Standard Operating Procedures Workbook.
    SOP or Task Action Items Action Item Owner
    Ticket escalation SOP
    • Debrief the rest of the Service Desk team on the new process.
    • Modify the SOP further based on feedback, if warranted.
    • Implement the new SOP. This includes communicating visible changes to business users and other IT staff.
    Jeff Sutter
    SOP party
    • Contact prospective attendees to communicate the purpose of the SOP party.
    • Schedule the SOP party.
    Bob Smith

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with out Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    2.1

    Identify current content management practices

    As a group, identify current pain points and opportunities for improvement in your current content management practices.

    2.2

    Assign action items to address documentation process challenges

    Develop a list of action items to address gaps in the SOP documentation and maintenance process.

    Phase 3

    Identify a Content Management Solution

    Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind

    Phase 3 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 3: Decide on a content management solution for your SOPs

    Proposed Time to Completion (in weeks): 1 week

    Step 3.1: Understand the options for CM solutions

    Start with an analyst kick off call:

    • Review your current approach to content management and discuss possible alternatives.

    Then complete these activities…

    • Evaluate the pros and cons of different approaches to content management.
    • Discuss approaches for fit with your team.

    Step 3.2: Identify the right solution for you

    Review findings with analyst:

    • Identify 2–3 possible options for a content management strategy.

    Then complete these activities…

    • Identify the best solution based on portability, maintainability, cost, and implementation effort.

    With these tools & templates:

    • Publishing and Document Management Solution Evaluation Tool
    • SOP Project Roadmap
    • SOP Workbook

    Phase 3 Results & Insights:

    Choose an approach to content management that will best support your organization’s SOP documentation and maintenance process.

    Decide on an appropriate publishing and document management strategy for your organization

    Publishing and document management considerations:

    • Portability/External Access: At the best of times, portability is nice because it enables flexibility, but at the worst of times (such as in a disaster recovery situation) it is absolutely essential. If your primary site is down, can you still access your documentation? As shown in this chart, traditional storage strategies still dominate DRP documentation, but these aren’t necessarily the best options.
    • Maintainability/Usability: How easy is it to create, update, and use the documentation? Is it easy to link to other documents? Is there version control? The easier the system is to use, the easier it is to get employees to use it.
    • Cost/Effort: Is the cost and effort appropriate? For example, a large enterprise may need a formal solution like SharePoint or a Content Management System. For smaller organizations, the cost of these tools might be harder to justify.

    Consider these approaches:

    This section reviews the following approaches, their pros and cons, and how they meet publishing and document management requirements:

    • SOP tools.
    • Cloud-based content management software.
    • In-house solutions combining SharePoint and MS Office (or equivalent).
    • Wiki site.
    • “Manual” approaches such as storing documents on a USB drive.
    Chart depicting the portable strategy popularity, followed by a key defining the colours on the graph

    Source: Info-Tech Research Group; N=118

    Note: Percentages total more than 100% due to respondents using more than one portability strategy.

    Develop a content management strategy and process to reduce organizational risk

    CASE STUDY

    Segment

    Mid-market company

    Source

    Info-Tech Interview

    Situation

    • A mid-sized company hired a technical consultancy to manage its network.
    • As part of this move, the company’s network administrator was fired.
    • Over time, this administrator had become a “go-to” person for several other IT functions.

    Complication

    • The consulting team realizes that the network administrator kept critical documentation on his local hard drive.
    • This includes configs, IP addresses, passwords, logins to vendor accounts, and more.
    • It becomes clear the administrator was able to delete some of this information before leaving, which the consultants are required to retrieve and re-document.

    Result

    • Failing to implement effective SOPs for document management and terminating key IT staff exposed the organization to unnecessary risk and additional costs.
    • Allowing a local content management system to develop created a serious security risk.
    • The bottom line: create a secure, centralized, and backed-up location and establish SOPs around using it to help keep the company’s data safe.

    Info-Tech offers a web-based policy management solution with process management capabilities

    Role How myPolicies helps you
    Policy Sponsors
    • CEO
    • Board of Directors

    Reduced Corporate Risk

    Avoid being issued a regulatory fine or sanction that could jeopardize operations or hurt brand image.

    Policy Reviewers
    • Internal Audit
    • Compliance
    • Risk
    • Legal

    A Culture of Compliance

    Adherence with regulatory requirements as well as documented audit trail of all critical policy activities.

    Policy Owners
    • HR
    • IT
    • Finance
    • Operations

    Less Administrative Burden

    Automation and simplification of policy creation, distribution, and tracking.

    Policy Users
    • Employees
    • Vendors
    • Contractors

    Policy Clarity

    Well-written policies are stored in one reliable, easy to navigate location.

    About this Approach:

    myPolicies is a web-based solution to create, distribute, and manage corporate policies, procedures, and forms, built around best practices identified by our research.

    Contact your Account Manager today to find out if myPolicies is right for you.

    SOP software and DR planning tools can help, but they aren’t a silver bullet

    Portability/External Access:
    • Pros: Typically have a SaaS option, providing built-in external access with appropriate security and user administration to vary access rights.
    • Cons: Dependent on the vendor to ensure external access, but this is typically not an issue.
    Maintainability/Usability:
    • Pros: Built-in templates encourage consistency as well as guide initial content development by indicating what details need to be captured.
    • Pros: Built-in document management (e.g. version control, metadata support, etc.), centralized access/navigation to required documents, and some automation (e.g. update contacts throughout the system).
    • Cons: Not a silver bullet. You still have to do the work to define and capture your processes.
    • Cons: Requires end-user and administrator training.
    • Cons: Often modules of larger software suites. If you use the entire suite, it may make sense to use the SOP tool, but otherwise probably not.
    Cost/Effort:
    • Pros: For large enterprises, the convenience of built-in document management and templates can outweigh the cost.
    • Cons: SOP tools can be costly. Expect to pay at least $3,000-7,000 for software licensing, plus additional per user and hosting fees.
    About this Approach:

    SOP tools such as Princeton Center’s SOP ExpressTM and SOP Tracks or MasterControl’s SOP Management and eSOP allow organizations to create, manage, and access SOPs. These programs typically offer a range of SOP templates and formats, electronic signatures, version control, and review options and training features such as quizzes and monitoring.

    Similarly, DR planning solutions (e.g. eBRP, Recovery Planner, LDRPS, etc.) provide templates, tools, and document management to create DR documentation including SOPs.

    Consider leveraging SharePoint to provide document management capabilities

    Portability/External Access:
    • Pros: SharePoint is commonly web-enabled and supports external access with appropriate security and user administration.
    • Cons: Must be installed at redundant sites or be cloud-based to be effective in the event of a worst-case scenario disaster recovery situation in which the primary data center is down.
    Maintainability/Usability:
    • Pros: Built-in document management (e.g. version control, metadata support, etc.) as well as centralized access to required documents.
    • Pros: No tool learning curve – SharePoint and MS Office would be existing solutions already used on a daily basis.
    • Cons: No built-in automated updates (e.g. automated updates to contacts throughout the system).
    • Cons: Consistency depends on creating templates and implementing processes for document updates, review, and approval.
    Cost/Effort:
    • Pros: Using existing tools, so this is a sunk cost in terms of capex.
    • Cons: Additional effort required to create templates and manage the documentation library.

    For more information on SharePoint as a content management solution, see Info-Tech’s Use SharePoint for Enterprise Content Management.

    About this Approach:

    Most SOP documents start as MS Office documents, even if there is an SOP tool available (some SOP tools actually run within MS Office on the desktop). For organizations that decide to bypass a formal SOP tool, the biggest gap they have to overcome is document management.

    Many organizations are turning to SharePoint to meet this need. For those that already have SharePoint in place, it makes sense to further leverage SharePoint for SOP documentation.

    For SharePoint to be a practical solution, the documentation must still be accessible if the primary data center is down, e.g. by having redundant SharePoint instance at multiple in-house locations or using a cloud-based SharePoint solution.

    As an alternative to SharePoint, SaaS tools such as Power DMS, NetDocuments, Xythos on Demand, Knowledge Tree, Spring CM, and Zoho Docs offer cloud-based document management, authoring, and distribution services that can work well for SOPs. Some of these, such as Power DMS and Spring CM, are geared specifically toward workflows.

    A wiki may be all you need

    Portability/External Access:
    • Pros: Wiki sites can support external access as with any web solution.
    • Cons: May lack more sophisticated content management features.
    Maintainability/Usability:
    • Pros: Built-in document management (e.g. version control, metadata support, etc.) as well as centralized access to required information.
    • Pros: Authorized users can make updates dynamically, depending on how much restriction you have on the site.
    • Cons: No built-in automation (e.g. automated updates to contacts throughout the system).
    • Cons: Consistency depends on creating templates and implementing processes for document updates, review, and approval.
    Cost/Effort:
    • Pros: An inexpensive option compared to traditional content management solutions such as SharePoint.
    • Cons: Learning curve if wikis are new to your organization.
    About this Approach:

    Wiki sites are websites where users collaborate to create and edit the content. Wikipedia is an example.

    While wiki sites are typically used for collaboration and dynamic content development, the traditional collaborative authoring model can be restricted to provide structure and an approval process.

    Several tools are available to create and manage wiki sites (and other collaboration solutions), as outlined in the following research:

    An approach that I’ve seen work well is to consult the wiki for any task, activity, job, etc. Is it documented? If not, then document it there and then. Sure, this led to 6-8 weeks of huge effort, but the documentation grew in terms of volume and quality at an alarming but pleasantly surprising rate. Providing an environment to create the documentation is important and a wiki is ideal. Fast, lightweight, in-browser editing leads to little resistance in creating documents.

    - Lee Blackwell, Global IT Operation Services Manager, Avid Technology

    Managing SOPs on a shared network drive involves major challenges and limitations

    Portability/External Access:
    • Cons: Must be hosted at redundant sites in order to be effective in a worst-case scenario that takes down your data center.
    Maintainability/Usability:
    • Pros: Easy to implement and no learning curve.
    • Pros: Access can be easily managed.
    • Cons: Version control, standardization, and document management can be significant challenges.
    Cost/Effort:
    • Pros: Little to no cost and no tool management required.
    • Cons: Managing documents on a shared network drive requires strict attention to process for version control, updates, approvals, and distribution.
    About this Approach:

    With this strategy, SOP documents are stored and managed locally on a shared network drive. Only process owners and administrators have read-write permissions on documents on the shared drive.

    The administrator grants access and manages security permissions.

    Info-Tech Insight

    For small organizations, the shared network drive approach can work, but this is ultimately a short-term solution. Move to an online library by creating a wiki site. Start slow by beginning with a particular department or project, then evaluate how well your staff adapt to this technology as well as its potential effectiveness in your organization. Refer to the Info-Tech collaboration strategy research cited on the previous slide for additional guidance.

    Avoid extensive use of paper copies of SOP documentation

    SOP documents need to be easy to update, accessible from anywhere, and searchable. Paper doesn’t meet these needs.

    Portability/External Access:
    • Pros: Does not rely on technology or power.
    • Cons: Not adequate for disaster recovery situations; would require all staff to have a copy and to have it with them at all times.
    Maintainability/Usability:
    • Pros: In terms of usability, again there is no dependence on technology.
    • Cons: Updates need to be printed and distributed to all relevant staff every time there is a change to ensure staff have access to the latest most accurate documentation.
    • Cons: Navigation to other information is manual – flipping through pages etc. No searching or hyperlinks.
    Cost/Effort:
    • Pros: No technology system to maintain, aside from what you use for printing.
    • Cons: Printing expenses are actually among the highest incurred by organizations and this adds to it.
    • Cons: Labor-intensive due to need to print and physically distribute documentation updates.
    About this Approach

    Traditionally, SOPs were printed and kept somewhere in a large binder (or several large binders). This isn’t adequate to the needs of most organizations and typically results in documents that aren’t up to date or effective.

    Use Info-Tech’s solution evaluation tool to decide on a publishing and document management strategy

    All organizations have existing document management methodologies, even if it’s simply storing documents on a network drive.

    Use Info-Tech’s solution evaluation tool to decide whether your existing solution meets the portability/external access, maintainability/usability, and cost/effort criteria, or whether you need to explore a different option.

    Note: This tool was originally built to evaluate DRP publishing options, so the tool name and terminology refers to DR. However, the same tool can be used to evaluate general SOP publishing and document management solutions.

    The image is a screenshot of Info-Tech's evaluation tool
    Consider using Info-Tech’s DRP Publishing and Document Management Solution Evaluation Tool.

    Info-Tech Insight

    There is no absolute ranking for possible solutions. The right choice will depend on factors such as current in-house tools, maturity around document management, the size of your IT department, and so on. For example, a small shop may do very well with the USB drive strategy, whereas a multi-national company will need a more formal strategy to ensure consistent application of corporate guidelines.

    If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

    Book a workshop with our Info-Tech analysts:

    • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
    • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
    • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

    The following are sample activities that will be conducted by Info-Tech analysts with your team:

    3.1

    Decide on a publishing and document management strategy

    Review the pros and cons of different strategies for publishing and document management. Identify needs, priorities, and limitations of your environment. Create a shortlist of options that can meet your organization’s needs and priorities.

    3.2

    Complete the solution evaluation tool

    Evaluate solutions on the shortlist to identify the strongest option for your organization, based on the criteria of maintainability, affordability, effort to implement, and accessibility/portability.

    Insight breakdown

    Create visual documents, not dense SOP manuals.

    • Visual documents that can be scanned are more usable and easier to update.
    • Flowcharts, checklists, and diagrams all have their place in visual documentation.

    Start with high-impact SOPs.

    • It can be difficult to decide where to start when faced with a major documentation backlog.
    • Focus first on client facing and high-impact SOPs, i.e. mission-critical operations, service management, and disaster recovery procedures.

    Integrate SOP creation into project requirements and hold staff accountable.

    • Holding staff accountable does not provide all the benefits of a well documented and maintained SOP, but it minimizes procrastination, so the work is ultimately done in a more timely manner.

    Summary of accomplishment

    Knowledge Gained

    SOPs may not be exciting, but they’re very important to organizational consistency, efficiency, and improvement.

    This blueprint outlined how to:

    • Prioritize and execute SOP documentation work.
    • Establish a sustainable process for creating and maintaining SOP documentation.
    • Choose a content management solution for best fit.

    Processes Optimized

    • Multiple processes supporting mission-critical operations, service management, and disaster recovery were documented. Gaps in those processes were uncovered and addressed.
    • In addition, your process for maintaining process documents was improved, including adding documentation requirements and steps requiring documentation approval.

    Deliverables Completed

    As part of completing this project, the following deliverables were completed:

    • Standard Operating Procedures Workbook
    • Standard Operating Procedures Project Roadmap Tool
    • Document Management Checklist
    • Publishing and Document Management Solution Evaluation Tool

    Project step summary

    Client Project: Create and maintain visual SOP documentation.

    1. Prioritize undocumented SOPs.
    2. Develop visual SOP documentation.
    3. Optimize and document critical processes.
    4. Establish guidelines for identifying and organizing SOPs.
    5. Define a process for documenting and maintaining SOPs.
    6. Plan time with experts to put a dent in your documentation backlog.
    7. Understand the options for content management solutions.
    8. Identify the right content management solution for your organization.

    Info-Tech Insight

    This project has the ability to fit the following formats:

    • Onsite workshop by Info-Tech Research Group consulting analysts.
    • Do-it-yourself with your team.
    • Remote delivery (Info-Tech Guided Implementation).

    Bibliography

    Anderson, Chris. “What is a Standard Operating Procedure (SOP)?” Bizmanualz, Inc. No date. Web. 25 Jan. 2016. https://www.bizmanualz.com/save-time-writing-procedures/what-are-policies-and-procedures-sop.html

    Grusenmeyer, David. “Developing Effective Standard Operating Procedures.” Dairy Business Management. 1 Feb. 2003. Web. 25 Jan. 2016. https://ecommons.cornell.edu/handle/1813/36910

    Mosaic. “The Value of Standard Operating Procedures.” 22 Oct. 2012. Web. 25 Jan. 2016. ttp://www.mosaicprojects.com.au/WhitePapers/WP1086_Standard_Operating_Procedures.pdf

    Sinn, John W. “Lean, Six Sigma, Quality Transformation Toolkit (LSSQTT) Tool #17 Courseware Content – Standard Operating Procedures (SOP) For Lean and Six Sigma: Infrastructure for Understanding Process.” Summer 2006. Web. 25 Jan. 2016. https://www.bgsu.edu/content/dam/BGSU/college-of-technology/documents/LSSQTT/LSSQTT%20Toolkit/toolkit3/LSSQTT-Tool-17.pdf

    United States Environmental Protection Agency. “Guidance for Preparing Standard Operating Procedures (SOPs).” April 2007. Web. 25 Jan. 2016. http://www.epa.gov/sites/production/files/2015-06/documents/g6-final.pdf

    Implement an IT Chargeback System

    • Buy Link or Shortcode: {j2store}71|cart{/j2store}
    • member rating overall impact: 8.0/10 Overall Impact
    • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
    • member rating average days saved: Read what our members are saying
    • Parent Category Name: Cost & Budget Management
    • Parent Category Link: /cost-and-budget-management
    • Business units voraciously consume IT services and don’t understand the actual costs of IT. This is due to lack of IT cost transparency and business stakeholder accountability for consumption of IT services.
    • Business units perceive IT costs as uncompetitive, resulting in shadow IT and a negative perception of IT.
    • Business executives have decided to implement an IT chargeback program and IT must ensure the program succeeds.

    Our Advice

    Critical Insight

    Price IT services so that business consumers find them meaningful, measurable, and manageable:

    • The business must understand what they are being charged for. If they can’t understand the value, you’ve chosen the wrong basis for charge.
    • Business units must be able to control and track their consumption levels, or they will feel powerless to control costs and you’ll never attain real buy-in.

    Impact and Result

    • Explain IT costs in ways that matter to the business. Instead of focusing on what IT pays for, discuss the value that IT brings to the business by defining IT services and how they serve business users.
    • Develop a chargeback model that brings transparency to the flow of IT costs through to business value. Demonstrate how a good chargeback model can bring about fair “pay-for-value” and “pay-for-what-you-use” pricing.
    • Communicate IT chargeback openly and manage change effectively. Business owners will want to know how their profit and loss statements will be affected by the new pricing model.

    Implement an IT Chargeback System Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should implement an IT chargeback program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Launch

    Make the case for IT chargeback, then assess the financial maturity of the organization and identify a pathway to success. Create a chargeback governance model.

    • Implement IT Chargeback – Phase 1: Launch
    • IT Chargeback Kick-Off Presentation

    2. Define

    Develop a chargeback model, including identifying user-facing IT services, allocating IT costs to services, and setting up the chargeback program.

    • Implement IT Chargeback – Phase 2: Define
    • IT Chargeback Program Development & Management Tool

    3. Implement

    Communicate the rollout of the IT chargeback model and establish a process for recovering IT services costs from business units.

    • Implement IT Chargeback – Phase 3: Implement
    • IT Chargeback Communication Plan
    • IT Chargeback Rollout Presentation
    • IT Chargeback Financial Presentation

    4. Revise

    Gather and analyze feedback from business owners, making necessary modifications to the chargeback model and communicating the implications.

    • Implement IT Chargeback – Phase 4: Revise
    • IT Chargeback Change Communication Template
    [infographic]

    Workshop: Implement an IT Chargeback System

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Kick-Off IT Chargeback

    The Purpose

    Make the case for IT chargeback.

    Identify the current and target state of chargeback maturity.

    Establish a chargeback governance model.

    Key Benefits Achieved

    Investigated the benefits and challenges of implementing IT chargeback.

    Understanding of the reasons why traditional chargeback approaches fail.

    Identified the specific pathway to chargeback success.

    Activities

    1.1 Investigate the benefits and challenges of implementing IT chargeback

    1.2 Educate business owners and executives on IT chargeback

    1.3 Identify the current and target state of chargeback maturity

    1.4 Establish chargeback governance

    Outputs

    Defined IT chargeback mandate

    IT chargeback kick-off presentation

    Chargeback maturity assessment

    IT chargeback governance model

    2 Develop the Chargeback Model

    The Purpose

    Develop a chargeback model.

    Identify the customers and user-facing services.

    Allocate IT costs.

    Determine chargeable service units.

    Key Benefits Achieved

    Identified IT customers.

    Identified user-facing services and generated descriptions for them.

    Allocated IT costs to IT services.

    Identified meaningful, measurable, and manageable chargeback service units.

    Activities

    2.1 Identify user-facing services and generate descriptions

    2.2 Allocate costs to user-facing services

    2.3 Determine chargeable service units and pricing

    2.4 Track consumption

    2.5 Determine service charges

    Outputs

    High-level service catalog

    Chargeback model

    3 Communicate IT Chargeback

    The Purpose

    Communicate the implementation of IT chargeback.

    Establish a process for recovering the costs of IT services from business units.

    Share the financial results of the charge cycle with business owners.

    Key Benefits Achieved

    Managed the transition to charging and recovering the costs of IT services from business units.

    Communicated the implementation of IT chargeback and shared the financial results with business owners.

    Activities

    3.1 Create a communication plan

    3.2 Deliver a chargeback rollout presentation

    3.3 Establish a process for recovering IT costs from business units

    3.4 Share the financial results from the charge cycle with business owners

    Outputs

    IT chargeback communication plan

    IT chargeback rollout presentation

    IT service cost recovery process

    IT chargeback financial presentation

    4 Review the Chargeback Model

    The Purpose

    Gather and analyze feedback from business owners on the chargeback model.

    Make necessary modifications to the chargeback model and communicate implications.

    Key Benefits Achieved

    Gathered business stakeholder feedback on the chargeback model.

    Made necessary modifications to the chargeback model to increase satisfaction and accuracy.

    Managed changes by communicating the implications to business owners in a structured manner.

    Activities

    4.1 Address stakeholder pain points and highly disputed costs

    4.2 Update the chargeback model

    4.3 Communicate the chargeback model changes and implications to business units

    Outputs

    Revised chargeback model with business feedback, change log, and modifications

    Chargeback change communication

    Build a Strategic Infrastructure Roadmap

    • Buy Link or Shortcode: {j2store}332|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $36,636 Average $ Saved
    • member rating average days saved: 26 Average Days Saved
    • Parent Category Name: Strategy and Organizational Design
    • Parent Category Link: /strategy-and-organizational-design

    Getting a seat at the table is your first objective in building a strategic roadmap. Knowing what the business wants to do and understanding what it will need in the future is a challenge for most IT departments.

    This could be a challenge such as:

    • Understanding the business vision
    • Clear communications on business planning
    • Insight into what the future state should look like
    • Understanding what the IT team is spending its time on day to day

    Our Advice

    Critical Insight

    • Having a clear vision of what the future state is and knowing that creating an IT Infrastructure roadmap is never finished will give your IT team an understanding of priorities, goals, business vision, and risks associated with not planning.
    • Understand what you are currently paying for and why.

    Impact and Result

    • Understanding of the business priorities, and vision of the future
    • Know what your budget is spent on: running the business, growth, or innovation
    • Increased communication with the right stakeholders
    • Better planning based on analysis of time study, priorities, and business goals

    Build a Strategic Infrastructure Roadmap Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build a Strategic Infrastructure Roadmap Storyboard – Improve and align goals and strategy.

    In this section you will develop a vision and mission statement and set goals that align with the business vision and goals. The outcome will deliver your guiding principles and a list of goals that will determine your initiatives and their priorities.

    • Build Your Infrastructure Roadmap Storyboard
    • Strategic Infrastructure Roadmap Tool

    2. Financial Spend Analysis Template – Envision future and analyze constraints.

    Consider your future state by looking at technology that will help the business in the future. Complete an analysis of your past spending to determine your future spend. Complete a SWOT analysis to determine suitability.

    • Financial Spend Analysis Template

    3. Strategic Roadmap Initiative Template – Align and build the roadmap.

    Develop a risk framework that may slow or hinder your strategic initiatives from progressing and evaluate your technical debt. What is the current state of your infrastructure? Generate and prioritize your initiatives, and set dates for completion.

    • Strategic Roadmap Initiative Template

    4. Infrastructure and Strategy Executive Brief Template – Communicate and improve the process.

    After creating your roadmap, communicate it to your audience. Identify who needs to be informed and create an executive brief with the template download. Finally, create KPIs to measure what success looks like.

    • Infrastructure Strategy and Roadmap Executive Presentation Template
    • Infrastructure Strategy and Roadmap Report Template

    Infographic

    Further reading

    Build a Strategic Infrastructure Roadmap

    Align infrastructure investment to business-driven goals.

    Analysts' Perspectives

    Infrastructure roadmaps are an absolute necessity for all organizations. An organization's size often dictates the degree of complexity of the roadmap, but they all strive to paint the future picture of the organization's IT infrastructure.

    Infrastructure roadmaps typically start with the current state of infrastructure and work on how to improve. That thinking must change! Start with the future vision, an unimpeded vision, as if there were no constraints. Now you can see where you want to be.

    Look at your past to determine how you have been spending your infrastructure budget. If your past shows a trend of increased operational expenditures, that trend will likely continue. The same is true for capital spending and staffing numbers.

    Now that you know where you want to go, and how you ended up where you are, look at the constraints you must deal with and make a plan. It's not as difficult as it may seem, and even the longest journey begins with one step.

    Speaking of that first step, it should be to understand the business goals and align your roadmap with those same goals. Now you have a solid plan to develop a strategic infrastructure roadmap; enjoy the journey!

    There are many reasons why you need to build a strategic IT infrastructure roadmap, but your primary objectives are to set the long-term direction, build a framework for decision making, create a foundation for operational planning, and be able to explain to the business what you are planning. It is a basis for accountability and sets out goals and priorities for the future.

    Other than knowing where you are going there are four key benefits to building the roadmap.

    1. It allows you to be strategic and transformative rather than tactical and reactive.
    2. It gives you the ability to prioritize your tasks and projects in order to get them going.
    3. It gives you the ability to align your projects to business outcomes.
    4. Additionally, you can leverage your roadmap to justify your budget for resources and infrastructure.

    When complete, you will be able to communicate to your fellow IT teams what you are doing and get an understanding of possible business- or IT-related roadblocks, but overall executing on your roadmap will demonstrate to the business your competencies and ability to succeed.

    PJ Ryan

    PJ Ryan
    Research Director
    Infrastructure & Operations Practice
    Info-Tech Research Group

    John Donovan

    John Donovan
    Principal Research Director
    Infrastructure & Operations Practice
    Info-Tech Research Group

    Build a Strategic Infrastructure Roadmap

    Align infrastructure investment to business-driven goals.

    EXECUTIVE BRIEF

    Executive Summary

    Your Challenge

    When it comes to building a strategic roadmap, getting a seat at the table is your first objective. Knowing what the business wants to do and understanding its future needs is a challenge for most IT organizations.

    Challenges such as:

    • Understanding the business vision
    • Clear communications on business planning
    • Insight into what the future state should look like

    Common Obstacles

    Fighting fires, keeping the lights on, patching, and overseeing legacy debt maintenance – these activities prevent your IT team from thinking strategically and looking beyond day-to-day operations. Issues include:

    • Managing time well
    • Building the right teams
    • Setting priorities

    Procrastinating when it comes to thinking about your future state will get you nowhere in a hurry.

    Info-Tech's Approach

    Look into your past IT spend and resources that are being utilized.

    • Analyze all aspects of the operation, and resources required.
    • Be realistic with your timelines.
    • Work from the future state backward.

    Build your roadmap by setting priorities, understanding risk and gaps both in finance and resources. Overall, your roadmap is never done, so don't worry if you get it wrong on the first pass.

    Info-Tech Insight

    Have a clear vision of what the future state is, and know that when creating an IT infrastructure roadmap, it is never done. This will give your IT team an understanding of priorities, goals, business vision, and risks associated with not planning. Understand what you are currently paying for and why.

    Insight Summary

    "Planning is bringing the future into the present so that you can do something about it now."
    Source: Alan Lakein, Libquotes

    Your strategic objectives are key to building a roadmap

    Many organizations' day-to-day IT operations are tactical and reactive. This needs to change; the IT team needs to become strategic and proactive in its planning and execution. Forward thinking bridges the gap from your current state, to what the organization is, to what it wants to achieve. Your strategic objectives need to align to the business vision and goals and keep it running.

    Your future state will determine your roadmap priorities

    Identify what the business needs to meet its goals; this should be reflected in your roadmap priorities. Then identify the tasks and projects that can get you there. Business alignment is key, as these projects require prioritization. Strategic initiatives that align to business outcomes will be your foundation for planning on those priorities. If you do not align your initiatives, you will end up spinning your wheels. A good strategic roadmap will have all the elements of forward thinking and planning to execute with the right resources, right priorities, and right funding to make it happen.

    Understand what you have been paying for the last few years

    Measure the cost of "keeping the lights on" as a baseline for your budget that is earmarked and already spent. Determine if your current spend is holding back innovation due to:

    1. The high cost of maintenance
    2. Resources in operations doing low-value work due to the effort required to do tasks related to break/fix on aging hardware and software

    A successful strategic roadmap will be determined when you have a good handle on your current spending patterns and planning for future needs that include resources, budget, and know-how. Without a plan and roadmap, that plan will not get business buy-in or funding.

    Top challenges reported by Info-Tech members

    Lack of strategic direction

    • Infrastructure leadership must discover the business goals.

    Time seepage

    • Project time is constantly being tracked incorrectly.

    Technical debt

    • Aging equipment is not proactively cycled out with newer enabling technologies.

    Case Study

    The strategic IT roadmap allows Dura to stay at the forefront of automotive manufacturing.

    INDUSTRY: Manufacturing
    SOURCE: Performance Improvement Partners

    Challenge

    Following the acquisition of Dura, MiddleGround aimed to position Dura as a leader in the automotive industry, leveraging the company's established success spanning over a century.

    However, prior limited investments in technology necessitated significant improvements for Dura to optimize its processes and take advantage of digital advancements.

    Solution

    MiddleGround joined forces with PIP to assess technology risks, expenses, and prospects, and develop a practical IT plan with solutions that fit MiddleGround's value-creation timeline.

    By selecting the top 15 most important IT projects, the companies put together a feasible technology roadmap aimed at advancing Dura in the manufacturing sector.

    Results

    Armed with due diligence reports and a well-defined IT plan, MiddleGround and Dura have a strategic approach to maximizing value creation.

    By focusing on key areas such as analysis, applications, infrastructure and the IT organization, Dura is effectively transforming its operations and shaping the future of the automotive manufacturing industry.

    How well do you know your business strategy?

    A mere 25% of managers
    can list three of the company's
    top five priorities.

    Based on a study from MIT Sloan, shared understanding of strategic directives barely exists beyond the top tiers of leadership.

    An image of a bar graph showing the percentage of leaders able to correctly list a majority of their strategic priorities.

    Take your time back

    Unplanned incident response is a leading cause of the infrastructure time crunch, but so too are nonstandard service requests and service requests that should be projects.

    29%

    Less than one-third of all IT projects finish on time.

    200%

    85% of IT projects average cost overruns of 200% and time overruns of 70%.

    70%

    70% of IT workers feel as though they have too much work and not enough time to do it.

    Source: MIT Sloan

    Inventory Assessment

    Lifecycle

    Refresh strategies are still based on truisms (every three years for servers, every seven years for LAN, etc.) more than risk-based approaches.

    Opportunity Cost

    Assets that were suitable to enable business goals need to be re-evaluated as those goals change.

    See Info-Tech's Manage Your Technical Debt blueprint

    an image of info-tech's Manage your technical debt.

    Key IT strategy initiatives can be categorized in three ways

    IT key initiative plan

    Initiatives collectively support the business goals and corporate initiatives, and improve the delivery of IT services.

    1. Business support
      • Support major business initiatives
      • Each corporate initiative is supported by a major IT project and each project has unique IT challenges that require IT support.
    2. IT excellence
      • Reduce risk and improve IT operational excellence
      • These projects will increase IT process maturity and will systematically improve IT.
    3. Innovation
      • Drive technology innovation
      • These projects will improve future innovation capabilities and decrease risk by increasing technology maturity.

    Info-Tech Insight

    A CIO has three roles: enable business productivity, run an effective IT shop, and drive technology innovation. Your key initiative plan must reflect these three mandates and how IT strives to fulfill them.

    IT must accomplish many things

    Manage
    the lifecycle of aging equipment against current capacity and capability demands.

    Curate
    a portfolio of enabling technologies to meet future capacity and capability demands.

    Initiate
    a realistic schedule of initiatives that supports a diverse range of business goals.

    Adapt
    to executive feedback and changing business goals.

    an image of Info-Tech's Build your strategic roadmap

    Primary and secondary infrastructure drivers

    • Primary driver – The infrastructure component that is directly responsible for enabling change in the business metric.
    • Secondary driver – The infrastructure component(s) that primary drivers rely on.

    (Source: BMC)

    Sample primary and secondary drivers

    Business metric Source(s) Primary infrastructure drivers Secondary infrastructure drivers

    Sales revenue

    Online store

    Website/Server (for digital businesses)

    • Network
    • Data center facilities

    # of new customers

    Call center

    Physical plant cabling in the call center

    • PBX/VOIP server
    • Network
    • Data center facilities

    Info-Tech Insight

    You may not be able to directly influence the primary drivers of the business, but your infrastructure can have a major impact as a secondary driver.

    Info-Tech's approach

    1. Align strategy and goals
    • Establish the scope of your IT strategy by defining IT's mission and vision statements and guiding principles.
  • Envision future and analyze constraints
    • Envision and define your future infrastructure and analyze what is holding you back.
  • Align and build the roadmap
    • Establish a risk framework, identify initiatives, and build your strategic infrastructure roadmap.
  • Communicate and improve the process
    • Communicate the results of your hard work to the right people and establish the groundwork for continual improvement of the process.
  • Blueprint deliverables

    Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

    Mission and Vision Statement
    Goal Alignment (Slide 28)

    Construct your vision and mission aligned to the business.

    Mission and Vision Statement

    Strategic Infrastructure Roadmap tool

    Build initiatives and prioritize them. Build the roadmap.

    Strategic Infrastructure Roadmap tool

    Infrastructure Domain Study

    What is stealing your time from getting projects done?

    Infrastructure Domain Study

    Initiative Templates Process Maps & Strategy

    Build templates for initiates, build process map, and develop strategies.

    Initiative Templates Process Maps & Strategy

    Key Deliverable

    it infrastructure roadmap template

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

    Workshop

    “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

    Consulting

    “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

    Diagnostics and consistent frameworks used throughout all four options

    Info-Tech's methodology for an infrastructure strategy and roadmap

    1. Align Strategy and Goals

    2. Envision Future and Analyze Constraints

    3. Align and Build the Roadmap

    4. Communicate and Improve the Process

    Phase steps

    1.1 Develop the infrastructure strategy

    1.2 Define the goals

    2.1 Define the future state

    2.2 Analyze constraints

    3.1 Align the roadmap

    3.2 Build the roadmap

    4.1 Identify the audience

    4.2 Improve the process

    Phase Outcomes

    • Vision statement
    • Mission statement
    • Guiding principles
    • List of goals
    • Financial spend analysis
    • Domain time study
    • Prioritized list of roadblocks
    • Future-state vision document
    • IT and business risk frameworks
    • Technical debt assessment
    • New technology analysis
    • Initiative templates
    • Initiative candidates
    • Roadmap visualization
    • Process schedule
    • Communications strategy
    • process map
    • Infrastructure roadmap report

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 0 Phase 1 Phase 2 Phase 3 Phase 4

    Call #1: Scope requirements, objectives, and your specific challenges.

    Call #2: Define mission and vision statements and guiding principles to discuss strategy scope.
    Call #3: Brainstorm goals and definition.

    Call #4: Conduct a spend analysis and a time resource study.
    Call #5: Identify roadblocks.

    Call #6: Develop a risk framework and address technical debt.
    Call #7: Identify new initiatives and SWOT analysis.
    Call #8: Visualize and identify initiatives.
    Call #9: Complete shadow IT and initiative finalization.

    Call #10: Identify your audience and communicate.
    Call #11: Improve the process.

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is 8 to 12 calls over the course of 4 to 6 months.

    Workshop Overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Session 0 (Pre-workshop)

    Session 1

    Session 2

    Session 3

    Session 4

    Session 5 (Post-workshop)

    Elicit business context Align Strategy and Goals Envision Future and Analyze Constraints Align and Build the Roadmap Communicate and Improve the Process Wrap-up (offsite)

    0.1 Complete recommended diagnostic programs.
    0.2 Interview key business stakeholders, as needed, to identify business context: business goals, initiatives, and the organization's mission and vision.
    0.3 (Optional) CIO to compile and prioritize IT success stories.

    1.1 Infrastructure strategy.
    1.1.1 Review/validate the business context.
    1.1.2 Construct your mission and vision statements.
    1.1.3 Elicit your guiding principles and finalize IT strategy scope.

    1.2 Business goal alignment
    1.2.1 Intake identification and analysis.
    1.2.2 Survey results analysis.
    1.2.3 Brainstorm goals.
    1.2.4 Perform goal association and analysis.

    2.1 Define the future state.
    2.1.1 Conduct an emerging technology discussion.
    2.1.2 Document desired future state.
    2.1.3 Develop a new technology identification process.
    2.1.4 Compete SWOT analysis.

    2.2 Analyze your constraints
    2.2.1 Perform a historical spend analysis.
    2.2.2 Conduct a time study.
    2.2.3 Identify roadblocks.
    .

    3.1 Align the roadmap
    3.1.1 Develop a risk framework.
    3.1.2 Evaluate technical debt.

    3.2 Build the roadmap.
    3.2.1 Build effective initiative templates.
    3.2.2 Visualize.
    3.2.3 Generate new initiatives.
    3.2.4 Repatriate shadow IT initiatives.
    3.2.5 Finalize initiative candidates.

    4.2 Identify the audience
    4.1.1 Identify required authors and target audiences.
    4.1.2 Plan the process.
    4.1.2 Identify supporters and blockers.

    4.2 Improve the process
    4.2.1 Evaluate the value of each process output.
    4.2.2 Brainstorm improvements.
    4.2.3 Set realistic measures.

    5.1 Complete in-progress deliverables from previous four days.
    5.2 Set up time to review workshop deliverables and discuss next steps.

    1. SWOT analysis of current state
    2. Goals cascade
    3. Persona analysis
    1. Vision statement, mission statement, and guiding principles
    2. List of goals
    1. Spend analysis document
    2. Domain time study
    3. Prioritized list of roadblocks
    4. Future state vision document
    1. IT and business risk frameworks
    2. Technical debt assessment
    3. New technology analysis
    4. Initiative templates
    5. Initiative candidates
    1. Roadmap visualization
    2. Process schedule
    3. Communications strategy
    4. Process map
    1. Strategic Infrastructure Roadmap Report

    Phase 1

    Align Strategy and Goals

    Phase 1

    Phase 2

    Phase 3

    Phase 4

    1.1 Infrastructure strategy

    1.2 Goal alignment

    2.1 Define your future

    2.2 Conduct constraints analysis

    3.1 Drive business alignment

    3.2. Build the roadmap

    4.1 Identify the audience

    4.2 Process improvement

    and measurements

    This phase will walk you through the following activities:

    • How to build IT mission and vision statements
    • How to elicit IT guiding principles
    • How to finalize and communicate your IT strategy scope

    This phase involves the following participants:

    • CIO
    • Senior IT Team

    Step 1.1

    Develop the Infrastructure Strategy

    Activities

    1.1.1 Review/validate the business context

    1.1.2 Construct your mission and vision statements

    1.1.3 Elicit your guiding principles and finalize IT strategy scope

    This step requires the following inputs:

    • Business Mission Statement
    • Business Vision Statement
    • Business Goals

    This step involves the following participants:

    • Roadmap team

    Outcomes of this step

    • IT mission statement
    • IT vision statement
    • Guiding principles

    To complete this phase, you will need:

    Infrastructure Strategy and Roadmap Report Template

    Infrastructure Strategy and Roadmap Report Template

    Use the IT Infrastructure Strategy and Roadmap Report Template to document the results from the following activities:

    • Mission and Vision Statements
    • Business impact
    • Roadmap

    IT must aim to support the organization's mission and vision

    A mission statement

    • Focuses on today and what an organization does to achieve the mission.
    • Drives the company.
    • Answers: What do we do? Who do we serve? How do we service them?

    "A mission statement focuses on the purpose of the brand; the vision statement looks to the fulfillment of that purpose."

    A vision statement

    • Focuses on tomorrow and what an organization ultimately wants to become.
    • Gives the company direction.
    • Answers: What problems are we solving? Who and what are we changing?

    "A vision statement provides a concrete way for stakeholders, especially employees, to understand the meaning and purpose of your business. However, unlike a mission statement – which describes the who, what, and why of your business – a vision statement describes the desired long-term results of your company's efforts."
    Source: Business News Daily, 2020

    Characteristics of mission and vision statements

    A strong mission statement has the following characteristics:

    • Articulates the IT function's purpose and reason for existence.
    • Describes what the IT function does to achieve its vision.
    • Defines the customers of the IT function.
    • Is:
      • Compelling
      • Easy to grasp
      • Sharply focused
      • Concise

    A strong vision statement has the following characteristics:

    • Describes a desired future achievement.
    • Focuses on ends, not means.
    • Communicates promise.
    • Is:
      • Concise; no unnecessary words
      • Compelling
      • Achievable
      • Measurable

    Derive the IT mission and vision statements from the business

    Begin the process by identifying and locating the business mission and vision statements.

    • Corporate websites
    • Business strategy documents
    • Business executives

    Ensure there is alignment between the business and IT statements.

    Note: Mission statements may remain the same unless the IT department's mandate is changing.

    an image showing Business mission, IT mission, Business Vision, and IT Vison.

    1.1.2 Construct mission and vision statements

    1 hour

    Objective: Help teams define their purpose (why they exist) to build a mission statement (if one doesn't already exist).

    Step 1:

    1. Gather the IT strategy creation team and revisit your business context inputs, specifically the corporate mission statement.
    2. Begin by asking the participants:
        1. What is our job as a team?
        2. What's our goal? How do we align IT to our corporate mission?
        3. What benefit are we bringing to the company and the world?
      1. Ask them to share general thoughts in a check-in.

    Step 2:

    1. Share some examples of IT mission statements.
    2. Example: IT provides innovative product solutions and leadership that drives growth and
      success.
    3. Provide each participant with some time to write their own version of an IT mission statement.

    Download the ITRG IT Infrastructure Strategy and Roadmap Report Template and document your mission and vision statements in Section 1.

    Input

    • Business vision statement
    • Business mission statement

    Output

    • IT mission statement
    • IT vision statement

    Materials

    • Sticky notes
    • Markers
    • Whiteboard
    • Paper
    • Collaboration/brain-storming tool (whiteboard, flip chart, digital equivalent)

    Participants

    • CIO
    • Senior IT Team

    1.1.2 Construct mission and vision statements (cont'd)

    1 hour

    Objective: Help teams define their purpose (why they exist) to build a mission statement (if one doesn't already exist).

    Step 3:

    This step involves reviewing individual mission statements, combining them, and building one collective mission statement for the team.

    1. Consider the following approach to build a unified mission statement:

    Use the 20x20 rule for group decision-making. Give the group no more than 20 minutes to craft a collective team purpose with no more than 20 words.

    1. As a facilitator, provide guidelines on how to write for the intended audience. Business stakeholders need business language.
    2. Refer to the corporate mission statement periodically and ensure there is alignment.
    3. Document your final mission statement in your ITRG Infrastructure Strategy and Roadmap Report Template.

    Download the ITRG IT Infrastructure Strategy and Roadmap Report Template and document your mission and vision statements in Section 1.

    Input

    • Business vision statement
    • Business mission statement

    Output

    • IT mission statement
    • IT vision statement

    Materials

    • Sticky notes
    • Markers
    • Whiteboard
    • Paper
    • Collaboration/brain-storming tool (whiteboard, flip chart, digital equivalent)

    Participants

    • CIO
    • Senior IT Team

    1.1.2 Construct mission and vision statements (cont'd)

    1 hour

    Objective: Help teams define their purpose (why they exist) to build a mission statement (if one doesn't already exist).

    Step 4:

    1. Gather the IT strategy creation team and revisit your business context inputs, specifically the corporate vision statement.
    2. Share one or more examples of vision statements.
    3. Provide participants with sticky notes and writing materials and ask them to work individually for this step.
    4. Ask participants to brainstorm:
      1. What is the desired future state of the IT organization?
      2. How should we work to attain the desired state?
      3. How do we want IT to be perceived in the desired state?
    5. Provide participants with guidelines to build descriptive, compelling, and achievable statements regarding their desired future state.
    6. Regroup as a team and review participant answers.

    Download the ITRG IT Infrastructure Strategy and Roadmap Report Template and document your mission and vision statements in Section 1.

    Input

    • Business vision statement
    • Business mission statement

    Output

    • IT mission statement
    • IT vision statement

    Materials

    • Sticky notes
    • Markers
    • Whiteboard
    • Paper
    • Collaboration/brain-storming tool (whiteboard, flip chart, digital equivalent)

    Participants

    • CIO
    • Senior IT Team

    1.1.2 Construct mission and vision statements (cont'd)

    1 hour

    Objective: Help teams define their purpose (why they exist) to build a mission statement (if one doesn't already exist).

    Step 5:

    1. Ask the team to post their notes on the wall.
    2. Have the team group the words that have a similar meaning or feeling behind them; this will create themes.
    3. When the group is done categorizing the statements into themes, ask if there's anything missing. Did they ensure alignment to the corporate vision statement? Are there any elements missing when considering alignment back to the corporate vision statement?

    Step 6:

    1. Consider each category as a component of your vision statement.
    2. Review each category with participants; define what the behavior looks like when it is being met and what it looks like when it isn't.
    3. As a facilitator, provide guidelines on word-smithing and finessing the language.
    4. Refer to the corporate vision statement periodically and ensure there is alignment.
    5. Document your final mission statement in your IT Strategy Presentation Template.

    Download the ITRG IT Infrastructure Strategy and Roadmap Report Template and document your mission and vision statements in Section 1.

    Input

    • Business vision statement
    • Business mission statement

    Output

    • IT mission statement
    • IT vision statement

    Materials

    • Sticky notes
    • Markers
    • Whiteboard
    • Paper
    • Collaboration/brain-storming tool (whiteboard, flip chart, digital equivalent)

    Participants

    • CIO
    • Senior IT Team

    1.1.2 Construct mission and vision statements (cont'd)

    Tips for online facilitation:

    • Pick an online whiteboard tool that allows participants to use a large, zoomable canvas.
    • Set up each topic at a different area of the board; spread them out just like you would do on the walls of a room.
    • Invite participants to zoom in and visit each section and add their ideas as sticky notes once you reach that section of the exercise.
    • If you're not using an online whiteboard, we'd recommend using a collaboration tool such as Google Docs or Teams Whiteboard to collect the information for each step under a separate heading. Invite everyone into the document but be very clear regarding editing rights.
    • Pre-create your screen deck and screen share this with your participants through your videoconferencing software. We'd also recommend sharing this so participants can go through the deck again during the reflection steps.
    • When facilitating group discussion, we'd recommend that participants use non-verbal means to indicate they'd like to speak. You can use tools like Teams' hand-raising tool, a reaction emoji, or have people put their hands up. The facilitator can then invite that person to talk.

    Source: Hyper Island

    Input

    • Business vision statement
    • Business mission statement

    Output

    • IT mission statement
    • IT vision statement

    Materials

    • Sticky notes
    • Markers
    • Whiteboard
    • Paper
    • Collaboration/brainstorming tool (whiteboard, flip chart, digital equivalent)

    Participants

    • CIO
    • Senior IT Team

    IT mission statements demonstrate IT's purpose

    The IT mission statement specifies the function's purpose or reason for being. The mission should guide each day's activities and decisions. The mission statements use simple and concise terminology and speak loudly and clearly, generating enthusiasm for the organization.

    Strong IT mission statements have the following characteristics:

    • Articulate the IT function's purpose and reason for existence
    • Describe what the IT function does to achieve its vision
    • Define the customers of the IT function
    • Are:
      • Compelling
      • Easy to grasp
      • Sharply focused
      • Inspirational
      • Memorable
      • Concise

    Sample IT Mission Statements:

    • To provide infrastructure, support, and innovation in the delivery of secure, enterprise-grade information technology products and services that enable and empower the workforce at [Company Name].
    • To help fulfill organizational goals, the IT department is committed to empowering business stakeholders with technology and services that facilitate effective processes, collaboration, and communication.
    • The mission of the information technology (IT) department is to build a solid, comprehensive technology infrastructure; to maintain an efficient, effective operations environment; and to deliver high-quality, timely services that support the business goals and objectives of ABC Inc.
    • The IT department has operational, strategic, and fiscal responsibility for the innovation, implementation, and advancement of technology at ABC Inc. in three main areas: network administration and end-user support, instructional services, and information systems. The IT department provides leadership in long-range planning, implementation, and maintenance of information technology across the organization.
    • The IT group is customer-centered and driven by its commitment to management and staff. It oversees services in computing, telecommunications, networking, administrative computing, and technology training.

    Sample mission statements (cont'd)

    • To collaborate and empower our stakeholders through an engaged team and operational agility and deliver innovative technology and services.
    • To empower our stakeholders with innovative technology and services, through collaboration and agility.
    • To collaborate and empower our stakeholder, by delivering innovative technology and services, with an engaged team and operational agility.
    • To partner with departments and be technology leaders that will deliver innovative, secure, efficient, and cost-effective services for our citizens.
    • As a client-centric strategic partner, provide excellence in IM and IT services through flexible business solutions for achieving positive user experience and satisfaction.
    • Develop a high-performing global team that will plan and build a scalable, stable operating environment.
    • Through communication and collaboration, empower stakeholders with innovative technology and services.
    • Build a robust portfolio of technology services and solutions, enabling science-lead and business-driven success.
    • Guided by value-driven decision making, high-performing teams and trusted partners deliver and continually improve secure, reliable, scalable, and reusable services that exceed customer expectations.
    • Engage the business to grow capabilities and securely deliver efficient services to our users and clients.
    • Engage the business to securely deliver efficient services and grow capabilities for our users and clients.

    IT vision statements demonstrate what the IT organization aspires to be

    The IT vision statement communicates a desired future state of the IT organization. The statement is expressed in the present tense. It seeks to articulate the desired role of IT and how IT will be perceived.

    Strong IT vision statements have the following characteristics:

    • Describe a desired future
    • Focus on ends, not means
    • Communicate promise
    • Are:
      • Concise; no unnecessary words
      • Compelling
      • Achievable
      • Inspirational
      • Memorable

    Sample IT vision statements:

    • To be a trusted advisor and partner in enabling business innovation and growth through an engaged IT workforce.
    • The IT organization will strive to become a world-class value center that is a catalyst for innovation.
    • IT is a cohesive, proactive, and disciplined team that delivers innovative technology solutions while demonstrating a strong customer-oriented mindset.
    • Develop and maintain IT and an IT support environment that is secure, stable, and reliable within a dynamic environment.

    Sample vision statements (cont'd)

    • Alignment: To ensure that the IT organizational model and all related operational services and duties are properly aligned with all underlying business goals and objectives. Alignment reflects an IT operation "that makes sense," considering the business served, its interests and its operational imperatives.
    • Engagement: To ensure that all IT vision stakeholders are fully engaged in technology-related planning and the operational parameters of the IT service portfolio. IT stakeholders include the IT performing organization (IT Department), company executives and end-users.
    • Best Practices: To ensure that IT operates in a standardized fashion, relying on practical management standards and strategies properly sized to technology needs and organizational capabilities.
    • Commitment to Customer Service: To ensure that IT services are provided in a timely, high-quality manner, designed to fill the operational needs of the front-line end-users, working within the boundaries established by business interests and technology best practices.

    Quoted From ITtoolkit, 2020

    Case Study

    Acme Corp. was able to construct its IT mission and vison statements by aligning to its corporate mission and vision.

    INDUSTRY: Professional Services
    COMPANY: This case study is based on a real company but was anonymized for use in this research.

    Business

    IT

    Mission

    Vision

    Mission

    Vision

    We help IT leaders achieve measurable results by systematically improving core IT processes, governance, and critical technology projects.

    Acme Corp. will grow to become the largest research firm across the industry by providing unprecedented value to our clients.

    IT provides innovative product solutions and leadership that drives growth and success.

    We will relentlessly drive value to our customers through unprecedented innovation.

    IT guiding principles set the boundaries for your strategy

    Strategic guiding principles advise the IT organization on the boundaries of the strategy.

    Guiding principles are a priori decisions that limit the scope of strategic thinking to what is acceptable organizationally, from budgetary, people, and partnership standpoints. Guiding principles can cover other dimensions, as well.

    Organizational stakeholders are more likely to follow IT principles when a rationale is provided.

    After defining the set of IT principles, ensure that they are all expanded upon with a rationale. The rationale ensures principles are more likely to be followed because they communicate why the principles are important and how they are to be used. Develop the rationale for each IT principle your organization has chosen.

    IT guiding principles = IT strategy boundaries

    Consider these four components when brainstorming guiding principles

    Breadth

    of the IT strategy can span across the eight perspectives: people, process, technology, data, process, sourcing, location, and timing.

    Defining which of the eight perspectives is in scope for the IT strategy is crucial to ensuring the IT strategy will be comprehensive, relevant, and actionable.

    Depth

    of coverage refers to the level of detail the IT strategy will go into for each perspective. Info-Tech recommends that depth should go to the initiative level (i.e. individual projects).

    Organizational coverage

    will determine which part of the organization the IT strategy will cover.

    Planning horizon

    of the IT strategy will dictate when the target state should be reached and the length of the roadmap.

    Consider these criteria when brainstorming guiding principle statements

    Approach focused IT principles are focused on the approach, i.e. how the organization is built, transformed, and operated, as opposed to what needs to be built, which is defined by both functional and non-functional requirements.
    Business relevant Create IT principles that are specific to the organization. Tie IT principles to the organization's priorities and strategic aspirations.
    Long lasting Build IT principles that will withstand the test of time.
    Prescriptive Inform and direct decision-making with IT principles that are actionable. Avoid truisms, general statements, and observations.
    Verifiable If compliance can't be verified, the principle is less likely to be followed.
    Easily digestible IT principles must be clearly understood by everyone in IT and by business stakeholders. IT principles aren't a secret manuscript of the IT team. IT principles should be succinct; wordy principles are hard to understand and remember.
    Followed

    Successful IT principles represent a collection of beliefs shared among enterprise stakeholders. IT principles must be continuously reinforced to all stakeholders to achieve and maintain buy-in.

    In organizations where formal policy enforcement works well, IT principles should be enforced through appropriate governance processes.

    Review ten universal IT principles to determine if your organization wishes to adopt them

    IT principle name

    IT principle statement

    1. Enterprise value focus We aim to provide maximum long-term benefits to the enterprise as a whole while optimizing total costs of ownership and risks.
    2. Fit for purpose We maintain capability levels and create solutions that are fit for purpose without over engineering them.
    3. Simplicity We choose the simplest solutions and aim to reduce operational complexity of the enterprise.
    4. Reuse > buy > build We maximize reuse of existing assets. If we can't reuse, we procure externally. As a last resort, we build custom solutions.
    5. Managed data We handle data creation, modification, and use enterprise-wide in compliance with our data governance policy.
    6. Controlled technical diversity We control the variety of technology platforms we use.
    7. Managed security We manage security enterprise-wide in compliance with our security governance policy.
    8. Compliance to laws and regulations We operate in compliance with all applicable laws and regulations.
    9. Innovation We seek innovative ways to use technology for business advantage.
    10. Customer centricity We deliver best experiences to our customers with our services and products.

    1.1.3 Elicit guiding principles

    1 hour

    Objective: Generate ideas for guiding principle statements with silent sticky note writing.

    1. Gather the IT strategy creation team and revisit your mission and vision statements.
    2. Ask the group to brainstorm answers individually, silently writing their ideas on separate sticky notes. Provide the brainstorming criteria from the previous slide to all team members. Allow the team to put items on separate notes that can later be shuffled and sorted as distinct thoughts.
    3. After a set amount of time, ask the members of the group to stick their notes to the whiteboard and quickly present them. Categorize all ideas into four major buckets: breadth, depth, organizational coverage, and planning horizon. Ideally, you want one guiding principle to describe each of the four components.
    4. If there are missing guiding principles in any category or anyone's items inspire others to write more, they can stick those up on the wall too, after everyone has presented.
    5. Discuss and finalize your IT guiding principles.
    6. Document your guiding principles in the IT Strategy Presentation Template in Section 1.

    Source: Hyper Island

    Download the ITRG IT Infrastructure Strategy and Roadmap Report Template and document your mission and vision statements in Section 1.

    Input

    • Four components for eliciting guiding principles
    • Mission and vision statements

    Output

    • IT guiding principles
    • IT strategy scope

    Materials

    • Sticky notes
    • Whiteboard
    • Paper
    • Collaboration/brain-storming tool (whiteboard, flip chart, digital equivalent)

    Participants

    • CIO
    • Senior IT Team

    Guiding principle examples

    • Alignment: Our IT decisions will align with [our organization's] strategic plan.
    • Resources: We will allocate cyber-infrastructure resources based on providing the greatest value and benefit for [the community].
    • User Focus: User needs will be a key component in all IT decisions.
    • Collaboration: We will work within and across organizational structures to meet strategic goals and identify opportunities for innovation and improvement.
    • Transparency: We will be transparent in our decision making and resource use.
    • Innovation: We will value innovative and creative thinking.
    • Data Stewardship: We will provide a secure but accessible data environment.
    • IT Knowledge and Skills: We will value technology skills development for the IT community.
    • Drive reduced costs and improved services
    • Deploy packaged apps – do not develop – retain business process knowledge expertise – reduce apps portfolio
    • Standardize/Consolidate infrastructure with key partners
    • Use what we sell, and help sell
    • Drive high-availability goals: No blunders
    • Ensure hardened security and disaster recovery
    • Broaden skills (hard and soft) across the workforce
    • Improve business alignment and IT governance

    Quoted From: Office of Information Technology, 2014; Future of CIO, 2013

    Case Study

    Acme Corp. elicited guiding principles that set the scope of its IT strategy for FY21.

    INDUSTRY: Professional Services
    COMPANY: Acme Corp.

    The following guiding principles define the values that drive IT's strategy in FY23 and provide the criteria for our 12-month planning horizon.

    • We will focus on big-ticket items during the next 12 months.
    • We will keep the budget within 5%+/- YOY.
    • We will insource over outsource.
    • We will develop a cloud-first technology stack.

    Finalize your IT strategy scope

    Your mission and vision statements and your guiding principles should be the first things you communicate on your IT strategy document.

    Why is this important?

    • Communicating these elements shows how IT supports the corporate direction.
    • The vision and mission statements will clearly articulate IT's aspirations and purpose.
    • The guiding principles will clearly articulate how IT plans to support the business strategically.
    • These elements set expectations with stakeholders for the rest of your strategy.

    Input information into the IT Strategy Presentation Template.

    an image showing the IT Strategy Scope.

    Summary of Accomplishment

    Established the scope of your IT strategy

    • Constructed the IT mission statement to communicate the IT organization's reason for being.
    • Constructed the IT vision statement to communicate the desired future state of the IT organization.
    • Elicited IT's guiding principles to communicate the overall scope and time horizon for the strategy.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Step 1.2

    Business Goal Alignment

    Activities

    1.2.1 Intake identification and analysis

    1.2.2 Survey results analysis

    1.2.3 Goal brainstorming

    1.2.4 Goal association and analysis

    This step requires the following inputs:

    • Last year's accomplished project list
    • Business unit input source list
    • Goal list
    • In-flight initiatives list

    This step involves the following participants:

    • Business leadership
    • Project Management Office
    • Service Desk
    • Business Relationship Management
    • Solution or Enterprise Architecture
    • Roadmap team

    Outcomes of this step

    • Intake analysis
    • Goal list
    • Initiative-to-goal map

    Identify who is expecting what from the infrastructure

    "Typically, IT thinks in an IT first, business second, way: 'I have a list of problems and if I solve them, the business will benefit.' This is the wrong way of thinking. The business needs to be thought of first, then IT."

    – Fred Chagnon, Infrastructure Director,
    Info-Tech Research Group

    Info-Tech Insight

    If you're not soliciting input from or delivering on the needs of the various departments in your company, then who is? Be explicit and track how you communicate with each individual unit within your company.

    Mature project portfolio management and enterprise architecture practices are no substitute for understanding your business clientele.

    It may not be a democracy, but listening to everyone's voice is an essential step toward generating a useful roadmap.

    Building good infrastructure requires an understanding of how it will be used. Explicit consultation with stakeholders maximizes a roadmap's usefulness and holds the enterprise accountable in future roadmap iterations as goals change.

    Who are the customers for infrastructure?

    Internal customer examples:

    • Network Operations manager
    • IT Systems manager
    • Webmaster
    • Security manager

    External customer examples:

    • Director of Sales
    • Operations manager
    • Applications manager
    • Clients
    • Partners and consultants
    • Regulators/government

    1.2.1 Intake identification and analysis

    1 hour

    The humble checklist is the single most effective tool to ensure we don't forget someone or something:

    1. Have everyone write down their top five completed projects from last year – one project per sticky note.
    2. Organize everyone's sticky notes on a whiteboard according to input source – did these projects come from the PMO? Directly from a BRM? Service request? VP or LoB management?
    3. Make a MECE list of these sources on the left-hand side of a whiteboard.
    4. On the right-hand side list all the departments or functional business units within the company.
    5. Draw lines from right to left indicating which business units use which input source to request work.
    6. Optional: Rate the efficacy of each input channel – what is the success rate of projects per channel in terms of time, budget, and functionality?

    Discussion:

    1. How clearly do projects and initiatives arrive at infrastructure to be acted on? Do they follow the predictable formal process with all the needed information or is it more ad hoc?
    2. Can we validate that business units are using the correct input channel to request the appropriate work? Does infrastructure have to spend more time validating the requests of any one channel?
    3. Can we identify business units that are underserved? How about overserved? Infrastructure initiatives tend to be near universal in effect – are we forgetting anyone?
    4. Are all these methods passive (order taking), or is there a process for infrastructure to suggest an initiative or project?

    Input

    • Last year's accomplished project list

    Output

    • Work requested workflow and map

    Materials

    • Sticky notes
    • Whiteboard & markers

    Participants

    • Roadmap team

    Case Study

    Building IT governance and digital infrastructure for tech-enabled student experiences

    INDUSTRY: Education
    COMPANY: Collegis Education

    Challenge

    In 2019, Saint Francis University decided to expand its online program offering to reach students outside of its market.

    It had to first transform its operations to deliver a high-quality, technology-enabled student experience on and off campus. The remote location of the campus posed power outages, Wi-Fi issues, and challenges in attracting and retaining the right staff to help the university achieve its goals.

    It began working with an IT consulting firm to build a long-term strategic roadmap.

    Solution

    The consultant designed a strategic multi-year roadmap for digital transformation that would prioritize developing infrastructure to immediately improve the student experience and ultimately enable the university to scale its online programs. The consultant worked with school leadership to establish a virtual CIO to oversee the IT department's strategy and operations. The virtual CIO quickly became a key advisor to the president and board, identifying gaps between technology initiatives and enrollment and revenue targets. St. Francis staff also transitioned to the consultant's technology team, allowing the university to alleviate its talent acquisition and retention challenges.

    Results

    • $200,000 in funds reallocated to help with upgrades due to streamlined technology infrastructure
    • Updated card access system for campus staff and students
    • Active directory implementation for a secure and strong authentication technology
    • An uninterruptible power supply (UPS) backup is installed to ensure power continues in the event of a power outage
    • Upgrade to a reliable, campus-wide Wi-Fi network
    • Behind-the-scenes upgrades like state-of-the-art data centers to stabilize aging technology for greater reliability

    Track your annual activity by business unit – not by input source

    A simple graph showing the breakdown of projects by business unit is an excellent visualization of who is getting the most from infrastructure services.

    Show everyone in the organization that the best way to get anything done is by availing themselves of the roadmap process.

    An image of two bar graphs, # of initiatives requested
by customer; # of initiatives proposed to customer.

    Enable technology staff to engage in business storytelling by documenting known goals in a framework

    Without a goal framework

    Technology-focused IT staff are notoriously disconnected from the business process and are therefore often unable to explain the outcomes of their projects in terms that are meaningful to the business.

    With a goal framework

    When business, IT, and infrastructure goals are aligned, the business story writes itself as you follow the path of cascading goals upward.

    Info-Tech Best Practice

    So many organizations we speak with don't have goals written down. This rarely means that the goals aren't known, rather that they're not clearly communicated.

    When goals aren't clear, personal agendas can take precedence. This is what often leads to the disconnect between what the business wants and what IT is delivering.

    1.2.2 Survey and results analysis

    1 hour

    Infrastructure succeeds by effectively scaling shared resources for the common good. Sometimes that is a matter of aggregating similarities, sometimes by recognizing where specialization is required.

    1. Have every business unit provide their top three to five current goals or objectives for their department. Emphasize that you are requesting their operational objectives, not just the ones they think IT may be able to help them with.
    2. Put each goal on a sticky note (optional: use a unique sticky note or marker color for each department) and place them on a whiteboard.
    3. Group the sticky notes according to common themes.
    4. Rank each grouping according to number of occurrences.

    Discussion:

    1. This is very democratic. Do certain departments' goals carry more weight more than others?
    2. What is the current business prioritization process? Do the results of our activity match with the current published output of this process?
    3. Consider each business goal in the context of infrastructure activity or technology feature or capability. As infrastructure is a lift function existing only to serve the business, it is important to understand our world in context.

    Examples: The VP of Operations is looking to reduce office rental costs over the next three years. The VP of Sales is focused on increasing the number of face-to-face customer interactions. Both can potentially be served by IT activities and technologies that increase mobility.

    Input

    • Business unit input source list

    Output

    • Prioritized list of business goals

    Materials

    • Sticky notes
    • Whiteboard & markers

    Participants

    • Roadmap team

    1.2.3 Goal brainstorming – Affinity diagramming exercise

    1 hour

    Clarify how well you understand what the business wants.

    1. Ask each participant to consider: "What are the top three priorities of the company [this period]?" They should consider not what they think the priorities should be, but their understanding of what business leadership's priorities actually are.
    2. Have each participant write down their three priorities on sticky notes – one per note.
    3. Select a moderator from the group – not the infrastructure leader or the CIO. The moderator will begin by placing (and explaining) their sticky notes on the whiteboard.
    4. Have each participant place and explain their sticky notes on the whiteboard.
    5. The moderator will assist each participant in grouping sticky notes together based on theme.
    6. Groups that become overly large may be broken into smaller, more precise themes.
    7. Once everyone has placed their sticky notes, and the groups have been arranged and rearranged, you should have a visual representation of infrastructure's understanding of the business' priorities.
    8. Let the infrastructure leader and/or CIO place their sticky notes last.

    Discussion:

    Is there a lot of agreement within the group? What does it mean if there are 10 or 15 groups with equal numbers of sticky notes? What does it mean if there are a few top groups and dozens of small outliers?

    How does the group's understanding compare with that of the Director and/or CIO?

    What mechanisms are in place for the business to communicate their goals to infrastructure? Are they effective? Does the team take the time to reimagine those goals and internalize them?

    What does it mean if infrastructure's understanding differs from the business?

    Input

    • Business unit input source list

    Output

    • Prioritized list of business goals

    Materials

    • Sticky notes
    • Whiteboard & markers

    Participants

    • Roadmap team

    Additional Activity

    Now that infrastructure has a consensus on what it thinks the business' goals are, suggest a meeting with leadership to validate this understanding. Once the first picture is drawn, a 30-minute meeting can help clear up any misconceptions.

    Build your own framework or start with these three root value drivers

    With a framework of cascading goals in place, a roadmap is a Rosetta Stone. Being able to map activities back to governance objectives allows you to demonstrate value regardless of the audience you are addressing.

    An image of the framework for developing a roadmap using three root value drivers.

    (Info-Tech, Build a Business-Aligned IT Strategy 2022)

    1.2.4 Goal association exercise and analysis

    1 hour

    Wherever possible use the language of your customers to avoid confusion, but at least ensure that everyone in infrastructure is using a common language.

    1. Take your business strategy or IT strategy or survey response (Activity 1.2.3) or Info-Tech's fundamental goals list (strategic agility, improved cash flow, innovate product, safety, standardize end-user experience) and write them across the top of a whiteboard.
    2. Have everyone write, on a sticky note, their current in-flight initiatives – one per sticky note.
    3. Have each participant then place each of their sticky notes on the whiteboard and draw a line from the initiative to the goal it supports.
    4. The rest of the group should challenge any relationships that seem unsupported or questionable.

    Discussion:

    1. How many goals are you supporting? Are there too many? Are you doing enough to support the right goals?
    2. Is there a shared understanding of the business goals among the infrastructure staff? Or, do questions about meaning keep coming up?
    3. Do you have initiatives that are difficult to express in terms of business goals? Do you have a lot of them or just a few?

    Input

    • Goal list
    • In-flight initiatives list

    Output

    • Initiatives-to-goals map

    Materials

    • Whiteboard & markers

    Participants

    • Roadmap team

    Summary of Accomplishment

    Review performance from last fiscal year.

    • Analyzed and communicated the benefits and value realized from IT's strategic initiatives in the past fiscal year.
    • Analyzed and prioritized diagnostic data insights to communicate IT success stories.
    • Elicited important retrospective information such as KPIs, financials, etc. to build IT's credibility as a strategic business partner.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Phase 2

    Envision Future and Analyze Constraints

    Phase 1

    Phase 2

    Phase 3

    Phase 4

    1.1 Infrastructure strategy

    1.2 Goal alignment

    2.1 Define your future

    2.2 Conduct constraints analysis

    3.1 Drive business alignment

    3.2. Build the roadmap

    4.1 Identify the audience

    4.2 Process improvement

    and measurements

    This phase will walk you through the following activities:

    • Determine from a greenfield perspective what the future state looks like.
    • Do SWOT analysis on technology you may plan to use in the future.
    • Complete a time study.

    This phase involves the following participants:

    • Roadmap team

    Step 2.1

    Define the future state

    Activities

    2.1.1 Define your future infrastructure vision

    2.1.2 Document desired future state

    2.1.3 Develop a new technology identification process

    2.1.4 Conduct a SWOT analysis

    This step requires the following inputs:

    • Emerging technology interest

    This step involves the following participants:

    • Roadmap team
    • External SMEs

    Outcomes of this step

    • Technology discovery process
    • Technology assessment process
    • Future state vision document

    Future state discussion

    "Very few of us are lucky enough to be one of the first few employees in a new organization. Those of you who get to plan the infrastructure with a blank slate and can focus all of your efforts on doing things right the first time."

    BMC, 2018

    "A company's future state is ultimately defined as the greater vision for the business. It's where you want to be, your long-term goal in terms of the ever-changing state of technology and how that applies to your present-day business."
    "Without a definitive future state, a company will often find themselves lacking direction, making it harder to make pivotal decisions, causing misalignment amongst executives, and ultimately hindering the progression and growth of a company's mission."
    Source: Third Stage Consulting

    "When working with digital technologies, it is imperative to consider how such technologies can enhance the solution. The future state should communicate the vision of how digital technologies will enhance the solutions, deliver value, and enable further development toward even greater value creation."
    Source: F. Milani

    Info-Tech Insight

    Define your infrastructure roadmap as if you had a blank slate – no constraints, no technical debt, and no financial limitations. Imagine your future infrastructure and let that vision drive your roadmap.

    Expertise is not innate; it requires effort and research

    Evaluating new enterprise technology is a process of defining it, analyzing it, and sourcing it.

    • Understand what a technology is in order to have a common frame of reference for discussion. Just as important, understand what it is not.
    • Conduct an internal and external analysis of the technology including an adoption case study.
    • Provide an overview of the vendor landscape, identifying the leading players in the market and how they differentiate their offerings.

    This is not intended to be a thesis grade research project, nor an onerous duty. Most infrastructure practitioners came to the field because of an innate excitement about technology! Harness that excitement and give them four to eight hours to indulge themselves.

    An output of approximately four slides per technology candidate should be sufficient to decided if moving to PoC or pilot is warranted.

    Including this material in the roadmap helps you control the technology conversation with your audience.

    Info-Tech Best Practices

    Don't start from scratch. Recall the original sources from your technology watchlist. Leverage vendors and analyst firms (such as Info-Tech) to give the broad context, letting you focus instead on the specifics relevant to your business.

    Channel emerging technologies to ensure the rising tide floats all boats rather than capsizing your business

    Adopting the wrong new technology can be even more dangerous than failing to adopt any new technology.

    Implementing every new promising technology would cost prodigious amounts of money and time. Know the costs before choosing what to invest in.

    The risk of a new technology failing is acceptable. The risk of that failure disrupting adjacent core functions is unacceptable. Vet potential technologies to ensure they can be safely integrated.

    Best practices for new technologies are nonexistent, standards are in flux, and use cases are fuzzy. Be aware of the unforeseen that will negatively affect your chances of a successful implementation.

    "Like early pioneers crossing the American plains, first movers have to create their own wagon trails, but later movers can follow in the ruts."
    Harper Business, 2014

    Info-Tech Insight

    The right technology for someone else can easily be the wrong technology for your business.

    Even with a mature Enterprise Architecture practice, wrong technology bets can happen. Minimize the chance of this occurrence by making selection an infrastructure-wide activity. Leverage the practical knowledge of the day-to-day operators.

    First Mover

    47% failure rate

    Fast Follower

    8% failure rate

    2.1.1 Create your future infrastructure vision

    1 hour

    Objective: Help teams define their future infrastructure state (assuming zero constraints or limitations).

    1. Ask each participant to ponder the question: "How would the infrastructure look if there were no limitations?" They should consider all aspects of their infrastructure but keep in mind the infrastructure vision and mission statements from phase one, as well as the business goals.
    2. Have each participant write down their ideas on sticky notes – one per note.
    3. Select a moderator and a scribe from the group – not the infrastructure leader or the CIO. The moderator will begin by placing (and explaining) their sticky notes on the whiteboard. The scribe will summarize the results in short statements at the end.
    4. Have each participant place and explain their sticky notes on the whiteboard.
    5. The moderator will assist each participant in grouping sticky notes together based on theme.
    6. Once everyone has placed their sticky notes and groups have been arranged and rearranged, you should have a visual representation of infrastructure's understanding of the business' priorities.
    7. Let the infrastructure leader and/or CIO place their sticky notes last.

    Discussion:

    1. Assume a blank slate as a starting point. No technical debt or financial constraints; nothing holding you back.
    2. Can SaaS, PaaS, or other cloud-based offerings play a role in this future utopia?
    3. Do vendors play a larger or smaller role in your future infrastructure vision?

    Download the IT Infrastructure Strategy and Roadmap Report Template and document your mission and vision statements in Section 1.

    Input

    • Thoughts and ideas about how the future infrastructure should look.

    Output

    • Future state vision

    Materials

    • Sticky notes
    • Whiteboard & markers

    Participants

    • Roadmap team

    2.1.1 Document your future state vision (cont'd)

    Objective: Help teams define their future infrastructure state (assuming zero constraints or limitations).

    1 hour

    Steps:

    1. The scribe will take the groups of suggestions and summarize them in a statement or two, briefly describing the infrastructure in that group.
    2. The statements should be recorded on Tab 2 of the Infrastructure Strategy and Roadmap Tool.

    Discussion:

    • Should the points be listed in any specific order?
    • Include all suggestions in the summary. Remember this is a blank slate with no constraints, and no idea is higher or lower in weight at this stage.
    Infrastructure Future State Vision
    Item Focus Area Future Vision
    1 Email Residing on Microsoft 365
    2 Servers Hosted in cloud - nothing on prem.
    3 Endpoints virtual desktops on Microsoft Azure
    4 Endpoint hardware Chromebooks
    5 Network internet only
    6 Backups cloud based but stored in multiple cloud services
    7

    Download Info-Tech's Infrastructure Strategy and Roadmap Tool and document your future state vision in the Infrastructure Future State tab.

    Input

    • Thoughts and ideas about how the future infrastructure should look.

    Output

    • Future state vision

    Materials

    • Sticky notes
    • Whiteboard & markers

    Participants

    • Roadmap team

    2.1.2 Identification and association exercise

    1 hour

    Formalize what is likely an ad hoc process.

    1. Brainstorm with the group a list of external sources they are currently using to stay abreast of the market.
    2. Organize this list on the left-hand side of a whiteboard, in vendor and vendor-neutral groups.
      1. For each item in the list ask a series of questions:
      2. Is this a push or pull source?
      3. Is this source suited to individual or group consumption?
      4. What is the frequency of this source?
    3. What is the cost of this source to the company?
    4. On the right-hand side of the whiteboard brainstorm a list of internal mechanisms for sharing new technology information. Ask about the audience, distribution mode, and frequency for each of those mechanisms.
    5. Map which of the external sources make it over to internal distribution.

    Discussion:

    1. Are we getting the most value out of our high-cost conferences? Does that information make it from the attendees to the rest of the team?
    2. Do we share information only within our domains? Or across the whole infrastructure practice?
    3. Do we have sufficient diversity of sources? Are we in danger of believing one vendor's particular market interpretation?
    4. How do we select new technologies to explore further? Make it fun – upvotes, for example.

    Input

    • Team knowledge
    • Conference notes
    • Expense reports

    Output

    • Internal socialization process
    • Tech briefings & repository

    Materials

    • Whiteboard & markers

    Participants

    • Roadmap team

    Info-Tech Best Practices

    It is impractical for everyone to present their tech briefing at the monthly meeting. But you want to avoid a one-to-many exercise. Keep the presenter a secret until called on. Those who do not present live can still contribute their material to the technology watchlist database.

    Analyze new technologies for your future state

    Four to eight hours of research per technology can uncover a wealth of relevant information and prepare the infrastructure team for a robust discussion. Key research elements include:

    • Précis: A single page or slide that describes the technology, outlines some of the vendors, and explores the value proposition.
    • SWOT Analysis:
      • Strengths and weaknesses: What does the technology inherently do well (e.g. lots of features) and what does it do poorly (e.g. steep learning curve)?
      • Opportunities and threats: What capabilities can the technology enable (e.g. build PCs faster, remote sensing)? Why would we not want to exploit this technology (e.g. market volatility, M&As)

    a series of four screenshots from the IT Infrastructure Strategy and Roadmap Report Template

    Download the IT Infrastructure Strategy and Roadmap Report Template slides 21, 22, 23 for sample output.

    Position infrastructure as the go-to source for information about new technology

    One way or another, tech always seems to finds its way into infrastructure's lap. Better to stay in front and act as stewards rather than cleanup crew.

    Beware airline magazine syndrome!

    Symptoms

    Pathology
    • Leadership speaking in tech buzzwords
    • Urgent meetings to discuss vaguely defined topics
    • Fervent exclamations of "I don't care how – just get it done!"
    • Management showing up on at your doorstep needing help with their new toy

    Outbreaks tend to occur in close proximity to

    • Industry trade shows
    • Excessive executive travel
    • Vendor BRM luncheons or retreats with leadership
    • Executive golf outings with old college roommates

    Effective treatment options

    1. Targeted regular communication with a technology portfolio analysis customized to the specific goals of the business.
    2. Ongoing PoC and piloting efforts with detailed results reporting.

    While no permanent cure exists, regular treatment makes this chronic syndrome manageable.

    Keep your roadmap horizon in mind

    Technology doesn't have to be bleeding edge. New-to-you can have plenty of value.

    You want to present a curated landscape of technologies, demonstrating that you are actively maintaining expertise in your chosen field.

    Most enterprise IT shops buy rather than develop their technology, which means they want to focus effort on what is market available. The outcome is that infrastructure sponsors and delivers new technologies whose capabilities and features will help the business achieve its goals on this roadmap.

    If you want to think more like a business disruptor or innovator, we suggest working through the blueprint Exploit Disruptive Infrastructure Technology.
    Explore technology five to ten years into the future!

    a quadrant analysis comparing innovation and transformation, as well as two images from Exploit Disruptive Infrastructure Technology.

    Info-Tech Insight

    The ROI of any individual effort is difficult to justify – in aggregate, however, the enterprise always wins!
    Money spent on Google Glass in 2013 seemed like vanity. Certainly, this wasn't enterprise-ready technology. But those early experiences positioned some visionary firms to quickly take advantage of augmented reality in 2018. Creative research tends to pay off in unexpected and unpredictable ways.
    .

    2.1.3 Working session, presentation, and feedback

    1 hour

    Complete a SWOT analysis with future state technology.

    The best research hasn't been done in isolation since the days of da Vinci.

    1. Divide the participants into small groups of at least four people.
    2. Further split those groups into two teams – the red team and the white team.
    3. Assign a technology candidate from the last exercise to each group. Ideally the group should have some initial familiarity with the technology and/or space.
    4. The red team from each group will focus on the weaknesses and threats of the technology. The white team will focus on the strengths and opportunities of the technology.
    5. Set a timer and spend the next 30-40 minutes completing the SWOT analysis.
    6. Have each group present their analysis to the larger team. Encourage conversation and debate. Capture and refine the understanding of the analysis.
    7. Reset with the next technology candidate. Have the participants switch teams within their groups.
    8. Continue until you've exhausted your technology candidates.

    Discussion:

    1. Does working in a group make for better research? Why?
    2. Do you need specific expertise in order to evaluate a technology? Is an outsider (non-expert) view sometimes valuable?
    3. Is it easier to think of the positive or the negative qualities of a technology? What about the internal or external implications?

    Input

    • Technology candidates

    Output

    • Technology analysis including SWOT

    Materials

    • Projector
    • Templates
    • Laptops & internet

    Participants

    • Roadmap team

    Step 2.2

    Constraints analysis

    Activities

    2.2.1 Historical spend analysis

    2.2.2 Conduct a time study

    2.2.3 Identify roadblocks

    This step requires the following inputs:

    • Historical spend and staff numbers
    • Organizational design identification and thought experiment
    • Time study
    • Roadblock brainstorming session
    • Prioritization exercise

    This step involves the following participants:

    • Financial leader
    • HR Leader
    • Roadmap team

    Outcomes of this step

    • OpEx, CapEx, and staffing trends
    • Domain time study
    • Prioritized roadblock list

    2.2.1 Historical spend analysis

    "A Budget is telling your money where to go, instead of wondering where it went."
    -David Ramsay

    "Don't tell me where your priorities are. Show me where you spend your money and I'll tell you what they are"
    -James Frick, Due.com

    Annual IT budgeting aligns with business goals
    a circle showing 68%, broken down into 50% and 18%

    50% of businesses surveyed see that improvements are necessary for IT budgets to align to business goals, while 18% feel they require significant improvements to align to business goals
    Source: ITRG Diagnostics 2022

    Challenges in IT spend visibility

    68%

    Visibility of all spend data for on-prem, SaaS and cloud environments
    Source: Flexera

    The challenges that keep IT leaders up at night

    47%

    Lack of visibility in resource usage and cost
    Source: BMC, 2021

    2.2.1 Build a picture of your financial spending and staffing trends

    Follow the steps below to generate a visualization so you can start the conversation:

    1 hour

    1. Open the Info-Tech Infrastructure Roadmap Financial Spend Analysis Tool.
    2. The Instructions tab will provide guidance, or you can follow the instructions below.
    3. Insert values into the appropriate uncolored blocks in the first 4 rows of the Spend Record Entry tab to reflect the amount spent on IT OpEx, IT CapEx, or staff numbers for the present year (budgeted) as well as the previous five years.
    4. Data input populates cells in subsequent rows to quickly reveal spending ratios.

    an image of the timeline table from the Infrastructure Roadmap Financial Analysis Tool

    Download the Infrastructure Roadmap Financial Analysis Tool
    ( additional Deep Dive available if required)

    Input

    • Historical spend and staff numbers

    Output

    • OpEx, CapEx, and staffing trends for your organization

    Materials

    • Info-Tech's Infrastructure Roadmap Financial Spend Analysis Tool

    Participants

    • Infrastructure leader
    • Financial leader
    • HR leader

    2.2.1 Build a picture of your financial spending and staffing trends (cont'd)

    Continue with the steps below to generate a visualization so you can start the conversation.

    1 hour

    1. Select tab 3 (Results) to reveal a graphical analysis of your data.
    2. Trends are shown in graphs for OpEx, CapEx, and staffing levels as well as comparative graphs to show broader trends between multiple spend and staffing areas.
    3. Some observations worth noting may include the following:
      • Is OpEx spending increasing over time or decreasing?
      • Is CapEx increasing or decreasing?
      • Are OpEx and CapEx moving in the same directions?
      • Are IT staff to total staff ratios increasing or decreasing?
      • Trends will continue in the same direction unless changes are made.

    Download the Infrastructure Roadmap Financial Analysis Tool
    ( additional Deep Dive available if required)

    Input

    • Historical spend and staff numbers

    Output

    • OpEx, CapEx, and staffing trends for your organization

    Materials

    • Info-Tech's Infrastructure Roadmap Financial Spend Analysis Tool

    Participants

    • Infrastructure leader
    • Financial leader
    • HR leader

    Consider perceptions held by the enterprise when dividing infrastructure into domains

    2.2.2 Conduct a time study

    Internal divisions that seem important to infrastructure may have little or even negative value when it comes to users accessing their services.

    Domains are the logical divisions of work within an infrastructure practice. Historically, the organization was based around physical assets: servers, storage, networking, and end-user devices. Staff had skills they applied according to specific best practices using physical objects that provided functionality (computing power, persistence, connectivity, and interface).

    Modern enterprises may find it more effective to divide according to activity (analytics, programming, operations, and security) or function (customer relations, learning platform, content management, and core IT). As a rule, look to your organizational chart; managers responsible for buying, building, deploying, or supporting technologies should each be responsible for their own domain.

    Regardless of structure, poor organization leads to silos of marginally interoperable efforts working against each other, without focus on a common goal. Clearly defined domains ensure responsibility and allow for rapid, accurate, and confident decision making.

    • Server
    • Network
    • Storage
    • End User
    • DevOps
    • Analytics
    • Core IT
    • Security

    Info-Tech Insight

    The medium is the message. Do stakeholders talk about switches or storage or services? Organizing infrastructure to match its external perception can increase communication effectiveness and improve alignment.

    Case Study

    IT infrastructure that makes employees happier

    INDUSTRY: Services
    SOURCE: Network Doctor

    Challenge

    Atlas Electric's IT infrastructure was very old and urgently needed to be refreshed. Its existing server hardware was about nine years old and was becoming unstable. The server was running Windows 2008 R2 server operating systems that was no longer supported by Microsoft; security updates and patches were no longer available. They also experienced slowdowns on many older PCs.

    Recommendations for an upgrade were not approved due to budgetary constraints. Recommendations for upgrading to virtual servers were approved following a harmful phishing attack.

    Solution

    The following improvements to their infrastructure were implemented.

    • Installing a new physical host server running VMWare ESXi virtualization software and hosting four virtual servers.
    • Migration of data and applications to new virtual servers.
    • Upgrading networking equipment and deploying new relays, switches, battery backups, and network management.
    • New server racks to host new hardware.

    Results

    Virtualization, consolidating servers, and desktops have made assets more flexible and simpler to manage.

    Improved levels of efficiency, reliability, and productivity.

    Enhanced security level.

    An upgraded backup and disaster recovery system has improved risk management.

    Optimize where you spend your time by doing a time study

    Infrastructure activity is limited generally by only two variables: money and time. Money is in the hands of the CFO, which leaves us a single variable to optimize.

    Not all time is spent equally, nor is it equally valuable. Analysis lets us communicate with others and gives us a shared framework to decide where our priorities lie.

    There are lots of frameworks to help categorize our activities. Stephen Covey (Seven Habits of Highly Effective People) describes a four-quadrant system along the axes of importance and urgency. Gene Kim, through his character Erik in The Phoenix Project,speaks instead of business projects, internal IT projects, changes, and unplanned work.

    We propose a similar four-category system.

    Project Maintenance

    Administrative

    Reactive

    Planned activity spent pursuing a business objective

    Planned activity spent on the upkeep of existing IT systems

    Planned activity required as a condition of employment

    Unplanned activity requiring immediate response

    This is why we are valuable to our company

    We have it in our power to work to reduce these three in order to maximize our time available for projects

    Survey and analysis

    Perform a quick time study.

    Verifiable data sources are always preferred but large groups can hold each other's inherent biases in check to get a reasonable estimate.

    1 hour

    1. Organize the participants into the domain groups established earlier.
    2. On an index card have each participant independently write down the percentage of time they think their entire domain (not themselves personally) spends during the average month, quarter, or year on:
      1. Admin
      2. Reactive work
      3. Maintenance
    3. Draw a matrix on the whiteboard; collect the index cards and transcribe the results from participants into the matrix.
    4. Add up the three reported time estimates and subtract from 100 – the result is the percentage of time available for/spent on project work.

    Discussion

    1. Certain domains should have higher percentages of reactive work (think Service Desk and Network Operations Center) – can we shift work around to optimize resources?
    2. Why is reactive work the least desirable type? Could we reduce our reactive work by increasing our maintenance work?
    3. From a planning perspective, what are the implications of only having x% of time available for project work?
    4. Does it feel like backing into the project work from adding the other three together provides a reasonable assessment?

    Input

    • Domain groups

    Output

    • Time study

    Materials

    • Whiteboard & markers
    • Index cards

    Participants

    • Roadmap team

    Quickly and easily evaluate all your infrastructure

    Strategic Infrastructure Roadmap Tool, Tab 2, Capacity Analysis

    In order to quickly and easily build some visualizations for the eventual final report, Info-Tech has developed the Strategic Infrastructure Roadmap Tool.

    • Up to five infrastructure domains are supported.
      • For practices that cannot be reasonably collapsed into five domains, multiple copies of the tool can be used and manually stitched together.
    • The tool can be used in either an absolute (total number) or relative mode (percentage of available).
    • By design we specifically don't ask for a project work figure but rather calculate it based on other values.
    • For everything but miscellaneous duties, hard data sources can (and where appropriate should) be leveraged.
      • Reactive work – service desk tool
      • Project work – project management tool
      • Maintenance work – logs or ITSM tool
    • Individual domains' values are calculated, as well as the overall breakdown for the infrastructure practice.
    • Even these rough estimates will be useful during the planning steps throughout the rest of the roadmap process.

    an image of the source capacity analysis page from tab 2 of the Strategic Infrastructure Roadmap Tool

    Please note that this tool requires Microsoft's Power Pivot add-in to be installed if you are using Excel 2010 or 2013. The scatter plot labels on tabs 5 and 8 may not function correctly in Excel 2010.

    Build your roadmap from both the top and the bottom for best results

    Strong IT strategy favors top-down: activities enabling clearly dictated goals. The bottom-up approach aggregates ongoing activities into goals.

    Systematic approach

    External stakeholders prioritize a list of goals requiring IT initiatives to achieve.

    Roadblocks:

    • Multitudes of goals easily overwhelm scant IT resources.
    • Unglamorous yet vital maintenance activities get overlooked.
    • Goals are set without awareness of IT capacity or capabilities.

    Organic approach

    Practitioners aggregate initiatives into logical groups and seek to align them to one or more business goals.

    Roadblocks:

    • Pet initiatives can be perpetuated based on cult of personality rather than alignment to business goals.
    • Funding requests can fall flat when competing against other business units for executive support.

    A successful roadmap respects both approaches.

    an image of two arrows, intersecting with the words Infrastructure Roadmap with the top arrow labeled Systematic, and the bottom arrow being labeled Organic.

    Info-Tech Insight

    Perfection is anathema to practicality. Draw the first picture and not only expect but welcome conflicting feedback! Socialize it and drive the conversation forward to a consensus.

    2.2.3 Brainstorming – Affinity diagramming

    Identify the systemic roadblocks to executing infrastructure projects

    1 hour

    Affinity diagramming is a form of structured brainstorming that works well with larger groups and provokes discussion.

    1. Have each participant write down their top five impediments to executing their projects from last year – one roadblock per sticky note.
    2. Once everyone has written their top five, select a moderator from the group. The moderator will begin by placing (and explaining) their five sticky notes on the whiteboard.
    3. Have each participant then place and explain their sticky notes on the whiteboard.
    4. The moderator will assist participants in grouping sticky notes together based on theme.
    5. Groups that have become overly large may be broken into smaller, more precise themes.
    6. Once everyone has placed their sticky notes, you should be able to visually identify the greatest or most common roadblocks the group perceives.

    Discussion

    Categorize each roadblock identified as either internal or external to infrastructure's control.

    Attempt to understand the root cause of each roadblock. What would you need to ask for in order to remove the roadblock?

    Additional Research

    Also called the KJ Method (after its inventor, Jiro Kawakita, a 1960s Japanese anthropologist), this activity helps organize large amounts of data into groupings based on natural relationships while reducing many social biases.

    Input

    • Last years initiatives and their roadblocks

    Output

    • List of refined Roadblocks

    Materials

    • Sticky notes
    • Whiteboard & markers

    Participants

    • Roadmap team

    2.2.4 Prioritization exercise – Card sorting

    Choose your priorities wisely.

    Which roadblocks do you need to work on? How do you establish a group sense of these priorities? This exercise helps establish priorities while reducing individual bias.

    1 hour

    1. Distribute index cards that have been prepopulated with the roadblocks identified in the previous activity – one full set of cards to each participant.
    2. Have each participant sort their set-in order of perceived priority, highest on top.
    3. Where n=number of cards in the stack, take the n-3 lowest priority cards and put a tick mark in the upper-right-hand corner. Pass these cards to the person on the left, who should incorporate them into their pile (if you start with eight cards you're ticking and passing five cards). Variation: On the first pass, allow everyone to take the most important and least important cards, write "0th" and "NIL" on them, respectively, and set them aside.
    4. Repeat steps 2 and 3 for a total of n times. Treat duplicates as a single card in your hand.
    5. After the final pass, ask each participant to write the priority in the upper-left-hand corner of their top three cards.
    6. Collect all the cards, group by roadblock, count the number of ticks, and take note of the final priority.

    Discussion

    Total the number of passes (ticks) for each roadblock. A large number indicates a notionally low priority. No passes indicates a high priority.

    Are the internal or external roadblocks of highest priority? Were there similarities among participants' 0th and NILs compared to each other or to the final results?

    Input

    • Roadblock list

    Output

    • Prioritized roadblocks

    Materials

    • Index cards

    Participants

    • Roadmap team

    Summary of Accomplishment

    Review performance from last fiscal year

    • Analyzed and communicated the benefits and value realized from IT's strategic initiatives in the past fiscal year.
    • Analyzed and prioritized diagnostic data insights to communicate IT success stories.
    • Elicited important retrospective information such as KPIs, financials, etc. to build IT's credibility as a strategic business partner.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Phase 3

    Align and Build the Roadmap

    Phase 1

    Phase 2

    Phase 3

    Phase 4

    1.1 Infrastructure strategy

    1.2 Goal alignment

    2.1 Define your future

    2.2 Conduct constraints analysis

    3.1 Drive business alignment

    3.2. Build the roadmap

    4.1 Identify the audience

    4.2 Process improvement

    and measurements

    This phase will walk you through the following activities:

    • Elicit business context from the CIO & IT team
    • Identify key initiatives that support the business
    • Identify key initiatives that enable IT excellence
    • Identify initiatives that drive technology innovation
    • Build initiative profiles
    • Construct your strategy roadmap

    This phase involves the following participants:

    • Roadmap Team

    Step 3.1

    Drive business alignment

    Activities

    3.1.1 Develop a risk framework

    3.1.2 Evaluate technical debt

    This step requires the following inputs:

    • Intake identification and analysis
    • Survey results analysis
    • Goal brainstorming
    • Goal association and analysis

    This step involves the following participants:

    • Business leadership
    • Project Management Office
    • Service Desk
    • Business Relationship Management
    • Solution or Enterprise Architecture
    • Roadmap team

    Outcomes of this step

    • Intake analysis
    • Goal list
    • Initiative-to-goal map

    Speak for those with no voice – regularly review your existing portfolio of IT assets and services

    A chain is only as strong as its weakest link; while you'll receive no accolades for keeping the lights on, you'll certainly hear about it if you don't!

    Time has been a traditional method for assessing the fitness of infrastructure assets – servers are replaced every five years, core switches every seven, laptops and desktops every three. While quick, this framework of assessment is overly simplistic for most modern organizations.

    Building one that is instead based on the likelihood of asset failure plotted against the business impact of that failure is not overly burdensome and yields more practical results. Infrastructure focuses on its strength (assessing IT risk) and validates an understanding with the business regarding the criticality of the service(s) enabled by any given asset.

    Rather than fight on every asset individually, agree on a framework with the business that enables data-driven decision making.

    IT Risk Factors
    Age, Reliability, Serviceability, Conformity, Skill Set

    Business Risk Factors
    Suitability, Capacity, Safety, Criticality

    Info-Tech Insight

    Infrastructure in a cloud-enabled world: As infrastructure operations evolve it is important to keep current with the definition of an asset. Software platforms such as hypervisors and server OS are just as much an asset under the care and control of infrastructure as are cloud services, managed services from third-party providers, and traditional racks and switches.

    3.1.1 Develop a risk framework – Classification exercise

    While it's not necessary for each infrastructure domain to view IT risk identically, any differences should be intensely scrutinized.

    1 hour

    1. Divide the whiteboard along the axes of IT Risk and
      Business Risk (criticality) into quadrants:
      1. High IT Risk & High Biz Risk (upper right)
      2. Low IT Risk & Low Biz Risk (bottom left)
      3. Low IT Risk & High Biz Risk (bottom right)
      4. High IT Risk & Low Biz Risk (upper left)
    2. Have each participant write the names of two or three infrastructure assets or services they are responsible or accountable for – one name per sticky note.
    3. Have each participant come one-at-a-time and place their sticky notes in one quadrant.
    4. As each additional sticky note is placed, verify with the group that the relative positioning of the others is still accurate.

    Discussion:

    1. Most assets should end up in the lower-right quadrant, indicating that IT has lowered the risk of failure commensurate to the business consequences of a failure. What does this imply about assets in the other three quadrants?
    2. Infrastructure is foundational; do we properly document and communicate all dependencies for business-critical services?
    3. What actions can infrastructure take to adjust the risk profile of any given asset?

    Input

    • List of infrastructure assets

    Output

    • Notional risk analysis

    Materials

    • Whiteboard & markers
    • Sticky notes

    Participants

    • Roadmap team

    3.1.2 Brainstorming and prioritization exercise

    Identify the key elements that make up risk in order to refine your framework.

    A shared notional understanding is good, but in order to bring the business onside a documented defensible framework is better.

    1 hour

    1. Brainstorm (possibly using the affinity diagramming technique) the component elements of IT risk.
    2. Ensure you have a non-overlapping set of risk elements. Ensure that all the participants are comfortable with the definitions of each element. Write them on a whiteboard.
    3. Give each participant an equal number (three to five) of voting dots.
    4. As a group have the participants go the whiteboard and use their dots to cast their votes for what they consider to be the most important risk element(s). Participants are free to place any number of their dots on a single element.
    5. Based on the votes cast select a reasonable number of elements with which to proceed.
    6. For each element selected, brainstorm up to six tiers of the risk scale. You can use numbers or words, whichever is most compelling.
      • E.g. Reliability: no failures, >1 incident per year, >1 incident per quarter, >1 incident per month, frequent issues, unreliable.
    7. Repeat the above except with the components of business risk. Alternately, rely on existing business risk documentation, possibly from a disaster recovery or business continuity plan.

    Discussion
    How difficult was it to agree on the definitions of the IT risk elements? What about selecting the scale? What was the voting distribution like? Were there tiers of popular elements or did most of the dots end up on a limited number of elements? What are the implications of having more elements in the analysis?

    Input

    • Notional risk analysis

    Output

    • Risk elements
    • Scale dimensions

    Materials

    • Whiteboard & markers
    • Voting dots

    Participants

    • Roadmap team

    3.1.3 Forced ranking exercise

    Alternate: Identify the key elements that make up risk in order to refine your framework

    A shared notional understanding is good, but in order to bring the business onside a documented defensible framework is better.

    1 hour

    1. Brainstorm (possibly using the affinity diagramming technique) the component elements of IT risk.
    2. Ensure you have a non-overlapping set of risk elements. Ensure that all the participants are comfortable with the definitions of each element. Write them on a whiteboard.
    3. Distribute index cards (one per participant) with the risk elements written down one side.
    4. Ask the participants to rank the elements in order of importance, with 1 being the most important.
    5. Collect the cards and write the ranking results on the whiteboard.
    6. Look for elements with high variability. Also look for the distribution of 1, 2, and 3 ranks.
    7. Based on the results select a reasonable number of elements with which to proceed.
    8. Follow the rest of the procedure from the previous activity.

    Discussion:

    What was the total number of elements required in order to contain the full set of every participant's first-, second-, and third-ranked risks? Does this seem a reasonable number?

    Why did some elements contain both the lowest and highest rankings? Was one (or more) participant thinking consistently different from the rest of the group? Are they seeing something the rest of the group is overlooking?

    This technique automatically puts the focus on a smaller number of elements – is this effective? Or is it overly simplistic and reductionist?

    Input

    • Notional risk analysis

    Output

    • Risk elements

    Materials

    • Whiteboard & markers
    • Index cards

    Participants

    • Roadmap team

    3.1.4 Consensus weighting

    Use your previous notional assessment to inform your risk weightings:

    1 hour

    1. Distribute index cards that have been prepopulated with the risk elements from the previous activity.
    2. Have the participants independently assign a weighting to each element. The assigned weights must add up to 100.
    3. Collect the cards and transcribe the results into a matrix on the whiteboard.
    4. Look for elements with high variability in the responses.
    5. Discuss and come to a consensus figure for each element's weighting.
    6. Select a variety of assets and services from the notional assessment exercise. Ensure that you have representation from all four quadrants.
    7. Using your newly defined risk elements and associated scales, evaluate as a group the values you'd suggest for each asset. Aim for a plurality of opinion rather than full consensus.
    8. Use Info-Tech's Strategic Infrastructure Roadmap Tool to document the elements, weightings, scales, and asset analysis.
    9. Compare the output generated by the tool (Tab 4) with the initial notional assessment.

    Discussion:

    How much framework is too much? Complexity and granularity do not guarantee accuracy. What is the right balance between effort and result?

    Does your granular assessment match your notional assessment? Why or why not? Do you need to go back and change weightings? Or reduce complexity?

    Is this a more reasonable and valuable way of periodically evaluating your infrastructure?

    Input

    • Notional risk analysis

    Output

    • Weighted risk framework

    Materials

    • Whiteboard & markers
    • Index cards
    • Strategic Infrastructure Roadmap Tool

    Participants

    • Roadmap team

    3.1.5 Platform assessment set-up

    Hard work up front allows for year-over-year comparisons

    The value of a risk framework is that once the heavy lifting work of building it is done, the analysis and assessment can proceed very quickly. Once built, the framework can be tweaked as necessary, rather than recreated every year.

    • Open Info-Tech's Strategic Infrastructure Roadmap Tool, Tab 3.
    • Up to eight elements each of IT and business risk can be captured.
      • IT risk elements of end-of-life and dependencies are mandatory and do not count against the eight customizable elements.
    • Every element can have up to six scale descriptors. Populate them from left to right in increasing magnitude of risk.
      • Scale descriptors must be input as string values and not numeric.
    • Each element's scale can be customized from linear to a risk-adverse or risk-seeking curve. We recommend linear.

    an image of the Platform Assessment Setup Page from Info-Tech's Strategic Infrastructure Roadmap Tool,

    IT platform assessment

    Quickly and easily evaluate all your infrastructure.

    Once configured, individual domain teams can spend surprisingly little time answering reasonably simple questions to assess their assets. The common framework lets results be compared between teams and produces a valuable visualization to communication with the business.

    • Open the Strategic Infrastructure Roadmap Tool, Tab 4.
    • The tool has been tested successfully with up to 2,000 asset items. Don't necessarily list every asset; rather, think of the logical groups of assets you'd cycle in or out of your environment.
    • Each asset must be associated with one and only one infrastructure domain and have a defined End of Service Life date.
    • With extreme numbers of assets an additional filter can be useful – the Grouping field allows you to set any number of additional tags to make sorting and filtering easier.
    • Drop-down menus for each risk element are prepopulated with the scale descriptors from Tab 3. Unused elements are greyed out.
    • Each asset can be deemed dependent on up to four additional assets or services. Use this to highlight obscure or undervalued relationships between assets. It is generally not useful to be reminded that everything relies on Cat 6 cabling.

    A series of screenshots from the IT Platform Assessment.

    Prioritized upgrades

    Validate and tweak your framework with the business

    Once the grunt work of inputting all the assets and the associated risk data has been completed, you can tweak the risk profile and sort the data to whatever the business may require.

    • Open Info-Tech's Strategic Infrastructure Roadmap Tool, Tab 5.
    • IT platforms in the upper-right quadrant have an abundance of IT risk and are critical to the business.
    • The visualization can be sorted by selecting the slicers on the left. Sort by:
      • Infrastructure domain
      • Customized grouping tag
      • Top overall risk platforms
    • With extreme numbers of assets an additional filter can be useful. The Grouping field allows you to set any number of additional tags to make sorting and filtering easier.
    • Risk weightings can be individually adjusted to reflect changing business priorities or shared infrastructure understanding of predictive power.
      • In order to make year-over-year comparisons valuable it is recommended that changing IT risk elements should be avoided unless absolutely necessary.

    An image of a scatter plot graph titled Prioritized Upgrades.

    Step 3.2

    Build the roadmap

    Activities

    3.2.1 Build templates and visualize

    3.2.2 Generate new initiatives

    3.2.3 Repatriate shadow IT initiatives

    3.2.4 Finalize initiative candidates

    This step requires the following inputs:

    • Develop an initiative template
    • Restate the existing initiatives with the template
    • Visualize the existing initiatives
    • Brainstorm new initiatives
    • Initiative ranking
    • Solicit, evaluate, and refine shadow IT initiatives
    • Resource estimation

    This step involves the following participants:

    • Roadmap team

    Outcomes of this step

    • Initiative communication template
    • Roadmap visualization diagram

    Tell them what they really need to know

    Templates transform many disparate sources of data into easy-to-produce, easy-to-consume, business-ready documents.

    Develop a high-level document that travels with the initiative from inception through executive inquiry and project management, and finally to execution. Understand an initiative's key elements that both IT and the business need defined and that are relatively static over its lifecycle.

    Initiatives are the waypoints along a roadmap leading to the eventual destination, each bringing you one step closer. Like steps, initiatives need to be discrete: able to be conceptualized and discussed as a single largely independent item. Each initiative must have two characteristics:

    • Specific outcome: Describe an explicit change in the people, processes, or technology of the enterprise.
    • Target end date: When the described outcome will be in effect.

    "Learn a new skill"– not an effective initiative statement.

    "Be proficient in the new skill by the end of the year" – better.

    "Use the new skill to complete a project and present it at a conference by Dec 15" – best!

    Info-Tech Insight

    Bundle your initiatives for clarity and manageability.
    Ruthlessly evaluate if an initiative should stand alone or can be rolled up with another. Fewer initiatives increases focus and alignment, allowing for better communication.

    3.2.1 Develop impactful templates to sell your initiative upstream

    Step 1: Open Info-Tech's Strategic Roadmap Initiative Template. Determine and describe the goals that the initiative is enabling or supporting.
    Step 2: State the current pain points from the end-user or business perspective. Do not list IT-specific pain points here, such as management complexity.
    Step 3: List both the tangible (quantitative) and ancillary (qualitative) benefits of executing the project. These can be pain relievers derived from the pain points, or any IT-specific benefit not captured in Step 1.
    Step 4: List any enabled capability that will come as an output of the project. Avoid technical capabilities like "Application-aware network monitoring." Instead, shoot for business outcomes like "Ability to filter network traffic based on application type."

    An image of the Move to Office 365, with the numbers 1-4 superimposed over the image.  These correspond to steps 1-4 above.

    Info-Tech Insight

    Sell the project to the mailroom clerk! You need to be able to explain the outcome of the project in terms that non-IT workers can appreciate. This is done by walking as far up the goals cascade as you have defined, which gets to the underlying business outcome that the initiative supports.

    Develop impactful templates to sell your initiative upstream (cont'd)

    Strategic Roadmap Initiative Template, p. 2

    Step 5: State the risks to the business for not executing the project (and avoid restating the pain points).
    Step 6: List any known or anticipated roadblocks that may come before, during, or after executing the project. Consider all aspects of people, process, and technology.
    Step 7: List any measurable objectives that can be used to gauge the success of the projects. Avoid technical metrics like "number of IOPS." Instead think of business metrics such as "increased orders per hour."
    Step 8: The abstract is a short 50-word project description. Best to leave it as the final step after all the other aspects of the project (risks and rewards) have been fully fleshed out. The abstract acts as an executive summary – written last, read first.

    An image of the Move to Office 365, with the numbers 5-8 superimposed over the image.  These correspond to steps 5-8 above.

    Info-Tech Insight

    Every piece of information that is not directly relevant to the interests of the audience is a distraction from the value proposition.

    Working session, presentation, and feedback

    Rewrite your in-flight initiatives to ensure you're capturing all the required information:

    1 hour

    1. Have each participant select an initiative they are responsible or accountable for.
    2. Introduce the template and discuss any immediate questions they might have.
    3. Take 15-20 minutes and have each participant attempt to fill out the template for their initiative.
    4. Have each participant present their initiative to the group.
    5. The group should imagine themselves business leaders and push back with questions or clarification when IT jargon is used.
    6. Look to IT leadership in the room for cues as to what hot button items they've encountered from the business executives.
    7. Debate the merits of each section in the template. Adjust and customize as appropriate.

    Discussion:
    Did everyone use the goal framework adopted earlier? Why not?
    Are there recurring topics or issues that business leaders always seem concerned about?
    Of all the information available, what consistently seems to be the talking points when discussing an initiative?

    Input

    • In-flight initiatives

    Output

    • Completed initiatives templates

    Materials

    • Templates
    • Laptops & internet

    Participants

    • Roadmap team

    3.2.2 Visual representations are more compelling than text alone

    Being able to quickly sort and filter data allows you to customize the visualization and focus on what matters to your audience. Any data that is not immediately relevant to them risks becoming a distraction.

    1. Open the Strategic Infrastructure Roadmap Tool, Tabs 6 and 7.
    2. Up to ten goals can be supported. Input the goals into column F of the tool. Be explicit but brief.
    3. Initiatives and Obstacles can be independently defined, and the tool supports up to five subdivisions of each. Initiative by origin source makes for an interesting analysis but initially we recommend simplicity.
    4. Every Initiative and Obstacle must be given a unique name in column H. Context-sensitive drop-downs let you define the subtype and responsible infrastructure domain.
    5. Three pieces of data are captured for each initiative: Business Impact is the qualitative value to the business; Risk is the qualitative likelihood of failure – entirely or partially (e.g. significantly over budget or delayed); and Effort is a relative measure of magnitude ($ or time). Only the value for Effort must be specified.
    6. Every initiative can claim to support one or many goals by placing an "x" in the appropriate column(s).
    7. On Tab 7 you must select the initiative end date (go-live date). You can also document start date, owner, and manager if required. Remember, though, that the tool does not replace proper project management tools.

    A series of screenshots of tables, labeled A-F

    Decoding your visualization

    Strategic Infrastructure Roadmap Tool, Tab 8, "Roadmap"

    Visuals aren't always as clear as we assume them to be.

    An example of a roadmap visualization found in the Strategic Infrastructure Roadmap Tool

    If you could suggest one thing, what would it be?

    The roadmap is likely the best and most direct way to showcase our ideas to business leadership – take advantage of it.

    We've spent an awful lot of time setting the stage, deciding on frameworks so we agree on what is important. We know how to have an effective conversation – now what do we want to say?

    an image of a roadmap, including inputs passing through infrastructure & Operations; to the Move to Office 365 images found earlier in this blueprint.

    Creative thinking, presentation, and feedback

    Since we're so smart – how could we do it better?

    1 hour

    1. Introduce the Roadmap Initiative Template and discuss any immediate questions the participants might have.
    2. Take 15-20 minutes and have each participant attempt to fill out the template for their initiative candidate.
    3. Have each author present their initiative to the group.
    4. The group should imagine themselves business leaders and push back with questions or clarification when IT jargon is used.
    5. Look to IT leadership in the room for cues as to what hot button items they've encountered from the business executives
    6. Debate the merits of each section in the template. Adjust and customize as appropriate.

    Discussion:
    Did everyone use the goal framework adopted earlier? Why not?
    Do we think we can find business buy-in or sponsorship? Why or why not?
    Are our initiatives at odds with or complementary to the ones proposed through the normal channels?

    Input

    • Everything we know

    Output

    • Initiative candidates

    Materials

    • Info-Tech's Infrastructure Roadmap Initiatives Template
    • Laptops & internet

    Participants

    • Roadmap team

    Forced Ranking Exercise

    Showcase only your best and brightest ideas:

    1 hour

    1. Write the initiative titles from the previous exercise across the top of a whiteboard.
    2. Distribute index cards (one per participant) with the initiative titles written down one side.
    3. Ask each participant to rank the initiatives in order of importance, with 1 being the most important.
    4. Collect the cards and write the ranking results on the whiteboard.
    5. Look at the results with an eye toward high variability. Also look for the distribution of 1, 2, and 3 ranks.
    6. Based on the results, select (through democratic vote or authoritarian fiat – Director or CIO) a reasonable number of initiatives.
    7. Refine the selected initiative templates for inclusion in the roadmap.

    Discussion:
    Do participants tend to think their idea is the best and rank it accordingly?
    If so, then is it better to look at the second, third, and fourth rankings for consensus instead?
    What is a reasonable number of initiatives to suggest? How do we limit ourselves?

    Input

    • Infrastructure initiative candidates

    Output

    • Infrastructure initiatives

    Materials

    • Index cards

    Participants

    • Roadmap team

    Who else might be using technology to solve business problems?

    Shadow IT operates outside of the governance and control structure of Enterprise IT and so is, by definition, a problem. an opportunity!

    Except for that one thing they do wrong, that one small technicality, they may well do everything else right.

    Consider:

    1. Shadow IT evolves to solve a problem or enable an activity for a specific group of users.
    2. This infers that because stakeholders spend their own resources resolving a problem or enabling an action, it is a priority.
    3. The technology choices they've made have been based solely on functionality for value, unrestrained by any legacy of previous decisions.
    4. Staffing demands and procedural issues must be modest or nonexistent.
    5. The users must be engaged, receptive to change, and tolerant of stutter steps toward a goal.

    In short, shadow IT can provide fully vetted infrastructure initiatives that with a little effort can be turned into easy wins on the roadmap.

    Info-Tech Insight

    Shadow IT can include business-ready initiatives, needing only minor tweaking to align with infrastructure's best practices.

    3.2.3 Survey and hack-a-thon

    Negotiate amnesty with shadow IT by evaluating their "hacks" for inclusion on the roadmap.

    1 hour

    1. Put out an open call for submissions across the enterprise. Ask "How do you think technology could help you solve one of your pain points?" Be specific.
    2. Gather the responses into a presentable format and assemble the roadmap team.
    3. Use voting dots (three per person) to filter out a shortlist.
    4. Invite the original author to come in and work with a roadmap team member to complete the template.
    5. Reassemble the roadmap team and use the forced ranking exercise to select initiatives to move forward.

    Discussion:
    Did you learn anything from working directly with in-the-trenches staff? Can those learnings be used elsewhere in infrastructure? Or in larger IT?

    Input

    • End-user ideas

    Output

    • Roadmap initiatives

    Materials

    • Whiteboard & markers
    • Voting dots
    • Index cards
    • Templates

    Participants

    • Enthusiastic end users
    • Roadmap team
    • Infrastructure leader

    3.2.4 Consensus estimation

    Exploit the wisdom of groups to develop reasonable estimates.

    1 hour

    Also called scrum poker (in Agile software circles), this method reduces anchoring bias by requiring all participants to formulate and submit their estimates independently and simultaneously.

    Equipment: A typical scrum deck shows the Fibonacci sequence of numbers, or similar progression, with the added values of ∞ (project too big and needs to be subdivided), and a coffee cup (need a break). Use of the (mostly) Fibonacci sequence helps capture the notional uncertainty in estimating larger values.

    1. The infrastructure leader, who will not play, moderates the activity. A "currency" of estimation is selected. This could be person, days, or weeks, or a dollar value in the thousands or tens of thousands – whatever the group feels they can speak to authoritatively.
    2. The author of each initiative gives a short overview, and the participants are given the chance to ask questions and clarify assumptions and risks.
    3. Participants lay a card representing their estimate face down on the table. Estimates are revealed simultaneously.
    4. Participants with the highest and lowest estimates are given a soapbox to offer justification. The author is expected to provide clarifications. The moderator drives the conversation.
    5. The process is repeated until consensus is reached (decided by the moderator).
    6. To structure discussion, the moderator can impose time limits between rounds.

    Discussion:

    How often was the story unclear? How often did participants have to ask for additional information to make their estimate? How many rounds were required to reach consensus?
    Does number of person, days, or weeks, make more sense than dollars? Should we estimate both independently?
    Source: Scrum Poker

    Input

    • Initiative candidates from previous activity

    Output

    • Resourcing estimates

    Materials

    • Scrum poker deck

    Participants

    • Roadmap team

    Hard work up front allows for year-over-year comparisons

    Open the Strategic Infrastructure Roadmap Tool, Tab 6, "Initiatives & Goals" and Tab 7, "Timeline"

    Add your ideas to the visualization.

    • An initiative subtype can be useful here to differentiate infrastructure-sponsored initiatives from traditional ones.
    • Goal alignment is as important as always – ideally you want your sponsored initiatives to fill gaps or support the highest-priority business goals.
    • The longer-term roadmap is an excellent parking lot for ideas, especially ones the business didn't even know they wanted. Make sure to pull those ideas forward, though, as you repeat the process periodically.

    An image containing three screenshots of timeline tables from the Strategic Infrastructure Roadmap Tool

    Pulling it all together – the published report

    We started with eight simple questions. Logically, the answers suggest sections for a published report. Developing those answers in didactic method is effective and popular among technologists as answers build upon each other. Business leaders and journalists, however, know never to bury the lead.

    Report Section Title Roadmap Activity or Step
    Sunshine diagram Visualization
    Priorities Understand business goals
    Who we help Evaluate intake process
    How we can help Create initiatives
    What we're working on Review initiatives
    How you can help us Assess roadblocks
    What is new Assess new technology
    How we spend our day Conduct a time study
    What we have Assess IT platform
    We can do better! Identify process optimizations

    Summary of Accomplishment

    Review performance from last fiscal year

    • Analyzed and communicated the benefits and value realized from IT's strategic initiatives in the past fiscal year.
    • Analyzed and prioritized diagnostic data insights to communicate IT success stories.
    • Elicited important retrospective information such as KPIs, financials, etc. to build IT's credibility as a strategic business partner.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Phase 4

    Communicate and Improve the Process

    Phase 1

    Phase 2

    Phase 3

    Phase 4

    1.1 Infrastructure strategy

    1.2 Goal alignment

    2.1 Define your future

    2.2 Conduct constraints analysis

    3.1 Drive business alignment

    3.2. Build the roadmap

    4.1 Identify the audience

    4.2 Process improvement

    and measurements

    This phase will walk you through the following activities:

    • Identify authors and target audiences
    • Understand the planning process
    • Identify if the process outputs have value
    • Set up realistic KPIs

    This phase involves the following participants:

    • CIO
    • Roadmap team

    Step 4.1

    Identify the audience

    Activities

    4.1.1 Identify required authors and target audiences

    4.1.2 Planning the process

    4.1.3 Identifying supporters and blockers

    This step requires the following inputs:

    • Identify required authors and target audiences
    • Plan the process
    • Identify supporters and blockers

    This step involves the following participants:

    • CIO
    • Roadmap team

    Outcomes of this step

    • Process schedule
    • Communication strategy

    Again! Again!

    And you thought we were done. The roadmap is a process. Set a schedule and pattern to the individual steps.

    Publishing an infrastructure roadmap once a year as a lead into budget discussion is common practice. But this is just the last in a long series of steps and activities. Balance the effort of each activity against its results to decide on a frequency. Ensure that the frequency is sufficient to allow you to act on the results if required. Work backwards from publication to develop the schedule.

    an image of a circle of questions around the Infrastructure roadmap.

    A lot of work has gone into creating this final document. Does a single audience make sense? Who else may be interested in your promises to the business? Look back at the people you've asked for input. They probably want to know what this has all been about. Publish your roadmap broadly to ensure greater participation in subsequent years.

    4.1.1 Identify required authors and target audiences

    1 hour

    Identification and association

    Who needs to hear (and more importantly believe) your message? Who do you need to hear from? Build a communications plan to get the most from your roadmap effort.

    1. Write your eight roadmap section titles in the middle of a whiteboard.
    2. Make a list of everyone who answered your questions during the creation of this roadmap. Write these names on a single color of sticky notes and place them on the left side.
    3. Make a list of everyone who would be (or should be) interested in what you have to say. Write these names on a different single color of sticky notes and place them on the right side.
    4. Draw lines between the stickies and the relevant section of the roadmap. Solid lines indicate a must have communication while dashed lines indicate a nice-to-have communication.
    5. Come to a consensus.

    Discussion:

    How many people appear in both lists? What are the implications of that?

    Input

    • Roadmap sections

    Output

    • Roadmap audience and contributors list

    Materials

    • Whiteboard & markers
    • Sticky notes

    Participants

    • Roadmap team

    4.1.2 Planning the process and scheduling

    The right conversation at the right time

    Due Date (t) Freq Mode Participants Infrastructure Owner
    Update & Publish

    Start of Budget Planning

    Once

    Report

    IT Steering Committee

    Infrastructure Leader or CIO

    Evaluate Intakes

    (t) - 2 months

    (t) - 8 months

    Biannually

    Review

    PMO

    Service Desk

    Domain Heads

    Assess Roadblocks

    (t) - 2 months

    (t) - 5 months

    (t) - 8 months

    (t) - 11 months

    Quarterly

    Brainstorming & Consensus

    Domain Heads

    Infrastructure Leader

    Time Study

    (t) - 1 month

    (t) - 4 months

    (t) - 7 months

    (t) - 10 months

    Quarterly

    Assessment

    Domain Staff

    Domain Heads

    Inventory Assessment

    (t) - 2 months

    Annually

    Assessment

    Domain Staff

    Domain Heads

    Business Goals

    (t) - 1 month

    Annually

    Survey

    Line of Business Managers

    Infrastructure Leader or CIO

    New Technology Assessment

    monthly

    (t) - 2 months

    Monthly/Annually

    Process

    Domain Staff

    Infrastructure Leader

    Initiative Review

    (t) - 1 month

    (t) - 4 months

    (t) - 7 months

    (t) - 10 months

    Quarterly

    Review

    PMO

    Domain Heads

    Infrastructure Leader

    Initiative Creation

    (t) - 1 month

    Annually

    Brainstorming & Consensus

    Roadmap Team

    Infrastructure Leader

    The roadmap report is just a point-in-time snapshot, but to be most valuable it needs to come at the end of a full process cycle. Know your due date, work backwards, and assign responsibility.

    Discussion:

    1. Do each of the steps make sense? Is the outcome clear and does it flow naturally to where it will be useful?
    2. Is the effort required for each step commensurate with its value? Are we doing to much for not enough return?
    3. Are we acting on the information we're gathering? Is it informing or changing decisions throughout the year or period?

    Input

    • Roadmap sections

    Output

    • Roadmap process milestones

    Materials

    • Whiteboard & markers
    • Template

    Participants

    • Roadmap team

    Tailor your messaging to secure stakeholders' involvement and support

    If your stakeholders aren't on board, you're in serious trouble.

    Certain stakeholders will not only be highly involved and accountable in the process but may also be responsible for approving the roadmap and budget, so it's essential that you get their buy-in upfront.

    an image of a quadrant analysis, comparing levels of influence and support.

    an image of a quadrant analysis, comparing levels of influence and support.

    4.1.3 Identifying supporters and blockers

    Classification and Strategy

    1 hour

    You may want to restrict participation to senior members of the roadmap team only.

    This activity requires a considerable degree of candor in order to be effective. It is effectively a political conversation and as such can be sensitive.

    Steps:

    1. Review your sticky notes from the earlier activity (list of input and output names).
    2. Place each name in the corresponding quadrant of a 2x2 matrix like the one on the right.
    3. Come to a consensus on the placement of each sticky note.

    Input

    • Roadmap audience and contributors list

    Output

    • Communications strategy & plan

    Materials

    • Whiteboard & markers
    • Sticky notes

    Participants

    • Senior roadmap team

    Step 4.2

    Process improvement

    Activities

    4.2.1 Evaluating the value of each process output

    4.2.2 Brainstorming improvements

    4.2.3 Setting realistic measures

    This step requires the following inputs:

    • Evaluating the efficacy of each process output
    • Brainstorming improvements
    • Setting realistic measures

    This step involves the following participants:

    • Roadmap team

    Outcomes of this step

    • Process map
    • Process improvement plan

    Continual improvement

    Not just for the DevOps hipsters!

    You started with a desire – greater satisfaction with infrastructure from the business. All of the inputs, processes, and outputs exist only, and are designed solely, to serve the attainment of that outcome.

    The process outlined is not dogma; no element is sacrosanct. Ruthlessly evaluate the effectiveness of your efforts so you can do better next time.

    You would do no less after a server migration, network upgrade, or EUC rollout.

    Consider these four factors to help make your infrastructure roadmap effort more successful.

    Leadership
    If infrastructure leaders aren't committed, then this will quickly become an exercise of box-checking rather than candid communication.

    Data
    Quantitative or qualitative – always try to go where the data leads. Reduce unconscious bias and be surprised by the insight uncovered.

    Metrics
    Measurement allows management but if you measure the wrong thing you can game the system, cheating yourself out of the ultimate prize.

    Focus
    Less is sometimes more.

    4.2.1 Evaluating the value of each process output

    Understanding why and how individual steps are effective (or not) is how we improve the outcome of any process.

    1 hour

    1. List each of the nine roadmap steps on the left-hand side of a whiteboard.
    2. Ask the participants "Why was this step included? Did it accomplish its objective?" Consider using a reduced scale affinity diagramming exercise for this step.
    3. Consider the priority characteristics of each step; try to be as universal as possible (every characteristic will ideally apply to each step).
    4. Include two columns at the far right: "Improvement" and "Expected Change."
    5. Populate the table. If this is your first time, brainstorm reasonable objectives for your left-hand columns. Otherwise, document the reality of last year and focus on brainstorming the right-hand columns.
    6. Optional: Conduct a thought experiment and brainstorm tension metrics to establish whether the process is driving the outcomes we desire.
    7. Optional: Consider Info-Tech's assertion about the four things a roadmap can do. Brainstorm KPIs that you can measure yearly. What else would you want the roadmap to be able to do?

    Discussion:

    Did the group agree on the intended outcome of each step? Did the group think the step was effective? Was the outcome clear and did it flow naturally to where it was useful?
    Is the effort required for each step commensurate with its value? Are we doing too much for not enough return?
    Are we acting on the information we're gathering? Is it informing or changing decisions throughout the year or period?

    Input

    • Roadmap process steps

    Output

    • Process map
    • Improvement targets & metrics

    Materials

    • Whiteboard & markers
    • Sticky notes
    • Process Map Template (see next slide)

    Participants

    • Roadmap team

    Process map template

    Replace the included example text with your inputs.

    Freq.MethodMeasuresSuccess criteria

    Areas for improvement

    Expected change

    Evaluate intakesBiannuallyPMO Intake & Service RequestsProjects or Initiatives% of departments engaged

    Actively reach out to underrepresented depts.

    +10% engagement

    Assess roadblocksQuarterlyIT All-Staff MeetingRoadblocks% of identified that have been resolved

    Define expected outcomes of removing roadblock

    Measurable improvements

    Time studyQuarterly IT All-Staff MeetingTimeConfidence value of data

    Real data sources (time sheets, tools, etc.)

    85% of sources defensible

    Legacy asset assessmentAnnuallyDomain effortAsset Inventory Completeness of Inventory
    • Compare against Asset Management database
    • Track business activity by enabling asset(s)
    • > 95% accuracy/
      completeness
    • Easier business risk framework conversations
    Understand business goalsAnnuallyRoadmap MeetingGoal listGoal specificity

    Survey or interview leadership directly

    66% directly attributable participation

    New technology assessmentMonthly/AnnuallyTeam/Roadmap MeetingTechnologies Reviewed IT staff participation/# SWOTs

    Increase participation from junior members

    50% presentations from junior members

    Initiative review

    Quarterly

    IT All-Staff Meeting

    • Status Review
    • Template usage
    • Action taken upon review
    • Template uptake
    • Identify predictive factors
    • Improve template
    • 25% of yellow lights to green
    • -50% requests for additional info

    Initiative creation

    Annually Roadmap MeetingInitiatives# of initiatives proposedBusiness uptake+25% sponsorship in 6 months (biz)

    Update and publish

    AnnuallyPDF reportRoadmap Final ReportLeadership engagement Improve audience reach+15% of LoB managers have read the report

    Establish baseline metrics

    Baseline metrics will improve through:

    1. Increased communication. More information being shared to more people who need it.
    2. Better planning. More accurate information being shared.
    3. Reduced lead times. Less due diligence or discovery work required as part of project implementations.
    4. Faster delivery times. Less less-valuable work, freeing up more time to project work.
    Metric description Current metric Future goal
    # of critical incidents resulting from equipment failure per month
    # of service provisioning delays due to resource (non-labor) shortages
    # of projects that involve standing up untested (no prior infrastructure PoC) technologies
    # of PoCs conducted each year
    # of initiatives proposed by infrastructure
    # of initiatives proposed that find business sponsorship in >1yr
    % of long-term projects reviewed as per goal framework
    # of initiatives proposed that are the only ones supporting a business goal
    # of technologies deployed being used by more than the original business sponsor
    # of PMO delays due to resource contention

    Insight Summary

    Insight 1

    Draw the first picture.

    Highly engaged and effective team members are proactive rather than reactive. Instead of waiting for clear inputs from the higher ups, take what you do know, make some educated guesses about the rest, and present that to leadership. Where thinking diverges will be crystal clear and the necessary adjustments will be obvious.

    Insight 2

    Infrastructure must position itself as the broker for new technologies.

    No man is an island; no technology is a silo. Infrastructure's must ensure that everyone in the company benefits from what can be shared, ensure those benefits are delivered securely and reliably, and prevent the uninitiated from making costly technological mistakes. It is easier to lead from the front, so infrastructure must stay on top of available technology.

    Insight 3

    The roadmap is a process that is business driven and not a document.

    In an ever-changing world the process of change itself changes. We know the value of any specific roadmap output diminishes quickly over time, but don't forget to challenge the process itself from time to time. Striving for perfection is a fool's game; embrace constant updates and incremental improvement.

    Insight 4

    Focus on the framework, not the output.

    There usually is no one right answer. Instead make sure both the business and infrastructure are considering common relevant elements and are working from a shared set of priorities. Data then, rather than hierarchical positioning or a d20 Charisma roll, becomes the most compelling factor in making a decision. But since your audience is in hierarchical ascendency over you, make the effort to become familiar with their language.

    4.2.3 Track metrics throughout the project to keep stakeholders informed

    An effective strategic infrastructure roadmap should help to:

    1. Initiate a schedule of infrastructure projects to achieve business goals.
    2. Adapt to feedback from executives on changing business priorities.
    3. Curate a portfolio of enabling technologies that align to the business whether growing or stabilizing.
    4. Manage the lifecycle of aging equipment in order to meet capacity demands.
    Metric description

    Metric goal

    Checkpoint 1

    Checkpoint 2

    Checkpoint 3

    # of critical incidents resulting from equipment failure per month >1
    # of service provisioning delays due to resource (non-labor) shortages >5
    # of projects that involve standing up untested (no prior infrastructure PoC) technologies >10%
    # of PoCs conducted each year 4
    # of initiatives proposed by infrastructure 4
    # of initiatives proposed that find business sponsorship in >1 year 1
    # of initiatives proposed that are the only ones supporting a business goal 1
    % of long-term projects reviewed as per goal framework 100%

    Summary of Accomplishment

    Review performance from last fiscal year

    • Analyzed and communicated the benefits and value realized from IT's strategic initiatives in the past fiscal year.
    • Analyzed and prioritized diagnostic data insights to communicate IT success stories.
    • Elicited important retrospective information such as KPIs, financials, etc. to build IT's credibility as a strategic business partner.

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Related Info-Tech Research

    Build a Business-Aligned IT Strategy
    Success depends on IT initiatives clearly aligned to business goals, IT excellence, and driving technology innovation.

    Document your Cloud Strategy
    A cloud strategy might seem like a big project, but it's just a series of smaller conversations. The methodology presented here is designed to facilitate those conversations using a curated list of topics, prompts, participant lists, and sample outcomes. We have divided the strategy into four key areas.

    Develop an IT Asset Management Strategy
    ITAM is a foundational IT service that provides accurate, accessible, actionable data on IT assets. But there's no value in data for data's sake. Enable collaboration between IT asset managers, business leaders, and IT leaders to develop an ITAM strategy that maximizes the value they can deliver as service provider.

    Infrastructure & Operations Research Center
    Practical insights, tools, and methodologies to systematically improve IT Infrastructure & Operations.

    Summary of Accomplishment

    Knowledge gained

    • Deeper understanding of business goals and priorities
    • Key data the business requires for any given initiative
    • Quantification of risk
    • Leading criteria for successful technology adoption

    Processes optimized

    • Infrastructure roadmap
    • Initiative creation, estimation, evaluation, and prioritization
    • Inventory assessment for legacy infrastructure debt
    • Technology adoption

    Deliverables completed

    • Domain time study
    • Initiative intake analysis
    • Prioritized roadblock list
    • Goal listing
    • IT and business risk frameworks
    • Infrastructure inventory assessment
    • New technology analyzes
    • Initiative templates
    • Initiative candidates
    • Roadmap visualization
    • Process schedule
    • Communications strategy
    • Process map
    • Roadmap report

    If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Bibliography

    "10 Essential KPIs for the IT Strategic Planning Process." Apptio Inc, Dec. 2021. Accessed Nov. 2022.
    Amos, Justin. "8 areas your 2022 IT Infrastructure roadmap should cover." Soma, 24 Jan 2022 Accessed Nov. 2022
    Ahmed, Anam. "Importance of Mission Vision in Organizational Strategy." Chron, 14 March 2019. Accessed 10 May 2021. ."
    Barker, Joel A. "Joel A Barker Quote about Vision." Joel A Barker.com. Accessed 10 Nov 2022
    Bhagwat, Swapnil ."Top IT Infrastructure Management Strategies For 2023 , Atlas Systems, 23 Oct 2022. Accessed Nov. 2022.
    Blank, Steve. "You're Better Off Being A Fast Follower Than An Originator." Business Insider. 5 Oct. 2010. Web.
    Bridges, Jennifer . "IT Risk Management Strategies and Best Practices." Project Manager, 6 Dec 2019. Accessed Nov. 2022.
    "Building a Technology Roadmap That Stabilizes and Transforms." Collegis Education. Accessed Dec 2022.
    Collins, Gavin. "WHY AN IT INFRASTRUCTURE ROAD MAP?." Fifth Step, Date unknown. Accessed Nov. 2022.
    "Define the Business Context Needed to Complete Strategic IT Initiatives: 2018 Blueprint - ResearchAndMarkets.com." Business Wire, 1 Feb. 2018. Accessed 9 June 2021.
    De Vos, Colton. “Well-Developed IT Strategic Plan Example." Resolute Tech Solutions, 6 Jan 2020. Accessed Nov. 2022.
    Gray, Dave. "Post-Up." Gamestorming, 15 Oct. 2010. Accessed 10 Nov 2022
    Helm, Clay. "Majority of Surveyed Companies are Not Prepared for IT Needs of the Future." IBM Study, 4 Jan 2021. Accessed Nov. 2022.
    Hertvik, Joe. "8 Components of A Great IT Strategy, BMC Blogs, 29 May. 2020. Accessed Nov. 2022.
    ISACA, "Effective governance at your Fingertips". COBIT Framework, Accessed Dec 2022
    "IT Guiding Principles." Office of Information Technology, NC State University, 2014-2020. Accessed 9 Nov 2022.
    ""IT Infrastructure That Makes Employees Happier." Network Doctor, 2021. Accessed Dec 2022
    "IT Road mapping Helps Dura Remain at the Forefront of Auto Manufacturing." Performance Improvement Partners, ND. Accessed Dec 2022.
    ITtoolkit.com. "The IT Vision: A Strategic Path to Lasting IT Business Alignment." ITtoolkit Magazine, 2020. Accessed 9 June 2021.
    Kark, Khalid. "Survey: CIOs Are CEOs' Top Strategic Partner." CIO Journal, The Wall Street Journal, 22 May 2020. Accessed 11 May 2021.
    Kimberling, Eric. "What is "Future State" and Why is it Important?" Third Stage Consulting, 11 June 2021. Accessed Nov. 2022.
    Kishore. "The True Cost of Keeping the Lights On." Optanix, 1 Feb. 2017. Accessed Nov. 2022.
    Lakein, Alan. Libquotes.
    Mindsight. "THE ULTIMATE GUIDE TO CREATING A TECHNOLOGY ROADMAP" Mind sight, 12 Dec 2021. Accessed Nov. 2022.
    Milani, F. (2019). Future State Analysis. In: Digital Business Analysis. Springer, Cham. https://doi.org/10.1007/978-3-030-05719-0_13
    Newberry, Dennis. "Meeting the Challenges of Optimizing IT Cost and Capacity Management." BMC, 2021, Accessed 12 Nov 2022.
    Peek, Sean. "What Is a Vision Statement?" Business News Daily, 7 May 2020. Accessed 10 Nov 2022.
    Ramos, Diana. "Infrastructure Management 101: A Beginner's Guide to IT Infrastructure Management." Smartsheet.com. 30 Nov 2021. Accessed 09 Dec 2022.
    Ramsey, Dave. "Dave Rant: How to Finally Take Control of Your Money." Ramseysolutions. 26 Aug 2021. Accessed 10 Nov 2022.
    Richards-Gustafson, Flora. "5 Core Operational Strategies." Chron, 8 Mar 2019. Accessed 9 June 2021.
    Richardson, Nigel. "What are the differences between current and future state maps?." Nexus, 18 Oct 2022. Accessed Nov. 2022.
    Roush, Joe. "IT Infrastructure Planning: How To Get Started." BMC. 05 January, 2018. Accessed 24 Jan 2023.
    Shields, Corey. "A Complete Guide to IT Infrastructure Management." Ntiva, 15 Sept. 2020. Accessed 28 Nov. 2022.
    Snow, Shane. "Smartcuts: How Hackers, Innovators, and Icons Accelerate Success." Harper Business, 2014.
    Strohlein, Marc. "The CIO's Guide to Aligning IT Strategy with the Business." IDC, 2019. Accessed Nov 2022.
    Sull, Sull, and Yoder. "No One Knows Your Strategy — Not Even Your Top Leaders." MIT Sloan. 12 Feb 2018. Accessed 26 Jan 2023.
    "Team Purpose & Culture." Hyper Island. Accessed 10 Nov. 2022
    "Tech Spend Pulse, 2022." Flexera, Jan 2022, Accessed 15 Nov 2022
    "Tech Spend Pulse." Flexera, Dec. 2022. Accessed Nov. 2022.
    "The Definitive Guide to Developing an IT Strategy and Roadmap" CIO Pages.com , 5 Aug 13 2022. Accessed 30 Nov. 2022.
    Wei, Jessica. "Don't Tell Me Where Your Priorities Are – James W. Frick." Due.com, 21 Mar 2022. Accessed 23 Nov 2022.
    Zhu, Pearl. "How to Set Guiding Principles for an IT Organization." Future of CIO, 1 July 2013. Accessed 9 June 2021.

    Demystify Oracle Licensing and Optimize Spend

    • Buy Link or Shortcode: {j2store}136|cart{/j2store}
    • member rating overall impact: 9.9/10 Overall Impact
    • member rating average dollars saved: $85,754 Average $ Saved
    • member rating average days saved: 10 Average Days Saved
    • Parent Category Name: Licensing
    • Parent Category Link: /licensing
    • License keys are not needed with optional features accessible upon install. Conducting quarterly checks of the Oracle environment is critical because if products or features are installed, even if they are not actively in use, it constitutes use by Oracle and requires a license.
    • Ambiguous license models and definitions abound: terminology and licensing rules can be vague, making it difficult to purchase licensing even with the best of intentions to keep compliant.
    • Oracle has aggressively started to force new Oracle License and Service Agreements (OLSA) on customers that slightly modify language and remove pre-existing allowances to tilt the contract terms in Oracle's favor.

    Our Advice

    Critical Insight

    • Focus on needs first. Conduct a thorough requirements assessment and document the results. Well-documented license needs will be your core asset in navigating Oracle licensing and negotiating your agreement.
    • Communicate effectively. Be aware that Oracle will reach out to employees at your organization at various levels. Having your executives on the same page will help send a strong message.
    • Manage the relationship. If Oracle is managing you, there is a high probability you are over paying or providing information that may result in an audit.

    Impact and Result

    • Conducting business with Oracle is not typical compared to other vendors. To emerge successfully from a commercial transaction with Oracle, customers must learn the "Oracle way" of conducting business, which includes a best-in-class sales structure, highly unique contracts and license use policies, and a hyper-aggressive compliance function.
    • Map out the process of how to negotiate from a position of strength, examining terms and conditions, discount percentages, and agreement pitfalls.
    • Develop a strategy that leverages and utilizes an experienced Oracle DBA to gather accurate information, and then optimizes it to mitigate and meet the top challenges.

    Demystify Oracle Licensing and Optimize Spend Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you need to understand and document your Oracle licensing strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Establish licensing requirements

    Begin your proactive Oracle licensing journey by understanding which information to gather and assessing the current state and gaps.

    • Demystify Oracle Licensing and Optimize Spend – Phase 1: Establish Licensing Requirements
    • Oracle Licensing Purchase Reference Guide
    • Oracle Database Inventory Tool
    • Effective Licensing Position Tool
    • RASCI Chart

    2. Evaluate licensing options

    Review current licensing models and determine which licensing models will most appropriately fit your environment.

    • Demystify Oracle Licensing and Optimize Spend – Phase 2: Evaluate Licensing Options

    3. Evaluate agreement options

    Review Oracle’s contract types and assess which best fit the organization’s licensing needs.

    • Demystify Oracle Licensing and Optimize Spend – Phase 3: Evaluate Agreement Options
    • Oracle TCO Calculator

    4. Purchase and manage licenses

    Conduct negotiations, purchase licensing, and finalize a licensing management strategy.

    • Demystify Oracle Licensing and Optimize Spend – Phase 4: Purchase and Manage Licenses
    • Oracle Terms & Conditions Evaluation Tool
    • Controlled Vendor Communications Letter
    • Vendor Communication Management Plan
    [infographic]

    Workshop: Demystify Oracle Licensing and Optimize Spend

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Establish Licensing Requirements

    The Purpose

    Assess current state and align goals; review business feedback

    Interview key stakeholders to define business objectives and drivers

    Key Benefits Achieved

    Have a baseline for requirements

    Assess the current state

    Determine licensing position

    Examine cloud options

    Activities

    1.1 Gather software licensing data

    1.2 Conduct a software inventory

    1.3 Perform manual checks

    1.4 Reconcile licenses

    1.5 Create your Oracle licensing team

    1.6 Meet with stakeholders to discuss the licensing position, cloud offerings, and budget allocation

    Outputs

    Copy of your Oracle License Statement

    Software inventory report from software asset management (SAM) tool

    Oracle Database Inventory Tool

    RASCI Chart

    Oracle Licensing Effective License Position (ELP) Template

    Oracle Licensing Purchase Reference Guide

    2 Evaluate Licensing Options

    The Purpose

    Review licensing options

    Review licensing rules

    Key Benefits Achieved

    Understand how licensing works

    Determine if you need software assurance

    Discuss licensing rules, application to current environment.

    Examine cloud licensing

    Understand the importance of documenting changes

    Meet with desktop product owners to determine product strategies

    Activities

    2.1 Review full, limited, restricted, and AST use licenses

    2.2 Calculate license costs

    2.3 Determine which database platform to use

    2.4 Evaluate moving to the cloud

    2.5 Examine disaster recovery strategies

    2.6 Understand purchasing support

    2.7 Meet with stakeholders to discuss the licensing position, cloud offerings, and budget allocation

    Outputs

    Oracle TCO Calculator

    Oracle Licensing Purchase Reference Guide

    3 Evaluate Agreement Options

    The Purpose

    Review contract option types

    Review vendors

    Key Benefits Achieved

    Understand why a type of contract is best for you

    Determine if ULA or term agreement is best

    The benefits of other types and when you should change

    Activities

    3.1 Prepare to sign or renew your ULA

    3.2 Decide on an agreement type that nets the maximum benefit

    Outputs

    Type of contract to be used

    Oracle TCO Calculator

    Oracle Licensing Purchase Reference Guide

    4 Purchase and Manage Licenses

    The Purpose

    Finalize the contract

    Prepare negotiation points

    Discuss license management

    Evaluate and develop a roadmap for future licensing

    Key Benefits Achieved

    Negotiation strategies

    Licensing management

    Introduction of SAM

    Leverage the work done on Oracle licensing to get started on SAM

    Activities

    4.1 Control the flow of communication terms and conditions

    4.2 Use Info-Tech’s readiness assessment in preparation for the audit

    4.3 Assign the right people to manage the environment

    4.4 Meet with stakeholders to discuss the licensing position, cloud offerings, and budget allocation

    Outputs

    Controlled Vendor Communications Letter

    Vendor Communication Management Plan

    Oracle Terms & Conditions Evaluation Tool

    RASCI Chart

    Oracle Licensing Purchase Reference Guide

    Audit the Project Portfolio

    • Buy Link or Shortcode: {j2store}442|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Portfolio Management
    • Parent Category Link: /portfolio-management
    • As a CIO you know you should audit your portfolio, but you don’t know where to start.
    • There is a lack of portfolio and project visibility.
    • Projects are out of scope, over budget, and over schedule.

    Our Advice

    Critical Insight

    • Organizations establish processes and assume people are following them.
    • There is a dilution of practices from external influences and rapid turnover rates.
    • Many organizations build their processes around existing frameworks. These frameworks are great resources but they’re often missing context and clear links to tools, templates, and fiduciary duty.

    Impact and Result

    • The best way to get insight into your current state is to get an objective set of observations of your processes.
    • Use Info-Tech’s framework to audit your portfolios and projects:
      • Triage at a high level to assess the need for an audit by using the Audit Standard Triage Tool to assess your current state and the importance of conducting a deeper audit.
      • Complete Info-Tech’s Project Portfolio Audit Tool:
        • Validate the inputs.
        • Analyze the data.
        • Review the findings and create your action plan.

    Audit the Project Portfolio Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should audit the project portfolio, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess readiness

    Understand your current state and determine the need for a deeper audit.

    • Audit the Project Portfolio – Phase 1: Assess Readiness
    • Info-Tech Audit Standard for Project Portfolio Management
    • Audit Glossary of Terms
    • Audit Standard Triage Tool

    2. Perform project portfolio audit

    Audit your selected projects and portfolios. Understand the gaps in portfolio practices.

    • Audit the Project Portfolio – Phase 2: Perform Project Portfolio Audit
    • Project Portfolio Audit Tool

    3. Establish a plan

    Document the steps you are going to take to address any issues that were uncovered in phase 2.

    • Audit the Project Portfolio – Phase 3: Establish a Plan
    • PPM Audit Timeline Template
    [infographic]

    Workshop: Audit the Project Portfolio

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Portfolio Audit

    The Purpose

    An audit of your portfolio management practices.

    Key Benefits Achieved

    Analysis of audit results.

    Activities

    1.1 Info-Tech’s Audit Standard/Engagement Context

    1.2 Portfolio Audit

    1.3 Input Validation

    1.4 Portfolio Audit Analysis

    1.5 Start/Stop/Continue

    Outputs

    Audit Standard and Audit Glossary of Terms

    Portfolio and Project Audit Tool

    Start/Stop/Continue

    2 Project Audit

    The Purpose

    An audit of your project management practices.

    Key Benefits Achieved

    Analysis of audit results.

    Activities

    2.1 Project Audit

    2.2 Input Validation

    2.3 Project Audit Analysis

    2.4 Start/Stop/Continue

    Outputs

    Portfolio and Project Audit Tool

    Start/Stop/Continue

    3 Action Plan

    The Purpose

    Create a plan to start addressing any vulnerabilities.

    Key Benefits Achieved

    A plan to move forward.

    Activities

    3.1 Action Plan

    3.2 Key Takeaways

    Outputs

    Audit Timeline Template

    Human Resources Management

    • Buy Link or Shortcode: {j2store}31|cart{/j2store}
    • Related Products: {j2store}31|crosssells{/j2store}
    • member rating overall impact: 9.6/10
    • member rating average dollars saved: $13,367
    • member rating average days saved: 7
    • Parent Category Name: people and Resources
    • Parent Category Link: /people-and-resources
    Talent is the differentiator; availability is not.

    Optimize the Current Testing Process for Enterprise Mobile Applications

    • Buy Link or Shortcode: {j2store}404|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Testing, Deployment & QA
    • Parent Category Link: /testing-deployment-and-qa
    • Your team has little or no experience in mobile testing.
    • You need to optimize current testing processes to include mobile.
    • You need to conduct an RFP for mobile testing tools.

    Our Advice

    Critical Insight

    • One-size-fits-all testing won’t work for mobile. The testing tools are fragmented.
    • Mobile offers many new test cases, so organizations can expect to spend more time testing.

    Impact and Result

    • Identify and address gaps between your current testing process and a target state that includes mobile testing.
    • Establish project value metrics to ensure business and technical requirements are met.

    Optimize the Current Testing Process for Enterprise Mobile Applications Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess the current testing state

    Determine a starting point for architecture and discuss pain points that will drive reusability.

    • Storyboard: Optimize the Current Testing Process for Enterprise Mobile Applications
    • Mobile Testing Project Charter Template
    • Visual SOP Template for Application Testing

    2. Determine the target state testing framework

    Document a preliminary list of test requirements and create vendor RFP and scoring.

    • Test Requirements Tool
    • Request for Proposal (RFP) Template

    3. Implement testing tools to support the testing SOP

    Create an implementation rollout plan.

    • Project Planning and Monitoring Tool

    Infographic

    Workshop: Optimize the Current Testing Process for Enterprise Mobile Applications

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Assess the Fit for Test Process Optimization

    The Purpose

    Understand mobile testing pain points.

    Evaluate current statistics and challenges around mobile testing and compare with your organization.

    Realize the benefits of mobile testing.

    Understand the differences of mobile testing.

    Assess your readiness for optimizing testing to include mobile.

    Key Benefits Achieved

    Preliminary understanding of how mobile testing is different from conventional approaches to testing apps.

    Understanding of how mobile testing can optimize your current testing process.

    Activities

    1.1 Understand the pain points experienced with mobile testing

    1.2 Evaluate current statistics and challenges of mobile testing and compare your organization

    1.3 Realize the benefits that come from mobile testing

    1.4 Understand the differences between mobile app testing and conventional app testing

    1.5 Assess your readiness for optimizing the testing process to include mobile

    Outputs

    Organizational state assessment for mobile testing

    2 Structure & Launch the Project

    The Purpose

    Identify stakeholders for testing requirements gathering.

    Create a project charter to obtain project approval.

    Present and obtain project charter sign-off.

    Key Benefits Achieved

    Well documented project charter.

    Approval to launch the project.

    Activities

    2.1 Identify stakeholders for testing requirements gathering

    2.2 Create a project charter to obtain project approval

    2.3 Present & obtain project charter sign-off

    Outputs

    Project objectives and scope

    Project roles and responsibilities

    3 Assess Current Testing State

    The Purpose

    Document your current non-mobile testing processes.

    Create a current testing visual SOP.

    Determine current testing pain points.

    Key Benefits Achieved

    Thorough understanding of current testing processes and pain points.

    Activities

    3.1 Document your current non-mobile testing processes

    3.2 Create a current state visual SOP

    3.3 Determine current testing pain points

    Outputs

    Documented current testing processes in the form of a visual SOP

    List of current testing pain points

    4 Determine Target State Testing Framework

    The Purpose

    Determine your target state for mobile testing.

    Choose vendors for the RFP process.

    Evaluate selected vendor(s) against testing requirements.

    Design mobile testing visual SOP(s).

    Key Benefits Achieved

    Prioritized list of testing requirements for mobile.

    Vendor selection for mobile testing solutions through an RFP process.

    New SOP designed to include both current testing and mobile testing processes.

    Activities

    4.1 Determine your target state for mobile testing by following Info-Tech’s framework as a starting point

    4.2 Design new SOP to include testing for mobile apps

    4.3 Translate all considered visual SOP mobile injections into requirements

    4.4 Document the preliminary list of test requirements in the RFP

    4.5 Determine which vendors to include for the RFP process

    4.6 Reach out to vendors for a request for proposal

    4.7 Objectively evaluate vendors against testing requirements

    4.8 Identify and assess the expected costs and impacts from determining your target state

    Outputs

    List of testing requirements for mobile

    Request for Proposal

    5 Implement Testing Tools to Support Your Testing SOP

    The Purpose

    Develop an implementation roadmap to integrate new testing initiatives.

    Anticipate potential roadblocks during implementation rollout.

    Operationalize mobile testing and ensure a smooth hand-off to IT operations.

    Key Benefits Achieved

    Creation of implementation project plan.

    List of approaches to mitigate potential implementation roadblocks.

    Achieving clean hand-off to IT ops team.

    Activities

    5.1 Develop a project plan to codify your current understanding of the scope of work

    5.2 Anticipate potential roadblocks during your tool’s implementation

    5.3 Operationalize your testing tools and ensure a smooth hand-off from the project team

    Outputs

    Mobile testing metrics implementation plan

    6 Conduct Your Retrospectives

    The Purpose

    Conduct regular retrospectives to consider areas for improvement.

    Adjust your processes, systems, and testing tools to improve performance and usability.

    Revisit implementation metrics to communicate project benefits.

    Leverage the lessons learned and apply them to other projects.

    Key Benefits Achieved

    Project specific metrics.

    Discovery of areas to improve.

    Activities

    6.1 Conduct regular retrospectives to consider areas for improvement

    6.2 Revisit your implementation metrics to communicate project benefits to business stakeholders

    6.3 Adjust your processes, systems, and testing tools to improve performance and usability

    6.4 Leverage the lessons learned and apply them to other IT projects

    Outputs

    Steps to improve your mobile testing

    Portfolio Management

    • Buy Link or Shortcode: {j2store}47|cart{/j2store}
    • Related Products: {j2store}47|crosssells{/j2store}
    • member rating overall impact: 9.6/10
    • member rating average dollars saved: $40,234
    • member rating average days saved: 30
    • Parent Category Name: Applications
    • Parent Category Link: /applications

    The challenge

    • Typically your business wants much more than your IT development organization can deliver with the available resources at the requested quality levels.
    • Over-damnd has a negative influence on delivery throughput. IT starts many projects (or features) but has trouble delivering most of them within the set parameters of scope, time, budget, and quality. Some requested deliverables may even be of questionable value to the business.
    • You may not have the right project portfolio management (PPM) strategy to bring order in IT's delivery activities and to maximize business value.

    Our advice

    Insight

    • Many in IT mix PPM and project management. Your project management playbook does not equate to the holistic view a real PPM practice gives you.
    • Some organizations also mistake PPM for a set of processes. Processes are needed, but a real strategy works towards tangible goals.
    • PPM works at the strategic level of the company; hence executive buy-in is critical. Without executive support, any effort to reconcile supply and demand will be tough to achieve.

    Impact and results 

    • PPM is a coherent business-aligned strategy that maximizes business value creation across the entire portfolio, rather than in each project.
    • Our methodology tackles the most pressing challenge upfront: get executive buy-in before you start defining your goals. With senior management behind the plan, implementation will become easier.
    • Create PPM processes that are a cultural fit for your company. Define your short and long-term goals for your strategy and support them with fully embedded portfolio management processes.

    The roadmap

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    Get started.

    Read our executive brief to understand why you should develop a PPM strategy and understand how our methodology can help you. We show you how we can support you.

    Obtain executive buy-in for your strategy

    Ensure your strategy is a cultural fit or cultural-add for your company.

    • Develop a Project Portfolio Management Strategy – Phase 1: Get Executive Buy-In for Your PPM Strategy (ppt)
    • PPM High-Level Supply-Demand Calculator (xls)
    • PPM Strategic Plan Template (ppt)
    • PPM Strategy-Process Goals Translation Matrix Template (xls)

    Align the PPM processes to your company's strategic goals

    Use the advice and tools in this stage to align the PPM processes.

    • Develop a Project Portfolio Management Strategy – Phase 2: Align PPM Processes to Your Strategic Goals (ppt)
    • PPM Strategy Development Tool (xls)

    Refine and complete your plan

    Use the inputs from the previous stages and add a cost-benefit analysis and tool recommendation.

    • Streamline Application Maintenance – Phase 3: Optimize Maintenance Capabilities (ppt)

    Streamline your maintenance delivery

    Define quality standards in maintenance practices. Enforce these in alignment with the governance you have set up. Show a high degree of transparency and open discussions on development challenges.

    • Develop a Project Portfolio Management Strategy – Phase 3: Complete Your PPM Strategic Plan (ppt)
    • Project Portfolio Analyst / PMO Analyst (doc)

     

     

    Build a Continual Improvement Program

    • Buy Link or Shortcode: {j2store}463|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Operations Management
    • Parent Category Link: /i-and-o-process-management
    • IT managers must work hard to maintain and improve service quality or risk performance deterioration over time.
    • Leadership may feel lost about what to do next and which initiatives have higher priority for improvement.
    • The backlog of improvement initiatives makes the work even harder. Managers should involve the right people in the process and build a team that is responsible to monitor, measure, prioritize, implement, and test improvements.

    Our Advice

    Critical Insight

    • Without continual improvement, sustained service quality will be temporary. Organizations need to put in place an ongoing process to detect potential services, enhance their procedures, and sustain their performance, whatever the process maturity is.

    Impact and Result

    • Set strategic vision for the continual improvement program.
    • Build a team to set regulations, processes, and audits for the program.
    • Set measurable targets for the program.
    • Identify and prioritize improvement initiatives.
    • Measure and monitor progress to ensure initiatives achieve the desired outcome.
    • Apply lessons learned to the next initiatives.

    Build a Continual Improvement Program Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build a Continual Improvement Program – A step-by-step document to walk you through building a plan for efficient IT continual improvement.

    This storyboard will help you craft a continual improvement register and a workflow to ensure sustained service improvements that fulfill ongoing increases in stakeholder expectations.

    • Build a Continual Improvement Program Storyboard

    2. Continual Improvement Register and Workflow – Structured documents to help you outline improvement initiatives, prioritize them, and build a dashboard to streamline tracking.

    Use the Continual Improvement Register and Continual Improvement Workflow to help you brainstorm improvement items, get a better visibility into the items, and plan to execute improvements.

    • Continual Improvement Register
    • Continual Improvement Workflow (Visio)
    • Continual Improvement Workflow (PDF)
    [infographic]

    Further reading

    Build a Continual Improvement Program

    Don’t stop with process standardization; plan to continually improve and help those improvements stick.

    Analyst Perspective

    Go beyond standardizing basics

    IT managers often learn how to standardize IT services. Where they usually fail is in keeping these improvements sustainable. It’s one thing to build a quality process, but it’s another challenge entirely to keep momentum and know what to do next.

    To fill the gap, build a continual improvement plan to continuously increase value for stakeholders. This plan will help connect services, products, and practices with changing business needs.

    Without a continual improvement plan, managers may find themselves lost and wonder what’s next. This will lead to misalignment between ongoing and increasingly high stakeholder expectations and your ability to fulfill these requirements.

    Build a continual improvement program to engage executives, leaders, and subject matter experts (SMEs) to go beyond break fixes, enable proactive enhancements, and sustain process changes.

    Photo of Mahmoud Ramin, Ph.D., Senior Research Analyst, Infrastructure and Operations, Info-Tech Research Group. Mahmoud Ramin, Ph.D.
    Senior Research Analyst
    Infrastructure and Operations
    Info-Tech Research Group

    Executive Summary

    Your Challenge

    • Even high-quality services and products need to be aligned with rising stakeholder expectations to sustain operational excellence.
    • Without the right leadership, commitment, and processes, improvements in service quality can be difficult to sustain.
    • Continual improvement is not only a development plan but also an organizational culture shift, which makes stakeholder buy-in even challenging.

    Common Obstacles

    • IT managers must work hard to maintain and improve service quality or risk performance deterioration over time.
    • Leadership feels lost about what to do next and which initiatives have higher priority for improvement.
    • A backlog of improvement initiatives makes the work even harder. Managers should involve the right people in the process and build a team that is responsible for monitoring, measuring, prioritizing, implementing, and testing improvements.

    Info-Tech’s Approach

    • Set a strategic vision for the continual improvement program.
    • Build a team to set regulations, processes, and audits for the program.
    • Set measurable targets for the program.
    • Identify and prioritize improvement initiatives.
    • Measure and monitor progress to ensure initiatives achieve the desired outcome.
    • Apply lessons learned to the next initiatives.

    Info-Tech Insight

    Without continual improvement, any process maturity achieved around service quality will not be sustained. Organizations need to put in place an ongoing program to maintain their current maturity and continue to grow and improve by identifying new services and enhancing existing processes.

    Purpose of continual improvement

    There should be alignment between ongoing improvements of business products and services and management of these products and services. Continual improvement helps service providers adapt to changing environments. No matter how critical the service is to the business, failure to continually improve reduces the service value.

    Image of a notebook with an illustration titled 'Continuous Improvement'.

    Continual improvement is one of the five elements of ITIL’s Service Value System (SVS).

    Continual improvement should be documented in an improvement register to record and manage improvement initiatives.

    Continual improvement is a proactive approach to service management. It involves measuring the effectiveness and efficiency of people, processes, and technology to:

    • Identify areas for improvement.
    • Adapt to changes in the business environment.
    • Align the IT strategy to organizational goals.

    A continual improvement process helps service management move away from a reactive approach that focuses only on fixing problems as they occur.

    Info-Tech Insight

    Make sure the basics are in place before you embark on a continual improvement initiative.

    Benefits of embedding a cross-organizational continual improvement approach

    Icon of a computer screen. Encourage end users to provide feedback on service quality. Icon of a crossed pencil and wrench.

    Provide an opportunity to stakeholders to define requirements and raise their concerns.

    Icon of a storefront.

    Embed continual improvement in all service delivery procedures.

    Icon of chevrons moving backward.

    Turn failures into improvement opportunities rather than contributing to a blame culture.

    Icon of a telescope.

    Improve practice effectiveness that enhances IT efficiency.

    Icon of a thumbs up in a speech bubble.

    Improve end-user satisfaction that positively impacts brand reputation.

    Icon of shopping bags.

    Improve operational costs while maintaining a high level of satisfaction.

    Icon of a magnifying glass over a map marker.

    Help the business become more proactive by identifying and improving services.

    Info-Tech Insight

    It’s the responsibility of the organization’s leaders to develop and promote a continual improvement culture. Work with the business unit leads and communicate the benefits of continual improvement to get their buy-in for the practice and achieve the long-term impact.

    Build a feedback program to get input into where improvement initiatives are needed

    A well-maintained continual improvement process creates a proper feedback mechanism for the following stakeholder groups:
    • Users
    • Suppliers
    • Service delivery team members
    • Service owners
    • Sponsors
    An efficient feedback mechanism should be constructed around the following initiatives:
    Target with an arrow in the bullseye. The arrow has four flags: 'Perceived value by users', 'Service effectiveness', 'Service governance', and 'Service demand'.
    Stakeholders who participate in feedback activities should feel comfortable providing suggestions for improvement.

    Work closely with the service desk team to build communication channels to conduct surveys. Avoid formal bureaucratic communications and enforce openness in communicating the value of feedback the stakeholders can provide.

    Info-Tech Insight

    When conducting feedback activities with users, keep surveys anonymous and ensure users’ information is kept confidential. Make sure everyone else is comfortable providing feedback in a constructive way so that you can seek clarification and create a feedback loop.

    Implement an iterative continual improvement model and ensure that your services align with your organizational vision

    Build a six-step process for your continual improvement plan. Make it a loop, in which each step becomes an input for the next step. A cycle around a dartboard with numbered steps: '01 Determine your goals', '02 Define the process team', '03 Determine initiatives', '04 Prioritize initiatives', '05 Execute improvement', '06 Establish a learning culture'.

    1. Determine your goals

    A vision statement communicates your desired future state of the IT organization.

    Your IT goals should always support your organizational goals. IT goals are high-level objectives that the IT organization needs to achieve to reach a target state.
    A cycle of the bolded statements on the right surrounding a dartboard with two bullseyes.

    Understand the high-level business objectives to set the vision for continual improvement in a way that will align IT strategies with business strategies.

    Obtaining a clear picture of your organization’s goals and overall corporate strategy is one of the crucial first steps to continual improvement and will set the stage for the metrics you select. Document your continual improvement program goals and objectives.

    Knowing what your business is doing and understanding the impact of IT on the business will help you ensure that any metrics you collect will be business focused.

    Understanding the long-term vision of the business and its appetite for commitment and sponsorship will also inform your IT strategy and continual improvement goals.

    Assess the future state

    At this stage, you need to visualize improvement, considering your critical success factors.

    Critical success factors (CSFs) are higher-level goals or requirements for success, such as improving end-user satisfaction. They’re factors that must be met in order to reach your IT and business strategic vision.

    Select key performance indicators (KPIs) that will identify useful information for the initiative: Define KPIs for each CSF. These will usually involve a trend, as an increase or decrease in something. If KPIs already exist for your IT processes, re-evaluate them to assess their relevance to current strategy and redefine if necessary. Selected KPIs should provide a full picture of the health of targeted practice.

    KPIs should cover these four vectors of practice performance:

    1. Quantity
      How many continual improvement initiatives are in progress
    2. Quality
      How well you implemented improvements
    3. Timeliness
      How long it took to get continual improvement initiatives done
    4. Compliance
      How well processes and controls are being executed, such as system availability
    Cross-section of a head split into sections with icons in the middle sections.

    Examples of key CSFs and KPIs for continual improvement

    CSF

    KPI

    Adopt and maintain an effective approach for continual improvement Improve stakeholder satisfaction due to implementation of improvement initiatives.
    Enhance stakeholder awareness about continual improvement plan and initiatives.
    Increase continual improvement adoption across the organization.
    Commit to effective continual improvement across the business Improve the return on investment.
    Increase the impact of the improvement initiatives on process maturity.
    Increase the rate of successful improvement initiatives.

    Prepare a vision statement to communicate the improvement strategy

    IT Implications + Business Context –› IT Goals
    • IT implications are derived from the business context and inform goals by aligning the IT goals with the business context.
    • Business context encompasses an understanding of the factors impacting the business from various perspectives, how the business makes decisions, and what it is trying to achieve.
    • IT goals are high-level, specific objectives that the IT organization needs to achieve to reach the target state. IT goals begin a process of framing what IT as an organization needs to be able to do in the target state.

    IT goals will help identify the target state, IT capabilities, and the initiatives that will need to be implemented to enable those capabilities.

    The vision statement is expressed in the present tense. It seeks to articulate the desired role of IT and how IT will be perceived.

    Strong IT vision statements have the following characteristics:
    Arrow pointing right. Describe a desired future
    Arrow pointing right. Focus on ends, not means
    Arrow pointing right. Communicate promise
    Arrow pointing right. Work as an elevator pitch:
    • Concise; no unnecessary words
    • Compelling
    • Achievable
    • Inspirational
    • Memorable

    2. Define the process team

    The structure of each continual improvement team depends on resource availability and competency levels.

    Make sure to allocate continual improvement activities to the available resources and assess the requirement to bring in others to fulfill all tasks.

    Brainstorm what steps should be included in a continual improvement program:

    • Who is responsible for identifying, logging, and prioritizing improvement opportunities?
    • Who makes the business case for improvement initiatives?
    • Who is the owner of the register, responsible for documenting initiatives and updating their status?
    • Who executes implementation?
    • Who evaluates implementation success?
    Match stakeholder skill sets with available resources to ensure continual improvement processes are handled properly. Brainstorm skills specific to the program:
    • Knowledge of provided products and services.
    • Good understanding of organization’s goals and objectives.
    • Efficiency in collecting and measuring metrics, understanding company standards and policies, and presenting them to impacted stakeholders.
    • Competency in strategic thinking and aligning the organization’s goals with improvement initiatives.

    Enable the continual improvement program by clarifying responsibilities

    Determine roles and responsibilities to ensure accountability

    The continual improvement activities will only be successful if specific roles and responsibilities are clearly identified.

    Depending on available staff and resources, you may be able to have full-time continual improvement roles, or you may include continual improvement activities in individuals’ job descriptions.

    Each improvement action that you identify should have clear ownership and accountability to ensure that it is completed within the specified timeframe.

    Roles and responsibilities can be reassigned throughout the continual improvement process.

    Info-Tech Insight

    Create cross-functional teams to improve perspective and not focus on only one small group when trying to problem solve. Having other teams hear and reframe the issue or talk about how they can help to solve issues as a team can create bigger solutions that will help the entire IT team, not just one group.

    Consider assigning dedicated continual improvement roles

    Silhouette of a business person.
    CI Coordinator

    Continual improvement coordinators are responsible for moving projects to the implementation phase and monitoring all continual improvement roles.

    Silhouette of a business person.
    Business Owner

    Business owners are accountable for business governance, compliance, and ROI analysis. They are responsible for operational and monetary aspects of the business.

    Silhouette of a business person.
    IT Owner

    IT owners are responsible for developing the action plan and ensuring success of the initiatives. They are usually the subject matter experts, focusing on technical aspects.

    3. Determine improvement initiatives

    Businesses usually make the mistake of focusing too much on making existing processes better while missing gaps in their practices.

    Gather stakeholder feedback to help you evaluate the maturity levels of IT practices Sample of the End User Satisfaction Survey.

    You need to understand the current state of service operations to understand how you can provide value through continual improvement. Give everyone an opportunity to provide feedback on IT services.

    Use Info-Tech’s End User Satisfaction Survey to define the state of your core IT services.

    Info-Tech Insight

    Become proactive to improve satisfaction. Continual improvement is not only about identifying pain points and improving them. It enables you to proactively identify initiatives for further service improvement using both practice functionality and technology enablement.

    Understand the current state of your IT practices

    Determine the maturity level of your IT areas to help you understand which processes need improvement. Involve the practice team in maturity assessment activities to get ideas and input from them. This will also help you get their buy-in and engagement for improvement.

    Leverage performance metrics to analyze performance level. Metrics play a key role in understanding what needs improvement. After you implement metrics, have an impact report regularly generated to monitor them.

    Use problem management to identify root causes for the identified gaps. Potential sources of problems can be:

    • Recurring issues that may be an indicator of an underlying problem.
    • Business processes or service issues that are not IT related, such as inefficient business process or service design issues.

    Establish an improvement roadmap and execute initiatives

    Build a continual improvement register (CIR) for your target initiatives

    A CIR is a document used for recording your action plan from the beginning to the end of the improvement project.

    If you just sit and plan for improvements without acting on them, nothing will improve. CIR helps you create an action plan and allows you to manage, track, and prioritize improvement suggestions.

    Consider tracking the following information in your CIR, adjusted to meet the needs of your organization:

    Information

    Description

    Business value impact Identify approved themes or goals that each initiative should apply to. These can and should change over time based on changing business needs.
    Effort/cost Identify the expected effort or cost the improvement initiative will require.
    Priority How urgent is the improvement? Categorize based on effort, cost, and risk levels.
    Status Ensure each initiative has a status assigned that reflects its current state.
    Timeline List the timeframe to start the improvement initiative based on the priority level.
    CI functional groups Customize the functional groups in your CI program

    Populate your register with ideas that come from your first round of assessments and use this document to continually add and track new ideas as they emerge.

    You can also consider using the register to track the outcomes and benefits of improvement initiatives after they have been completed.

    Activity: Use the Continual Improvement Register template to brainstorm responsibilities, generate improvement initiatives, and action plan

    1-3 hours
    1. Open the Continual Improvement Register template and navigate to tab 2, Setup.
    2. Brainstorm your definitions for the following items to get a clear understanding of these items when completing the CIR. The more quantification you apply to the criteria, the more tangible evaluation you will do:
      • Business value impact categories
      • Effort/cost
      • Priority
      • Status
      • Timeline
    3. Discuss the teams that the upcoming initiatives will belong to and update them under CI Functional Groups.
    1. Analyze the assessment data collected throughout stakeholder feedback and your current-state evaluation.
    2. Use this data to generate a list of initiatives that should be undertaken to improve the performance of the targeted processes.
    3. Use sticky notes to record identified CI initiatives.
    4. Record each initiative in tab 3, CI Register, along with associated information:
      • A unique ID number for the initiative
      • The individual who submitted the idea
      • The team the initiative belongs to
      • A description of the initiative

    Download the Continual Improvement Register template

    Activity: Use the Continual Improvement Register template to brainstorm responsibilities, generate improvement initiatives, and action plan

    Input

    • List of key stakeholders for continual improvement
    • Current state of services and processes

    Output

    • Continual improvement register setup
    • List of initiatives for continual improvement

    Materials

    • Continual improvement register
    • Whiteboard/flip charts
    • Markers
    • Laptops

    Participant

    • CIO
    • IT managers
    • Project managers
    • Continual improvement manager/coordinator

    4. Prioritize initiatives

    Prioritization should be transparent and available to stakeholders.

    Some initiatives are more critical than others to achieve and should be prioritized accordingly. Some improvements require large investments and need an equally large effort, while some are relatively low-cost, low-effort improvements. Focus on low-hanging fruit and prioritize low-cost, low-effort improvements to help the organization with rapid growth. This will also help you get stakeholder buy-in for the rest of your continual improvement program.

    Prioritize improvement initiatives in your CIR to increase visibility and ensure larger improvement initiatives are done the next cycle. As one improvement cycle ends, the next cycle begins, which allows the continual improvement team to keep pace with changing business requirements.

    Stock image of a person on a ladder leaning against a bookshelf.

    Identify “quick wins” that can provide immediate improvement

    Prioritize these quick wins to immediately demonstrate the success of the continual service improvement effort to the business.

    01

    Keep the scope of the continual improvement process manageable at the beginning by focusing on a few key areas that you want to improve.
    • If you have identified pain points, addressing these will demonstrate the value of the project to the business to gain their support.
    • Choose the services or processes that continue to disrupt or threaten service – focus on where pain points are evident and where there is a need for improvement.
    • Critical services to improve should emerge from the current-state assessments.

    02

    From your list of proposed improvements, focus on a few of the top pain points and plan to address those.

    03

    Choose the right services to improve at the first stage of continual improvement to ensure that the continual improvement process delivers value to the business.

    Activity: Prioritize improvement initiatives

    2-3 hours

    Input: List of initiatives for continual improvement

    Output: Prioritized list of initiatives

    Materials: Continual improvement register, Whiteboard/flip charts, Markers, Laptops

    Participants: CIO, IT managers, Project managers, Continual improvement manager

    1. In the CI Register tab of the Continual Improvement Register template, define the status, priority, effort/cost, and timeline according to the definition of each in the data entry tab.
    2. Review improvement initiatives from the previous activity.
    3. Record the CI coordinator, business owner, and IT owner for each initiative.
    4. Fill out submission date to track when the initiative was added to the register.
    5. According to the updated items, you will get a dashboard of items based on their categories, effort, priority, status, and timeline. You will also get a visibility into the total number of improvement initiatives.
    6. Focus on the short-term initiatives that are higher priority and require less effort.
    7. Refer to the Continual Improvement Workflow template and update the steps.

    Download the Continual Improvement Register template

    Download the Continual Improvement Workflow template

    5. Execute improvement

    Develop a plan for improvement

    Determine how you want to reach your improvement objectives. Define how to make processes work better.
    Icons representing steps. Descriptions below.
    Make a business case for your action plan Determine budget for implementing the improvement and move to execution. Find out how long it takes to build the improvement in the practice. Confirm the resources and skill sets you require for the improvement. Communicate the improvement plan across the business for better visibility and for seamless organizational change management, if needed. Lean into incremental improvements to ensure practice quality is sustained, not temporary. Put in place an ongoing process to audit, enhance, and sustain the performance of the target practice.

    Create a specific action plan to guide your improvement activities

    As part of the continual improvement plan, identify specific actions to be completed, along with ownership for each action.

    The continual improvement process must:

    • Define activities to be completed.
    • Create roles and assign ownership to complete activities.
    • Provide training and awareness about the initiative.
    • Define inputs and outputs.
    • Include reporting.

    For each action, identify:

    • The problem.
    • Who will be responsible and accountable.
    • Metric(s) for assessment.
    • Baseline and target metrics.
    • Action to be taken to achieve improvement (training, new templates, etc.).

    Choose timelines:

    • Firm timelines are important to keep the project on track.
    • One to two months for an initiative is an ideal length of time to maintain interest and enthusiasm for the specific project and achieve a result.

    Info-Tech Insight

    Every organization is unique in terms of its services, processes, strengths, weaknesses, and needs, as well as the expectations of its end users. There is no single action plan that will work for everyone. The improvement plan will vary from organization to organization, but the key elements of the plan (i.e. specific priorities, timelines, targets, and responsibilities) should always be in place.

    Build a communication plan to ensure the implementation of continual improvement stakeholder buy-in

    1. Throughout the improvement process, share information about both the status of the project and the impact of the improvement initiatives.
    Icon of a group of people. Encourage a collaborative environment across all members of the practice team.
    Icon of an ascending graph. Motivate every individual to continue moving upward and taking ownership over their roles.
    Icon of overlapping speech bubbles. Communication among team members ensures that everyone is on the same page working together toward a common goal.
    Icon of a handshake. The most important thing is to get the support of your team. Unless you have their support, you won’t be able to deliver any of the solutions you draw up.
    2. The end users should be kept in the loop so they can feel that their contribution is valued.
    Icon of an arrow pointing right. When improvements happen and only a small group of people are involved in the results and action plan, misconceptions will arise.
    Icon of a thumbs up in a speech bubble. If communication is lacking, end users will provide less feedback on the practice improvements.
    Icon of a cone made of stacked layers. For end users to feel their concerns are being considered, you must communicate the findings in a way that conveys the impact of their contribution.

    Info-Tech Insight

    To be effective, continual improvement requires open and honest feedback from IT staff. Debriefings work well for capturing information about lessons learned. Break down the debriefings into smaller, individual activities completed within each phase of the project to better capture the large amount of data and lessons learned within that phase.

    Measure the success of your improvement program

    Continual improvement is everybody’s job within the organization.

    Determine how improvements impacted stakeholders. Build a relationship pyramid to analyze how improvements impacted external users and narrow down to the internal users, implementing team, and leaders.
    1. How did we make improvements with our partners and suppliers? –› Look into your contracts and measure the SLAs and commitments.
    2. How could improvement initiatives impact the organization? –› Involve everybody to provide feedback. Rerun the end-user satisfaction survey and compare with the baseline that you obtained before improvement implementation.
    3. How does the improvement team feel about the whole process? –› What were the lessons learned, and can the team apply the lessons in the next improvement initiatives?
    4. How did the leaders manage and lead improvements? –› Were they able to provide proper vision to guide the improvement team through the process?
    A relationship pyramid with the initial questions on the left starting from '1' at the bottom to '4' at the 2nd highest level.

    Measure changes in selected metrics to evaluate success

    Measuring and reporting are key components in the improvement process.

    Adjust improvement priority based on updated objectives. Justify the reason. Refer to your CIR to document it.

    Did you get there?

    Part of the measurement should include a review of CSFs and KPIs determined in step 1 (assess the future state). Some may need to be replaced.

    • After an improvement has been implemented, it is important to regularly monitor and evaluate the CSFs and KPIs you chose and run reports to evaluate whether the implemented improvement has actually resolved the service/process issues or helped you achieve your objectives.
    • Establish a schedule for regularly reviewing key metrics that were identified in Step 1 and assessing change in those metrics and progress toward reaching objectives.
    • In addition to reviewing CSFs, KPIs, and metrics, check in with the IT organization and end users to measure their perceptions of the change once an appropriate amount of time has passed.
    • Ensure that metrics are telling the whole story and that reporting is honest in order to be informative.
    Outcomes of the continual improvement process should include:
    • Improved efficiency, effectiveness, and quality of processes and services.
    • Processes and services more aligned with the business needs and strategy.
    • Maturity of processes and services.

    For a guideline to determine a list of metrics, refer to Info-Tech’s blueprints:

    Info-Tech Insight

    Make sure you’re measuring the right things and considering all sources of information. Don’t rely on a single or very few metrics. Instead, consider a group of metrics to help you get a better holistic view of improvement initiatives and their impact on IT operations.

    6. Establish a learning culture and apply it to other practices

    Reflect on lessons learned to drive change forward

    What did you learn?
    Icon of a checklist and pencil. Ultimately, continual improvement is an ongoing educational program.
    Icon of a brain with a lighting bolt.
    Icon of a wrench in a speech bubble. By teaching your team how to learn better and identify sources of new knowledge that can be applied going forward, you maximize the efficacy of your team and improvement plan effort.
    What obstacles prevented you from reaching your target condition?
    Icon of a map marker. If you did not reach your target goals, reflect as a team on what obstacles prevented you from reaching that target.
    Icon of a wrench in a gear. Focus on the obstacles that are preventing your team from reaching the target state.
    Icon of a sun behind clouds. As obstacles are removed, new ones will appear, and old ones will disappear.

    Compare expectations versus reality

    Compare the EC (expected change) to the AC (actual change)
    Arrow pointing down.
    Arrow pointing left and down labelled 'Small'. Evaluate the differences: how large is the difference from what you expected? Arrow pointing right and down labelled 'Large'.
    Things are on track and the issue could have simply been an issue with timing of the improvement. More reflection is needed. Perhaps it is a gap in understanding the goal or a poor execution of the action plan.

    Info-Tech Insight

    Regardless of the cause, large differences between the EC and the AC provide great learning opportunities about how to approach change in the future.

    A cycle around a dartboard with numbered steps: '01 Determine your goals', '02 Define the process team', '03 Determine initiatives', '04 Prioritize initiatives', '05 Execute improvement', '06 Establish a learning culture'.

    Think long-term to sustain changes

    The continual improvement process is ongoing. When one improvement cycle ends, the next should begin in order to continually measure and evaluate processes.

    The goal of any framework is steady and continual improvement over time that resets the baseline to the current (and hopefully improved) level at the end of each cycle.

    Have processes in place to ensure that the improvements made will remain in place after the change is implemented. Each completed cycle is just another step toward your target state.
    Icon of a group of people. Ensure that there is a continual commitment from management.
    Icon of a bar chart. Regularly monitor metrics as well as stakeholder feedback after the initial improvement period has ended. Use this information to plan the next improvement.
    Icon of gears. Continual improvement is a combination of attitudes, behavior, and culture.

    Related Info-Tech Research

    Sample of 'Build a Business-Aligned IT Strategy'. Build a Business-Aligned IT Strategy

    Success depends on IT initiatives clearly aligned to business goals, IT excellence, and driving technology innovation.

    Sample of 'Develop Meaningful Service Metrics'. Develop Meaningful Service Metrics

    Reinforce service orientation in your IT organization by ensuring your IT metrics generate value-driven resource behavior.

    Sample of 'Common Challenges to incident management success'. Improve Incident and Problem Management

    Rise above firefighter mode with structured incident management to enable effective problem management.

    Works Cited

    “Continual Improvement ITIL4 Practice Guide.” AXELOS, 2020. Accessed August 2022.

    “5 Tips for Adopting ITIL 4’s Continual Improvement Management Practice.” SysAid, 2021. Accessed August 2022.

    Jacob Gillingham. “ITIL Continual Service Improvement And 7-Step Improvement Process” Invensis Global Learning Services, 2022. Accessed August 2022.

    Enter Into Mobile Development Without Confusion and Frustration

    • Buy Link or Shortcode: {j2store}282|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Mobile Development
    • Parent Category Link: /mobile-development
    • IT managers don’t know where to start when initiating a mobile program.
    • IT has tried mobile development in the past but didn't achieve success.
    • IT must initiate a mobile program quickly based on business priorities and needs a roadmap based on best practices.

    Our Advice

    Critical Insight

    • Form factors and mobile devices won't drive success – business alignment and user experience will. Don't get caught up with the latest features in mobile devices.
    • Software emulation testing is not true testing. Get on the device and run your tests.
    • Cross form-factor testing cannot be optimized to run in parallel. Therefore, anticipate longer testing cycles for cross form-factor testing.

    Impact and Result

    • Prepare your development, testing, and deployment teams for mobile development.
    • Get a realistic assessment of ROI for the launch of a mobile program.

    Enter Into Mobile Development Without Confusion and Frustration Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Make the Case for a Mobile Program

    Understand the current mobile ecosystem. Use this toolkit to help you initiate a mobile development program.

    • Storyboard: Enter Into Mobile Development Without Confusion and Frustration

    2. Assess Your Dev Process for Readiness

    Review and evaluate your current application development process.

    3. Prepare to Execute Your Mobile Program

    Prioritize your mobile program based on your organization’s prioritization profile.

    • Mobile Program Tool

    4. Communicate with Stakeholders

    Summarize the execution of the mobile program.

    • Project Status Communication Worksheet
    [infographic]

    Workshop: Enter Into Mobile Development Without Confusion and Frustration

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Build your Future Mobile Development State

    The Purpose

    Understand the alignment of stakeholder objectives and priorities to mobile dev IT drivers.

    Assess readiness of your organization for mobile dev.

    Understand how to build your ideal mobile dev process.

    Key Benefits Achieved

    Identify and address the gaps in your existing app dev process.

    Build your future mobile dev state.

    Activities

    1.1 Getting started

    1.2 Assess your current state

    1.3 Establish your future state

    Outputs

    List of key stakeholders

    Stakeholder and IT driver mapping and assessment of current app dev process

    List of practices to accommodate mobile dev

    2 Prepare and Execute your Mobile Program

    The Purpose

    Assess the impact of mobile dev on your existing app dev process.

    Prioritize your mobile program.

    Understand the dev practice metrics to gauge success.

    Key Benefits Achieved

    Properly prepare for the execution of your mobile program.

    Calculate the ROI of your mobile program.

    Prioritize your mobile program with dependencies in mind.

    Build a communication plan with stakeholders.

    Activities

    2.1 Conduct an impact analysis

    2.2 Prepare to execute

    2.3 Communicate with stakeholders

    Outputs

    Impact analysis of your mobile program and expected ROI

    Mobile program order of execution and project dependencies mapping

    List of dev practice metrics

    In Case Of Emergency...

    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    1. Get people to safety efficiently by following the floor warden's information and get out if needed
      If there are no floor wardens, YOU take the initiative and alert people. Vacate the premises if you suspect danger.
      Err on the side of caution. Nobody ever got fired over keeping people safe.
    2. Get people to safety (yes! double check this)
    3. Check what is happening
    4. Stop the bleeding
    5. Check what you broke while stopping the bleeding
    6. Check if you need to go into DR mode
    7. Go into DR mode if that is the fastest way to restore the service
    8. Only now start to look deeper

    Notice what is missing in this list?

    • WHY did this happen?
    • WHO did what

    During the first reactions to an event, stick to the facts of what is happening and the symptoms. If the symptoms are bad, attend to people first, no matter the financial losses occurring.
    Remember that financial losses are typically insured. Human life is not. Only loss of income and ability to pay is insured! Not the person's life.

    The WHY, HOW, WHO and other root cause questions are asked in the aftermath of the incident and after you have stabilized the situation.
    In ITIL terms, those are Problem Management and Root Cause Analysis stage questions.

     

     

     

    Management, incident, reaction, emergency

    Modernize Data Architecture for Measurable Business Results

    • Buy Link or Shortcode: {j2store}387|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
    • member rating average days saved: Read what our members are saying
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • Data architecture projects have often failed in the past, causing businesses today to view the launch of a new project as a costly initiative with unclear business value.
    • New technologies in big data and analytics are requiring organizations to modernize their data architecture, but most organizations have failed to spend the time and effort refining the appropriate data models and blueprints that enable them to do so.
    • As the benefits for data architecture are often diffused across an organization’s information management practice, it can be difficult for the business to understand the value and necessity of data architecture.

    Our Advice

    Critical Insight

    • At the heart of tomorrow’s insights-driven enterprises is a modern data environment anchored in fit-for-purpose data architectures.
    • The role of traditional data architecture is transcending beyond organizational boundaries and its focus is shifting from “keeping the lights on” (i.e. operational data and BI) to providing game-changing insights gleaned from untapped big data.

    Impact and Result

    • Perform a diagnostic assessment of your present day architecture and identify the capabilities of your future “to be” environment to position your organization to capitalize on new opportunities in the data space.
    • Use Info-Tech’s program diagnostic assessment and guidance for developing a strategic roadmap to support your team in building a fit-for purpose data architecture practice.
    • Create a data delivery architecture that harmonizes traditional and modern architectural opportunities.

    Modernize Data Architecture for Measurable Business Results Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should modernize your data architecture, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Develop a data architecture vision

    Plan your data architecture project and align it with the business and its strategic vision.

    • Modernize Data Architecture for Measurable Business Results – Phase 1: Develop a Data Architecture Vision
    • Modernize Data Architecture Project Charter
    • Data Architecture Strategic Planning Workbook

    2. Assess data architecture capabilities

    Evaluate the current and target capabilities of your data architecture, using the accompanying diagnostic assessment to identify performance gaps and build a fit-for-purpose practice.

    • Modernize Data Architecture for Measurable Business Results – Phase 2: Assess Data Architecture Capabilities
    • Data Architecture Assessment and Roadmap Tool
    • Initiative Definition Tool

    3. Develop a data architecture roadmap

    Translate your planned initiatives into a sequenced roadmap.

    • Modernize Data Architecture for Measurable Business Results – Phase 3: Develop a Data Architecture Roadmap
    • Modernize Data Architecture Roadmap Presentation Template
    [infographic]

    Workshop: Modernize Data Architecture for Measurable Business Results

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Develop a Data Architecture (DA) Vision

    The Purpose

    Discuss key business drivers and strategies.

    Identify data strategies.

    Develop a data architecture vision.

    Assess data architecture practice capabilities. 

    Key Benefits Achieved

    A data architecture vision aligned with the business.

    A completed assessment of the organization’s current data architecture practice capabilities.

    Identification of "to be" data architecture practice capabilities.

    Identification of key gaps. 

    Activities

    1.1 Explain approach and value proposition

    1.2 Discuss business vision and key drivers

    1.3 Discover business pain points and needs

    1.4 Determine data strategies

    1.5 Assess DA practice capabilities

    Outputs

    Data strategies

    Data architecture vision

    Current and target capabilities for the modernized DA practice

    2 Assess DA Core Capabilities (Part 1)

    The Purpose

    Assess the enterprise data model (EDM).

    Assess current and target data warehouse, BI/analytics, and big data architectures.

    Key Benefits Achieved

    A completed assessment of the organization’s current EDM, data warehouse, BI and analytics, and big data architectures.

    Identification of "to be" capabilities for the organization’s EDM, data warehouse, BI and analytics, and big data architectures.

    Identification of key gaps.

    Activities

    2.1 Present an overarching DA capability model

    2.2 Assess current and target EDM capabilities

    2.3 Assess current/target data warehouse, BI/analytics, and big data architectures

    2.4 Identify gaps and high level strategies

    Outputs

    Target capabilities for EDM

    Target capabilities for data warehouse architecture, BI architecture, and big data architecture

    3 Assess DA Core Capabilities (Part 2)

    The Purpose

    Assess EDM.

    Assess current/target MDM, metadata, data integration, and content architectures.

    Assess dynamic data models.

    Key Benefits Achieved

    A completed assessment of the organization’s current MDM, metadata, data integration, and content architectures.

    Identification of “to be” capabilities for the organization’s MDM, metadata, data integration, and content architectures.

    Identification of key gaps.

    Activities

    3.1 Present an overarching DA capability model

    3.2 Assess current and target MDM, metadata, data integration, and content architectures

    3.3 Assess data lineage and data delivery model

    3.4 Identify gaps and high level strategies

    Outputs

    Target capabilities for MDM architecture, metadata architecture, data integration architecture, and document & content architecture

    Target capabilities for data lineage/delivery

    4 Analyze Gaps and Formulate Strategies

    The Purpose

    Map performance gaps and document key initiatives from the diagnostic assessment.

    Identify additional gaps and action items.

    Formulate strategies and initiatives to address priority gaps. 

    Key Benefits Achieved

    Prioritized gap analysis.

    Improvement initiatives and related strategies.

    Activities

    4.1 Map performance gaps to business vision, pain points, and needs

    4.2 Identify additional gaps

    4.3 Consolidate/rationalize/prioritize gaps

    4.4 Formulate strategies and actions to address gaps

    Outputs

    Prioritized gaps

    Data architecture modernization strategies

    5 Develop a Data Architecture Roadmap

    The Purpose

    Plot initiatives and strategies on a strategic roadmap.

    Key Benefits Achieved

    A roadmap with prioritized and sequenced initiatives.

    Milestone plan.

    Executive report. 

    Activities

    5.1 Transform strategies into a plan of action

    5.2 Plot actions on a prioritized roadmap

    5.3 Identify and discuss next milestone plan

    5.4 Compile an executive report

    Outputs

    Data architecture modernization roadmap

    Data architecture assessment and roadmap report (from analyst team)

    Reduce Time to Consensus With an Accelerated Business Case

    • Buy Link or Shortcode: {j2store}286|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $12,999 Average $ Saved
    • member rating average days saved: 5 Average Days Saved
    • Parent Category Name: Business Analysis
    • Parent Category Link: /business-analysis
    • Enterprise application initiatives are complex, expensive, and require a significant amount of planning before initiation.
    • A financial business case is sometimes used to justify these initiatives.
    • Once the business case (and benefits therein) are approved, the case is forgotten, eliminating a critical check and balance of benefit realization.

    Our Advice

    Critical Insight

    1. Frame the conversation.

    Understand the audience and forum for the business case to best frame the conversation.

    2. Time-box the process of building the case.

    More time should be spent on performing the action rather than building the case.

    3. The business case is a living document.

    The business case creates the basis for review of the realization of the proposed business benefits once the procurement is complete.

    Impact and Result

    • Understand the drivers for decision making in your organization, and the way initiatives are evaluated.
    • Compile a compelling business case that provides decision makers with sufficient information to make decisions confidently.
    • Evaluate proposed enterprise application initiatives “apples-to-apples” using a standardized and repeatable methodology.
    • Provide a mechanism for tracking initiative performance during and after implementation.

    Reduce Time to Consensus With an Accelerated Business Case Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should build a business case for enterprise application investments, review Info-Tech’s methodology, and understand how we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Gather the required information

    Complete the necessary preceding tasks to building the business case. Rationalize the initiative under consideration, determine the organizational decision flow following a stakeholder assessment, and conduct market research to understand the options.

    • Reduce Time to Consensus With an Accelerated Business Case – Phase 1: Gather the Required Information
    • Business Case Readiness Checklist
    • Business Case Workbook
    • Request for Information Template
    • Request for Quotation Template

    2. Conduct the business case analysis

    Conduct a thorough assessment of the initiative in question. Define the alternatives under consideration, identify tangible and intangible benefits for each, aggregate the costs, and highlight any risks.

    • Reduce Time to Consensus With an Accelerated Business Case – Phase 2: Conduct the Business Case Analysis

    3. Make the case

    Finalize the recommendation based on the analysis and create a business case presentation to frame the conversation for key stakeholders.

    • Reduce Time to Consensus With an Accelerated Business Case – Phase 3: Make the Case
    • Full-Form Business Case Presentation Template
    • Summary Business Case Presentation Template
    • Business Case Change Log
    • Business Case Close-Out Form
    [infographic]

    Workshop: Reduce Time to Consensus With an Accelerated Business Case

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Plan for Business Case Development

    The Purpose

    Complete the necessary preceding tasks to building a strong business case.

    Key Benefits Achieved

    Alignment with business objectives.

    Stakeholder buy-in.

    Activities

    1.1 Map the decision flow in your organization.

    1.2 Define the proposed initiative.

    1.3 Define the problem/opportunity statement.

    1.4 Clarify goals and objectives expected from the initiative.

    Outputs

    Decision traceability

    Initiative summary

    Problem/opportunity statement

    Business objectives

    2 Build the Business Case Model

    The Purpose

    Put together the key elements of the business case including alternatives, benefits, and costs.

    Key Benefits Achieved

    Rationalize the business case.

    Activities

    2.1 Design viable alternatives.

    2.2 Identify the tangible and intangible benefits.

    2.3 Assess current and future costs.

    2.4 Create the financial business case model.

    Outputs

    Shortlisted alternatives

    Benefits tracking model

    Total cost of ownership

    Impact analysis

    3 Enhance the Business Case

    The Purpose

    Determine more integral factors in the business case such as ramp-up time for benefits realization as well as risk assessment.

    Key Benefits Achieved

    Complete a comprehensive case.

    Activities

    3.1 Determine ramp-up times for costs and benefits.

    3.2 Identify performance measures and tracking.

    3.3 Assess initiative risk.

    Outputs

    Benefits realization schedule

    Performance tracking framework

    Risk register

    4 Prepare the Business Case

    The Purpose

    Finalize the recommendation and formulate the business case summary and presentation.

    Key Benefits Achieved

    Prepare the business case presentation.

    Activities

    4.1 Choose the alternative to be recommended.

    4.2 Create the detailed and summary business case presentations.

    4.3 Present and incorporate feedback.

    4.4 Monitor and close out.

    Outputs

    Final recommendation

    Business case presentation

    Final sign-off

    Improve Application Development Throughput

    • Buy Link or Shortcode: {j2store}151|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $59,399 Average $ Saved
    • member rating average days saved: 39 Average Days Saved
    • Parent Category Name: Development
    • Parent Category Link: /development
    • The business is demanding more features at an increasing pace. It is expecting your development teams to keep up with its changing needs while maintaining high quality.
    • However, your development process is broken. Tasks are taking significant time to complete, and development handoffs are not smooth.

    Our Advice

    Critical Insight

    • Lean development is independent of your software development lifecycle (SDLC) methodology. Lean development practices can be used in both Agile and Waterfall teams.
    • Lean isn’t about getting rid of sound development processes. Becoming lean means fine-tuning the integration of core practices like coding and testing.
    • Lean thinking motivates automation. By focusing on optimizing the development process, automation becomes a logical and necessary step toward greater maturity and improved throughput.

    Impact and Result

    • Gain a deep understanding of lean principles and associated behaviors. Become familiar with the core lean principles and the critical attitudes and mindsets required by lean. Understand how incorporating DevOps and Agile principles can help your organization.
    • Conduct a development process and tool review. Use a value-stream analysis of your current development process and tools to reveal bottlenecks and time-consuming or wasteful tasks. Analyze these insights to identify root causes and the impact to product delivery.
    • Incorporate the right tools and practices to become more lean. Optimize the key areas where you are experiencing the most pain and consuming the most resources. Look at how today’s best development and testing practices (e.g. version control, branching) and tools (e.g. automation, continuous integration) can improve the throughput of your delivery pipeline.

    Improve Application Development Throughput Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should make development teams leaner, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Conduct a current state analysis

    Acquire a holistic perspective of the development team, process, and tools to identify the bottlenecks and inefficiency points that are significantly delaying releases.

    • Improve Application Development Throughput – Phase 1: Conduct a Current State Analysis
    • Lean Implementation Roadmap Template
    • Lean Development Readiness Assessment

    2. Define the lean future state

    Identify the development guiding principles and artifact management practices and build automation and continuous integration processes and tools that best fit the context and address the organization’s needs.

    • Improve Application Development Throughput – Phase 2: Define the Lean Future State

    3. Create an implementation roadmap

    Prioritize lean implementation initiatives in a gradual, phased approach and map the critical stakeholders in the lean transformation.

    • Improve Application Development Throughput – Phase 3: Create an Implementation Roadmap
    [infographic]

    Workshop: Improve Application Development Throughput

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Conduct a Current State Analysis

    The Purpose

    Assess the current state of your development environment.

    Select a pilot project to demonstrate the value of your optimization.

    Key Benefits Achieved

    Realization of the root causes behind the bottlenecks and inefficiencies in your current development process.

    Valuation of your current development tools.

    Selection of a pilot project that will be used to gather the metrics in order obtain buy-in for wider optimization initiatives.

    Activities

    1.1 Assess your readiness to transition to lean development.

    1.2 Conduct a SWOT analysis and value-stream assessment of your current development process.

    1.3 Evaluate your development tools.

    1.4 Select a pilot project.

    Outputs

    Lean development readiness assessment

    Current state analysis of development process

    Value assessment of existing development tools

    Pilot project selection

    2 Define Your Lean Future State

    The Purpose

    Establish your development guiding principles.

    Enhance the versioning and management of your development artifacts.

    Automatically build and continuously integrate your code.

    Key Benefits Achieved

    Grounded and well-understood set of guiding principles that are mapped to development tasks and initiatives.

    Version control strategy of development artifacts, including source code, adapted to support lean development.

    A tailored approach to establish the right environment to support automated build, testing, and continuous integration tools.

    Activities

    2.1 Assess your alignment to the lean principles.

    2.2 Define your lean development guiding principles.

    2.3 Define your source code branching approach.

    2.4 Define your build automation approach.

    2.5 Define your continuous integration approach.

    Outputs

    Level of alignment to lean principles

    Development guiding principles

    Source code branching approach

    Build automation approach.

    Continuous integration approach

    3 Create Your Implementation Roadmap

    The Purpose

    Prioritize your optimization initiatives to build an implementation roadmap.

    Identify the stakeholders of your lean transformation.

    Key Benefits Achieved

    Phased implementation roadmap that accommodates your current priorities, constraints, and enablers.

    Stakeholder engagement strategy to effectively demonstrate the value of the optimized development environment.

    Activities

    3.1 Identify metrics to gauge the success of your lean transformation.

    3.2 List and prioritize your implementation steps.

    3.3 Identify the stakeholders of your lean transformation.

    Outputs

    List of product, process, and tool metrics

    Prioritized list of tasks to optimize your development environment

    Identification of key stakeholders

    Develop a Cloud Testing Strategy for Today's Apps

    • Buy Link or Shortcode: {j2store}470|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Cloud Strategy
    • Parent Category Link: /cloud-strategy
    • The growth of the Cloud and the evolution of business operations have shown that traditional testing strategies do not work well with modern applications.
    • Organizations require a new framework around testing cloud applications that account for on-demand scalability and self-provisioning.
    • Expectations of application consumers are continually increasing with speed-to-market and quality being the norm.

    Our Advice

    Critical Insight

    • Cloud technology does not change the traditional testing processes that many organizations have accepted and adopted. It does, however, enhance traditional practices with increased replication capacity, execution speed, and compatibility through its virtual infrastructure and automated processes. Consider these factors when developing the cloud testing strategy.
    • Involving the business in strategy development will keep them engaged and align business drivers with technical initiatives.
    • Implement cloud testing solutions in a well-defined rollout process to ensure business objectives are realized and cloud testing initiatives are optimized.
    • Cloud testing is green and dynamic. Realize the limitations of cloud testing and play on its strengths.

    Impact and Result

    • Engaging in a formal and standardized cloud testing strategy and consistently meeting business needs throughout the organization maintains business buy-in.
    • The Cloud compounds the benefits from virtualization and automation because of the Cloud’s scalability, speed, and off-premise and virtual infrastructure and data storage attributes.
    • Cloud testing presents a new testing avenue. Realize that only certain tests are optimized in the Cloud, i.e., load, stress, and functional testing.

    Develop a Cloud Testing Strategy for Today's Apps Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Develop a cloud testing strategy.

    Obtain organizational buy-ins and build a standardized and formal cloud testing strategy.

    • Storyboard: Develop a Cloud Testing Strategy for Today's Apps
    • None

    2. Assess the organization's readiness for cloud testing.

    Assess your people, process, and technology for cloud testing readiness and realize areas for improvement.

    • Cloud Testing Readiness Assessment Tool

    3. Plan and manage the resources allocated to each project task.

    Organize and monitor cloud project planning tasks throughout the project's duration.

    • Cloud Testing Project Planning and Monitoring Tool
    [infographic]

    Design a Coordinated Vulnerability Disclosure Program

    • Buy Link or Shortcode: {j2store}322|cart{/j2store}
    • member rating overall impact: 10.0/10 Overall Impact
    • member rating average dollars saved: $10,000 Average $ Saved
    • member rating average days saved: 20 Average Days Saved
    • Parent Category Name: Threat Intelligence & Incident Response
    • Parent Category Link: /threat-intelligence-incident-response
    • Businesses prioritize speed to market over secure coding and testing practices in the development lifecycle. As a result, vulnerabilities exist naturally in software.
    • To improve overall system security, organizations are leveraging external security researchers to identify and remedy vulnerabilities, so as to mitigate the overall security risk.
    • A primary challenge to developing a coordinated vulnerability disclosure (CVD) program is designing repeatable procedures and scoping the program to the organization’s technical capacity.

    Our Advice

    Critical Insight

    • Having a coordinated vulnerability disclosure program is likely to be tomorrow’s law. With pressures from federal government agencies and recommendations from best-practice frameworks, it is likely that a CVD will be mandated in the future to encourage organizations to be equipped and prepared to respond to externally disclosed vulnerabilities.
    • CVD programs such as bug bounty and vulnerability disclosure programs (VDPs) may reward differently, but they have the same underlying goals. As a result, you don't need dramatically different process documentation.

    Impact and Result

    • Design a coordinated vulnerability disclosure program that reflects business, customer, and regulatory obligations.
    • Develop a program that aligns your resources with the scale of the coordinated vulnerability disclosure program.
    • Follow Info-Tech’s vulnerability disclosure methodology by leveraging our policy, procedure, and workflow templates to get you started.

    Design a Coordinated Vulnerability Disclosure Program Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should design a coordinated vulnerability disclosure program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Assess goals

    Define the business, customer, and compliance alignment for the coordinated vulnerability disclosure program.

    • Design a Coordinated Vulnerability Disclosure Program – Phase 1: Assess Goals
    • Information Security Requirements Gathering Tool

    2. Formalize the program

    Equip your organization for coordinated vulnerability disclosure with formal documentation of policies and processes.

    • Design a Coordinated Vulnerability Disclosure Program – Phase 2: Formalize the Program
    • Coordinated Vulnerability Disclosure Policy
    • Coordinated Vulnerability Disclosure Plan
    • Coordinated Vulnerability Disclosure Workflow (Visio)
    • Coordinated Vulnerability Disclosure Workflow (PDF)
    [infographic]

    Avoid Project Management Pitfalls

    • Buy Link or Shortcode: {j2store}374|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Program & Project Management
    • Parent Category Link: /program-and-project-management
    • IT organizations seem to do everything in projects, yet fewer than 15% successfully complete all deliverables on time and on budget.
    • Project managers seem to succumb to the relentless pressure from stakeholders to deliver more, more quickly, with fewer resources, and with less support than is ideal.
    • To achieve greater likelihood that your project will stay on track, watch out for the four big pitfalls: scope creep, failure to obtain stakeholder commitment, inability to assemble a team, and failure to plan.

    Our Advice

    Critical Insight

    • While many project managers worry about proper planning as the key to project success, skilled management of the political factors around a project has a much greater impact on success.
    • Alone, combating scope creep can improve your likelihood of success by a factor of 2x.
    • A strong project sponsor will be key to fighting the inevitable battles to control scope and obtain resources.

    Impact and Result

    • Take steps to avoid falling into common project pitfalls.
    • Assess which pitfalls threaten your project in its current state and take appropriate steps to avoid falling into them.
    • Avoiding pitfalls will allow you to deliver value on time and on budget, creating the perception of success in users’ and managers’ eyes.

    Avoid Project Management Pitfalls Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Learn about common PM pitfalls and the strategies to avoid them

    Consistently meet project goals through enhanced PM knowledge and awareness.

    • Storyboard: Avoid Project Management Pitfalls
    • None

    2. Detect project pitfalls

    Take action and mitigate a pitfall before it becomes a problem.

    • Project Pitfall Detection & Mitigation Tool

    3. Document and report PM issues

    Learn from issues encountered to help map PM strategies for future projects.

    • Project Management Pitfalls Issue Log
    [infographic]

    Why learn from Tymans Group?

    The TY classes contain in-depth learning material based on over 30 years of experience in IT Operations and Resilience.

    You receive the techniques, tips, tricks, and "professional secrets" you need to succeed in your resilience journey.

    Why would I share "secrets?"

    Because over time, you will find that "secrets" are just manifested experiences.

    What do I mean by that? Gordon Ramsay, who was born in 1966 like me, decided to focus on his culinary education at age 19. According to his Wikipedia page, that was a complete accident. (His Wikipedia page is a hoot to read, by the way.) And he has nothing to prove anymore. His experience in his field speaks for itself.

    I kept studying in my original direction for just one year longer, but by 21, I founded my first company in Belgium in 1987, in the publishing industry. This was extended by IT experiences in various sectors, like international publishing and hospitality, culminating in IT for high-velocity international financial markets and insurance.

    See, "secrets" are a great way to get you to sign up for some "guru" program that will "tell all!" Don't fall for it, especially if the person is too young to have significant experience.

    There are no "secrets." There is only experience and 'wisdom." And that last one only comes with age.

    If I were in my 20s, 30s, or 40s, there is no chance I would share my core experiences with anyone who could become my competitor. At that moment, I'm building my own credibility and my own career. I like helping people, but not to the extent that it will hurt my prospects. 

    And that is my second lesson: be always honest about your intentions. Yes, always. 

    At the current point in my career, "hurting my prospects" is less important. Yes, I still need to make a living, and in another post, I will explain more about that. Here, I feel it is important to share my knowledge and experience with the next people who will take my place in the day-to-day operations of medium and large corporations. And that is worth something. Hence, "sharing my secrets."

    Gert

    Why learn about resilience from us?

    This is a great opportunity to learn from my 30+ years of resilience experience. TY's Gert experienced 9/11 in New York, and he was part of the Lehman Disaster Recovery team that brought the company back within one (one!) week of the terrorist attack.

    He also went through the London Bombings of 2005 and the 2008 financial crisis, which required fast incident responses, the Covid 2020 issues, and all that entailed. Not to mention that Gert was part of the Tokyo office disaster response team as early as 1998, ensuring that Salomon was protected from earthquakes and floods in Japan.

    Gert was part of the solution (for his clients) to several further global events, like the admittedly technical log4J event in 2021, the 2024 Crowdstrike event, and many other local IT incidents, to ensure that clients could continue using the services they needed at that time.

    Beyond the large corporate world, we helped several small local businesses improve their IT resilience with better cloud storage and security solutions. 

    These solutions and ways of thinking work for any business, large or small.

    The TY team

    Explore our resilience solutions.

    Build a Data Pipeline for Reporting and Analytics

    • Buy Link or Shortcode: {j2store}126|cart{/j2store}
    • member rating overall impact: 9.3/10 Overall Impact
    • member rating average dollars saved: $61,999 Average $ Saved
    • member rating average days saved: 20 Average Days Saved
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • Continuous and disruptive database design updates while trying to have one design pattern to fit all use cases.
    • Sub-par performance while loading, retrieving, and querying data.
    • You want to shorten time-to-market of the projects aimed at data delivery and consumption.
    • Unnecessarily complicated database design limits usability of the data and requires knowledge of specific data structures for their effective use.

    Our Advice

    Critical Insight

    • Evolve your data architecture. Data pipeline is an evolutionary break away from the enterprise data warehouse methodology.
    • Avoid endless data projects. Building centralized all-in-one enterprise data warehouses takes forever to deliver a positive ROI.
    • Facilitate data self-service. Use-case optimized data delivery repositories facilitate data self-service.

    Impact and Result

    • Understand your high-level business capabilities and interactions across them – your data repositories and flows should be just a digital reflection thereof.
    • Divide your data world in logical verticals overlaid with various speed data progression lanes, i.e. build your data pipeline – and conquer it one segment at a time.
    • Use the most appropriate database design pattern for a given phase/component in your data pipeline progression.

    Build a Data Pipeline for Reporting and Analytics Research & Tools

    Start here – read the Executive Brief

    Build your data pipeline using the most appropriate data design patterns.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Understand data progression

    Identify major business capabilities, business processes running inside and across them, and datasets produced or used by these business processes and activities performed thereupon.

    • Build a Data Pipeline for Reporting and Analytics – Phase 1: Understand Data Progression

    2. Identify data pipeline components

    Identify data pipeline vertical zones: data creation, accumulation, augmentation, and consumption, as well as horizontal lanes: fast, medium, and slow speed.

    • Build a Data Pipeline for Reporting and Analytics – Phase 2: Identify Data Pipeline Components

    3. Select data design patterns

    Select the right data design patterns for the data pipeline components, as well as an applicable data model industry standard (if available).

    • Build a Data Pipeline for Reporting and Analytics – Phase 3: Select Data Design Patterns
    [infographic]

    Workshop: Build a Data Pipeline for Reporting and Analytics

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Understand Data Progression

    The Purpose

    Identify major business capabilities, business processes running inside and across them, and datasets produced or used by these business processes and activities performed thereupon.

    Key Benefits Achieved

    Indicates the ownership of datasets and the high-level data flows across the organization.

    Activities

    1.1 Review & discuss typical pitfalls (and their causes) of major data management initiatives.

    1.2 Discuss the main business capabilities of the organization and how they interact.

    1.3 Discuss the business processes running inside and across business capabilities and the datasets involved.

    1.4 Create the Enterprise Business Process Model (EBPM).

    Outputs

    Understanding typical pitfalls (and their causes) of major data management initiatives.

    Business capabilities map

    Business processes map

    Enterprise Business Process Model (EBPM)

    2 Identify Data Pipeline Components

    The Purpose

    Identify data pipeline vertical zones: data creation, accumulation, augmentation, and consumption, as well as horizontal lanes: fast, medium, and slow speed.

    Key Benefits Achieved

    Design the high-level data progression pipeline.

    Activities

    2.1 Review and discuss the concept of a data pipeline in general, as well as the vertical zones: data creation, accumulation, augmentation, and consumption.

    2.2 Identify these zones in the enterprise business model.

    2.3 Review and discuss multi-lane data progression.

    2.4 Identify different speed lanes in the enterprise business model.

    Outputs

    Understanding of a data pipeline design, including its zones.

    EBPM mapping to Data Pipeline Zones

    Understanding of multi-lane data progression

    EBPM mapping to Multi-Speed Data Progression Lanes

    3 Develop the Roadmap

    The Purpose

    Select the right data design patterns for the data pipeline components, as well as an applicable data model industry standard (if available).

    Key Benefits Achieved

    Use of appropriate data design pattern for each zone with calibration on the data progression speed.

    Activities

    3.1 Review and discuss various data design patterns.

    3.2 Discuss and select the data design pattern selection for data pipeline components.

    3.3 Discuss applicability of data model industry standards (if available).

    Outputs

    Understanding of various data design patterns.

    Data Design Patterns mapping to the data pipeline.

    Selection of an applicable data model from available industry standards.

    Build Your Data Quality Program

    • Buy Link or Shortcode: {j2store}127|cart{/j2store}
    • member rating overall impact: 9.1/10 Overall Impact
    • member rating average dollars saved: $40,241 Average $ Saved
    • member rating average days saved: 33 Average Days Saved
    • Parent Category Name: Data Management
    • Parent Category Link: /data-management
    • Experiencing the pitfalls of poor data quality and failing to benefit from good data quality, including:
      • Unreliable data and unfavorable output.
      • Inefficiencies and costly remedies.
      • Dissatisfied stakeholders.
    • The chances of successful decision-making capabilities are hindered with poor data quality.

    Our Advice

    Critical Insight

    • Address the root causes of your data quality issues and form a viable data quality program.
      • Be familiar with your organization’s data environment and business landscape.
      • Prioritize business use cases for data quality fixes.
      • Fix data quality issues at the root cause to ensure proper foundation for your data to flow.
    • It is important to sustain best practices and grow your data quality program.

    Impact and Result

    • Implement a set of data quality initiatives that are aligned with overall business objectives and aimed at addressing data practices and the data itself.
    • Develop a prioritized data quality improvement project roadmap and long-term improvement strategy.
    • Build related practices such as artificial intelligence and analytics with more confidence and less risk after achieving an appropriate level of data quality.

    Build Your Data Quality Program Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should establish a data quality program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Define your organization’s data environment and business landscape

    Learn about what causes data quality issues, how to measure data quality, what makes a good data quality practice in relation to your data and business environments.

    • Business Capability Map Template

    2. Analyze your priorities for data quality fixes

    Determine your business unit priorities to create data quality improvement projects.

    • Data Quality Problem Statement Template
    • Data Quality Practice Assessment and Project Planning Tool

    3. Establish your organization’s data quality program

    Revisit the root causes of data quality issues and identify the relevant root causes to the highest priority business unit, then determine a strategy for fixing those issues.

    • Data Lineage Diagram Template
    • Data Quality Improvement Plan Template

    4. Grow and sustain your data quality practices

    Identify strategies for continuously monitoring and improving data quality at the organization.

    Infographic

    Workshop: Build Your Data Quality Program

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Define Your Organization’s Data Environment and Business Landscape

    The Purpose

    Evaluate the maturity of the existing data quality practice and activities.

    Assess how data quality is embedded into related data management practices.

    Envision a target state for the data quality practice.

    Key Benefits Achieved

    Understanding of the current data quality landscape

    Gaps, inefficiencies, and opportunities in the data quality practice are identified

    Target state for the data quality practice is defined

    Activities

    1.1 Explain approach and value proposition

    1.2 Detail business vision, objectives, and drivers

    1.3 Discuss data quality barriers, needs, and principles

    1.4 Assess current enterprise-wide data quality capabilities

    1.5 Identify data quality practice future state

    1.6 Analyze gaps in data quality practice

    Outputs

    Data Quality Management Primer

    Business Capability Map Template

    Data Culture Diagnostic

    Data Quality Diagnostic

    Data Quality Problem Statement Template

    2 Create a Strategy for Data Quality Project 1

    The Purpose

    Define improvement initiatives

    Define a data quality improvement strategy and roadmap

    Key Benefits Achieved

    Improvement initiatives are defined

    Improvement initiatives are evaluated and prioritized to develop an improvement strategy

    A roadmap is defined to depict when and how to tackle the improvement initiatives

    Activities

    2.1 Create business unit prioritization roadmap

    2.2 Develop subject areas project scope

    2.3 By subject area 1 data lineage analysis, root cause analysis, impact assessment, and business analysis

    Outputs

    Business Unit Prioritization Roadmap

    Subject area scope

    Data Lineage Diagram

    3 Create a Strategy for Data Quality Project 2

    The Purpose

    Define improvement initiatives

    Define a data quality improvement strategy and roadmap

    Key Benefits Achieved

    Improvement initiatives are defined

    Improvement initiatives are evaluated and prioritized to develop an improvement strategy

    A roadmap is defined to depict when and how to tackle the improvement initiatives

    Activities

    3.1 Understand how data quality management fits in with the organization’s data governance and data management programs

    3.2 By subject area 2 data lineage analysis, root cause analysis, impact assessment, and business analysis

    Outputs

    Data Lineage Diagram

    Root Cause Analysis

    Impact Analysis

    4 Create a Strategy for Data Quality Project 3

    The Purpose

    Determine a strategy for fixing data quality issues for the highest priority business unit

    Key Benefits Achieved

    Strategy defined for fixing data quality issues for highest priority business unit

    Activities

    4.1 Formulate strategies and actions to achieve data quality practice future state

    4.2 Formulate a data quality resolution plan for the defined subject area

    4.3 By subject area 3 data lineage analysis, root cause analysis, impact assessment, and business analysis

    Outputs

    Data Quality Improvement Plan

    Data Lineage Diagram

    5 Create a Plan for Sustaining Data Quality

    The Purpose

    Plan for continuous improvement in data quality

    Incorporate data quality management into the organization’s existing data management and governance programs

    Key Benefits Achieved

    Sustained and communicated data quality program

    Activities

    5.1 Formulate metrics for continuous tracking of data quality and monitoring the success of the data quality improvement initiative

    5.2 Workshop Debrief with Project Sponsor

    5.3 Meet with project sponsor/manager to discuss results and action items

    5.4 Wrap up outstanding items from the workshop, deliverables expectations, GIs

    Outputs

    Data Quality Practice Improvement Roadmap

    Data Quality Improvement Plan (for defined subject areas)

    Further reading

    Build Your Data Quality Program

    Quality Data Drives Quality Business Decisions

    Executive Brief

    Analyst Perspective

    Get ahead of the data curve by conquering data quality challenges.

    Regardless of the driving business strategy or focus, organizations are turning to data to leverage key insights and help improve the organization’s ability to realize its vision, key goals, and objectives.

    Poor quality data, however, can negatively affect time-to-insight and can undermine an organization’s customer experience efforts, product or service innovation, operational efficiency, or risk and compliance management. If you are looking to draw insights from your data for decision making, the quality of those insights is only as good as the quality of the data feeding or fueling them.

    Improving data quality means having a data quality management practice that is sustainably successful and appropriate to the use of the data, while evolving to keep pace with or get ahead of changing business and data landscapes. It is not a matter of fixing one data set at a time, which is resource and time intensive, but instead identifying where data quality consistently goes off the rails, and creating a program to improve the data processes at the source.

    Crystal Singh

    Research Director, Data and Analytics

    Info-Tech Research Group

    Executive Summary

    Your Challenge

    Your organization is experiencing the pitfalls of poor data quality, including:

    • Unreliable data and unfavorable output.
    • Inefficiencies and costly remedies.
    • Dissatisfied stakeholders.

    Poor data quality hinders successful decision making.

    Common Obstacles

    Not understanding the purpose and execution of data quality causes some disorientation with your data.

    • Failure to realize the importance/value of data quality.
    • Unsure of where to start with data quality.
    • Lack of investment in data quality.

    Organizations tend to adopt a project mentality when it comes to data quality instead of taking the strategic approach that would be all-around more beneficial in the long term.

    Info-Tech’s Approach

    Address the root causes of your data quality issues by forming a viable data quality program.

    • Be familiar with your organization’s data environment and business landscape.
    • Prioritize business use cases for data quality fixes.
    • Fixing data quality issues at the root cause to ensure a proper foundation for your data to flow.

    It is important to sustain best practices and grow your data quality program.

    Info-Tech Insight

    Fix data quality issues as close as possible to the source of data while understanding that business use cases will each have different requirements and expectations from data quality.

    Data is the foundation of your organization’s knowledge

    Data enables your organization to make decisions.

    Reliable data is needed to facilitate data consumers at all levels of the enterprise.

    Insights, knowledge, and information are needed to inform operational, tactical, and strategic decision-making processes. Data and information are needed to manage the business and empower business processes such as billing, customer touchpoints, and fulfillment.

    Raw Data

    Business Information

    Actionable Insights

    Data should be at the foundation of your organization’s evolution. The transformational insights that executives are constantly seeking can be uncovered with a data quality practice that makes high-quality, trustworthy information readily available to the business users who need it.

    98% of companies use data to improve customer experience. (Experian Data Quality, 2019)

    High-Level Data Architecture

    The image is a graphic, which at the top shows different stages of data, and in the lower part of the graphic shows the data processes.

    Build Your Data Quality Program

    1. Data Quality & Data Culture Diagnostics Business Landscape Exercise
    2. Business Strategy & Use Cases
    3. Prioritize Use Cases With Poor Quality

    Info-Tech Insight

    As data is ingested, integrated, and maintained in the various streams of the organization's system and application architecture, there are multiple points where the quality of the data can degrade.

    1. Understand the organization's data culture and data quality environment across the business landscape.
    2. Prioritize business use cases with poor data quality.
    3. For each use case, identify data quality issues and requirements throughout the data pipeline.
    4. Fix data quality issues at the root cause.
    5. As data flow through quality assurance monitoring checkpoints, monitor data to ensure good quality output.

    Insight:

    Proper application of data quality dimensions throughout the data pipeline will result in superior business decisions.

    Data quality issues can occur at any stage of the data flow.

    The image shows the flow of data through various stages: Data Creation; Data Ingestion; Data Accumulation and Engineering; Data Delivery; and Reporting & Analytics. At the bottom, there are two bars: the left one labelled Fix data quality root causes here...; and the right reads: ...to prevent expensive cures here.

    The image is a legend that accompanies the data flow graphic. It indicates that a white and green square icon indicates Data quality dimensions; a red cube indicates a potential point of data quality degradation; the pink square indicates Root cause of poor data quality; and a green flag indicates Quality Assurance Monitoring.

    Prevent the domino effect of poor data quality

    Data is the foundation of decisions made at data-driven organizations.

    Therefore, if there are problems with the organization’s underlying data, this can have a domino effect on many downstream business functions.

    Let’s use an example to illustrate the domino effect of poor data quality.

    Organization X is looking to migrate their data to a single platform, System Y. After the migration, it has become apparent that reports generated from this platform are inconsistent and often seem wrong. What is the effect of this?

    1. Time must be spent on identifying the data quality issues, and often manual data quality fixes are employed. This will extend the time to deliver the project that depends on system Y by X months.
    2. To repair these issues, the business needs to contract two additional resources to complete the unforeseen work. The new resources cost $X each, as well as additional infrastructure and hardware costs.
    3. Now, the strategic objectives of the business are at risk and there is a feeling of mistrust in the new system Y.

    Three key challenges impacting the ability to deliver excellent customer experience

    30% Poor data quality

    30% Method of interaction changing

    30% Legacy systems or lack of new technology

    95% Of organizations indicated that poor data quality undermines business performance.

    (Source: Experian Data Quality, 2019)

    Maintaining quality data will support more informed decisions and strategic insight

    Improving your organization’s data quality will help the business realize the following benefits:

    Data-Driven Decision Making

    Business decisions should be made with a strong rationale. Data can provide insight into key business questions, such as, “How can I provide better customer satisfaction?”

    89% Of CIOs surveyed say lack of quality data is an obstacle to good decision making. (Larry Dignan, CIOs juggling digital transformation pace, bad data, cloud lock0in and business alignment, 2020)

    Customer Intimacy

    Improve marketing and the customer experience by using the right data from the system of record to analyze complete customer views of transactions, sentiments, and interactions.

    94% Percentage of senior IT leaders who say that poor data quality impinges business outcomes. (Clint Boulton, Disconnect between CIOs and LOB managers weakens data quality, 2016)

    Innovation Leadership

    Gain insights on your products, services, usage trends, industry directions, and competitor results to support decisions on innovations, new products, services, and pricing.

    20% Businesses lose as much as 20% of revenue due to poor data quality. (RingLead Data Management Solutions, 10 Stats About Data Quality I Bet You Didn’t Know)

    Operational Excellence

    Make sure the right solution is delivered rapidly and consistently to the right parties for the right price and cost structure. Automate processes by using the right data to drive process improvements.

    10-20% The implementation of data quality initiatives can lead to reductions in corporate budget of up to 20%. (HaloBI, 2015)

    However, maintaining data quality is difficult

    Avoid these pitfalls to get the true value out of your data.

    1. Data debt drags down ROI – a high degree of data debt will hinder you from attaining the ROI you’re expecting.
    2. Lack of trust means lack of usage – a lack of confidence in data results in a lack of data usage in your organization, which negatively effects strategic planning, KPIs, and business outcomes.
    3. Strategic assets become a liability – bad data puts your business at risk of failing compliance standards, which could result in you paying millions in fines.
    4. Increased costs and inefficiency – time spent fixing bad data means less workload capacity for your important initiatives and the inability to make data-based decisions.
    5. Barrier to adopting data-driven tech – emerging technologies, such as predictive analytics and artificial intelligence, rely on quality data. Inaccurate, incomplete, or irrelevant data will result in delays or a lack of ROI.
    6. Bad customer experience – Running your business on bad data can hinder your ability to deliver to your customers, growing their frustration, which negatively impacts your ability to maintain your customer base.

    Info-Tech Insight

    Data quality suffers most at the point of entry. This is one of the causes of the domino effect of data quality – and can be one of the most costly forms of data quality errors due to the error propagation. In other words, fix data ingestion, whether through improving your application and database design or improving your data ingestion policy, and you will fix a large majority of data quality issues.

    Follow Our Data & Analytics Journey

    Data Quality is laced into Data Strategy, Data Management, and Data Governance.

    • Data Strategy
      • Data Management
        • Data Quality
        • Data Governance
          • Data Architecture
            • MDM
            • Data Integration
            • Enterprise Content Management
            • Information Lifecycle Management
              • Data Warehouse/Lake/Lakehouse
                • Reporting and Analytics
                • AI

    Data quality is rooted in data management

    Extract Maximum Benefit Out of Your Data Quality Management.

    • Data management is the planning, execution, and oversight of policies, practices, and projects that acquire, control, protect, deliver, and enhance the value of data and information assets (DAMA, 2009).
    • In other words, getting the right information, to the right people, at the right time.
    • Data quality management exists within each of the data practices, information dimensions, business resources, and subject areas that comprise the data management framework.
    • Within this framework, an effective data quality practice will replace ad hoc processes with standardized practices.
    • An effective data quality practice cannot succeed without proper alignment and collaboration across this framework.
    • Alignment ensures that the data quality practice is fit for purpose to the business.

    The DAMA DMBOK2 Data Management Framework

    • Data Governance
      • Data Quality
      • Data Architecture
      • Data Modeling & Design
      • Data Storage & Operations
      • Data Security
      • Data Integration & Interoperability
      • Documents & Content
      • Reference & Master Data
      • Data Warehousing & Business Intelligence
      • Meta-data

    (Source: DAMA International)

    Related Info-Tech Research

    Build a Robust and Comprehensive Data Strategy

    • People often think that the main problems they need to fix first are related to data quality when the issues transpire at a much larger level. This blueprint is the key to building and fostering a data-driven culture.

    Create a Data Management Roadmap

    • Refer to this blueprint to understand data quality in the context of data disciplines and methods for improving your data management capabilities.

    Establish Data Governance

    • Define an effective data governance strategy and ensure the strategy integrates well with data quality with this blueprint.

    Info-Tech’s methodology for Data Quality

    Phase Steps 1. Define Your Organization’s Data Environment and Business Landscape 2. Analyze Your Priorities for Data Quality Fixes 3. Establish Your Organization’s Data Quality Program 4. Grow and Sustain Your Data Quality Practice
    Phase Outcomes This step identifies the foundational understanding of your data and business landscape, the essential concepts around data quality, as well as the core capabilities and competencies that IT needs to effectively improve data quality. To begin addressing specific, business-driven data quality projects, you must identify and prioritize the data-driven business units. This will ensure that data improvement initiatives are aligned to business goals and priorities. After determining whose data is going to be fixed based on priority, determine the specific problems that they are facing with data quality, and implement an improvement plan to fix it. Now that you have put an improvement plan into action, make sure that the data quality issues don’t keep cropping up. Integrate data quality management with data governance practices into your organization and look to grow your organization’s overall data maturity.

    Info-Tech Insight

    “Data Quality is in the eyes of the beholder.”– Igor Ikonnikov, Research Director

    Data quality means tolerance, not perfection

    Data from Info-Tech’s CIO Business Vision Diagnostic, which represents over 400 business stakeholders, shows that data quality is very important when satisfaction with data quality is low.

    However, when data quality satisfaction hit a threshold, it became less important.

    The image is a line graph, with the X-axis labelled Satisfaction with Data Quality, and the Y axis labelled Rated Importance for Data Quality. The line begins high, and then descends. There is text inside the graph, which is transcribed below.

    Respondents were asked “How satisfied are you with the quality, reliability, and effectiveness of the data you use to manage your group?” as well as to rank how important data quality was to their organization.

    When the business satisfaction of data quality reached a threshold value of 71-80%, the rated importance reached its lowest value.

    Info-Tech Insight

    Data needs to be good, but truly spectacular data may go unnoticed.

    Provide the right level of data quality, with the appropriate effort, for the correct usage. This blueprint will help you to determine what “the right level of data quality” means, as well as create a plan to achieve that goal for the business.

    Data Roles and Responsibilities

    Data quality occurs through three main layers across the data lifecycle

    Data Strategy

    Data Strategy should contain Data Quality as a standard component.

    ← Data Quality issues can occur throughout at any stage of the data flow →

    DQ Dimensions

    Timeliness – Representation – Usability – Consistency – Completeness – Uniqueness – Entry Quality – Validity – Confidence – Importance

    Source System Layer

    • Data Resource Manager/Collector: Enters data into a database and ensures that data collection sources are accurate

    Data Transformation Layer

    • ETL Developer: Designs data storage systems
    • Data Engineer: Oversees data integrations, data warehouses and data lakes, data pipelines
    • Database Administrator: Manages database systems, ensures they meet SLAs, performances, backups
    • Data Quality Engineer: Finds and cleanses bad data in data sources, creates processes to prevent data quality problems

    Consumption Layer

    • Data Scientist: Gathers and analyses data from databases and other sources, runs models, and creates data visualizations for users
    • BI Analyst: Evaluates and mines complex data and transforms it into insights that drive business value. Uses BI software and tools to analyze industry trends and create visualizations for business users
    • Data Analyst: Extracts data from business systems, analyzes it, and creates reports and dashboards for users
    • BI Engineer: Documents business needs on data analysis and reporting and develops BI systems, reports, and dashboards to support them
    Data Creation → [SLA] Data Ingestion [ QA] →Data Accumulation & Engineering → [SLA] Data Delivery [QA] →Reporting & Analytics
    Fix Data Quality root causes here… to prevent expensive cures here.

    Executive Brief Case Study

    Industry: Healthcare

    Source: Primary Info-Tech Research

    Align source systems to maximize business output.

    A healthcare insurance agency faced data quality issues in which a key business use case was impacted negatively. Business rules were not well defined, and default values instead of real value caused a concern. When dealing with multiple addresses, data was coming from different source systems.

    The challenge was to identify the most accurate address, as some were incomplete, and some lacked currency and were not up to date. This especially challenged a key business unit, marketing, to derive business value in performing key activities by being unable to reach out to existing customers to advertise any additional products.

    For this initiative, this insurance agency took an economic approach by addressing those data quality issues using internal resources.

    Results

    Without having any MDM tools or having a master record or any specific technology relating to data quality, this insurance agency used in-house development to tackle those particular issues at the source system. Data quality capabilities such as data profiling were used to uncover those issues and address them.

    “Data quality is subjective; you have to be selective in terms of targeting the data that matters the most. When getting business tools right, most issues will be fixed and lead to achieving the most value.” – Asif Mumtaz, Data & Solution Architect

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

    Guided Implementation

    "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

    Workshop

    "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

    Consulting

    "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostic and consistent frameworks are used throughout all four options.

    Guided Implementation

    What does a typical GI on this topic look like?

    Phase 1 Phase 2 Phase 3 Phase 4
    • Call #1: Learn about the concepts of data quality and the common root causes of poor data quality.
    • Call #2: Identify the core capabilities of IT for improving data quality on an enterprise scale.
    • Call #3: Determine which business units use data and require data quality remediation.
    • Call #4: Create a plan for addressing business unit data quality issues according to priority of the business units based on value and impact of data.
    • Call #5: Revisit the root causes of data quality issues and identify the relevant root causes to the highest priority business unit.
    • Call #6: Determine a strategy for fixing data quality issues for the highest priority business unit.
    • Call #7: Identify strategies for continuously monitoring and improving data quality at the organization.
    • Call #8: Learn how to incorporate data quality practices in the organization’s larger data management and data governance frameworks.
    • Call #9: Summarize results and plan next steps on how to evolve your data landscape.

    A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is between eight to twelve calls over the course of four to six months.

    Workshop Overview

    Contact your account representative for more information. workshops@infotech.com 1-888-670-8889

    Day 1 Day 2 Day 3 Day 4 Day 5
    Define Your Organization’s Data Environment and Business Landscape Create a Strategy for Data Quality Project 1 Create a Strategy for Data Quality Project 2 Create a Strategy for Data Quality Project 3 Create a Plan for Sustaining Data Quality
    Activities
    1. Explain approach and value proposition.
    2. Detail business vision, objectives, and drivers.
    3. Discuss data quality barriers, needs, and principles.
    4. Assess current enterprise-wide data quality capabilities.
    5. Identify data quality practice future state.
    6. Analyze gaps in data quality practice.
    1. Create business unit prioritization roadmap.
    2. Develop subject areas project scope.
    3. By subject area 1:
    • Data lineage analysis
    • Root cause analysis
    • Impact assessment
    • Business analysis
    1. Understand how data quality management fits in with the organization’s data governance and data management programs.
    2. By subject area 2:
    • Data lineage analysis
    • Root cause analysis
    • Impact assessment
    • Business analysis
    1. Formulate strategies and actions to achieve data quality practice future state.
    2. Formulate data quality resolution plan for defined subject area.
    3. By subject area 3:
    • Data lineage analysis
    • Root cause analysis
    • Impact assessment
    • Business analysis
    1. Formulate metrics for continuous tracking of data quality and monitoring the success of the data quality improvement initiative.
    2. Workshop Debrief with Project Sponsor.
    • Meet with project sponsor/manager to discuss results and action items.
    • Wrap up outstanding items from the workshop, deliverables expectations, GIs.
    Deliverables
    1. Data Quality Management Primer
    2. Business Capability Map Template
    3. Data Culture Diagnostic
    4. Data Quality Diagnostic
    5. Data Quality Problem Statement Template
    1. Business Unit Prioritization Roadmap
    2. Subject area scope
    3. Data Lineage Diagram
    1. Data Lineage Diagram
    2. Root Cause Analysis
    3. Impact Analysis
    1. Data Lineage Diagram
    2. Data Quality Improvement Plan
    1. Data Quality Practice Improvement Roadmap
    2. Data Quality Improvement Plan (for defined subject areas)

    Phase 1

    Define Your Organization’s Data Environment and Business Landscape

    Build Your Data Quality Program

    Data quality is a methodology and must be treated as such

    A comprehensive data quality practice includes appropriate business requirements gathering, planning, governance, and oversight capabilities, as well as empowering technologies for properly trained staff, and ongoing development processes.

    Some common examples of appropriate data management methodologies for data quality are:

    • The data quality team has the necessary competencies and resources to perform the outlined workload.
    • There are processes that exist for continuously evaluating data quality performance capabilities.
    • Improvement strategies are designed to increase data quality performance capabilities.
    • Policies and procedures that govern data quality are well-documented, communicated, followed, and updated.
    • Change controls exist for revising policies and procedures, including communication of updates and changes.
    • Self-auditing techniques are used to ensure business-IT alignment when designing or recalibrating strategies.

    Effective data quality practices coordinate with other overarching data disciplines, related data practices, and strategic business objectives.

    “You don’t solve data quality with a Band-Aid; you solve it with a methodology.” – Diraj Goel, Growth Advisor, BC Tech

    Data quality can be defined by four key quality indicators

    Similar to measuring the acidity of a substance with a litmus test, the quality of your data can be measured using a simple indicator test. As you learn about common root causes of data quality problems in the following slides, think about these four quality indicators to assess the quality of your data:

    • Completeness – Closeness to the correct value. Encompasses accuracy, consistency, and comparability to other databases.
    • Usability – The degree to which data meets current user needs. To measure this, you must determine if the user is satisfied with the data they are using to complete their business functions.
    • Timeliness – Length of time between creation and availability of data.
    • Accessibility – How easily a user can access and understand the data (including data definitions and context). Interpretability can also be used to describe this indicator.

    Info-Tech Insight

    Quality is a relative term. Data quality is measured in terms of tolerance. Perfect data quality is both impossible and a waste of time and effort.

    How to get investment for your data quality program

    Follow these steps to convince leadership of the value of data quality:

    “You have to level with people, you cannot just start talking with the language of data and expect them to understand when the other language is money and numbers.” – Izabela Edmunds, Information Architect at Mott MacDonald

    1. Perform Phases 0 & 1 of this blueprint as this will offer value in carrying out the following steps.
    2. Build credibility. Show them your understanding of data and how it aligns to the business.
    3. Provide tangible evidence of how significant business use cases are impacted by poor quality data.
    4. Present the ROI of fixing the data quality issues you have prioritized.
    5. Explain how the data quality program will be established, implemented, and sustained.
    6. Prove the importance of fixing data quality issues at the source and how it is the most efficient, effective, and cost-friendly solution.

    Phase 1 deliverables

    Each of these deliverables serve as inputs to detect key outcomes about your organization and to help complete this blueprint:

    1. Data Culture Diagnostic

    Use this report to understand where your organization lies across areas relating to data culture.

    While the Quality & Trust area of the report might be most prevalent to this blueprint, this diagnostic may point out other areas demanding more attention.

    Please speak to your account manager for access

    2. Business Capability Map Template

    Perform this process to understand the capabilities that enable specific value streams. The output of this deliverable is a high-level view of your organization’s defined business capabilities.

    Download this tool

    Info-Tech Insight

    Understanding your data culture and business capabilities are foundational to starting the journey of data quality improvement.

    Key deliverable:

    3. Data Quality Diagnostic

    The Data Quality Report is designed to help you understand, assess, and improve key organizational data quality issues. This is where respondents across various areas in the organization can assess Data Quality across various dimensions.

    Download this tool

    Data Quality Diagnostic Value

    Prioritize business use cases with our data quality dimensions.

    • Complete this diagnostic for each major business use case. The output from the Data Culture Diagnostic and the Business Capability Map should help you understand which use cases to address.
    • Involve all key stakeholders involved in the business use case. There may be multiple business units involved in a single use case.
    • Prioritize the business use cases that need the most attention pertaining to data quality by comparing the scores of the Importance and Confidence data quality dimensions.

    If there are data elements that are considered of high importance and low confidence, then they must be prioritized.

    Sample Scorecard

    The image shows a screen capture of a scorecard, with sample information filled in.

    The image shows a screen capture of a scorecard, with sample information filled in.

    Poor data quality develops due to multiple root causes

    After you get to know the properties of good quality data, understand the underlying causes of why those indicators can point to poor data quality.

    If you notice that the usability, completeness, timeliness, or accessibility of the organization’s data is suffering, one or more of the following root causes are likely plaguing your data:

    Common root causes of poor data quality, through the lens of Info-Tech’s Five-Tier Data Architecture:

    The image shows a graphic of Info-Tech's Five-Tier Data Architecture, with root causes of poor data quality identified. In the data creation and ingestion stages, the root causes are identified as Poor system/application design, Poor database design, Inadequate enterprise integration. The root causes identified in the latter stages are: Absence of data quality policies, procedures, and standards, and Incomplete/suboptimal business processes

    These root causes of poor data quality are difficult to avoid, not only because they are often generated at an organization’s beginning stages, but also because change can be difficult. This means that the root causes are often propagated through stale or outdated business processes.

    Data quality problems root cause #1:

    Poor system or application design

    Application design plays one of the largest roles in the quality of the organization’s data. The proper design of applications can prevent data quality issues that can snowball into larger issues downstream.

    Proper ingestion is 90% of the battle. An ounce of prevention is worth a pound of cure. This is true in many different topics, and data quality is one of them. Designing an application so that data gets entered properly, whether by internal staff or external customers, is the single most effective way to prevent data quality issues.

    Some common causes of data quality problems at the application/system level include:

    • Too many open fields (free-form text fields that accept a variety of inputs).
    • There are no lookup capabilities present. Reference data should be looked up instead of entered.
    • Mandatory fields are not defined, resulting in blank fields.
    • No validation of data entries before writing to the underlying database.
    • Manual data entry encourages human error. This can be compounded by poor application design that facilitates the incorrect data entry.

    Data quality problems root cause #2:

    Poor database design

    Database design also affects data quality. How a database is designed to handle incoming data, including the schema and key identification, can impact the integrity of the data used for reporting and analytics.

    The most common type of database is the relational database. Therefore, we will focus on this type of database.

    When working with and designing relational databases, there are some important concepts that must be considered.

    Referential integrity is a term that is important for the design of relational database schema, and indicates that table relationships must always be consistent.

    For table relationships to be consistent, primary keys (unique value for each row) must uniquely identify entities in columns of the table. Foreign keys (field that is defined in a second table but refers to the primary key in the first table) must agree with the primary key that is referenced by the foreign key. To maintain referential integrity, any updates must be propagated to the primary parent key.

    Info-Tech Insight

    Other types of databases, including databases with unstructured data, need data quality consideration. However, unstructured data may have different levels of quality tolerance.

    At the database level, some common root causes include:

    1. Lack of referential integrity.
    2. Lack of unique keys.
    3. Don’t have restricted data range.
    4. Incorrect datatype, string fields that can hold too many characters.
    5. Orphaned records.

    Databases and People:

    Even though database design is a technology issue, don’t forget about the people.

    A lack of training employees on database permissions for updating/entering data into the physical databases is a common problem for data quality.

    Data quality problems root cause #3:

    Improper integration and synchronization of enterprise data

    Data ingestion is another category of data-quality-issue root causes. When moving data in Tier 2, whether it is through ETL, ESB, point-to-point integration, etc., the integrity of the data during movement and/or transformation needs to be maintained.

    Tier 2 (the data ingestion layer) serves to move data for one of two main purposes:

    • To move data from originating systems to downstream systems to support integrated business processes.
    • To move data to Tier 3 where data rests for other purposes. This movement of data in its purest form means we move raw data to storage locations in an overall data warehouse environment reflecting any security, compliance and other standards in our choices for how to store. Also, it is where data is transformed for unique business purpose that will also be moved to a place of rest or a place of specific use. Data cleansing and matching and other data-related blending tasks occur at this layer.

    This ensures the data is pristine throughout the process and improves trustworthiness of outcomes and speed to task completion.

    At the integration layer, some common root causes of data quality problems include:

    1. No data mask. For example, zip code should have a mask of five numeric characters.
    2. Questionable aggregation, transformation process, or incorrect logic.
    3. Unsynchronized data refresh process in an integrated environment.
    4. Lack of a data matching tool.
    5. Lack of a data quality tool.
    6. Don’t have data profiling capability.
    7. Errors with data conversion or migration processes – when migrating, decommissioning, or converting systems – movement of data sets.
    8. Incorrect data mapping between data sources and targets.

    Data quality problems root cause #4:

    Insufficient and ineffective data quality policies and procedures

    Data policies and procedures are necessary for establishing standards around data and represent another category of data-quality-issue root causes. This issue spans across all five of the 5 Tier Architecture.

    Data policies are short statements that seek to manage the creation, acquisition, integrity, security, compliance, and quality of data. These policies vary amongst organizations, depending on your specific data needs.

    • Policies describe what to do, while standards and procedures describe how to do something.
    • There should be few data policies, and they should be brief and direct. Policies are living documents and should be continuously updated to respond to the organization’s data needs.
    • The data policies should highlight who is responsible for the data under various scenarios and rules around how to manage it effectively.

    Some common root causes of data quality issues related to policies and procedures include:

    1. Policies are absent or out of date.
    2. Employees are largely unaware of policies in effect.
    3. Policies are unmonitored and unenforced.
    4. Policies are in multiple locations.
    5. Multiple versions of the same policy exist.
    6. Policies are managed inconsistently across different silos.
    7. Policies are written poorly by untrained authors.
    8. Inadequate policy training program.
    9. Draft policies stall and lose momentum.
    10. Weak policy support from senior management.

    Data quality problems root cause #5:

    Inefficient or ineffective business processes

    Some common root causes of data quality issues related to business processes include:

    1. Multiple entries of the same record leads to duplicate records proliferating in the database.
    2. Many business definitions of data.
    3. Failure to document data manipulations when presenting data.
    4. Failure to train people on how to understand data.
    5. Manually intensive processes can result in duplication of effort (creates room for errors).
    6. No clear delineation of dependencies of business processes within or between departments, which leads to a siloed approach to business processes, rather than a coordinated and aligned approach.

    Business processes can impact data quality. How data is entered into systems, as well as employee training and knowledge about the correct data definitions, can impact the quality of your organization’s data.

    These problematic business process root causes can lead to:

    Duplicate records

    Incomplete data

    Improper use of data

    Wrong data entered into fields

    These data quality issues will result in costly and inefficient manual fixes, wasting valuable time and resources.

    Phase 1 Summary

    1. Data Quality Understanding

    • Understanding that data quality is a methodology and should be treated as such.
    • Data quality can be defined by four key indicators which are completeness, usability, timeliness, and accessibility.
    • Explained how to get investment for your data quality program and showcasing its value to leadership.

    2. Phase 0 Deliverables

    Introduced foundational tools to help you throughout this blueprint:

    • Complete the Data Culture Diagnostic and Business Capability Map Template as they are foundational in understanding your data culture and business capabilities to start the journey of data quality improvement.
    • Involve key relevant stakeholders when completing the Data Quality Diagnostic for each major business use case. Use the Importance and Confidence dimensions to help you prioritize which use case to address.

    3. Common Root Causes

    Addressed where multiple root causes can occur throughout the flow of your data.

    Analyzed the following common root causes of data quality:

    1. Poor system or application design
    2. Poor database design
    3. Improper integration and synchronization of enterprise data
    4. Insufficient and ineffective data quality policies and procedures
    5. Inefficient or ineffective business processes

    Phase 2

    Analyze Your Priorities for Data Quality Fixes

    Build Your Data Quality Program

    Business Context & Data Quality

    Establish the business context of data quality improvement projects at the business unit level to find common goals.

    • To ensure the data improvement strategy is business driven, start your data quality project evaluation by understanding the business context. You will then determine which business units use data and create a roadmap for prioritizing business units for data quality repairs.
    • Your business context is represented by your corporate business vision, mission, goals and objectives, differentiators, and drivers. Collectively, they provide essential information on what is important to your organization, and some hints on how to achieve that. In this step, you will gather important information about your business view and interpret the business view to establish a data view.

    Business Vision

    Business Goals

    Business Drivers

    Business Differentiators

    Not every business unit uses data to the same extent

    A data flow diagram can provide value by allowing an organization to adopt a proactive approach to data quality. Save time by knowing where the entry points are and where to look for data flaws.

    Understanding where data lives can be challenging as it is often in motion and rarely resides in one place. There are multiple benefits that come from taking the time to create a data flow diagram.

    • Mapping out the flow of data can help provide clarity on where the data lives and how it moves through the enterprise systems.
    • Having a visual of where and when data moves helps to understand who is using data and how it is being manipulated at different points.
    • A data flow diagram will allow you to elicit how data is used in a different use case.

    Info-Tech’s Four-Column Model of Data will help you to identify the essential aspects of your data:

    Business Use Case →Used by→Business Unit →Housed in→Systems→Used for→Usage of the Data

    Not every business unit requires the same standard of data quality

    To prioritize your business units for data quality improvement projects, you must analyze the relative importance of the data they use to the business. The more important the data is to the business, the higher the priority is of fixing that data. There are two measures for determining the importance of data: business value and business impact.

    Business Value of Data

    Business value of data can be evaluated by thinking about its ties to revenue generation for the organization, as well as how it is used for productivity and operations at the organization.

    The business value of data is assessed by asking what would happen to the following parameters if the data is not usable (due to poor quality, for example):

    • Loss of Revenue
    • Loss of Productivity
    • Increased Operating Costs

    Business Impact of Data

    Business impact of data should take into account the effects of poor data on both internal and external parties.

    The business impact of data is assessed by asking what the impact would be of bad data on the following parameters:

    • Impact on Customers
    • Impact on Internal Staff
    • Impact on Business Partners

    Value + Impact = Data Priority Score

    Ensure that the project starts on the right foot by completing Info-Tech’s Data Quality Problem Statement Template

    Before you can identify a solution, you must identify the problem with the business unit’s data.

    Download this tool

    Use Info-Tech’s Data Quality Problem Statement Template to identify the symptoms of poor data quality and articulate the problem.

    Info-Tech’s Data Quality Problem Statement Template will walk you through a step-by-step approach to identifying and describing the problems that the business unit feels regarding its data quality.

    Before articulating the problem, it helps to identify the symptoms of the problem. The following W’s will help you to describe the symptoms of the data quality issues:

    What

    Define the symptoms and feelings produced by poor data quality in the business unit.

    Where

    Define the location of the data that are causing data quality issues.

    When

    Define how severe the data quality issues are in frequency and duration.

    Who

    Define who is affected by the data quality problems and who works with the data.

    Info-Tech Best Practice

    Symptoms vs. Problems. Often, people will identify a list of symptoms of a problem and mistake those for the problem. Identifying the symptoms helps to define the problem, but symptoms do not help to identify the solution. The problem statement helps you to create solutions.

    Define the project problem to articulate the purpose

    1 hour

    Input

    • Symptoms of data quality issues in the business unit

    Output

    • Refined problem description

    Materials

    • Data Quality Problem Statement Template

    Participants

    • Data Quality Improvement Project team
    • Business line representatives

    A defined problem helps you to create clear goals, as well as lead your thinking to determine solutions to the problem.

    A problem statement consists of one or two sentences that summarize a condition or issue that a quality improvement team is meant to address. For the improvement team to fix the problem, the problem statement therefore has to be specific and concise.

    Instructions

    1. Gather the Data Quality Improvement Project Team in a room and start with an issue that is believed to be related to data quality.
    2. Ask what are the attributes and symptoms of that reality today; do this with the people impacted by the issue. This should be an IT and business collaboration.
    3. Draw your conclusions of what it all means: what have you collectively learned?
    4. Consider the implications of your conclusions and other considerations that must be taken into account such as regulatory needs, compliance, policy, and targets.
    5. Develop solutions – Contain the problem to something that can be solved in a realistic timeframe, such as three months.

    Download the Data Quality Problem Statement Template

    Case Study

    A strategic roadmap rooted in business requirements primes a data quality improvement plan for success.

    MathWorks

    Industry

    Software Development

    Source

    Primary Info-Tech Research

    As part of moving to a formalized data quality practice, MathWorks leveraged an incremental approach that took its time investigating business cases to support improvement actions. Establishing realistic goals for improvement in the form of a roadmap was a central component for gaining executive approval to push the project forward.

    Roadmap Creation

    In constructing a comprehensive roadmap that incorporated findings from business process and data analyses, MathWorks opted to document five-year and three-year overall goals, with one-year objectives that supported each goal. This approach ensured that the tactical actions taken were directed by long-term strategic objectives.

    Results – Business Alignment

    In presenting their roadmap for executive approval, MathWorks placed emphasis on communicating the progression and impact of their initiatives in terms that would engage business users. They focused on maintaining continual lines of communication with business stakeholders to demonstrate the value of the initiatives and also to gradually shift the corporate culture to one that is invested in an effective data quality practice.

    “Don’t jump at the first opportunity, because you may be putting out a fire with a cup of water where a fire truck is needed.” – Executive Advisor, IT Research and Advisory Firm

    Use Info-Tech’s Practice Assessment and Project Planning Tool to create your strategy for improving data quality

    Assess IT’s capabilities and competencies around data quality and plan to build these as the organization’s data quality practice develops. Before you can fix data quality, make sure you have the necessary skills and abilities to fix data quality correctly.

    The following IT capabilities are developed on an ongoing basis and are necessary for standardizing and structuring a data quality practice:

    • Meeting Business Needs
    • Services and Projects
    • Policies, Procedures, and Standards
    • Roles and Organizational Structure
    • Oversight and Communication
    • Data Quality of Different Data Types

    Download this Tool

    Data Handling and Remediation Competencies:

    • Data Standardization: Formatting values into consistent standards based on industry standards and business rules.
    • Data Cleansing: Modification of values to meet domain restrictions, integrity constraints, or other business rules for sufficient data quality for the organization.
    • Data Matching: Identification, linking, and merging related entries in or across sets of data.
    • Data Validation: Checking for correctness of the data.

    After these capabilities and competencies are assessed for a current and desired target state, the Data Quality Practice Assessment and Project Planning Tool will suggest improvement actions that should be followed in order to build your data quality practice. In addition, a roadmap will be generated after target dates are set to create your data quality practice development strategy.

    Benchmark current and identify target capabilities for your data quality practice

    1 hour

    Input

    • Current and desired data quality practices in the organization

    Output

    • Assessment of where the gaps lie in your data quality practice

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Data Quality Project Lead
    • Business Line Representatives
    • Business Architects

    Use the Data Quality Practice Assessment and Project Planning Tool to evaluate the baseline and target capabilities of your practice in terms of how data quality is approached and executed.

    Download this Tool

    Instructions

    1. Invite the appropriate stakeholders to participate in this exercise. Examples:
      1. Business executives will have input in Tab 2
      2. Unique stakeholders: communications expert or executive advisors may have input
    2. On Tab 2: Practice Components, assess the current and target states of each capability on a scale of 1–5. Note: “Ad hoc” implies a capability is completed, but randomly, informally, and without a standardized method.

    These results will set the baseline against which you will monitor performance progress and keep track of improvements over time.

    Info-Tech Insight

    Focus on early alignment. Assessing capabilities within specific people’s job functions can naturally result in disagreement or debate, especially between business and IT people. Remind everyone that data quality should ultimately serve business needs wherever possible.

    Visualization improves the holistic understanding of where gaps exist in your data quality practice

    To enable deeper analysis on the results of your practice assessment, Tab 3: Data Quality Practice Scorecard in the Data Quality Practice Assessment and Project Planning Tool creates visualizations of the gaps identified in each of your practice capabilities and related data management practices. These diagrams serve as analysis summaries.

    Gap assessment of “Meeting Business Needs” capabilities

    The image shows a screen capture of the Gap assessment of 
“Meeting Business Needs” capabilities, with sample information filled in.

    Visualization of gap assessment of data quality practice capabilities

    The image shows a bar graph titled Data Quality Capabilities.

    1. Enhance your gap analyses by forming a relative comparison of total gaps in key practice capability areas, which will help in determining priorities.
    • Example: In Tab 2 compare your capabilities within “Policies, Procedures, and Standards.” Then in Tab 3, compare your overall capabilities in “Policies, Procedures, and Standards” versus “Empowering Technologies.”
  • Put these up on display to improve discussion in the gap analyses and prioritization sessions.
  • Improve the clarity and flow of your strategy template, final presentations, and summary documents by copying and pasting the gap assessment diagrams.
  • Before engaging in the data quality improvement project plan, receive signoff from IT regarding feasibility

    The final piece of the puzzle is to gain sign-off from IT.

    Hofstadter's law: It always takes longer than you expect, even when you take into account Hofstadter’s Law.

    This means that before engaging IT in data quality projects to fix the business units’ data in Phase 2, IT must assess feasibility of the data quality improvement plan. A feasibility analysis is typically used to review the strengths and weaknesses of the projects, as well as the availability of required skills and technologies needed to complete them. Use the following workflow to guide you in performing a feasibility analysis:

    Project evaluation process:

    Present capabilities

    • Operational Capabilities
    • System Capabilities
    • Schedule Capabilities
      • Summary of Evaluation Results
        • Recommendations/ modifications to the project plan

    Info-Tech Best Practice

    While the PMO identifies and coordinates projects, IT must determine how long and for how much.

    Conduct gap analysis sessions to review and prioritize the capability gaps

    1 hour

    Input

    • Current and Target State Assessment

    Output

    • Documented initiatives to help you get to the target state

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Data Quality team
    • IT representatives

    Instructions

    • Analyze Gap Analysis Results – As a group, discuss the high-level results on Tab 3: Data Quality Practice Score. Discuss the implications of the gaps identified.
    • Do a line-item review of the gaps between current and target levels for each assessed capability by using Tab 2: Practice Components.
    • Brainstorm Alignment Strategies – Brainstorm the effort and activities that will be necessary to support the practice in building its capabilities to the desired target level. Ask the following questions:
      • What activities must occur to enable this capability?
      • What changes/additions to resources, process, technology, business involvement, and communication must occur?
    • Document Data Quality Initiatives – Turn activities into initiatives by documenting them in Tab 4. Data Quality Practice Roadmap. Review the initiatives and estimate the start and end dates of each one.
    • Continue to evaluate the assessment results in order to create a comprehensive set of data quality initiatives that support your practice in building capabilities.

    Download this Tool

    Create the organization’s data quality improvement strategy roadmap

    1 hour

    Input

    • Data quality practice gaps and improvement actions

    Output

    • Data quality practice improvement roadmap

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Data Quality Project Lead
    • Business Executives
    • IT Executives
    • Business Architects

    Generating Your Roadmap

    1. Plan the sequence, starting time, and length of each initiative in the Data Quality Practice Assessment and Project Planning Tool.
    2. The tool will generate a Gantt chart based on the start and length of your initiatives.
    3. The Gantt chart is generated in Tab 4: Data Quality Practice Roadmap, and can be used to organize and ensure that all of the essential aspects of data quality are addressed.

    Use the Practice Roadmap to plan and improve data quality capabilities

    Download this Tool

    Info-Tech Best Practice

    To help get you started, Info-Tech has provided an extensive list of data quality improvement initiatives that are commonly undertaken by organizations looking to improve their data quality.

    Establish Baseline Metrics

    Baseline metrics will be improved through:

    2 hours

    Create practice-level metrics to monitor your data quality practice.

    Instructions:

    1. Establish metrics for both the business and IT that will be used to determine if the data quality practice development is effective.
    2. Set targets for each metric.
    3. Collect current data to calculate the metrics and establish a baseline.
    4. Assign an owner for tracking each metric to be accountable for performance.
    Metric Current Goal
    Usage (% of trained users using the data warehouse)
    Performance (response time)
    Performance (response time)
    Resource utilization (memory usage, number of machine cycles)
    User satisfaction (quarterly user surveys)
    Data quality (% values outside valid values, % fields missing, wrong data type, data outside acceptable range, data that violates business rules. Some aspects of data quality can be automatically tracked and reported)
    Costs (initial installation and ongoing, Total Cost of Ownership including servers, software licenses, support staff)
    Security (security violations detected, where violations are coming from, breaches)
    Patterns that are used
    Reduction in time to market for the data
    Completeness of data that is available
    How many "standard" data models are being used
    What is the extra business value from the data governance program?
    How much time is spent for data prep by BI & analytics team?

    Phase 2 summary

    As you improve your data quality practice and move from reactive to stable, don’t rest and assume that you can let data quality keep going by itself. Rapidly changing consumer requirements or other pains will catch up to your organization and you will fall behind again. By moving to the proactive and predictive end of the maturity scale, you can stay ahead of the curve. By following the methodology laid out in Phase 1, the data quality practices at your organization will improve over time, leading to the following results:

    Chaotic

    Before Data Quality Practice Improvements

    • No standards to data quality

    Reactive

    Year 1

    • Processes defined
    • Data cleansing approach to data quality

    Stable

    Year 2

    • Business rules/ stewardship in place
    • Education and training

    Proactive

    Year 3

    • Data quality practices fully in place and embedded in the culture
    • Trusted and intelligent enterprise

    (Global Data Excellence, Data Excellence Maturity Model)

    Phase 3

    Establish Your Organization’s Data Quality Program

    Build Your Data Quality Program

    Create a data lineage diagram to map the data journey and identify the data subject areas to be targeted for fixes

    It is important to understand the various data that exist in the business unit, as well as which data are essential to business function and require the highest degree of quality efforts.

    Visualize your databases and the flow of data. A data lineage diagram can help you and the Data Quality Improvement Team visualize where data issues lie. Keeping the five-tier architecture in mind, build your data lineage diagram.

    Reminder: Five-Tier Architecture

    The image shows the Five-Tier Architecture graphic.

    Use the following icons to represent your various data systems and databases.

    The image shows four icons. They are: the image of a square and a computer monitor, labelled Application; the image of two sheets of paper, labelled Desktop documents; the image of a green circle next to a computer monitor, labelled Web Application; and a blue cylinder labelled Database.

    Use Info-Tech’s Data Lineage Diagram to document the data sources and applications used by the business unit

    2 hours

    Input

    • Data sources and applications used by the business unit

    Output

    • Data lineage diagram

    Materials

    • Data Lineage Diagram Template

    Participants

    • Business Unit Head/Data Owner
    • Business Unit SMEs
    • Data Analysts/Architects

    Map the flow and location of data within a business unit by creating a system context diagram.

    Gain an accurate view of data locations and uses: Engage business users and representatives with a wide breadth of knowledge-related business processes and the use of data by related business operations.

    1. Sit down with key business representatives of the business unit.
    2. Document the sources of data and processes in which they’re involved, and get IT confirmation that the sources of the data are correct.
    3. Map out the sources and processes in a system context diagram.

    Download this Tool

    Sample Data Lineage Diagram

    The image shows a sample data lineage diagram, split into External Applications and Internal Applications, and showing the processes involved in each.

    Leverage Info-Tech’s Data Quality Practice Assessment and Project Planning Tool to document business context

    1 hour

    Input

    • Business vision, goals, and drivers

    Output

    • Business context for the data quality improvement project

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Data Quality project lead
    • Business line representatives
    • IT executives

    Develop goals and align them with specific objectives to set the framework for your data quality initiatives.

    In the context of achieving business vision, mission, goals, and objectives and sustaining differentiators and key drivers, think about where and how data quality is a barrier. Then brainstorm data quality improvement objectives that map to these barriers. Document your list of objectives in Tab 5. Prioritize business units of the Data Quality Practice Assessment and Project Planning Tool.

    Establishing Business Context Example

    Healthcare Industry

    Vision To improve member services and make service provider experience more effective through improving data quality and data collection, aggregation, and accessibility for all the members.
    Goals

    Establish meaningful metrics that guide to the improvement of healthcare for member effectiveness of health care providers:

    • Data collection
    • Data harmonization
    • Data accessibility and trust by all constituents.
    Differentiator Connect service consumers with service providers, that comply with established regulations by delivering data that is accurate, trusted, timely, and easy to understand to connect service providers and eliminate bureaucracy and save money and time.
    Key Driver Seamlessly provide a healthcare for members.

    Download this Tool

    Document the identified business units and their associated data

    30 minutes

    Input

    • Business units

    Output

    • Documented business units to begin prioritization

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Project Manager

    Instructions

    1. Using Tab 5: Prioritize Business Units of the Data Quality Practice Assessment and Project Planning Tool, document the business units that use data in the organization. This will likely be all business units in the organization.
    2. Next, document the primary data used by those business units.
    3. These inputs will then be used to assess business unit priority to generate a data quality improvement project roadmap.

    The image shows a screen capture of Tab 5: Prioritize Business Units, with sample information inputted.

    Reminder – Not every business unit requires the same standard of data quality

    To prioritize your business units for data quality improvement projects, you must analyze the relative importance of the data they use to the business. The more important the data is to the business, the higher the priority is of fixing that data. There are two measures for determining the importance of data: business value and business impact.

    Business Value of Data

    Business value of data can be evaluated by thinking about its ties to revenue generation for the organization, as well as how it is used for productivity and operations at the organization.

    The business value of data is assessed by asking what would happen to the following parameters if the data is not usable (due to poor quality, for example):

    • Loss of Revenue
    • Loss of Productivity
    • Increased Operating Costs

    Business Impact of Data

    Business impact of data should take into account the effects of poor data on both internal and external parties.

    The business impact of data is assessed by asking what the impact would be of bad data on the following parameters:

    • Impact on Customers
    • Impact on Internal Staff
    • Impact on Business Partners

    Value + Impact = Data Priority Score

    Assess the business unit priority order for data quality improvements

    2 hours

    Input

    • Assessment of value and impact of business unit data

    Output

    • Prioritization list for data quality improvement projects

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Project Manager
    • Data owners

    Instructions

    Instructions In Tab 5: Prioritize Business Units of the Data Quality Practice Assessment and Project Planning Tool, assess business value and business impact of the data within each documented business unit.

    Use the ratings High, Medium, and Low to measure the financial, productivity, and efficiency value and impact of each business unit’s data.

    In addition to these ratings, assess the number of help desk tickets that are submitted to IT regarding data quality issues. This parameter is an indicator that the business unit’s data is high priority for data quality fixes.

    Download this Tool

    Create a business unit order roadmap for your data quality improvement projects

    1 hour

    Input

    • Rating of importance of data for each business unit

    Output

    • Roadmap for data quality improvement projects

    Materials

    • Data Quality Practice Assessment and Project Planning Tool

    Participants

    • Project Manager
    • Product Manager
    • Business line representatives

    Instructions

    After assessing the business units for the business value and business impact of their data, the Data Quality Practice Assessment and Project Planning Tool automatically assesses the prioritization of the business units based on your ratings. These prioritizations are then summarized in a roadmap on Tab 6: Data Quality Project Roadmap. The following is an example of a project roadmap:

    The image shows an example of a project roadmap, with three business units listed vertically along the left hand side, and a Gantt chart showing the time periods in which each Business Unit would work. At the bottom, a table shows the Length of the Project in days (100), and the start date for the first project.

    On Tab 6, insert the timeline for your data quality improvement projects, as well as the starting date of your first data quality project. The roadmap will automatically update with the chosen timing and dates.

    Download this Tool

    Identify metrics at the business unit level to track data quality improvements

    As you improve the data quality for specific business units, measuring the benefits of data quality improvements will help you demonstrate the value of the projects to the business.

    Use the following table to guide you in creating business-aligned metrics:

    Business Unit Driver Metrics Goal
    Sales Customer Intimacy Accuracy of customer data. Percent of missing or incomplete records. 10% decrease in customer record errors.

    Marketing

    Customer Intimacy Accuracy of customer data. Percent of missing or incomplete records. 10% decrease in customer record errors.
    Finance Operational Excellence Relevance of financial reports. Decrease in report inaccuracy complaints.
    HR Risk Management Accuracy of employee data. 10% decrease in employee record errors.
    Shipping Operational Excellence Timeliness of invoice data. 10% decrease in time to report.

    Info-Tech Insight

    Relating data governance success metrics to overall business benefits keeps executive management and executive sponsors engaged because they are seeing actionable results. Review metrics on an ongoing basis with those data owners/stewards who are accountable, the data governance steering committee, and the executive sponsors.

    Case Study

    Address data quality with the right approach to maximize the ROI

    EDC

    Industry: Government

    Source: Environment Development of Canada (EDC)

    Challenge

    Environment Development Canada (EDC) would initially identify data elements that are important to the business purely based on their business instinct.

    Leadership attempted to tackle the enterprise’s data issues by bringing a set of different tools into the organization.

    It didn’t work out because the fundamental foundational layer, which is the data and infrastructure, was not right – they didn't have the foundational capabilities to enable those tools.

    Solution

    Leadership listened to the need for one single team to be responsible for the data persistence.

    Therefore, the data platform team was granted that mandate to extensively execute the data quality program across the enterprise.

    A data quality team was formed under the Data & Analytics COE. They had the mandate to profile the data and to understand what quality of data needed to be achieved. They worked constantly with the business to build the data quality rules.

    Results

    EDC tackled the source of their data quality issues through initially performing a data quality management assessment with business stakeholders.

    From then on, EDC was able to establish their data quality program and carry out other key initiatives that prove the ROI on data quality.

    Begin your data quality improvement project starting with the highest priority business unit

    Now that you have a prioritized list for your data quality improvement projects, identify the highest priority business unit. This is the business unit you will work through Phase 3 with to fix their data quality issues.

    Once you have initiated and identified solutions for the first business unit, tackle data quality for the next business unit in the prioritized list.

    The image is a graphic labelled as Phase 2. On the left, there is a vertical arrow pointing upward labelled Priority of Business Units. Next to it, there are three boxes, with downward pointing arrows between them, each box labelled as each Business Unit's Data Quality Improvement Project. From there an arrow points right to a circle. Inside the circle are the steps necessary to complete the data quality improvement project.

    Create and document your data quality improvement team

    1 hour

    Input

    • Individuals who fit the data quality improvement plan team roles

    Output

    • Project team

    Materials

    • Data Quality Improvement Plan Template

    Participants

    • Data owner
    • Project Manager
    • Product Manager

    The Data Quality Improvement Plan is a concise document that should be created for each data quality project (i.e. for each business unit) to keep track of the project.

    Instructions

    1. Meet with the data owner of the business unit identified for the data quality improvement project.
    2. Identify individuals who fit the data quality improvement plan team roles.
    3. Using the Data Quality Improvement Plan Template to document the roles and individuals who will fit those roles.
    4. Have an introductory meeting with the Improvement team to clarify roles and responsibilities for the project.

    Download this Tool

    Team role Assigned to
    Data Owner [Name]
    Project Manager [Name]
    Business Analyst/BRM [Name]
    Data Steward [Name]
    Data Analyst [Name]

    Document the business context of the Data Quality Improvement Plan

    1 hour

    Input

    • Project team
    • Identified data attributes

    Output

    • Business context for the data quality improvement plan

    Materials

    • Data Quality Improvement Plan Template

    Participants

    • Data owner
    • Project Sponsor
    • Product owner

    Data quality initiatives have to be relevant to the business, and the business context will be used to provide inputs to the data improvement strategy. The context can then be used to determine exactly where the root causes of data quality issues are, which will inform your solutions.

    Instructions

    The business context of the data quality improvement plan includes documenting from previous activities:

    1. The Data Quality Improvement Team.
    2. Your Data Lineage Diagram.
    3. Your Data Quality Problem Statement.

    Info-Tech Best Practice

    While many organizations adopt data quality principles, not all organizations express them along the same terms. Have multiple perspectives within your organization outline principles that fit your unique data quality agenda. Anyone interested in resolving the day-to-day data quality issues that they face can be helpful for creating the context around the project.

    Download this tool

    Now that you have a defined problem, revisit the root causes of poor data quality

    You previously fleshed out the problem with data quality present in the business unit chosen as highest priority. Now it is time to figure out what is causing those problems.

    In the table below, you will find some of the common categories of causes of data quality issues, as well as some specific root causes.

    Category Description
    1. System/Application Design Ineffective, insufficient, or even incorrect system/application design accepts incorrect and missing data elements to the source applications and databases. The data records in those source systems may propagate into systems in tiers 2, 3, 4, and 5 of the 5-tier architecture, creating domino and ripple effects.
    2. Database design Database is created and modeled in an incorrect manner so that the management of the data records is incorrect, resulting in duplicated and orphaned records, and records that are missing data elements or records that contain incorrect data elements. Poor operational data in databases often leads to issues in tiers 2, 3, 4, and 5.
    3. Enterprise Integration Data or information is improperly integrated, transformed, masked, and aggregated in tier 2. In addition, some data integration tasks might not be timely, resulting in out-of-date data or even data that contradicts with other data. Enterprise integration is a precursor of loading a data warehouse and data marts. Issues in this layer affect tier 3, 4 and 5 on the 5-tier architecture.
    4. Policies and Procedures Policies and procedures are not effectively used to reinforce data quality. In some situations, policy gaps are found. In others, policies are overlapped and duplicated. Policies may also be out-of-date or too complex, affecting the users’ ability to interpret the policy objectives. Policies affect all tiers in the 5-tier architecture.
    5. Business Processes Improper business process design introduces poor data into the data systems. Failure to create processes around approving data changes, failure to document key data elements, and failure to train employees on the proper uses of data make data quality a burning problem.

    Leverage a root cause analysis approach to pinpoint the origins of your data issues

    A root cause analysis is a systematic approach to decompose a problem into its components. Use fishbone diagrams to help reveal the root causes of data issues.

    The image shows a fishbone diagram on the left, which starts with Process on the left, and then leads to Application and Integration, and then Database and Policies. This section is titled Root causes. The right hand section is titled Lead to problems with data... and includes 4 circles with the word or in between each. The circles are labelled: Completeness; Usability; Timeliness; Accessibility.

    Info-Tech recommends five root cause categories for assessing data quality issues:

    Application Design. Is the issue caused by human error at the application level? Consider internal employees, external partners/suppliers, and customers.

    Database Design. Is the issue caused by a particular database and stems from inadequacies in its design?

    Integration. Data integration tools may not be fully leveraged, or data matching rules may be poorly designed.

    Policies and Procedures. Do the issues take place because of lack of governance?

    Business Processes. Do the issues take place due to insufficient processes?

    For Example:

    When performing a deeper analysis of your data issues related to the accuracy of the business unit’s data, you would perform a root cause analysis by assessing the contribution of each of the five categories of data quality problem root causes:

    The image shows another fishbone diagram, with example information filled in. The first section on the left is titled Application Design, and includes the text: Data entry problems lead to incorrect accounting entries. The second is Integration, and includes the text: Data integration tools are not fully leveraged. The third section is Policies, and includes the text: No policy on standardizing name and address. The last section is Database design, with text that reads: Databases do not contain unique keys. The diagram ends with an arrow pointing right to a blue circle with Accuracy in it.

    Leverage a combination of data analysis techniques to identify and quantify root causes

    Info-Tech Insight

    Including all attributes of the key subject area in your data profiling activities may produce too much information to make sense of. Conduct data profiling primarily at the table level and undergo attribute profiling only if you are able to narrow down your scope sufficiently.

    Data Profiling Tool

    Data profiling extracts a sample of the target data set and runs it through multiple levels of analysis. The end result is a detailed report of statistics about a variety of data quality criteria (duplicate data, incomplete data, stale data, etc.).

    Many data profiling tools have built-in templates and reports to help you uncover data issues. In addition, they quantify the occurrences of the data issues.

    E-Discovery Tool

    This supplements a profiling tool. For Example, use a BI tool to create a custom grouping of all the invalid states (e.g. “CAL,” “AZN,” etc.) and visualize the percentage of invalid states compared to all states.

    SQL Queries

    This supplements a profiling tool. For example, use a SQL statement to group the customer data by customer segment and then by state to identify which segment–state combinations contain poor data.

    Identify the data issues for the particular business unit under consideration

    2 hours

    Input

    • Issues with data quality felt by the business unit
    • Data lineage diagram

    Output

    • Categorized data quality issues

    Materials

    • Whiteboard, markers, sticky notes
    • Data Quality Improvement Plan Template

    Participants

    • Data quality improvement project team
    • Business line representatives

    Instructions

    1. Gather the data quality improvement project team in a room, along with sticky notes and a whiteboard.
    2. Display your previously created data lineage diagram on the whiteboard.
    3. Using color-coded sticky notes, attach issues to each component of the data lineage diagram that team members can identify. Use different colors for the four quality attributes: Completeness, Usability, Timeliness, and Accessibility.

    Example:

    The image shows the data lineage diagram that has been shown in previous sections. In addition, the image shows 4 post-its arranges around the diagram, labelled: Usability; Completeness; Timeliness; and Accessibility.

    Map the data issues on fishbone diagrams to identify root causes

    1 hour

    Input

    • Categorized data quality issues

    Output

    • Completed fishbone diagrams

    Materials

    • Whiteboard, markers, sticky notes
    • Data Quality Improvement Plan Template

    Participants

    • Data quality improvement project team

    Now that you have data quality issues classified according to the data quality attributes, map these issues onto four fishbone diagrams.

    The image shows a fishbone diagram, which is titled Example: Root cause analysis diagram for data accuracy.

    Download this Tool

    Get to know the root causes behind system/application design mistakes

    Suboptimal system/application design provides entry points for bad data.

    Business Process
    Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
    Issue Root Causes Usability Completeness Timeliness Accessibility
    Insufficient data mask No data mask is defined for a free-form text field in a user interface. E.g. North American phone number should have 4 masks – country code (1-digit), area code (3-digit), and local number (7-digit). X X
    Too many free-form text fields Incorrect use of free-form text fields (fields that accept a variety of inputs). E.g. Use a free-form text field for zip code instead of a backend look up. X X
    Lack of value lookup Reference data is not looked up from a reference list. E.g. State abbreviation is entered instead of being looked up from a standard list of states. X X
    Lack of mandatory field definitions Mandatory fields are not identified and reinforced. Resulting data records with many missing data elements. E.g. Some users may fill up 2 or 3 fields in a UI that has 20 non-mandatory fields. X

    The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Application Design section is highlighted.

    Get to know the root causes behind common database design mistakes

    Improper database design allows incorrect data to be stored and propagated.

    Business Process
    Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
    Issue Root Causes Usability Completeness Timeliness Accessibility
    Incorrect referential integrity Referential integrity constraints are absent or incorrectly implemented, resulting in child records without parent records, or related records are updated or deleted in a cascading manner. E.g. An invoice line item is created before an invoice is created. X X
    Lack of unique keys Lack of unique keys creating scenarios where record uniqueness cannot be guaranteed. E.g. Customer records with the same customer_ID. X X
    Data range Fail to define a data range for incoming data, resulting in data values that are out of range. E.g. The age field is able to store an age of 999. X X
    Incorrect data type Incorrect data types are used to store data fields. E.g. A string field is used to store zip codes. Some users use that to store phone numbers, birthdays, etc. X X

    The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Database Design section is highlighted

    Get to know the root causes behind enterprise integration mistakes

    Improper data integration or synchronization may create poor analytical data.

    Business Process
    Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
    Issue Root Causes Usability Completeness Timeliness Accessibility
    Incorrect transformation Transformation is done incorrectly. A wrong formula may have been used, transformation is done at the wrong data granularity, or aggregation logic is incorrect. E.g. Aggregation is done for all customers instead of just active customers. X X
    Data refresh is out of sync Data is synchronized at different intervals, resulting in a data warehouse where data domains are out of sync. E.g. Customer transactions are refreshed to reflect the latest activities but the account balance is not yet refreshed. X X
    Data is matched incorrectly Fail to match records from disparate systems, resulting in duplications and unmatched records. E.g. Unable to match customers from different systems because they have different cust_ID. X X
    Incorrect data mapping Fields from source systems are not properly matched with data warehouse fields. E.g. Status fields from different systems are mixed into one field. X X

    The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Integration section is highlighted

    Get to know the root causes behind policy and procedure mistakes

    Suboptimal policies and procedures undermine the effect of best practices.

    Business Process
    Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
    Issue Root Causes Usability Completeness Timeliness Accessibility
    Policy Gaps There are gaps in the policy landscape in terms of some missing key policies or policies that are not refreshed to reflect the latest changes. E.g. A data entry policy is absent, leading to inconsistent data entry practices. X X
    Policy Communications Policies are in place but the policies are not communicated effectively to the organization, resulting in misinterpretation of policies and under-enforcement of policies. E.g. The data standard is created but very few developers are aware of its existence. X X
    Policy Enforcement Policies are in place but not proactively re-enforced and that leads to inconsistent application of policies and policy adoption. E.g. Policy adoption is dropping over time due to lack of reinforcement. X X
    Policy Quality Policies are written by untrained authors and they do not communicate the messages. E.g. A non-technical data user may find a policy that is loaded with technical terms confusing. X X

    The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Policies section is highlighted

    Get to know the root causes behind common business process mistakes

    Ineffective and inefficient business processes create entry points for poor data.

    Business Process
    Usually found in → Tier 1 Tier 2 Tier 3 Tier 4 Tier 5
    Issue Root Causes Usability Completeness Timeliness Accessibility
    Lack of training Key data personnel and business analysts are not trained in data quality and data governance, leading to lack of accountability. E.g. A data steward is not aware of downstream impact of a duplicated financial statement. X X
    Ineffective business process The same piece of information is entered into data systems two or more times. Or a piece of data is stalled in a data system for too long. E.g. A paper form is scanned multiple times to extract data into different data systems. X X
    Lack of documentation Fail to document the work flows of the key business processes. A lack of work flow results in sub-optimal use of data. E.g. Data is modeled incorrectly due to undocumented business logic. X X
    Lack of integration between business silos Business silos hold on to their own datasets resulting in data silos in which data is not shared and/or data is transferred with errors. E.g. Data from a unit is extracted as a data file and stored in a shared drive with little access. X X

    The image shows a fishbone diagram, with the following sections, from left to right: Application Design; Integration; Processes; Policies; Database Design; Data Quality Measure. The Processes section is highlighted

    Phase 3 Summary

    1. Data Lineage Diagram
    • Creating the data lineage diagram is recommended to help visualize the flow of your data and to map the data journey and identify the data subject areas to be targeted for fixes.
    • The data lineage diagram was leveraged multiple times throughout this Phase. For example, the data lineage diagram was used to document the data sources and applications used by the business unit
  • Business Context
    • Business context was documented through the Data Quality Practice Assessment and Project Planning Tool.
    • The same tool was used to document identified business units and their associated data.
    • Metrics were also identified at the business unit level to track data quality improvements.
  • Common Root Causes
    • Leverage a root cause analysis approach to pinpoint the origins of your data quality issues.
    • Analyzed and got to know the root causes behind the following:
      1. System/application design mistakes
      2. Common database design mistakes
      3. Enterprise integration mistakes
      4. Policies and procedures mistakes
      5. Common business processes mistakes
  • Phase 4

    Grow and Sustain Your Data Quality Program

    Build Your Data Quality Program

    For the identified root causes, determine the solutions for the problem

    As you worked through the previous step, you identified the root causes of your data quality problems within the business unit. Now, it is time to identify solutions.

    The following slides provide an overview of the solutions to common data quality issues. As you identify solutions that apply to the business unit being addressed, insert the solution tables in Section 4: Proposed Solutions of the Data Quality Improvement Plan Template.

    All data quality solutions have two components to them:

    • Technology
    • People

    For the next five data quality solution slides, look for the slider for the contributions of each category to the solution. Use this scale to guide you in creating solutions.

    When designing solutions, keep in mind that solutions to data quality problems are not mutually exclusive. In other words, an identified root cause may have multiple solutions that apply to it.

    For example, if an application is plagued with inaccurate data, the application design may be suboptimal, but also the process that leads to data being entered may need fixing.

    Data quality improvement strategy #1:

    Fix data quality issues by improving system/application design.

    Technology

    Application Interface Design

    Restrict field length – Capture only the characters you need for your application.

    Leverage data masks – Use data masks in standardized fields like zip code and phone number.

    Restrict the use of open text fields and use reference tables – Only present open text fields when there is a need. Use reference tables to limit data values.

    Provide options – Use radio buttons, drop-down lists, and multi-select instead of using open text fields.

    Data Validation at the Application Level

    Validate data before committing – Use simple validation to ensure the data entered is not random numbers and letters.

    Track history – Keep track of who entered what fields.

    Cannot submit twice – Only design for one-time submission.

    People

    Training

    Data-entry training – Training that is related to data entry, creating, or updating data records.

    Data resolution training – Training data stewards or other dedicated data personnel on how to resolve data records that are not entered properly.

    Continuous Improvement

    Standards – Develop application design principles and standards.

    Field testing – Field data entry with a few people to look for abnormalities and discrepancies.

    Detection and resolution – Abnormal data records should be isolated and resolved ASAP.

    Application Testing

    Thorough testing – Application design is your first line of defence against poor data. Test to ensure bad data is kept out of the systems.

    Case Study

    HMS

    Industry: Healthcare

    Source: Informatica

    Improve your data quality ingestion procedures to provide better customer intimacy for your users

    Healthcare Management Systems (HMS) provides cost containment services for healthcare sponsors and payers, and coordinates benefits services. This is to ensure that healthcare claims are paid correctly to both government agencies and individuals. To do so, HMS relies on data, and this data needs to be of high quality to ensure the correct decisions are made, the right people get the correct claims, and the appropriate parties pay out.

    To improve the integrity of HMS’s customer data, HMS put in place a framework that helped to standardize the collection of high volume and highly variable data.

    Results

    Working with a data quality platform vendor to establish a framework for data standardization, HMS was able to streamline data analysis and reduce new customer implementations from months to weeks.

    HMS data was plagued with a lack of standardization of data ingestion procedures.

    Before improving data quality processes After improving data quality processes
    Data Ingestion Data Ingestion
    Many standards of ingestion. Standardized data ingestion
    Data Storage Data Storage
    Lack of ability to match data, creating data quality errors.
    Data Analysis Data Analysis
    = =
    Slow Customer Implementation Time 50% Reduction in Customer Implementation Time

    Data quality improvement strategy #2:

    Fix data quality issues using proper database design.

    Technology

    Database Design Best Practices

    Referential integrity – Ensure parent/child relationships are maintained in terms of cascade creation, update, and deletion.

    Primary key definition – Ensure there is at least one key to guarantee the uniqueness of the data records, and primary key should not allow null.

    Validate data domain – Create triggers to check the data values entered in the database fields.

    Field type and length – Define the most suitable data type and length to hold field values.

    One-Time Data Fix (more on the next slide)

    Explore solutions – Where to fix the data issues? Is there a case to fix the issues?

    Running profiling tools to catch errors – Run scans on the database with defined criteria to identify occurrences of questionable data.

    Fix a sample before fixing all records – Use a proof-of-concept approach to explore fix options and evaluate impacts before fixing the full set.

    People

    The DBA Team

    Perform key tasks in pairs – Take a pair approach to perform key tasks so that validation and cross-check can happen.

    Skilled DBAs – DBAs should be certified and accredited.

    Competence – Assess DBA competency on an ongoing basis.

    Preparedness – Develop drills to stimulate data issues and train DBAs.

    Cross train – Cross train team members so that one DBA can cover another DBA.

    Data quality improvement strategy #3:

    Improve integration and synchronization of enterprise data.

    Technology

    Integration Architecture

    Info-Tech’s 5-Tier Architecture – When doing transformations, it is good practice to persist the integration results in tier 3 before the data is further refined and presented in tier 4.

    Timing, timing, and timing – Think of the sequence of events. You may need to perform some ETL tasks before other tasks to achieve synchronization and consistence.

    Historical changes – Ensure your tier 3 is robust enough to include historical data. You need to enable type 2 slowly, changing dimension to recreate the data at a point in time.

    Data Cleansing

    Standardize – Leverage data standardization to standardize name and address fields to improve matching and integration.

    Fuzzy matching – When there are no common keys between datasets. The datasets can only be matched by fuzzy matching. Fuzzy matching is not hard science; define a confidence level and think about a mechanism to deal with the unmatched.

    People

    Reporting and Documentations

    Business data glossary and data lineage – Define a business data glossary to enhance findability of key data elements. Document data mappings and ETL logics.

    Create data quality reports – Many ETL platforms provide canned data quality reports. Leverage those quality reports to monitor the data health.

    Code Review

    Create data quality reports – Many ETL platforms provide canned data quality reports. Leverage those quality reports to monitor the data health.

    ARB (architectural review board) – All ETL codes should be approved by the architectural review board to ensure alignment with the overall integration strategy.

    Data quality improvement strategy #4:

    Improve data quality policies and procedures.

    Technology

    Policy Reporting

    Data quality reports – Leverage canned data quality reports from the ETL platforms to monitor data quality on an on-going basis. When abnormalities are found, provoke the right policies to deal with the issues.

    Store policies in a central location that is well known and easy to find and access. A key way that technology can help communicate policies is by having them published on a centralized website.

    Make the repository searchable and easily navigable. myPolicies helps you do all this and more.

    myPolicies helps you do all this and more.

    Go to this link

    People

    Policy Review and Training

    Policy review – Create a schedule for reviewing policies on a regular basis – invite professional writers to ensure polices are understandable.

    Policy training – Policies are often unread and misread. Training users and stakeholders on policies is an effective way to make sure those users and stakeholders understand the rationale of the policies. It is also a good practice to include a few scenarios that are handled by the policies.

    Policy hotline/mailbox – To avoid misinterpretation of the policies, a policy hotline/mailbox should be set up to answer any data policy questions from the end users/stakeholders.

    Policy Communications

    Simplified communications – Create handy one-pagers and infographic posters to communicate the key messages of the polices.

    Policy briefing – Whenever a new data project is initiated, a briefing of data policies should be given to ensure the project team follows the policies from the very beginning.

    Data quality improvement strategy #5:

    Streamline and optimize business processes.

    Technology

    Requirements Gathering

    Data Lineage – Leverage a metadata management tool to construct and document data lineage for future reference.

    Documentations Repository – It is a best practice to document key project information and share that knowledge across the project team and with the stakeholder. An improvement understanding of the project helps to identify data quality issues early on in the project.

    “Automating creation of data would help data quality most. You have to look at existing processes and create data signatures. You can then derive data off those data codes.” – Patrick Bossey, Manager of Business Intelligence, Crawford and Company

    People

    Requirements Gathering

    Info-Tech’s 4-Column Model – The datasets may exist but the business units do not have an effective way of communicating the quality needs. Use our four-column model and the eleven supporting questions to better understand the quality needs. See subsequent slides.

    I don’t know what the data means so I think the quality is poor – It is not uncommon to see that the right data presented to the business but the business does not trust the data. They also do not understand the business logic done on the data. See our Business Data Glossary in subsequent slides.

    Understand the business workflow – Know the business workflow to understand the manual steps associated with the workflow. You may find steps in which data is entered, manipulated, or consumed inappropriately.

    “Do a shadow data exercise where you identify the human workflows of how data gets entered, and then you can identify where data entry can be automated.” – Diraj Goel, Growth Advisor, BC Tech

    Brainstorm solutions to your data quality issues

    4 hours

    Input

    • Data profiling results
    • Preliminary root cause analyses

    Output

    • Proposals for data fix
    • Fixed issues

    Materials

    • Data Quality Improvement Plan Template

    Participants

    • Business and Data Analysts
    • Data experts and stewards

    After walking through the best-practice solutions to data quality issues, propose solutions to fix your identified issues.

    Instructions

    1. Review Root Cause Analyses: Revisit the root cause analysis and data lineage diagram you have generated in Step 3.2. to understand the issues in greater details.
    2. Characterize Each Issue: You may need to generate a data profiling report to characterize the issue. The report can be generated by using data quality suites, BI platforms, or even SQL statements.
    3. Brainstorm the Solutions: As a group, discuss potential ways to fix the issue. You can tackle the issues by approaching from these areas:
    Solution Approaches
    Technology Approach
    People Approach

    X crossover with

    Problematic Areas
    Application/System Design
    Database Design
    Data Integration and Synchronization
    Policies and Procedures
    Business Processes
    1. Document and Communicate: Document the solutions to your data issues. You may need to reuse or refer to the solutions. Also brainstorm some ideas on how to communicate the results back to the business.

    Download this Tool

    Sustaining your data quality requires continuous oversight through a data governance practice

    Quality data is the ultimate outcome of data governance and data quality management. Data governance enables data quality by providing the necessary oversight and controls for business processes in order to maintain data quality. There are three primary groups (at right) that are involved in a mature governance practice. Data quality should be tightly integrated with all of them.

    Define an effective data governance strategy and ensure the strategy integrates well with data quality with Info-Tech’s Establish Data Governance blueprint.

    Visit this link

    Data Governance Council

    This council establishes data management practices that span across the organization. This should be comprised of senior management or C-suite executives that can represent the various departments and lines of business within the organization. The data governance council can help to promote the value of data governance, facilitate a culture that nurtures data quality, and ensure that the goals of the data governance program are well aligned with business objectives.

    Data Owners

    Identifying the data owner role within an organization helps to create a greater degree of accountability for data issues. They often oversee how the data is being generated as well as how it is being consumed. Data owners come from the business side and have legal rights and defined control over a data set. They ensure data is available to the right people within the organization.

    Data Stewards

    Conflict can occur within an organization’s data governance program when a data steward’s role is confused with that of the steering committee’s role. Data stewards exist to enforce decisions made about data governance and data management. Data stewards are often business analysts or power users of a particular system/dataset. Where a data owner is primarily responsible for access, a data steward is responsible for the quality of a dataset.

    Integrate the data quality management strategy with existing data governance committees

    Ongoing and regular data quality management is the responsibility of the data governance bodies of the organization.

    The oversight of ongoing data quality activities rests on the shoulders of the data governance committees that exist in the organization.

    There is no one-size-fits-all data governance structure. However, most organizations follow a similar pattern when establishing committees, councils, and cross-functional groups. They strive to identify roles and responsibilities at a strategic, tactical, and operational level:

    The image shows a pyramid, with Executive Sponsors at the top, with the following roles in descending order: DG Council; Steering Committee; Working Groups; Data Owners and Data Stewards; and Data Users. Along the left side of the pyramid, there are three labels, in ascending order: Operational, Tactical, and Strategic.

    The image is a flow chart showing project roles, in two sections: the top section is labelled Governing Bodies, and the lower section is labelled Data Quality Improvement Team. There is a note indicating that the Data Owner reports to and provides updates regarding the state of data quality and data quality initiatives.

    Create and update the organization’s Business Data Glossary to keep up with current data definitions

    2 hours

    Input

    • Metrics and goals for data quality

    Output

    • Regularly scheduled data quality checkups

    Materials

    • Business Data Glossary Template
    • Data Quality Dashboard

    Participants

    • Data steward

    A crucial aspect of data quality and governance is the Business Data Glossary. The Business Data Glossary helps to align the terminology of the business with the organization’s data assets. It allows the people who interact with the data to quickly identify the applications, processes, and stewardship associated with it, which will enhance the accuracy and efficiency of searches for organization data definitions and attributes, enabling better access to the data. This will, in turn, enhance the quality of the organization’s data because it will be more accurate, relevant, and accessible.

    Use the Business Data Glossary Template to document key aspects of the data, such as:

    • Definition
    • Source System
    • Possible Values
    • Data Steward
    • Data Sensitivity
    • Data Availability
    • Batch or Live
    • Retention

    Data Element

    • Mkt-Product
    • Fin-Product

    Info-Tech Insight

    The Business Data Glossary ensures that the crucial data that has key business use by key business systems and users is appropriately owned and defined. It also establishes rules that lead to proper data management and quality to be enforced by the data owners.

    Download this Tool

    Data Steward(s): Use the Data Quality Improvement Plan of the business unit for ongoing quality monitoring

    Integrating your data quality strategy into the organization’s data governance program requires passing the strategy over to members of the data governance program. The data steward role is responsible for data quality at the business unit level, and should have been involved with the creation and implementation of the data quality improvement project. After the data quality repairs have been made, it is the responsibility of the data steward to regularly monitor the quality of the business unit’s data.

    Create Improvement Plan ↓
    • Data Quality Improvement Team identifies root cause issues.
    • Brainstorm solutions.
    Implement Improvement Plan ↓
    • Data Quality Improvement Team works with IT.
    Sustain Improvement Plan
    • Data Steward should regularly monitor data quality.

    Download this tool

    See Info-Tech’s Data Steward Job Description Template for a detailed understanding of the roles and responsibilities of the data steward.

    Responsible for sustaining

    The image shows a screen capture of a document entitled Business Context & Subject Area Selection.

    Develop a business-facing data quality dashboard to show improvements or a sudden dip in data quality

    One tool that the data steward can take advantage of is the data quality dashboard. Initiatives that are implemented to address data quality must have metrics defined by business objectives in order to demonstrate the value of the data quality improvement projects. In addition, the data steward should have tools for tracking data quality in the business unit to report issues to the data owner and data governance steering committee.

    • Example 1: Marketing uses data for direct mail and e-marketing campaigns. They care about customer data in particular. Specifically, they require high data quality in attributes such as customer name, address, and product profile.
    • Example 2: Alternatively, Finance places emphasis on financial data, focusing on attributes like account balance, latency in payment, credit score, and billing date.

    The image is Business dashboard on Data Quality for Marketing. It features Data Quality metrics, listed in the left column, and numbers for each quarter over the course of one year, on the right.

    Notes on chart:

    General improvement in billing address quality

    Sudden drop in touchpoint accuracy may prompt business to ask for explanations

    Approach to creating a business-facing data quality dashboard:

    1. Schedule a meeting with the functional unit to discuss what key data quality metrics are essential to their business operations. You should consider the business context, functional area, and subject area analyses you completed in Phase 1 as a starting point.
    2. Discuss how to gather data for the key metrics and their associated calculations.
    3. Discuss and decide the reporting intervals.
    4. Discuss and decide the unit of measurement.
    5. Generate a dashboard similar to the example. Consider using a BI or analytics tool to develop the dashboard.

    Data quality management must be sustained for ongoing improvements to the organization’s data

    • Data quality is never truly complete; it is a set of ongoing processes and disciplines that requires a permanent plan for monitoring practices, reviewing processes, and maintaining consistent data standards.
    • Setting the expectation to stakeholders that a long-term commitment is required to maintain quality data within the organization is critical to the success of the program.
    • A data quality maintenance program will continually revise and fine-tune ongoing practices, processes, and procedures employed for organizational data management.

    Data quality is a program that requires continual care:

    →Maintain→Good Data →

    Data quality management is a long-term commitment that shifts how an organization views, manages, and utilizes its corporate data assets. Long-term buy-in from all involved is critical.

    “Data quality is a process. We are trying to constantly improve the quality over time. It is not a one-time fix.” – Akin Akinwumi, Manager of Data Governance, Startech.com

    Define a data quality review agenda for data quality sustainment

    2 hours

    Input

    • Metrics and goals for data quality

    Output

    • Regularly scheduled data quality checkups

    Materials

    • Data Quality Diagnostic
    • Data Quality Dashboard

    Participants

    • Data Steward

    As a data steward, you are responsible for ongoing data quality checks of the business unit’s data. Define an improvement agenda to organize the improvement activities. Organize the activities yearly and quarterly to ensure improvement is done year-round.

    Quarterly

    • Measure data quality metrics against milestones. Perform a regular data quality health check with Info-Tech’s Data Quality Diagnostic.
    • Review the business unit’s Business Data Glossary to ensure that it is up to date and comprehensive.
    • Assess progress of practice area initiatives (time, milestones, budget, benefits delivered).
    • Analyze overall data quality and report progress on key improvement projects and corrective actions in the executive dashboard.
    • Communicate overall status of data quality to oversight body.

    Annually

    • Calculate your current baseline and measure progress by comparing it to previous years.
    • Set/revise quality objectives for each practice area and inter-practice hand-off processes.
    • Re-evaluate/re-establish data quality objectives.
    • Set/review data quality metrics and tracking mechanisms.
    • Set data quality review milestones and timelines.
    • Revisit data quality training from an end-user perspective and from a practitioner perspective.

    Info-Tech Insight

    Do data quality diagnostic at the beginning of any improvement plan, then recheck health with the diagnostic at regular intervals to see if symptoms are coming back. This should be a monitoring activity, not a data quality fixing activity. If symptoms are bad enough, repeat the improvement plan process.

    Take the next step in your Data & Analytics Journey

    After establishing your data quality program, look to increase your data & analytics maturity.

    • Artificial Intelligence (AI) is a concept that many organizations strive to implement. AI can really help in areas such as data preparation. However, implementing AI solutions requires a level of maturity that many organizations are not at.
    • While a solid data quality foundation is essential for AI initiatives being successful, AI can also ensure high data quality.
    • An AI analytics solution can address data integrity issues at the earliest point of data processing, rapidly transforming these vast volumes of data into trusted business information. This can be done through Anomaly detection, which flags “bad” data, identifying suspicious anomalies that can impact data quality. By tracking and evaluating data, anomaly detection gives critical insights into data quality as data is processed. (Ira Cohen, The End to a Never-Ending Story? Improve Data Quality with AI Analytics, anodot, 2020)

    Consider… “Garbage in, garbage out.”

    Lay a solid foundation by addressing your data quality issues prior to investing heavily in an AI solution.

    Related Info-Tech Research

    Are You Ready for AI?

    • Use AI as a compelling event to expedite funding, resources, and project plans for your data-related initiatives. Check out this note to understand what it takes to be ready to implement AI solutions.

    Get Started With Artificial Intelligence

    • Current AI technology is data-enabled, automated, adaptive decision support. Once you believe you are ready for AI, check out this blueprint on how to get started.

    Build a Data Architecture Roadmap

    • The data lineage diagram was a key tool used in establishing your data quality program. Check out this blueprint and learn how to optimize your data architecture to provide greatest value from data.

    Create an Architecture for AI

    • Build your target state architecture from predefined best practice building blocks. This blueprint assists members first to assess if they have the maturity to embrace AI in their organization, and if so, which AI acquisition model fits them best.

    Phase 4 Summary

    1. Data Quality Improvement Strategy
    • Brainstorm solutions to your data quality issues using the following data quality improvement strategies as a guide:
      1. Fix data quality issues by improving system/application design
      2. Fix data quality issues using proper database design
      3. Improve integration and synchronization of enterprise data
      4. Improve data quality policies and procedures
      5. Streamline and optimize business processes
  • Sustain Your Data Quality Program
    • Quality data is the ultimate outcome of data governance and data quality management.
    • Sustaining your data quality requires continuous oversight through a data governance practice.
    • There are three primary groups (Data Governance Council, Data Owners, and Data Stewards) that are involved in a mature governance practice.
  • Grow Your Data & Analytics Maturity
    • After establishing your data quality program, take the next step in increasing your data & analytics maturity.
    • Good data quality is the foundation of pursuing different ways of maximizing the value of your data such as implementing AI solutions.
    • Continue your data & analytics journey by referring to Info-Tech’s quality research.
  • Research Contributors and Experts

    Izabela Edmunds

    Information Architect Mott MacDonald

    Akin Akinwumi

    Manager of Data Governance Startech.com

    Diraj Goel

    Growth Advisor BC Tech

    Sujay Deb

    Director of Data Analytics Technology and Platforms Export Development Canada

    Asif Mumtaz

    Data & Solution Architect Blue Cross Blue Shield Association

    Patrick Bossey

    Manager of Business Intelligence Crawford and Company

    Anonymous Contributors

    Ibrahim Abdel-Kader

    Research Specialist Info-Tech Research Group

    Ibrahim is a Research Specialist at Info-Tech Research Group. In his career to date he has assisted many clients using his knowledge in process design, knowledge management, SharePoint for ECM, and more. He is expanding his familiarity in many areas such as data and analytics, enterprise architecture, and CIO-related topics.

    Reddy Doddipalli

    Senior Workshop Director Info-Tech Research Group

    Reddy is a Senior Workshop Director at Info-Tech Research Group, focused on data management and specialized analytics applications. He has over 25 years of strong industry experience in IT leading and managing analytics suite of solutions, enterprise data management, enterprise architecture, and artificial intelligence–based complex expert systems.

    Andy Neill

    Practice Lead, Data & Analytics and Enterprise Architecture Info-Tech Research Group

    Andy leads the data and analytics and enterprise architecture practices at ITRG. He has over 15 years of experience in managing technical teams, information architecture, data modeling, and enterprise data strategy. He is an expert in enterprise data architecture, data integration, data standards, data strategy, big data, and development of industry standard data models.

    Crystal Singh

    Research Director, Data & Analytics Info-Tech Research Group

    Crystal is a Research Director at Info-Tech Research Group. She brings a diverse and global perspective to her role, drawing from her professional experiences in various industries and locations. Prior to joining Info-Tech, Crystal led the Enterprise Data Services function at Rogers Communications, one of Canada’s leading telecommunications companies.

    Igor Ikonnikov

    Research Director, Data & Analytics Info-Tech Research Group

    Igor is a Research Director at Info-Tech Research Group. He has extensive experience in strategy formation and execution in the information management domain, including master data management, data governance, knowledge management, enterprise content management, big data, and analytics.

    Andrea Malick

    Research Director, Data & Analytics Info-Tech Research Group

    Andrea Malick is a Research Director at Info-Tech Research Group, focused on building best practices knowledge in the enterprise information management domain, with corporate and consulting leadership in enterprise architecture and content management (ECM).

    Natalia Modjeska

    Research Director, Data & Analytics Info-Tech Research Group

    Natalia Modjeska is a Research Director at Info-Tech Research Group. She advises members on topics related to AI, machine learning, advanced analytics, and data science, including ethics and governance. Natalia has over 15 years of experience in developing, selling, and implementing analytical solutions.

    Rajesh Parab

    Research Director, Data & Analytics Info-Tech Research Group

    Rajesh Parab is a Research Director at Info-Tech Research Group. He has over 20 years of global experience and brings a unique mix of technology and business acumen. He has worked on many data-driven business applications. In his previous architecture roles, Rajesh created a number of product roadmaps, technology strategies, and models.

    Bibliography

    Amidon, Kirk. "Case Study: How Data Quality Has Evolved at MathWorks." The Fifth MIT Information Quality Industry Symposium. 13 July 2011. Web. 19 Aug. 2015.

    Boulton, Clint. “Disconnect between CIOs and LOB managers weakens data quality.” CIO. 05 February 2016. Accessed June 2020.

    COBIT 5: Enabling Information. Rolling Meadows, IL: ISACA, 2013. Web.

    Cohen, Ira. “The End to a Never-Ending Story? Improve Data Quality with AI Analytics.” anodot. 2020.

    “DAMA Guide to the Data Management Body of Knowledge (DAMA-DMBOK Guide).” First Edition. DAMA International. 2009. Digital. April 2014.

    "Data Profiling: Underpinning Data Quality Management." Pitney Bowes. Pitney Bowes - Group 1 Software, 2007. Web. 18 Aug. 2015.

    Data.com. “Data.com Clean.” Salesforce. 2016. Web. 18 Aug. 2015.

    “Dawn of the CDO." Experian Data Quality. 2015. Web. 18 Aug. 2015.

    Demirkan, Haluk, and Bulent Dal. "Why Do So Many Analytics Projects Fail?" The Data Economy: Why Do so Many Analytics Projects Fail? Analytics Magazine. July-Aug. 2014. Web.

    Dignan, Larry. “CIOs juggling digital transformation pace, bad data, cloud lock-in and business alignment.” ZDNet. 11 March 2020. Accessed July.

    Dumbleton, Janani, and Derek Munro. "Global Data Quality Research - Discussion Paper 2015." Experian Data Quality. 2015. Web. 18 Aug. 2015.

    Eckerson, Wayne W. "Data Quality and the Bottom Line - Achieving Business Success through a Commitment to High Quality Data." The Data Warehouse Institute. 2002. Web. 18 Aug. 2015.

    “Infographic: Data Quality in BI the Costs and Benefits.” HaloBI. 2015 Web.

    Lee, Y.W. and Strong, D.M. “Knowing-Why About Data Processes and Data Quality.” Journal of Management Information Systems. 2004.

    “Making Data Quality a Way of Life.” Cognizant. 2014. Web. 18 Aug. 2015.

    "Merck Serono Achieves Single Source of Truth with Comprehensive RIM Solutions." www.productlifegroup.com. ProductLife Group. 15 Apr. 2015. Web. 23 Nov. 2015.

    Myers, Dan. “List of Conformed Dimensions of Data Quality.” Conformed Dimensions of Data Quality (CDDQ). 2019. Web.

    Redman, Thomas C. “Make the Case for Better Data Quality.” Harvard Business Review. 24 Aug. 2012. Web. 19 Aug. 2015.

    RingLead Data Management Solutions. “10 Stats About Data Quality I Bet You Didn’t Know.” RingLead. Accessed 7 July 2020.

    Schwartzrock, Todd. "Chrysler's Data Quality Management Case Study." Online video clip. YouTube. 21 April. 2011. Web. 18 Aug. 2015

    “Taking control in the digital age.” Experian Data Quality. Jan 2019. Web.

    “The data-driven organization, a transformation in progress.” Experian Data Quality. 2020. Web.

    "The Data Quality Benchmark Report." Experian Data Quality. Jan. 2015. Web. 18 Aug. 2015.

    “The state of data quality.” Experian Data Quality. Sept. 2013. Web. 17 Aug. 2015.

    Vincent, Lanny. “Differentiating Competence, Capability and Capacity.” Innovation Management Services. Web. June 2008.

    “7 ways poor data quality is costing your business.” Experian Data Quality. July 2020. Web.

    Beyond Survival

    • Buy Link or Shortcode: {j2store}204|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Big Data
    • Parent Category Link: /big-data
    • Consumer, customer, employee, and partner behavior has changed; new needs have arisen as a result of COVID-19. Entire business models had to be rethought and revised – in real time with no warning.
    • And worse, no one knows when (or even if) the pandemic will end. The world and the economy will continue to be highly uncertain, unpredictable, and vulnerable for some time.
    • Business leaders need to continue experimenting to stay in business, protect employees and supply chains, manage financial obligations, allay consumer and employee fears, rebuild confidence, and protect trust.
    • How do organizations know whether their new business tactics are working?

    Our Advice

    Critical Insight

    • We can learn many lessons from those who have survived and are succeeding.
    • They have one thing in common though – they rely on data and analytics to help people think and know how to respond, evaluate effectiveness of new business tactics, uncover emerging trends to feed innovation, and minimize uncertainty and risk.
    • This mini-blueprint highlights organizations and use cases where data, analytics, and AI deliver tangible business and human value now and in the future.

    Impact and Result

    • Learn from the pandemic survivors and super-achievers so that you too can hit the ground running in the new normal. Even better – go beyond survival, like many of them have done. Create your future by leveraging and scaling up your data and analytics investments. It is not (yet) too late, and Info-Tech can help.

    Beyond Survival Research & Tools

    Beyond Survival

    Use data, analytics, and AI to reimagine the future and thrive in the new normal.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    • Beyond Survival Storyboard
    [infographic]

    Develop Infrastructure & Operations Policies and Procedures

    • Buy Link or Shortcode: {j2store}452|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $46,324 Average $ Saved
    • member rating average days saved: 42 Average Days Saved
    • Parent Category Name: Operations Management
    • Parent Category Link: /i-and-o-process-management
    • Time and money are wasted dealing with mistakes or missteps that should have been addressed by procedures or policies.
    • Standard operating procedures are less effective without a policy to provide a clear mandate and direction.
    • Adhering to policies is rarely a priority, as compliance often feels like an impediment to getting work done.
    • Processes aren’t measured or audited to assess policy compliance, which makes enforcing the policies next to impossible.

    Our Advice

    Critical Insight

    • Document what you need to document and forget the rest. Always check to see if you can use a previously approved policy before you create a new one. You may only need to create new guidelines or standards rather than approve a new policy.

    Impact and Result

    • Start with a comprehensive policy framework to help you identify policy gaps. Prioritize and address those policy gaps.
    • Create effective policies that are reasonable, measurable, auditable, and enforceable.
    • Create and document procedures to support policy changes.

    Develop Infrastructure & Operations Policies and Procedures Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should change your approach to developing Infrastructure & Operations policies and procedures, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Identify policy and procedure gaps

    Create a prioritized action plan for documentation based on business need.

    • Develop Infrastructure & Operations Policies and Procedures – Phase 1: Identify Policy and Procedure Gaps

    2. Develop policies

    Adapt policy templates to meet your business requirements.

    • Develop Infrastructure & Operations Policies and Procedures – Phase 2: Develop Policies
    • Availability and Capacity Management Policy
    • Business Continuity Management Policy
    • Change Control – Freezes & Risk Evaluation Policy
    • Change Management Policy
    • Configuration Management Policy
    • Firewall Policy
    • Hardware Asset Management Policy
    • IT Triage and Support Policy
    • Release Management Policy
    • Software Asset Management Policy
    • System Maintenance Policy – NIST
    • Internet Acceptable Use Policy

    3. Document effective procedures

    Improve policy adherence and service effectiveness through procedure standardization and documentation.

    • Develop Infrastructure & Operations Policies and Procedures – Phase 3: Document Effective Procedures
    • Capacity Plan Template
    • Change Management Standard Operating Procedure
    • Configuration Management Standard Operation Procedures
    • Incident Management and Service Desk SOP
    • DRP Summary Template
    • Service Desk Standard Operating Procedure
    • HAM Standard Operating Procedures
    • SAM Standard Operating Procedures
    [infographic]

    Further reading

    Develop Infrastructure & Operations Policies and Procedures

    Document what you need to document and forget the rest.

    Table of contents

    Project Rationale

    Project Outlines

    • Phase 1: Identify Policy and Procedure Gaps
    • Phase 2: Develop Policies
    • Phase 3: Document Effective Procedures

    Bibliography

    ANALYST PERSPECTIVE

    Document what you need to document now and forget the rest.

    "Most IT organizations struggle to create and maintain effective policies and procedures, despite known improvements to consistency, compliance, knowledge transfer, and transparency.

    The numbers are staggering. Fully three-quarters of IT professionals believe their policies need improvement, and the same proportion of organizations don’t update procedures as required.

    At the same time, organizations that over-document and under-document perform equally poorly on key measures such as policy quality and policy adherence. Take a practical, step-by-step approach that prioritizes the documentation you need now. Leave the rest for later."

    (Andrew Sharp, Research Manager, Infrastructure & Operations Practice, Info-Tech Research Group)

    Our understanding of the problem

    This Research Is Designed For:

    • Infrastructure Managers
    • Chief Technology Officers
    • IT Security Managers

    This Research Will Help You:

    • Address policy gaps
    • Develop effective procedures and procedure documentation to support policy compliance

    This Research Will Also Assist:

    • Chief Information Officers
    • Enterprise Risk and Compliance Officers
    • Chief Human Resources Officers
    • Systems Administrators and Engineers

    This Research Will Help Them:

    • Understand the importance of a coherent approach to policy development
    • Understand the importance of Infrastructure & Operations policies
    • Support Infrastructure & Operations policy development and enforcement

    Info-Tech Best Practice

    This blueprint supports templates for key policies and procedures that help Infrastructure & Operations teams to govern and manage internal operations. For security policies, see the NIST SP 800-171 aligned Info-Tech blueprint, Develop and Deploy Security Policies.

    Executive Summary

    Situation

    • Time and money are wasted dealing with mistakes or missteps that should have been addressed by procedures or policies.
    • Standard operating procedures are less effective without a policy to provide a clear mandate and direction.

    Complication

    • Existing policies were written, approved, signed – and forgotten for years because no one has time to maintain them.
    • Adhering to policies is rarely a priority, as compliance often feels like an impediment to getting work done.
    • Processes aren’t measured or audited to assess policy compliance, which makes enforcing the policies next to impossible.

    Resolution

    • Start with a comprehensive policy framework to help you identify policy gaps. Prioritize and address those policy gaps.
    • Create effective policies that are reasonable, measurable, auditable, and enforceable.
    • Create and document procedures to support policy changes.

    Info-Tech Insight

    1. Document what you need to document and forget the rest.
      Always check if a previously approved policy exists before you create a new one. You may only need to create new guidelines or standards rather than approve a new policy.
    2. Support policies with documented procedures.
      Build procedures that embed policy adherence in daily operations. Find opportunities to automate policy adherence (e.g. removing local admin rights from user computers).

    What are policies, procedures, and processes?

    A policy is a governing document that states the long-term goals of the organization and in broad strokes outlines how they will be achieved (e.g. a Data Protection Policy).

    In the context of policies, a procedure is composed of the steps required to complete a task (e.g. a Backup and Restore Procedure). Procedures are informed by required standards and recommended guidelines. Processes, guidelines, and standards are three pillars that support the achievement of policy goals.

    A process is higher level than a procedure – a set of tasks that deliver on an organizational goal.

    Better policies and procedures reduce organizational risk and, by strengthening the ability to execute processes, enhance the organization’s ability to execute on its goals.

    Visualization of policies, procedures, and processes using pillars. Two separate structures, 'Policy A' and 'Policy B', are each held up by three pillars labelled 'Standards', 'Procedures', and 'Guidelines'. Two lines pass through the pillars of both structures and are each labelled 'Value-creating process'.

    Document to improve governance and operational processes

    Deliver value

    Build, deliver, and support Infrastructure assets in a consistent way, which ultimately reduces costs associated with downtime, errors, and rework. A good manual process is the foundation for a good automated process.

    Simplify Training

    Use documentation for knowledge transfer. Routine tasks can be delegated to less-experienced staff.

    Maintain compliance

    Comply with laws and regulations. Policies are often required for compliance, and formally documented and enforced policies help the organization maintain compliance by mandating required due diligence, risk reduction, and reporting activities.

    Provide transparency

    Build an open kitchen. Other areas of the organization may not understand how Infra & Ops works. Your documentation can provide the answer to the perennial question: “Why does that take so long?”

    Info-Tech Best Practice

    Governance goals must be supported with effective, well-aligned procedures and processes. Use Info-Tech’s research to support the key Infrastructure & Operations processes that enable your business to create value.

    Document what you need to document – and forget the rest

    Half of all organizations believe their policy suite is insufficient. (Info-Tech myPolicies Survey Data (N=59))

    Pie chart with three sections labelled 'Too Many Policies and Procedures 14%', 'Adequate Policies and Procedures 37%', 'Insufficient Policies and Procedures 49%'

    Too much documentation and a lack of documentation are both ineffective. (Info-Tech myPolicies Survey Data (N=59))

    Two bar charts labelled 'Policy Adherence' and 'Policy Quality' each with three bars representing 'Too Many Policies and Procedures', 'Insufficient Policies and Procedures', and 'Adequate Policies and Procedures'. The values shown are an average score out of 5. For Policy Adherence: Too Many is 2.4, Insufficient is 2.1, and Adequate is 3.2. For Policy Quality: Too Many is 2.9, Insufficient is 2.6, and Adequate is 4.1.

    77% of IT professionals believe their policies require improvement. (Kaspersky Lab)

    Presenting: A COBIT-aligned policy suite

    We’ve developed a suite of effective policy templates for every Infra & Ops manager based on Info-Tech’s IT Management & Governance Framework.

    Policy templates and the related aspects of Info-Tech's IT Management & Governance Framework

    Info-Tech Best Practice

    Look for these symbols as you work through the deck. Prioritize and focus on the policies you work on first based on the value of the policy to the enterprise and the existing gaps in your governance structure.

    Project outline

    Phases

    1. Identify policy and procedure gaps 2. Develop policies 3. Document effective procedures

    Steps

    • Review and right-size the existing policy set
    • Create an action plan to address policy gaps
    • Modify policy templates and gather feedback
    • Implement, enforce, measure, and maintain new policies
    • Scope and outline procedures
    • Document and maintain procedures

    Outcomes

    Action list of policy and procedure gaps New or updated Infrastructure & Operations policies Procedure documentation

    Use these icons to help direct you as you navigate this research

    Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

    A small monochrome icon of a wrench and screwdriver creating an X.

    This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

    A small monochrome icon depicting a person in front of a blank slide.

    This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    Guided Implementation

    Workshop

    Consulting

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Accelerate policy development with a Guided Implementation

    Your trusted advisor is just a call away.

    • Identify Policy and Procedure Gaps (Calls 1-2)
      Assess current policies, operational challenges, and gaps. Mitigate significant risks first.
    • Create and Review Policies (Calls 2-4)
      Modify and review policy templates with an Info-Tech analyst.
    • Create and Review Procedures (Calls 4-6)
      Workflow procedures, using templates wherever possible. Review documentation best practices.

    Contact Info-Tech to set up a Guided Implementation with a dedicated advisor who will walk you through every stage of your policy development project.

    Develop Infrastructure & Operations Policies and Procedures

    Phase 1

    Identify Policy and Procedure Gaps

    PHASE 1: Identify Policy and Procedure Gaps

    Step 1.1: Review and right-size the existing policy set

    This step will walk you through the following activities:

    • Identify gaps in your existing policy suite
    • Document challenges to core Infrastructure & Operations processes
    • Identify documentation that can close gaps
    • Prioritize your documentation effort

    This step involves the following participants:

    • Infrastructure & Operations Manager
    • Infrastructure Supervisors

    Results & Insights

    • Results: A review of the existing policy suite and identification of opportunities for improvement.
    • Insights: Not all gaps necessarily require a fresh policy. Repurpose, refresh, or supplement existing documentation wherever appropriate.

    Conduct a policy review

    Associated Activity icon 1(a) 30 minutes per policy

    You’ve got time to review your policy suite. Make the most of it.

    1. Start with organizational requirements.
      • What initiatives are on the go? What policies or procedures do you have a mandate to create?
    2. Weed out expired and dated policies.
      • Gather your existing policies. Identify when each one was published or last reviewed.
      • Decide whether to retire, merge, or update expired or obviously dated policy.
    3. Review policy statements.
      • Check that the organization is adequately supporting policy statements with SOPs, standards, and guidelines. Ensure role-related information is up to date.
    4. Document and bring any gaps forward to the next activity. If no action is required, indicate that you have completed a review and submit the findings for approval.

    But they just want one policy...

    A review of your policy suite is good practice, especially when it hasn’t been done for a while. Why?
    • Existing policies may address what you’re trying to do with a new policy. Using or modifying an existing policy avoids overlap and contradiction and saves you the effort required to create, communicate, approve, and maintain a new policy.
    • Review the suite to validate that you’re addressing the most important challenges first.

    Brainstorm improvements for core Infrastructure & Operations processes

    Associated Activity icon 1(b) 1 hour

    Supplement the list of gaps from your policy review with process challenges.

    1. Write out key Infra & Ops–related processes – one piece of flipchart paper per process. You can work through all of these processes or cherry-pick the processes you want to improve first.
    2. With participants, write out in point form how you currently execute on these processes (e.g. for Asset Management, you might be tagging hardware, tracking licenses, etc.)
    3. Work through a “Start – Stop – Continue” exercise. Ask participants: What should we start doing? What must we stop doing? What do we do currently that’s valuable and must continue? Write ideas on sticky notes.
    4. Once you’ve worked through the “Start – Stop – Continue” exercise for all processes, group similar suggestions for improvements.

    Asset Management: Manage hardware and software assets across their lifecycle to protect assets and manage costs.

    Availability and Capacity Management: Balance current and future availability, capacity, and performance needs with cost-to-serve.

    Business Continuity Management: Continue operation of critical business processes and IT services.

    Change Management: Deliver technical changes in a controlled manner.

    Configuration Management: Define and maintain relationships between technical components.

    Problem Management: Identify incident root cause.

    Operations Management: Coordinate operations.

    Release and Patch Management: Deliver updates and manage vulnerabilities in a controlled manner.

    Service Desk: Respond to user requests and all incidents.

    PHASE 1: Identify Policy and Procedure Gaps

    Step 1.2: Create an action plan to address policy gaps

    This step will walk you through the following activities:

    • Identify challenges and gaps that can be addressed via documentation
    • Prioritize high-value, high-risk gaps

    This step involves the following participants:

    • Infrastructure & Operations Manager
    • Infrastructure Supervisors

    Results & Insights

    • Results: An action plan to tackle policy and procedures gaps, aligned with business requirements and business value.
    • Insights: Not all documentation is equally valuable. Prioritize documentation that delivers value and mitigates risk.

    Support policies with procedures, standards, and guidelines

    Use a working definition for each type of document.

    Policy: Directives, rules, and mandates that support the overarching, long-term goals of the organization.

    • Standards: Prescriptive, uniform requirements.
    • Procedures: Specific, detailed, step-by-step instructions for completing a task.
    • Guidelines: Non-enforceable, recommended best practices.

    Info-Tech Best Practice

    Take advantage of your Info-Tech advisory membership by scheduling review sessions with an analyst. We provide high-level feedback to ensure your documentation is clear, concise, and consistent and aligns with the governance objectives you’ve identified.

    Answer the following questions to decide if governance documentation can help close gaps

    Associated Activity icon 1(c) 30 minutes

    Documentation supports knowledge sharing, process consistency, compliance, and transparency. Ask the following questions:

    1. What is the purpose of the documentation?
      Procedures support task completion. Policies set direction and manage organizational risk.
    2. Should it be enforceable?
      Policies and standards are enforceable; guidelines are not. Procedures are enforceable in that they should support policy enforcement.
    3. What is the scope?
      To document a task, create a procedure. Set overarching rules with policies. Use standards and guidelines to set detailed rules and best practices.
    4. What’s the expected cadence for updates?
      Policies should be revisited and revised less frequently than procedures.

    Info-Tech Best Practice

    Reinvent the wheel? I don’t think so!

    Always check to see if a gap can be addressed with existing tools before drafting a new policy

    • Is there an existing policy that could be supported with new or updated procedures, technical standards, or guidelines?
    • Is there a technical control you can deploy that would enforce the terms of an existing, approved policy?
    • It may be simpler to amend an existing policy instead of creating a new one.

    Some problems can’t be solved by better documentation (or by documentation alone). Consider additional strategies that address people, process, and technology.

    Tackle high-value, high-risk gaps first

    Associated Activity icon 1(d) 30 minutes

    Prioritize your documentation effort.

    1. List each proposed piece of documentation on the board.
    2. Assign a score to the risk posed to the business by the lack of documentation and to the expected benefit of completing the documentation. Use a scoring scale between 1 and 3 such as the one on the right.
    3. Prioritize documentation that mitigates risks and maximizes benefits.
    4. If you need to break ties, consider effort required to develop, implement, and enforce policies or procedures.

    Example Scoring Scale

    Score Business risk of missing documentation Business benefit of value of documentation

    1

    Low: Affects ad hoc activities or non-critical data. Low: Minimal impact.

    2

    Moderate: Impacts productivity or internal goodwill. Moderate: Required periodically; some cross-training opportunities.

    3

    High: Impacts revenue, safety, or external goodwill. High: Save time for common or ongoing processes; extensive improvement to training/knowledge transfer.

    Info-Tech Insight

    Documentation pulls resources away from other important programs and projects, so ultimately it must be a demonstrably higher priority than other work. This exercise is designed to align documentation efforts with business goals.

    Phase 1: Review accomplishments

    Policy pillars: Standards, Procedures, Guidelines

    Summary of Accomplishments

    • Identified gaps in the existing policy suite and identified pain points in existing Infra & Ops processes.
    • Developed a list of policies and procedures that can address existing gaps and prioritized the documentation effort.

    Develop Infrastructure & Operations Policies and Procedures

    Phase 2

    Develop Policies

    PHASE 2: Develop Policies

    Step 2.1: Modify policy templates and gather feedback

    This step will walk you through the following activities:

    • Modify policy templates

    This step involves the following participants:

    • Infrastructure & Operations Manager
    • Technical Writer

    Results & Insights

    • Results: Your own COBIT-aligned policies built by modifying Info-Tech templates.
    • Insights: Effective policies are easy to read and navigate.

    Write Good-er: Be Clear, Consistent, and Concise

    Effective policies adhere to the three Cs of documentation.

    1. Be clear. Make it as easy as possible for a user to learn how to comply with your policy.
    2. Be consistent. Write policies that complement each other, not contradict each other.
    3. Be concise. Make it as quick and easy as possible to read and understand your policy.

    Info-Tech Best Practice

    To download the full suite of templates all at once, click the “Download Research” button on the research landing page on the website.

    Use the three Cs: Be Clear

    Understanding makes compliance possible. Create policy with the goal of making compliance as easy as possible. Use positive, simple language to convey your intentions and rationale to your audience. Staff will make an effort adhere to your policy when they understand the need and are able to comply with the terms.

    1. Choose a skilled writer. Select a writer who can write clearly and succinctly.
    2. Default to simple language and define key terms. Define scope and key terms upfront. Avoid using technical terms outside of technical documentation; if they’re necessary be sure to define them as well.
    3. Use active, positive language. Where possible, tell people what they can do, not what they can’t.
    4. Keep the structure simple. Complicated documents are less likely to be understood and read. Use short sentences and paragraphs. Lists are a helpful way to summarize important information. Guide your reader through the document with appropriately named section headers, tables of contents, and numeration.
    5. Add a process for handling exceptions. Refer to procedures, standards, and guidelines documentation. Try to keep these links as static as possible. Also, refer to a process for handling exceptions.
    6. Manage the integrity of electronic documents. When published electronically, the policy should have restricted editing access or should be published in a non-editable format. Access to the procedure and policy storage database for employees should be read-only.

    Info-Tech Insight

    Highly effective policies are easy to navigate. Your policies should be “skimmable.” Very few people will fully read a policy before accepting it. Make it easy to navigate so the reader can easily find the policy statements that apply to them.

    Use the three Cs: Be Consistent

    Ensure that policies are aligned with other organizational policies and procedures. It detracts from compliance if different policies prescribe different behavior in the same situation. Moreover, your policies should reflect the corporate culture and other company standards. Use your policies to communicate rules and get employees aligned with how your company works.

    1. Use standard sentences and paragraphs. Policies are usually expressed in short, standard sentences. Lists should also be used when necessary or appropriate.
    2. Remember the three Ws. When writing a policy, always be sure to clearly state what the rule is, when it should be applied, and who needs to follow it. Policies should clearly define their scope of application and whether directives are mandatory or recommended.
    3. Use an outline format. Using a numbered or outline format will make a document easier to read and will make content easier to look up when referring back to the document at a later time.
    4. Avoid amendments. Avoid the use of information that is quickly outdated and requires regular amendment (e.g. names of people).
    5. Reference a set of supplementary documents. Codify your tactics outside of the policy document, but make reference to them within the text. This makes it easier to ensure consistency in the behavior prescribed by your policies.

    "One of the issues is the perception that policies are rules and regulations. Instead, your policies should be used to say ‘this is the way we do things around here.’" (Mike Hughes CISA CGEIT CRISC, Principal Director, Haines-Watts GRC)

    Use the three Cs: Be Concise

    Reading and understanding policies shouldn’t be challenging, and it shouldn’t significantly detract from productive time. Long policies are more difficult to read and understand, increasing the work required for employees to comply with them. Put it this way: How often do you read the Terms and Conditions of software you’ve installed before accepting them?

    1. Be direct. The quicker you get to the point, the easier it is for the reader to interpret and comply with your policy.
    2. Your policy is a rule, not a recipe. Your policy should outline what needs to be accomplished and why – your standards, guidelines, and SOPs address the how.
    3. Keep policies short. Nobody wants to read a huge policy book, so keep your policies short.
    4. Use additional documentation where needed. In addition to making consistency easier, this shortens the length of your policies, making them easier to read.
    5. Policy still too large? Modularize it. If you have an extremely large policy, it’s likely that it’s too widely scoped or that you’re including statements that should be part of procedure documentation. Consider breaking your policy into smaller, focused, more digestible documents.

    "If the policy’s too large, people aren’t going to read it. Why read something that doesn’t apply to me?" (Carole Fennelly, Owner and Principal, cFennelly Consulting)

    "I always try to strike a good balance between length and prescriptiveness when writing policy. Your policies … should be short and describe the problem and your approach to solving it. Below policies, you write standards, guidelines, and SOPs." (Michael Deskin, Policy and Technical Writer, Canadian Nuclear Safety Commission)

    Customize policy documents

    Associated Activity icon 2(a) 1-2 hours per policy

    Use the policies templates to support key Infrastructure & Operations programs.

    INPUT: List of prioritized policies

    OUTPUT: Written policy drafts ready for review

    Materials: Policy templates

    Participants: Policy writer, Signing authority

    No policy template will be a perfect fit for your organization. Use Info-Tech’s research to develop your organization’s program requirements. Customize the policy templates to support those requirements.

    1. Work through policies from highest to lowest priority as defined in Phase 1.
    2. Follow the instructions written in grey text to customize the policy. Follow the three Cs when you write your policy.
    3. When your draft is finished, prepare to request signoff from your signing authority by reviewing the draft with an Info-Tech analyst.
    4. Complete the highest ranked three or four draft policies. Review all these policies with relevant stakeholders and include all relevant signing authorities in the signoff process.
    5. Rinse and repeat. Iterate until all relevant polices are complete.

    Request, Incident, and Problem Management

    An effective, timely service desk correlates with higher overall end-user satisfaction across all other IT services. (Info-Tech Research Group, 2016 (N=25,998))

    An icon for the 'DSS02 Service Desk' template. An icon for the 'DSS03 Incident and Problem Management' template.

    Use the following template to create a policy that outlines the goals and mandate for your service and support organization:

    • IT Triage and Support Policy

    Support the program and associated policy statements using Info-Tech’s research:

    • Standardize the Service Desk
    • Incident and Problem Management
    • Design & Build a User-Facing Service Catalog

    Embrace Standardization

    • Outline the support and service mandate with the policy. Support the policy with the methodology in Info-Tech’s research.
    • Over time, organizations without standardized processes face confusion, redundancies, and cost overruns. Standardization avoids wasting energy and effort building new solutions to solved issues.
    • Standard processes for IT services define repeatable approaches to work and sandbox creative activities.
    • Create tickets for every task and categorize them using a standard classification system. Use the resulting data to support root-cause analysis and long-term trend management.
    • Create a single point of contact for users for all incidents and requests. Escalate and resolve tickets faster.
    • Empower end users and technicians with knowledge bases that help them solve problems without intervention.

    Change, Release, and Patch Management

    Slow turnaround, unauthorized changes, and change-related incidents are all too familiar to many managers.

    An icon for the 'BAI06 Change Management' template. An icon for the 'BAI07 Release Management' template.

    Use the following templates to create policies that define effective patch, release, and change management:

    • Change Management Policy
    • Release and Patch Management Policy
    • Change Control – Freezes & Risk Evaluation Policy

    Ensure the policy is supported by using the following Info-Tech research:

    • Optimize Change Management

    Embrace Change

    • IT system owners resist change management when they see it as slow and bureaucratic.
    • At the same time, an increasingly interlinked technical environment may cause issues to appear in unexpected places. Configuration management systems are often not kept up to date, so preventable conflicts get missed.
    • No process exists to support the identification and deployment of critical security patches. Tracking down users to find a maintenance window takes significant, dedicated effort and intervention from the management team.
    • Create a unified change management process that reduces risk and is balanced in its approach toward deploying changes, while also maintaining throughput of patches, fixes, enhancements, and innovation.

    IT Asset Management (ITAM)

    A proactive, dynamic ITAM program will pay dividends in support, contract management, appropriate provisioning, and more.

    An icon for the 'BAI09 Asset Management' template.

    Start by outlining the requirements for effective asset management:

    • Hardware Asset Management Policy
    • Software Asset Management Policy

    Support ITAM policies with the following Info-Tech research:

    • Implement IT Asset Management

    Leverage Asset Data

    • Create effective, directional policies for your asset management program that provide a mandate for action. Support the policies with robust procedures, capable staff, and right-fit technology solutions.
    • Poor management of assets generally leads to higher costs due to duplicated purchases, early replacement, loss, and so on.
    • Visibility into asset location and ownership improves security and accountability.
    • A centralized repository of asset data supports request fulfilment and incident management.
    • Asset management is an ongoing program, not a one-off project, and must be resourced accordingly. Organizations often implement an asset management program and let it stagnate.

    "Many of the large data breaches you hear about… nobody told the sysadmin the client data was on that server. So they weren’t protecting and monitoring it." (Carole Fennelly, Owner and Principal, cFennelly Consulting)

    Business Continuity Management (BCM)

    Streamline the traditional approach to make BCM practical and repeatable.

    An icon for the 'DSS04 DR and Business Continuity' template.

    Set the direction and requirements for effective BCM:

    • Business Continuity Management Policy

    Support the BCM policy with the following Info-Tech research:

    • Create a Right-Sized Disaster Recovery Plan
    • Develop a Business Continuity Plan

    Build Organizational Resilience

    • Evidence of disaster recovery and business continuity planning is increasingly required to comply with regulations, mitigate business risk, and meet customer demands.
    • IT leaders are often asked to take the lead on business continuity, but overall accountability for business continuity rests with the board of directors, and each business unit must create and maintain its business continuity plan.
    • Set an organizational mandate for BCM with the policy.
    • Divide the business continuity mandate into manageable parcels of work. Follow Info-Tech’s practical methodology to tackle key disaster recovery and business continuity planning activities one at a time.

    Info-Tech Best Practice

    Governance goals must be supported with effective, well-aligned procedures and processes. Use Info-Tech’s research to support the key Infrastructure & Operations processes that enable your business to create value.

    Availability, Capacity, and Operations Management

    What was old is new again. Use time-tested techniques to manage and plan cloud capacity and costs.

    An icon for the 'BAI04 Availability and Capacity Management' template. An icon for the 'DSS01 Operations Management' template. An icon for the 'BAI10 Configuration Management' template.

    Set the direction and requirements for effective availability and capacity management:

    • Availability and Capacity Management Policy
    • System Maintenance Policy – NIST

    Support the policy with the following Info-Tech research:

    • Develop an Availability and Capacity Management Plan
    • Improve IT Operations Management
    • Develop an IT Infrastructure Services Playbook

    Mature Service Delivery

    • Hybrid IT deployments – managing multiple locations, delivery models, and service providers – are the future of IT. Hybrid deployments significantly complicate capacity planning and operations management.
    • Effective operations management practices develop structured processes to automate activities and increase process consistency across the IT organization, ultimately improving IT efficiency.
    • Trying to add mature service delivery can feel like playing whack-a-mole. Systematically improve your service capabilities using the tactical, iterative approach outlined in Improve IT Operations Management.

    Enhance your overall security posture with a defensible, prescriptive policy suite

    Align your security policy suite with NIST Special Publication 800-171.

    Security policies support the organization’s larger security program. We’ve created a dedicated research blueprint and a set of templates that will help you build security policies around a robust framework.

    • Start with a security charter that aligns the security program with organizational objectives.
    • Prioritize security policies that address significant risks.
    • Work with technical and business stakeholders to adapt Info-Tech’s NIST SP 800-171–aligned policy templates (at right) to reflect your organizational objectives.

    A diagram listing all the different elements in a 'Security Charter': 'Access Control', 'Audit & Acc.', 'Awareness and Training', 'Config. Mgmt.', 'Identification and Auth.', 'Incident Response', 'Maintenance', 'Media Protection', 'Personnel Security', 'Physical Protection', 'Risk Assessment', 'Security Assessment', 'System and Comm. Protection', and 'System and Information Integrity'.

    Review and download Info-Tech's blueprint Develop and Deploy Security Policies.

    Info-Tech Best Practice

    Customize Info-Tech’s policy framework to align your policy suite to NIST SP 800-171. Given NIST’s requirements for the control of confidential information, organizations that align their policies to NIST standards will be in a strong governance position.

    PHASE 2: Develop Policies

    Step 2.2: Implement, enforce, measure, and maintain new policies

    This step will walk you through the following activities:

    • Gather stakeholder feedback
    • Identify preventive and detective controls
    • Identify required supports
    • Seek policy approval
    • Establish roles and responsibilities for policy maintenance

    This step involves the following participants:

    • Infrastructure & Operations Manager
    • Infrastructure Supervisors
    • Technical Writer
    • Policy Stakeholders

    Results & Insights

    • Results: Well-supported policies that have received signoff.
    • Insights: If you’re not prepared to enforce the policy, you might not actually need a policy. Use the policy statements as guidelines or standards, create and implement procedures, and build a culture of compliance. Once you can confidently execute on required controls, seek signoff.

    Gather feedback from users to assess the feasibility of the new policies

    Associated Activity icon 2(b) Review period: 1-2 weeks

    Once the policies are drafted, roundtable the drafts with stakeholders.

    INPUT: Draft policies

    OUTPUT: Reviewed policy drafts ready for approval

    Materials: Policy drafts

    Participants: Policy stakeholders

    1. Form a test group of users who will be affected by the policy in different ways. Keep the group to around five staff.
    2. Present new policies to the testers. Allow them to read the documents and attempt to comply with the new policies in their daily routines.
    3. Collect feedback from the group.
      • Consider using interviews, email surveys, chat channels, or group discussions.
      • Solicit ideas on how policy statements could be improved or streamlined.
    4. Make reasonable changes to the first draft of the policies before submitting them for approval. Policies will only be followed if they’re realistic and user friendly.

    Info-Tech Best Practice

    Allow staff the opportunity to provide input on policy development. Giving employees a say in policy development helps avoid obstacles down the road. This is especially true if you’re trying to change behavior rather than lock it in.

    Develop mechanisms for monitoring and enforcement

    Associated Activity icon 2(c) 20 minutes per policy

    Brainstorm preventive and detective controls.

    INPUT: Draft policies

    OUTPUT: Reviewed policy drafts ready for approval

    Materials: Policy drafts

    Participants: Policy stakeholders

    Preventive controls are designed to discourage or pre-empt policy breaches before they occur. Training, approvals processes, and segregation of duties are examples of preventive controls. (Ohio University)

    Detective controls help enforce the policy by identifying breaches after they occur. Forensic analysis and event log auditing are examples of detective controls. (Ohio University)

    Not all policies require the same level of enforcement. Policies that are required by law or regulation generally require stricter enforcement than policies that outline best practices or organizational values.

    Identify controls and enforcement mechanisms that are in line with policy requirements. Build control and enforcement into procedure documentation as needed.

    Suggestions:

    1. Have staff sign off on policies. Disclose any monitoring/surveillance.
    2. Ensure consequences match the severity of the infraction. Document infractions and ensure that enforcement is applied consistently across all infractions.
    3. Automatic controls shouldn’t get in the way of people’s ability to do their jobs. Test controls with users before you roll them out widely.

    Support the policy before seeking approval

    A policy is only as strong as its supporting pillars.

    Create Standards

    Standards are requirements that support policy adherence. Server builds and images, purchase approval criteria, and vulnerability severity definitions can all be examples of standards that improve policy adherence.

    Where reasonable, use automated controls to enforce standards. If you automate the control, consider how you’ll handle exceptions.

    Create Guidelines

    If no standards exist – or best practices can’t be monitored and enforced, as standards require – write guidelines to help users remain in compliance with the policy.

    Create Procedures: We’ll cover procedure development and documentation in Phase 3.

    Info-Tech Insight

    In general, failing to follow or strictly enforce a policy creates a risk for the business. If you’re not confident a policy will be followed or enforced, consider using policy statements as guidelines or standards as an interim measure as you update procedures and communicate and roll out changes that support adherence and enforcement.

    Seek approval and communicate the policy

    Policies ultimately need to be accepted by the business.

    • Once the drafts are completed, identify who is in charge of approving the policies.
    • Ensure all stakeholders understand the importance, context, and repercussions of the policies.
    • The approvals process is about appropriate oversight of the drafted policies. For example:
      • Do the policies satisfy compliance and regulatory requirements?
      • Do the policies work with the corporate culture?
      • Do the policies address the underlying need?

    If the draft is rejected:

    • Acquire feedback and make revisions.
    • Resubmit for approval.

    If the draft is approved:

    • Set the effective date and a review date.
    • Begin communication, training, and implementation.
    • Employees must know that there are new policies and understand the steps they must take to comply with the policies in their work.
    • Employees must be able to interpret, understand, and know how to act upon the information they find in the policies.
    • Employees must be informed on where to get help or ask questions and from whom to request policy exceptions.

    "A lot of board members and executive management teams… don’t understand the technology and the risks posed by it." (Carole Fennelly, Owner and Principal, cFennelly Consulting)

    Identify policy management roles and responsibilities

    Associated Activity icon 2(d) 30 minutes

    Discuss and assign roles and responsibilities for ongoing policy management.

    Role

    Responsibilities

    Executive sponsor

  • Supports the program at the highest levels of the business, as needed
  • Program lead

  • Leads the Infrastructure & Operations policy management program
  • Identifies and communicates status updates to the executive sponsor and the project team
  • Coordinates business demands and interviews and organizes stakeholders to identify requirements
  • Manages the work team and coordinates policy rollout
  • Policy writer

  • Authors and updates policies based on requirements
  • Coordinates with outsourced editor for completion of written documents
  • IT infrastructure SMEs

  • Provide technical insight into capabilities and limitations of infrastructure systems
  • Provide advice on possible controls that can aid policy rollout, monitoring, and enforcement
  • Legal expert

  • Provides legal advice on the policy’s legal terms and enforceability
  • "Whether at the level of a government, a department, or a sub-organization: technology and policy expertise complement one another and must be part of the conversation." (Peter Sheingold, Portfolio Manager, Cybersecurity, MITRE Corporation)

    Phase 2: Review accomplishments

    Effective Policies: Clear, Consistent, and Concise

    An icon for the 'DSS02 Service Desk' template.

    An icon for the 'DSS03 Incident and Problem Management' template.

    An icon for the 'BAI06 Change Management' template.

    An icon for the 'BAI07 Release Management' template.

    An icon for the 'BAI09 Asset Management' template.

    An icon for the 'DSS04 DR and Business Continuity' template.

    An icon for the 'BAI04 Availability and Capacity Management' template.

    An icon for the 'DSS01 Operations Management' template.

    An icon for the 'BAI10 Configuration Management' template.

    Summary of Accomplishments

    • Built priority policies based on templates aligned with the IT Management & Governance Framework and COBIT 5.
    • Reviewed controls and policy supports.
    • Assigned roles and responsibilities for ongoing policy maintenance.

    Develop Infrastructure & Operations Policies and Procedures

    Phase 3

    Document Effective Procedures

    PHASE 3: Document Effective Procedures

    Step 3.1: Scope and outline procedures

    This step will walk you through the following activities:

    • Prioritize SOP documentation
    • Draft workflows using a tabletop exercise
    • Modify templates, as applicable

    This step involves the following participants:

    • Infrastructure & Operations Manager
    • Technical Writer
    • Infrastructure Supervisors

    Results & Insights

    • Results: An action plan for SOP documentation and an outline of procedure workflows.
    • Insights: Don’t let tools get in the way of documentation – low-tech solutions are often the most effective way to build and analyze workflows.

    Prioritize your SOP documentation effort

    Associated Activity icon 3(a) 1-2 hours

    Build SOP documentation that gets used and doesn’t just check a box.

    1. Review the list of procedure gaps from Phase 1. Are any other procedures needed? Are some of the procedures now redundant?
    2. Establish the scope of the proposed procedures. Who are the stakeholders? What policies do they support?
    3. Run a basic prioritization exercise using a three-point scale. Higher scores mean greater risks or greater benefits. Score the risk of the undocumented procedure to the business (e.g. potential effect on data, productivity, goodwill, health and safety, or compliance). Score the benefit to the business of documenting the procedure (e.g. throughput improvements or knowledge transfer).
    4. Different procedures require different formats. Decide on one or more formats that can help you effectively document the procedure:
      • Flowcharts: Depict workflows and decision points. Provide an at-a-glance view that is easy to follow. Can be supported by checklists and diagrams where more detail is required.
      • Checklists: A reminder of what to do, rather than how to do it. Keep instructions brief.
      • Diagrams: Visualize objects, topologies, and connections for reference purposes.
      • Tables: Establish relationships between related categories.
      • Prose: Use full-text instructions where other documentation strategies are insufficient.

    Modify the following Info-Tech templates for larger SOPs

    Support these processes...

    ...with these blueprints...

    ...to create SOPs using these templates.

    An icon for the 'DSS04 DR and Business Continuity' template. Create a Right-Sized Disaster Recovery Plan DRP Summary
    An icon for the 'BAI09 Asset Management' template. Implement IT Asset Management HAM SOP and SAM SOP
    An icon for the 'BAI06 Change Management' template. An icon for the 'BAI07 Release Management' template. Optimize Change Management Change Management SOP
    An icon for the 'DSS02 Service Desk' template. An icon for the 'DSS03 Incident and Problem Management' template. Standardize the Service Desk Service Desk SOP

    Use tabletop planning or whiteboards to draft workflows

    Associated Activity icon 3(b) 30 minutes

    Tabletop planning is a paper-based exercise in which your team walks through a particular process and maps out what happens at each stage.

    OUTPUT: Steps in the current process for one SOP

    Materials: Tabletop, pen, and cue cards

    Participants: Process owners, SMEs

    1. For this exercise, choose one particular process to document.
    2. Document each step of the process on cue cards, which can be arranged on the table in sequence.
    3. Be sure to include task ownership in your steps.
    4. Map out the process as it currently happens – we’ll think about how to improve it later.
    5. Keep focused. Stay on task and on time.

    Example:

    • Step 3: PM reviews new defects daily
    • Step 4: PM assigns defects to tech leads
    • Step 5: Assigned resource updates status – frequency is based on ticket priority

    Info-Tech Insight

    Don’t get weighed down by tools. Relying on software or other technological tools can detract from the exercise. Use simple tools such as cue cards to record steps so that you can easily rearrange steps or insert steps based on input from the group.

    Collaborate to optimize the SOP

    Associated Activity icon 3(c) 30 minutes

    Review the tabletop exercise. What gaps exist in current processes?
    How can the processes be made better? What are the outputs and checkpoints?

    OUTPUT: Identify steps to optimize the SOP

    Materials: Tabletop, pen, and cue cards

    Participants: Process owners, SMEs

    Example:

    • Step 3: PM reviews new defects daily
    • NEW STEP: Schedule 10-minute daily defect reviews with PM and tech leads to evaluate ticket priority
    • Step 4: PM assigns defects to tech leads
    • Step 5: Assigned resource updates status – frequency is based on ticket priority
      • Step 5 Subprocess: Ticket status update
      • Step 5 Output: Ticket status moved to OPEN by assigned resource – acknowledges receipt by assigned resource

    A note on colors: Use white cards to record steps. Record gaps on yellow cards (e.g. a process step not documented) and risks on red cards (e.g. only one person knows how to execute a step) to highlight your gaps/to-dos and risks to be mitigated or accepted.

    If it’s necessary to clarify complex process flows during the exercise, you can also use green cards for decision diamonds, purple for document/report outputs, and blue for subprocesses.

    PHASE 3: Document Effective Procedures

    Step 3.2: Document effective procedures

    This step will walk you through the following activities:

    • Document workflows, checklists, and diagrams
    • Establish a cadence for document review and updates

    This step involves the following participants:

    • Infrastructure Manager
    • Technical Writer

    Results & Insights

    • Results: Improved SOP documentation and document management practices.
    • Insights: It’s possible to keep up with changes if you put the right cues and accountabilities in place. Include document review in project and change management procedures and hold staff accountable for completion.

    Document workflows with flowcharting software

    Suggestions for workflow documentation

    • Whether you draft the workflow on a whiteboard or using cue cards, the first iteration is usually messy. Clean up the flow as you document the results of the exercise.
    • Make the workflow as simple as possible and no simpler. Eliminate any decision points that aren’t strictly necessary to complete the procedure.
    • Use standard flowchart shapes (see next slide).
    • Use links to connect to related documentation.
    • Review the documented workflow with participants.

    Download the following workflow examples:

    Establish flowcharting standards

    If you don’t have existing flowchart standards, then keep it simple and stick to basic flowcharting conventions as described below.

    Basic flowcharting convention: a circle can be used for 'Start, End, and Connector'. Start, End, and Connector: Traditional flowcharting standards reserve this shape for connectors to other flowcharts or other points in the existing flowchart. Unified Modeling Language (UML) also uses the circle for start and end points.
    Basic flowcharting convention: a rounded rectangle can be used for 'Start and End'. Start and End: Traditional flowcharting standards use this for start and end. However, Info-Tech recommends using the circle shape to reduce the number of shapes and avoid confusion with other similar shapes.
    Basic flowcharting convention: a rectangle can be used for 'Process Step'. Process Step: Individual process steps or activities (e.g. create ticket or escalate ticket). If it’s a series of steps, then use the subprocess symbol and flowchart the subprocess separately.
    Basic flowcharting convention: a rectangle with double-line on the ends can be used for 'Subprocess'. Subprocess: A series of steps. For example, a critical incident SOP might reference a recovery process as one of the possible actions. Marking it as a subprocess, rather than listing each step within the critical incident SOP, streamlines the flowchart and avoids overlap with other flowcharts (e.g. the recovery process).
    Basic flowcharting convention: a diamond can be used for 'Decision'. Decision: Represents decision points, typically with Yes/No branches, but you could have other branches depending on the question (e.g. a “Priority?” question could branch into separate streams for Priority 1, 2, 3, 4, and 5 issues).
    Basic flowcharting convention: a rectangle with a wavy bottom can be used for 'Document/Report Output'. Document/Report Output: For example, the output from a backup process might include an error log.

    Support workflows with checklists and diagrams

    Diagrams

    • Diagrams are a visual representation of real-world phenomena and the connections between them.
    • Be sure to use standard shapes. Clearly label elements of the diagram. Use standard practices, including titles, dates, authorship, and versioning.
    • IT systems and interconnections are layered. Include physical, logical, protocol, and data flow connections.

    Examples:

    • XMPL Recovery Workflows
    • Workflow Library

    Checklists

    • Checklists are best used as short-form reminders on how to complete a particular task.
    • Remember the audience. If the process will be carried out by technical staff, there’s technical background material you won’t need to spell out in detail.

    Examples:

    • Employee Termination Process Checklist
    • XMPL Systems Recovery Playbook

    Establish a cadence for documentation review and maintenance

    Lock-in the work with strong document management practices.

    • Identify documentation requirements as part of project planning.
    • Require a manager or supervisor to review and approve SOPs.
    • Check documentation status as part of change management.
    • Hold staff accountable for documentation.

    "It isn’t unusual for us to see infrastructure or operations documentation that is wildly out of date. We’re talking months, even years. Often it was produced as one big effort and then not reliably maintained." (Gary Patterson, Consultant, Quorum Resources)

    Only a quarter of organizations update SOPs as needed

    A bar chart representing how often organizations update SOPs. Each option has two bars, one representing 'North America', the other representing 'Europe and Asia'. 'Never or rarely' is 11% in North America and 3% in Europe and Asia. 'Ad-hoc approach' is 38% in North America and 28% in Europe and Asia. 'For audits/annual reviews' is 33% in North America and 45% in Europe and Asia. 'As needed/via change management' is 18% in North America and 25% in Europe and Asia. Source: Info-Tech Research Group (N=104)

    Info-Tech Best Practice

    Use Info-Tech’s research Create Visual SOP Documents to further evaluate document management practices and toolsets.

    Phase 3: Review accomplishments

    Workflow documentation: Cue cards into flowcharts

    Summary of Accomplishments

    • Identified priority procedures for documentation activities.
    • Created procedure documentation in the appropriate format and level of granularity to support Infra & Ops policies.
    • Published and maintained procedure documentation.

    Research contributors and experts

    Carole Fennelly, Owner
    cFennelly Consulting

    Picture of Carole Fennelly, Owner, cFennelly Consulting.

    Carole Fennelly provides pragmatic cyber security expertise to help organizations bridge the gap between technical and business requirements. She authored the Center for Internet Security (CIS) Solaris and Red Hat benchmarks, which are used globally as configuration standards to secure IT systems. As a consultant, Carole has defined security strategies, and developed policies and procedures to implement them, at numerous Fortune 500 clients. Carole is a Certified Information Security Manager (CISM), Certified Security Compliance Specialist (CSCS), and Certified HIPAA Professional (CHP).

    Marko Diepold, IT Audit Manager
    audit2advise

    Picture of Marko Diepold, IT Audit Manager, audit2advise.

    Marko is an IT Audit Manager at audit2advise, where he delivers audit, risk advisory, and project management services. He has worked as a Security Officer, Quality Manager, and Consultant at some of Germany’s largest companies. He is a CISA and is ITIL v3 Intermediate and ITGCP certified.

    Research contributors and experts

    Martin Andenmatten, Founder & Managing Director
    Glenfis AG

    Picture of Martin Andenmatten, Founder and Managing Director, Glenfis AG.

    Martin is a digital transformation enabler who has been involved in various fields of IT for more than 30 years. At Glenfis, he leads large Governance and Service Management projects for various customers. Since 2002, he has been the course manager for ITIL® Foundation, ITIL® Service Management, and COBIT training. He has published two books on ISO 20000 and ITIL.

    Myles F. Suer, CIO Chat Facilitator
    CIO.com/Dell Boomi

    Picture of Myles F. Suer, CIO Chat Facilitator, CIO.com/Dell Boomi.

    Myles Suer, according to LeadTails, is the number 9 influencer of CIOs. He is also the facilitator for the CIOChat, which has executive-level participants from around the world in such industries as banking, insurance, education, and government. Myles is also the Industry Solutions Marketing Manager at Dell Boomi.

    Research contributors and experts

    Peter Sheingold, Portfolio Manager
    Cybersecurity, Homeland Security Center, The MITRE Corporation

    Picture of Peter Sheingold, Portfolio Manager, Cybersecurity, Homeland Security Center, The MITRE Corporation.

    Peter leads tasks that involve collaboration with the Department of Homeland Security (DHS) sponsors and MITRE colleagues and connect strategy, policy, organization, and technology. He brings a deep background in homeland security and strategic analysis to his work with DHS in the immigration, border security, and cyber mission spaces. Peter came to MITRE in 2005 but has worked with DHS from its inception.

    Robert D. Austin, Professor
    Ivey Business School

    Picture of Robert D. Austin, Professor, Ivey Business School.

    Dr. Austin is a professor of Information Systems at Ivey Business School and an affiliated faculty member at Harvard Medical School. Before his appointment at Ivey, he was a professor of Innovation and Digital Transformation at Copenhagen Business School, and, before that, a professor of Technology and Operations Management at the Harvard Business School.

    Research contributors and experts

    Ron Jones, Director of IT Infrastructure and Service Management
    DATA Communications

    Picture of Ron Jones, Director of IT Infrastructure and Service Management, DATA Communications.

    Ron is a senior IT leader with over 20 years of management experiences from engineering to IT Service Management and operations support. He is known for joining organizations and leading enhanced process efficiency and has improved software, hardware, infrastructure, and operations solution delivery and support. Ron has worked for global and Canadian firms including BlackBerry, DoubleClick, Cogeco, Infusion, Info-Tech Research Group, and Data Communications Management.

    Scott Genung, Executive Director of Networking, Infrastructure, and Service Operations
    University of Chicago

    Picture of Scott Genung, Executive Director of Networking, Infrastructure, and Service Operations, University of Chicago.

    Scott is an accomplished IT executive with 26 years of experience in technical and leadership roles. In his current role, Scott provides strategic leadership, vision, and oversight for an IT portfolio supporting 31,000 users consisting of services utilized by campuses located in North America, Asia, and Europe; oversees the University’s Command Center; and chairs the UC Cyberinfrastructure Alliance (UCCA), a group of research IT providers that collectively deliver services to the campus and partners.

    Research contributors and experts

    Steve Weil, CISSP, CISM, CRISC, Information Security Director, Cybersecurity Principal Consultant
    Point B

    Picture of Steve Weil, CISSP, CISM, CRISC, Information Security Director, Cybersecurity Principal Consultant, Point B.

    Steve has 20 years of experience in information security design, implementation, and assessment. He has provided information security services to a wide variety of organizations, including government agencies, hospitals, universities, small businesses, and large enterprises. With his background as a systems administrator, security consultant, security architect, and information security director, Steve has a strong understanding of both the strategic and tactical aspects of information security. Steve has significant hands-on experience with security controls, operating systems, and applications. Steve has a master's degree in Information Science from the University of Washington.

    Tony J. Read, Senior Program/Project Lead & Interim IT Executive
    Read & Associates

    Picture of Tony J. Read, Senior Program/Project Lead and Interim IT Executive, Read and Associates.

    Tony has over 25 years of international IT leadership experience, within high tech, computing, telecommunications, finance, banking, government, and retail industries. Throughout his career, Tony has led and successfully implemented key corporate initiatives, contributing millions of dollars to the top and bottom line. He established Read & Associates in 2002, an international IT management and program/project delivery consultancy practice whose aim is to provide IT value-based solutions, realizing stakeholder economic value and network advantage. These key concepts are presented in his new book: The IT Value Network: From IT Investment to Stakeholder Value, published by J. Wiley, NJ.

    Related Info-Tech research

    • Develop and Deploy Security Policies
    • Develop an Availability and Capacity Management Plan
    • Improve IT Operations Management
    • Develop an IT Infrastructure Services Playbook
    • Create a Right-Sized Disaster Recovery Plan
    • Develop a Business Continuity Plan
    • Implement IT Asset Management
    • Optimize Change Management
    • Standardize the Service Desk
    • Incident and Problem Management
    • Design & Build a User-Facing Service Catalog

    Bibliography

    “About Controls.” Ohio University, ND. Web. 2 Feb 2018.

    England, Rob. “How to implement ITIL for a client?” The IT Skeptic. Two Hills Ltd, 4 Feb. 2010. Web. 2018.

    “Global Corporate IT Security Risks: 2013.” Kaspersky Lab, May 2013. Web. 2018.

    “Information Security and Technology Policies.” City of Chicago, Department of Innovation and Technology, Oct. 2014. Web. 2018.

    ISACA. COBIT 5: Enabling Processes. International Systems Audit and Control Association. Rolling Meadows, IL.: 2012.

    “IT Policy & Governance.” NYC Information Technology & Telecommunications, ND. Web. 2018.

    King, Paula and Kent Wada. “IT Policy: An Essential Element of IT Infrastructure”. EDUCAUSE Review. May-June 2001. Web. 2018.

    Luebbe, Max. “Simplicity.” Site Reliability Engineering. O’Reilly Media. 2017. Web. 2018.

    Swartout, Shawn. “Risk assessment, acceptance, and exception with a process view.” ISACA Charlotte Chapter September Event, 2013. Web. 2018.

    “User Guide to Writing Policies.” Office of Policy and Efficiency, University of Colorado, ND. Web. 2018.

    “The Value of Policies and Procedures.” New Mexico Municipal League, ND. Web. 2018.

    Implement and Mature Your User Experience Design Practice

    • Buy Link or Shortcode: {j2store}430|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Requirements & Design
    • Parent Category Link: /requirements-and-design

    Many organizations want to get to market quickly and on budget but don’t know the steps to get the right product/service to satisfy the users and business. This may be made apparent through uninformed decisions leading to lack of adoption of your product or service, rework due to post-implementation user feedback, or the competition discovering new approaches that outshine yours.

    Our Advice

    Critical Insight

    Ensure your practice has a clear understanding of the design problem space – not just the solution. An understanding of the user is critical to this.

    Impact and Result

    • Create a practice that is focused on human outcomes; it starts and ends with the people you are designing for. This includes:
      • Establishing a practice with a common vision.
      • Enhancing the practice through four design factors.
      • Communicating a roadmap to improve your business through design.
    • Create a practice that develops solutions specific to the needs of users, customers, and stakeholders.

    Implement and Mature Your User Experience Design Practice Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should implement an experience design practice, review Info-Tech’s methodology, and understand the four dimensions we recommend using to mature your practice.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build the foundation

    Motivate your team with a common vision, mission, and goals.

    • Design Roadmap Workbook
    • User Experience Practice Roadmap

    2. Review the design dimensions

    Examine your practice – from the perspectives of organizational alignment, business outcomes, design perspective, and design integration – to determine what it takes to improve your maturity.

    3. Build your roadmap and communications

    Bring it all together – determine your team structure, the roadmap for the practice maturity, and communication plan.

    [infographic]

    Workshop: Implement and Mature Your User Experience Design Practice

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Answer “So What?”

    The Purpose

    Make the case for UX. Bring the team together with a common mission, vision, and goals.

    Key Benefits Achieved

    Mission, vision, and goals for design

    Activities

    1.1 Define design practice goals.

    1.2 Generate the vision statement.

    1.3 Develop the mission statement.

    Outputs

    Design vision statement

    Design mission statement

    Design goals

    2 Examine Design Dimensions

    The Purpose

    Review the dimensions that help organizations to mature, and assess what next steps make sense for your organization.

    Key Benefits Achieved

    Develop initiatives that are right-sized for your organization.

    Activities

    2.1 Examine organizational alignment.

    2.2 Establish priorities for initiatives.

    2.3 Identify business value sources.

    2.4 Identify design perspective.

    2.5 Brainstorm design integration.

    2.6 Complete UCD-Canvas.

    Outputs

    Documented initiatives for design maturity

    Design canvas framework

    3 Create Structure and Initiatives

    The Purpose

    Make your design practice structure right for you.

    Key Benefits Achieved

    Examine patterns and roles for your organization.

    Activities

    3.1 Structure your design practice.

    Outputs

    Design practice structure with patterns

    4 Roadmap and Communications

    The Purpose

    Define the communications objectives and audience for your roadmap.

    Develop your communication plan.

    Sponsor check-in.

    Key Benefits Achieved

    Complete in-progress deliverables from previous four days.

    Set up review time for workshop deliverables and to discuss next steps.

    Activities

    4.1 Define the communications objectives and audience for your roadmap.

    4.2 Develop your communication plan.

    Outputs

    Communication Plan and Roadmap

    The latest burning platform: Exit Plans in a shifting world

    • Large vertical image:
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A

    The current global situation, marked by significant trade tensions and retaliatory measures between major economic powers, has elevated the importance of more detailed, robust, and executable exit plans for businesses in nearly all industries. The current geopolitical headwinds create an unpredictable environment that can severely impact supply chains, technology partnerships, and overall business operations. What was once a prudent measure is now a critical necessity – a “burning platform” – for ensuring business continuity and resilience.

    Here I will delve deeper into the essential components of an effective exit plan, outline the practical steps for its implementation, and explain the crucial role of testing in validating its readiness.

    exit plan

    Continue reading

    Design and Build an Effective Contract Lifecycle Management Process

    • Buy Link or Shortcode: {j2store}214|cart{/j2store}
    • member rating overall impact: 9.0/10 Overall Impact
    • member rating average dollars saved: $5,039 Average $ Saved
    • member rating average days saved: 20 Average Days Saved
    • Parent Category Name: Vendor Management
    • Parent Category Link: /vendor-management
    • Your vendor contracts are unorganized and held in various cabinets and network shares. There is no consolidated list or view of all the agreements, and some are misplaced or lost as coworkers leave.
    • The contract process takes a long time to complete. Coworkers are unsure who should be reviewing and approving them.
    • You are concerned that you are not getting favorable terms with your vendors and not complying with your agreement commitments.
    • You are unsure what risks your organization could be exposed to in your IT vendor contacts. These could be financial, legal, or security risks and/or compliance requirements.

    Our Advice

    Critical Insight

    • Focus on what’s best for you. There are two phases to CLM. All stages within those phases are important, but choose to improve the phase that can be most beneficial to your organization in the short term. However, be sure to include reviewing risk and monitoring compliance.
    • Educate yourself. Understand the stages of CLM and how each step can rely on the previous one, like a stepping-stone model to success.
    • Consider the overall picture. Contract lifecycle management is the sum of many processes designed to manage contracts end to end while reducing corporate risk, improving financial savings, and managing agreement obligations. It can take time to get CLM organized and working efficiently, but then it will show its ROI and continuously improve.

    Impact and Result

    • Understand how to identify and mitigate risk to save the organization time and money.
    • Gain the knowledge required to implement a CLM that will be beneficial to all business units.
    • Achieve measurable savings in contract time processing, financial risk avoidance, and dollar savings.
    • Effectively review, store, manage, comply with, and renew agreements with a collaborative process

    Design and Build an Effective Contract Lifecycle Management Process Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out how a contract management system will save money and time and mitigate contract risk, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Master the operational framework of contract lifecycle management.

    Understand how the basic operational framework of CLM will ensure cost savings, improved collaboration, and constant CLM improvement.

    • Design and Build an Effective Contract Lifecycle Management Process – Phase 1: Master the Operational Framework of CLM
    • Existing CLM Process Worksheet
    • Contract Manager

    2. Understand the ten stages of contract lifecycle management.

    Understand the two phases of CLM and the ten stages that make up the entire process.

    • Design and Build an Effective Contract Lifecycle Management Process – Phase 2: Understand the Ten Stages of CLM
    • CLM Maturity Assessment Tool
    • CLM RASCI Diagram
    [infographic]

    Workshop: Design and Build an Effective Contract Lifecycle Management Process

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Review Your CLM Process and Learn the Basics

    The Purpose

    Identify current CLM processes.

    Learn the CLM operational framework.

    Key Benefits Achieved

    Documented overview of current processes and stakeholders.

    Activities

    1.1 Review and capture your current process.

    1.2 Identify current stakeholders.

    1.3 Learn the operational framework of CLM.

    1.4 Identify current process gaps.

    Outputs

    Existing CLM Process Worksheet

    2 Learn More and Plan

    The Purpose

    Dive into the two phases of CLM and the ten stages of a robust system.

    Key Benefits Achieved

    A deep understanding of the required components/stages of a CLM system.

    Activities

    2.1 Understand the two phases of CLM.

    2.2 Learn the ten stages of CLM.

    2.3 Assess your CLM maturity state.

    2.4 Identify and assign stakeholders.

    Outputs

    CLM Maturity Assessment

    CLM RASCI Diagram

    Further reading

    Design and Build an Effective Contract Lifecycle Management Process

    Mitigate risk and drive value through robust best practices for contract lifecycle management.

    Our understanding of the problem

    This Research Is Designed For:

    • The CIO who depends on numerous key vendors for services
    • The CIO or Project Manager who wants to maximize the value delivered by vendors
    • The Director or Manager of an existing IT procurement or vendor management team
    • The Contracts Manager or Legal Counsel whose IT department holds responsibility for contracts, negotiation, and administration

    This Research Will Help You:

    • Implement and streamline the contract management process, policies, and procedures
    • Baseline and benchmark existing contract processes
    • Understand the importance and value of contract lifecycle management (CLM)
    • Minimize risk, save time, and maximize savings with vendor contracts

    This Research Will Also Assist

    • IT Service Managers
    • IT Procurement
    • Contract teams
    • Finance and Legal departments
    • Senior IT leadership

    This Research Will Help Them

    • Understand the required components of a CLM
    • Establish the current CLM maturity level
    • Implement a new CLM process
    • Improve on an existing or disparate process

    ANALYST PERSPECTIVE

    "Contract lifecycle management (CLM) is a vital process for small and enterprise organizations alike. Research shows that all organizations can benefit from a contract management process, whether they have as few as 25 contracts or especially if they have contracts numbering in the hundreds.

    A CLM system will:

    • Save valuable time in the entire cycle of contract/agreement processes.
    • Save the organization money, both hard and soft dollars.
    • Mitigate risk to the organization.
    • Avoid loss of revenue.

    If you’re not managing your contracts, you aren’t capitalizing on your investment with your vendors and are potentially exposing your organization to contract and monetary risk."

    - Ted Walker
    Principal Research Advisor, Vendor Management Practice
    Info-Tech Research Group

    Executive Summary

    Situation

    • Most organizations have vendor overload and even worse, no defined process to manage the associated contracts and agreements. To manage contracts, some vendor management offices (VMOs) use a shared network drive to store the contracts and a spreadsheet to catalog and manage them. Yet other less-mature VMOs may just rely on a file cabinet in Procurement and a reminder in someone’s calendar about renewals. These disparate processes likely cost your organization time spent finding, managing, and renewing contracts, not to mention potential increases in vendor costs and risk and the inability to track contract obligations.

    Complication

    • Contract lifecycle management (CLM) is not an IT buzzword, and it’s rarely on the top-ten list of CIO concerns in most annual surveys. Until a VMO gets to a level of maturity that can fully develop a CLM and afford the time and costs of doing so, there can be several challenges to developing even the basic processes required to store, manage, and renew IT vendor contracts. As is always an issue in IT, budget is one of the biggest obstacles in implementing a standard CLM process. Until senior leadership realizes that a CLM process can save time, money, and risk, getting mindshare and funding commitment will remain a challenge.

    Resolution

    • Understand the immediate benefits of a CLM process – even a basic CLM implementation can provide significant cost savings to the organization; reduce time spent on creating, negotiating, and renewing contracts; and help identify and mitigate risks within your vendor contracts.
    • Budgets don’t always need to be a barrier to a standard CLM process. However, a robust CLM system can provide significant savings to the organization.

    Info-Tech Insight

    • If you aren’t managing your contracts, you aren’t capitalizing on your investments.
    • Even a basic CLM process with efficient procedures will provide savings and benefits.
    • Not having a CLM process may be costing your organization money, time, and exposure to unmitigated risk.

    What you can gain from this blueprint

    Why Create a CLM

    • Improved contract organization
    • Centralized and manageable storage/archives
    • Improved vendor compliance
    • Risk mitigation
    • Reduced potential loss of revenue

    Knowledge Gained

    • Understanding of the value and importance of a CLM
    • How CLM can impact many departments within the organization
    • Who should be involved in the CLM steps and processes
    • Why a CLM is important to your organization
    • How to save time and money by maximizing IT vendor contracts
    • How basic CLM policies and procedures can be implemented without costly software expenditure

    The Outcome

    • A foundation for a CLM with best-practice processes
    • Reduced exposure to potential risks within vendor contracts
    • Maximized savings with primary vendors
    • Vendor compliance and corporate governance
    • Collaboration, transparency, and integration with business units

    Contract management: A case study

    CASE STUDY
    Industry Finance and Banking
    Source Apttus

    FIS Global

    The Challenge

    FIS’ business groups were isolated across the organization and used different agreements, making contract creation a long, difficult, and manual process.

    • Customers frustrated by slow and complicated contracting process
    • Manual contract creation and approval processes
    • Sensitive contract data that lacked secure storage
    • Multiple agreements managed across divisions
    • Lack of central repository for past contracts
    • Inconsistent and inaccessible

    The Solution: Automating and Streamlining the Contract Management Process

    A robust CLM system solved FIS’ various contract management needs while also providing a solution that could expand into full quote-to cash in the future.

    • Contract lifecycle management (CLM)
    • Intelligent workflow approvals (IWA)
    • X-Author for Excel

    Customer Results

    • 75% cycle time reduction
    • $1M saved in admin costs per year
    • 49% increase in sales proposal volume
    • Automation on one standard platform and solution
    • 55% stronger compliance management
    • Easy maintenance for various templates
    • Ability to quickly absorb new contracts and processes via FIS’s ongoing acquisitions

    Track the impact of CLM with these metrics

    Dollars Saved

    Upfront dollars saved

    • Potential dollars saved from avoiding unfavorable terms and conditions
    • Incentives that encourage the vendor to act in the customer’s best interest
    • Secured commitments to provide specified products and services at firm prices
    • Cost savings related to audits, penalties, and back support
    • Savings from discounts found

    Time Saved

    Time saved, which can be done in several areas

    • Defined and automated approval flow process
    • Preapproved contract templates with corporate terms
    • Reduced negotiation times
    • Locate contracts in minutes

    Pitfalls Avoided

    Number of pitfalls found and avoided, such as

    • Auto-renewal
    • Inconsistencies between sections and documents
    • Security and data not being deleted upon termination
    • Improper licensing

    The numbers are compelling

    71%

    of companies can’t locate up to 10% of their contracts.

    Source: TechnologyAdvice, 2019

    9.2%

    of companies’ annual revenue is lost because of poor contract management practices.

    Source: IACCM, 2019

    60%

    still track contracts in shared drives or email folders.

    Source: “State of Contract Management,” SpringCM, 2018

    CLM blueprint objectives

    • To provide a best-practice process for managing IT vendor contract lifecycles through a framework that organizes from the core, analyzes each step in the cycle, has collaboration and governance attached to each step, and integrates with established vendor management practices within your organization.
    • CLM doesn’t have to be an expensive managed database system in the cloud with fancy dashboards. As long as you have a defined process that has the framework steps and is followed by the organization, this will provide basic CLM and save the organization time and money over a short period of time.
    • This blueprint will not delve into the many vendors or providers of CLM solutions and their methodologies. However, we will discuss briefly how to use our framework and contract stages in evaluating a potential solution that you may be considering.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

    Guided Implementation

    “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

    Workshop

    "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

    Consulting

    "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Design and Build an Effective CLM Process – project overview

    1. Master the Operational Framework

    2. Understand the Ten Stages of CLM

    Best-Practice Toolkit

    1.1 Understand the operational framework components.

    1.2 Review your current framework.

    1.3 Create a plan to implement or enhance existing processes.

    2.1 Understand the ten stages of CLM.

    2.2 Review and document your current processes.

    2.3 Review RASCI chart and assign internal ownership.

    2.4 Create an improvement plan.

    2.5 Track changes for measurable ROI.

    Guided Implementations
    • Review existing processes.
    • Understand what CLM is and why the framework is essential.
    • Create an implementation or improvement plan.
    • Review the ten stages of CLM.
    • Complete CLM Maturity Assessment.
    • Create a plan to target improvement.
    • Track progress to measure savings.
    Onsite Workshop

    Module 1: Review and Learn the Basics

    • Review and capture your current processes.
    • Learn the basic operational framework of contract management.

    Module 2 Results:

    • Understand the ten stages of effective CLM.
    • Create an improvement or implementation plan.
    Phase 1 Outcome:
    • A full understanding of what makes a comprehensive contract management system.
    Phase 2 Outcome:
    • A full understanding of your current CLM processes and where to focus your efforts for improvement or implementation.

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Workshop Day 1 Workshop Day 2
    Activities

    Task – Review and Learn the Basics

    Task – Learn More and Plan

    1.1 Review and capture your current process.

    1.2 Identify current stakeholders.

    1.3 Learn the operational framework of contract lifecycle management.

    1.4 Identify current process gaps.

    2.1 Understand the two phases of CLM.

    2.2 Learn the ten stages of CLM.

    2.3 Assess your CLM maturity.

    2.4 Identify and assign stakeholders.

    2.5 Discuss ROI.

    2.6 Summarize and next steps.

    Deliverables
    1. Internal interviews with business units
    2. Existing CLM Process Worksheet
    1. CLM Maturity Assessment
    2. RASCI Diagram
    3. Improvement Action Plan

    PHASE 1

    Master the Operational Framework of Contract Lifecycle Management

    Design and Build an Effective CLM Process

    Phase 1: Master the Operational Framework of Contract Lifecycle Management

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of
    2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Master the Operational Framework of Contract Lifecycle Management
    Proposed Time to Completion: 1-4 weeks

    Step 1.1: Document your Current CLM Process

    Step 1.2: Read and Understand the Operational Framework

    Step 1.3: Review Solution Options

    Start with an analyst kick-off call:

    • Understand what your current process(es) is for each stage
    • Do a probative review of any current processes
    • Interview stakeholders for input

    Review findings with analyst:

    • Discuss the importance of the framework as the core of your plan
    • Review the gaps in your existing process
    • Understand how to prioritize next steps towards a CLM

    Finalize phase deliverable:

    • Establish ownership of the framework
    • Prioritize improvement areas or map out how your new CLM will look

    Then complete these activities…

    • Document the details of your process for each stage of CLM

    With these tools & templates:

    • Existing CLM Process Worksheet

    Phase 1 Results:

    • A full understanding of what makes a comprehensive contract management system.

    What Is Contract Lifecycle Management?

    • Every contract has a lifecycle, from creation to time and usage to expiration. Organizations using a legacy or manual contract management process usually ask, “What is contract lifecycle management and how will it benefit my business?”
    • Contract lifecycle management (CLM) creates a process that manages each contract or agreement. CLM eases the challenges of managing hundreds or even thousands of important business and IT contracts that affect the day-to-day business and could expose the organization to vendor risk.
    • Managing a few contracts is quite easy, but as the number of contracts grows, managing each step for each contract becomes increasingly difficult. Ultimately, it will get to a point where managing contracts properly becomes very difficult or seemingly impossible.

    That’s where contract lifecycle management (CLM) comes in.

    CLM can save money and improve revenue by:

    • Improving accuracy and decreasing errors through standardized contract templates and approved terms and conditions that will reduce repetitive tasks.
    • Securing contracts and processes through centralized software storage, minimizing risk of lost or misplaced contracts due to changes in physical assets like hard drives, network shares, and file cabinets.
    • Using policies and procedures that standardize, organize, track, and optimize IT contracts, eliminating time spent on creation, approvals, errors, and vendor compliance.
    • Reducing the organization’s exposure to risks and liability.
    • Having contracts renewed on time without penalties and with the most favorable terms for the business.

    The Operational Framework of Contract Lifecycle Management

    Four Components of the Operational Framework

    1. Organization
    2. Analysis
    3. Collaboration and Governance
    4. Integration/Vendor Management
    • By organizing at the core of the process and then analyzing each stage, you will maximize each step of the CLM process and ensure long-term contract management for the organization.
    • Collaboration and governance as overarching policies for the system will provide accountability to stakeholders and business units.
    • Integration and vendor management are encompassing features in a well-developed CLM that add visibility, additional value, and savings to the entire organization.

    Info-Tech Best Practice

    Putting a contract manager in place to manage the CLM project will accelerate the improvements and provide faster returns to the organizations. Reference Info-Tech’s Contract Manager Job Description template as needed.

    The operational framework is key to the success, return on investment (ROI), cost savings, and customer satisfaction of a CLM process.

    This image depicts Info-Tech's Operational Framework.  It consists of a series of five concentric circles, with each circle a different colour.  On the outer circle, is the word Integration.  The next outermost circle has the words Collaboration and Governance.  The next circle has no words, the next circle has the word Analysis, and the very centre circle has the word Organization.

    1. Organization

    • Every enterprise needs to organize its contract documents and data in a central repository so that everyone knows where to find the golden source of contractual truth.
    • This includes:
      • A repository for storing and organizing contract documents.
      • A data dictionary for describing the terms and conditions in a consistent, normalized way.
      • A database for persistent data storage.
      • An object model that tracks changes to the contract and its prevailing terms over time.

    Info-Tech Insight

    Paper is still alive and doing very well at slowing down the many stages of the contract process.

    2. Analysis

    Most organizations analyze their contracts in two ways:

    • First, they use reporting, search, and analytics to reveal risky and toxic terms so that appropriate operational strategies can be implemented to eliminate, mitigate, or transfer the risk.
    • Second, they use process analytics to reveal bottlenecks and points of friction as contracts are created, approved, and negotiated.

    3. Collaboration

    • Throughout the contract lifecycle, teams must collaborate on tasks both pre-execution and post-execution.
    • This includes document collaboration among several different departments across an enterprise.
    • The challenge is to make the collaboration smooth and transparent to avoid costly mistakes.
    • For some contracting tasks, especially in regulated industries, a high degree of control is required.
    • In these scenarios, the organization must implement controlled systems that restrict access to certain types of data and processes backed up with robust audit trails.

    4. Integration

    • For complete visibility into operational responsibilities, relationships, and risk, an organization must integrate its golden contract data with other systems of record.
    • An enterprise contracts platform must therefore provide a rich set of APIs and connectors so that information can be pushed into or pulled from systems for enterprise resource planning (ERP), customer relationship management (CRM), supplier relationship management (SRM), document management, etc.

    This is the ultimate goal of a robust contract management system!

    Member Activity: Document Current CLM Processes

    1.1 Completion Time: 1-5 days

    Goal: Document your existing CLM processes (if any) and who owns them, who manages them, etc.

    Instructions

    Interview internal business unit decision makers, stakeholders, Finance, Legal, CIO, VMO, Sales, and/or Procurement to understand what’s currently in place.

    1. Use the Existing CLM Process Worksheet to capture and document current CLM processes.
    2. Establish what processes, procedures, policies, and workflows, if any, are in place for pre-execution (Phase 1) contract stages.
    3. Do the same for post-execution (Phase 2) stages.
    4. Use this worksheet as reference for assessments and as a benchmark for improvement review six to 12 months later.
    This image contains a screenshot of Info-Tech's Existing CLM Process Discovery Worksheet

    INPUT

    • Internal information from all CLM stakeholders

    OUTPUT

    • A summary of processes and owners currently in place

    Materials

    • Existing CLM processes from interviews

    Participants

    • Finance, Legal, CIO, VMO, Sales, Procurement

    PHASE 2

    Understand the Ten Stages of Contract Lifecycle Management

    Design and Build an Effective CLM Process

    Phase 1: Master the Operational Framework of Contract Lifecycle Management

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of
    2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 2: Understand the Ten Stages of Contract Lifecycle Management

    Proposed Time to Completion: 1-10 weeks

    Step 2.1: Assess CLM Maturity

    Step 2.2: Complete a RASCI Diagram

    Start with an analyst kick-off call:

    • Review the importance of assessing the maturity of your current CLM processes
    • Discuss interview process for internal stakeholders
    • Use data from the Existing CLM Process Worksheet

    Review findings with analyst:

    • Review your maturity results
    • Identify stages that require immediate improvement
    • Prioritize improvement or implementation of process

    Then complete these activities…

    • Work through the maturity assessment process
    • Answer the questions in the assessment tool
    • Review the summary tab to learn where to focus improvement efforts

    Then complete these activities…

    • Using maturity assessment and existing process data, establish ownership for each process stage
    • Fill in the RASCI Chart based on internal review or existing processes

    With these tools & templates:

    • CLM Maturity Assessment Tool

    With these tools & templates:

    • CLM RASCI Diagram

    Phase 2 Results & Insights:

    • A full understanding of your current CLM process and where improvement is required
    • A mapping of stakeholders for each stage of the CLM process

    The Ten Stages of Contract Lifecycle Management

    There are ten key stages of contract lifecycle management.

    The steps are divided into two phases, pre-execution and post-execution.

      Pre-Execution (Phase 1)

    1. Request
    2. Create
    3. Review Risk
    4. Approve
    5. Negotiate
    6. Sign
    7. Post-Execution (Phase 2)

    8. Capture
    9. Manage
    10. Monitor Compliance
    11. Optimize

    Ten Process Stages Within the CLM Framework

    This image contains the CLM framework from earlier in the presentation, with the addition of the following ten steps: 1. Request; 2. Create Contract; 3. Review Risk; 4. Approve; 5. Negotiate; 6. Sign; 7. Capture; 8. Manage; 9. Monitor Compliance; 10. Optimize.

    Stage 1: Request or Initiate

    Contract lifecycle management begins with the contract requesting process, where one party requests for or initiates the contracting process and subsequently uses that information for drafting or authoring the contract document. This is usually the first step in CLM.

    Requests for contracts can come from various sources:

    • Business units within the organization
    • Vendors presenting their contract, including renewal agreements
    • System- or process-generated requests for renewal or extension

    At this stage, you need to validate if a non-disclosure agreement (NDA) is currently in place with the other party or is required before moving forward. At times, adequate NDA components could be included within the contract or agreement to satisfy corporate confidentiality requirements.

    Stage 1: Request or Initiate

    Stage Input

    • Information about what the contract needs to contain, such as critical dates, term length, coverage, milestones, etc.
    • Some organizations require that justification and budget approval be provided at this stage.
    • Request could come from a vendor as a pre-created contract.
    • Best practices recommend that a contract request form or template is used to standardize all required information.

    Stage Output

    • Completed request form, stored or posted with all details required to move forward to risk review and contract creation.
    • Possible audit trails.

    Stage 2: Create Contract

    • At the creation or drafting stage, the document is created, generated, or provided by the vendor. The document will contain all clauses, scope, terms and conditions, and pricing as required.
    • In some cases, a vendor-presented contract that is already prepared will go through an internal review or redlining process by the business unit and/or Legal.
    • Both internal and external review and redlining are included in this stage.
    • Also at this stage, the approvers and signing authorities are identified and added to the contract. In addition, some audit trail features may be added.

    Info-Tech Best Practice

    For a comprehensive list of terms and conditions, see our Software Terms & Conditions Evaluation Tool within Master Contract Review and Negotiation for Software Agreements.

    Stage 2: Create Contract

    Stage Input

    • Contract request form, risk review/assessment.
    • Vendor- or contractor-provided contract/agreement, either soft copy, electronic form, or more frequently, “clickwrap” web-posted document.
    • Could also include a renewal notification from a vendor or from the CLM system or admin.

    Stage Output

    • Completed draft contract or agreement, typically in a Microsoft Word or Adobe PDF format with audit trail or comment tracking.
    • Redlined document for additional revision and or acceptance.
    • Amendment or addendum to existing contract.

    Stage 3: Review Risk 1 of 2

    The importance of risk review can not be understated. The contract or agreement must be reviewed by several stakeholders who can identify risks to the organization within the contract.

    Three important definitions:

    1. Risk is the potential for a negative outcome. A risk is crossing the street while wearing headphones and selecting the next track to play on your smartphone. A negative outcome is getting hit by an oncoming person who, unremarkably, was doing something similar at the same time.
    2. Risk mitigation is about taking the steps necessary to minimize both the likelihood of a risk occurring – look around both before and while crossing the street – and its impact if it does occur – fall if you must, but save the smartphone!
    3. Contract risk is about any number of situations that can cause a contract to fail, from trivially – the supplier delivers needed goods late – to catastrophically – the supplier goes out of business without having delivered your long-delayed orders.

    Stage 3: Review Risk 2 of 2

    • Contracts must be reviewed for business terms and conditions, potential risk situations from a financial or legal perspective, business commitments or obligations, and any operational concerns.
    • Mitigating contract risk requires a good understanding of what contracts are in place, how important they are to the success of the organization, and what data they contain.

    Collectively, this is known as contract visibility.

    • Risk avoidance and mitigation are also a key component in the ROI of a CLM system and should be tracked for analysis.
    • Risk-identifying forms or templates can be used to maintain consistency with corporate standards.

    Stage 3: Review Risk

    Stage Input

    • All details of the proposed contract so that a proper risk analysis can be done as well as appropriate review with stakeholders, including:
      • Finance
      • Legal
      • Procurement
      • Security
      • Line-of-business owner
      • IT stakeholders

    Stage Output

    • A list of identified concerns that could expose the business unit or organization.
    • Recommendations to minimize or eliminate identified risks.

    Stage 4: Approve

    The approval stage can be a short process if policies and procedures are already in place. Most organizations will have defined delegation of authority or approval authority depending on risk, value of the contract, and other corporate considerations.

    • Defined approval levels should be known within the organization and can be applied to the approval workflow, expediting the approval of drafted terms, conditions, changes, and cost/spend within the contract internally.
    • Tracking and flexibility needs to considered in the approval process.
    • Gates need to be in place to ensure that a required approver has approved the contract before it moves to the next approver.
    • Flexibility is needed in some situations for ad hoc approval tasks and should include audit trail as required.
    • Approvers can include business units, Finance, Legal, Security, and C-level leaders

    Stage 4: Approve

    Stage Input

    • Complete draft contract with all terms and conditions (T&Cs) and approval trail.
    • Amendment or addendum to existing contract.

    Stage Output

    • Approved draft contract ready to move to the next step of negotiating with the vendor.
    • Approved amendment or addendum to existing or renewal agreement.

    Stage 5: Negotiate

    • At this stage, there should be an approved draft of the contract that can be presented to the other party or vendor for review.
    • Typically organizations will negotiate their larger deals for terms and conditions with the goal of balancing the contractual allocation of risk with the importance of the vendor or agreement and its value to the business.
    • Several people on either side are typically involved and will discuss legal and commercial terms of the contract. Throughout the process, negotiators may leverage a variety of tools, including playbooks with preferred and fallback positions, clause libraries, document redlines and comparisons, and issue lists.
    • Audit trails or tracking of changes and acceptances is an important part of this stage. Tracking will avoid duplication and lost or missed changes and will speed up the entire process.
    • A final, clean document is created at this point and readied for execution.

    Stage 5: Negotiate

    Stage Input

    • Approved draft contract ready to move to the next step of negotiating with the vendor.
    • Approved amendment or addendum to existing or renewal agreement.

    Stage Output

    • A finalized and approved contract or amendment with agreed-upon terms and conditions ready for signatures.

    Info-Tech Insight

    Saving the different versions of a contract during negotiations will save time, provide reassurance of agreed terms as you move through the process, and provide reference for future negotiations with the vendor.

    Stage 6: Sign or Execute

    • At this stage in the process, all the heavy lifting in a contract’s creation is complete. Now it’s signature time.
    • To finalize the agreement, both parties need to the sign the final document. This can be done by an in-person wet ink signature or by what is becoming more prevalent, digital signature through an e-signature process.
    • Once complete, the final executed documents are exchanged or received electronically and then retained by each party.

    Stage 6: Sign or Execute

    Stage Input

    • A finalized and approved contract or amendment with agreed-upon terms and conditions ready for signatures.

    Stage Output

    • An executed contract or amendment ready to move to the next stage of CLM, capturing in the repository.

    Info-Tech Best Practice

    Process flow provisions should made for potential rejection of the contract by signatories, looping the contract back to the appropriate stage for rework or revision.

    Stage 7: Capture in Database/Repository 1 of 2

    • This is one of the most important stages of a CLM process. Executed agreements need to be stored in a single manageable, searchable, reportable, and centralized repository.
    • All documents should to be captured electronically, reviewed for accuracy, and then posted to the CLM repository.
    • The repository can be in various formats depending on the maturity, robustness, and budget of the CLM program.

    Most repositories are some type of database:

    • An off-the-shelf product
    • A PaaS cloud-based solution
    • A homegrown, internally developed database
    • An add-on module to your ERP system

    Stage 7: Capture in Database/Repository 2 of 2

    Several important features of an electronic repository should be considered:

    • Consistent metadata tagging of clauses, terms, conditions, dates, etc.
    • Centralized summary view of all contracts
    • Controlled access for those who need to review and manage the contracts

    Establishing an effective repository will be key to providing measurable value to the organization and saving large amounts of time for the business unit.

    Info-Tech Insight

    Planning for future needs by investing a little more money into a better, more robust repository could pay bigger dividends to the VMO and organization while providing a higher ROI over time as advanced functionality is deployed.

    Stage 8: Manage

    • Once an agreement is captured in the repository, it needs to be managed from both an operational and a commitment perspective.
    • Through a summary view or master list, contracts need to be operationally managed for end dates and renewals, vendor performance, discounts, and rebates.
    • Managing contracts for commitment and compliance will ensure all contract requirements, rights, service-level agreements (SLAs), and terms are fulfilled. This will eliminate the high costs of missed SLAs, potential breaches, or missed renewals.
    • Managing contracts can be improved by adding metadata to the records that allow for easier search and retrieval of contracts or even proactive notification.
    • The repository management features can and should be available to business stakeholders, or reporting from a CLM admin can also alert stakeholders to renewals, pricing, SLAs, etc.
    • Also important to this stage is reporting. This can be done by an admin or via a self-serve feature for stakeholders, or it could even be automated.

    Stage 9: Monitor Compliance 1 of 2

    • At this stage, the contracts or agreements need to be monitored for the polices within them and the purpose for which they were signed.
    • This is referred to as obligation management and is a key step to providing savings to the organization and mitigating risk.
    • Many contracts contain commitments by each party. These can include but are not limited to SLAs, service uptime targets, user counts, pricing threshold discounts and rebates, renewal notices to vendors, and training requirements.
    • All of these obligations within the contracts should be summarized and monitored to ensure that all commitments are delivered on. Managing obligations will mitigate risks, maximize savings and rebates to the organization, and minimize the potential for a breach within the contract.

    Stage 9: Monitor Compliance 2 of 2

    • Monitoring and measuring vendor commitments and performance will also be a key factor in maximizing the benefits of the contract through vendor accountability.
    • Also included in this stage is renewal and/or disposition of the contract. If renewal is due, it should go back to the business unit for submission to the Stage 1: Request process. If the business unit is not going to renew the contract, the contract must be tagged and archived for future reference.

    Stage 10: Optimize

    • The goal of this stage is to improve the other stages of the process as well as evaluate how each stage is integrating with the core operational framework processes.
    • With more data and improved insight into contractual terms and performance, a business can optimize its portfolio for better value, greater savings, and lower-risk outcomes.
    • For high-performance contract teams, the goal is a continuous feedback loop between the contract portfolio and business performance. If, for example, the data shows that certain negotiation issues consume a large chunk of time but yield no measurable difference in risk or performance, you may tweak the playbook to remedy those issues quickly.

    Additional optimization tactics:

    • Streamlining contract renewals with auto-renew
    • Predefined risk review process or template, continuous review/improvement of negotiation playbook
    • Better automation or flow of approval process
    • Better signature delegation process if required
    • Improving repository search with metadata tagging
    • Automating renewal tracking or notice process
    • Tracking the time a contract spends in each stage

    Establish Your Current CLM Maturity Position

    • Sometimes organizations have a well-defined pre-execution process but have a poor post-signature process.
    • Identifying your current processes or lack thereof will provide you with a starting point in developing a plan for your CLM. It’s possible that most of the stages are there and just need some improvements, or maybe some are missing and need to be implemented.
    • It’s not unusual for organizations to have a manual pre-execution process and an automated backend repository with compliance and renewal notices features.

    Info-Tech Best Practice

    Use the CLM Maturity Assessment Tool to outline where your organization is at each stage of the process.

    Member Activity: Assess Current CLM Maturity

    2.1 Completion Time 1-2 days

    Goal: Identify and measure your existing CLM processes, if any, and provide a maturity value to each stage. The resulting scores will provide a maturity assessment of your CLM.

    Instructions

    1. Use the Existing CLM Process Worksheet to document current CLM processes.
    2. Using the CLM worksheet info, answer the questions in the CLM Maturity Assessment Tool.
    3. Review the results and scores on Tab 3 to see where you need to focus your initial improvements.
    4. Save the initial assessment for future reference and reassess in six to 12 months to measure progress.

    This image contains a screenshot from Info-Tech's CLM Maturity Assessment Tool.

    INPUT

    • Internal information from all CLM stakeholders

    OUTPUT

    • A summary of processes and owners currently in place in the organization

    Materials

    • Existing CLM processes from interviews

    Participants

    • Finance, Legal, CIO, VMO, Sales, Procurement

    Member Activity: Complete RASCI Chart

    2.2 Completion Time 2-6 hours

    Goal: Identify who in your organization is primarily accountable and involved in each stage of the CLM process.

    Instructions

    Engage internal business unit decision makers, stakeholders, Finance, Legal, CIO, VMO, Sales, and Procurement as required to validate who should be involved in each stage.

    1. Using the information collected from internal reviews, assign a level in the CLM RASCI Diagram to each team member.
    2. Use the resulting RASCI diagram to guide you through developing or improving your CLM stages.

    This image contains a screenshot from Info-Tech's CLM RASCI Diagram.

    INPUT

    • Internal interview information

    OUTPUT

    • Understanding of who is involved in each CLM stage

    Materials

    • Interview data
    • RASCI Diagram

    Participants

    • Finance, Legal, CIO, VMO, Sales, Procurement

    Applying CLM Framework and Stages to Your Organization

    • Understand what CLM process you currently do or do not have in place.
    • Review implementation options: automated, semi-automated, and manual solutions.
    • If you are improving an existing process, focus on one phase at a time, perfect it, and then move to the other phase. This can also be driven by budget and time.
    • Create a plan to start with and then move to automating or semi-automating the stages.
    • Building onto or enhancing an existing system or processes can be a cost-effective method to produce near-term measurable savings
    • Focus on one phase at a time, then move on to the other phase.
    • While reviewing implementation of or improvements to CLM stages, be sure to track or calculate the potential time and cost savings and risk mitigation. This will help in any required business case for a CLM.

    CLM: An ROI Discussion 1 of 2

    • ROI can be easier to quantify and measure in larger organizations with larger CLM, but ROI metrics can be obtained regardless of the company or CLM size.
    • Organizations recognize their ROI through gains in efficiency across the entire business as well as within individual departments involved in the contracting process. They also do so by reducing the risk associated with decentralized and insecure storage of and access to their contracts, failure to comply with terms of their contracts, and missing deadlines associated with contracts.

    Just a few of the factors to consider within your own organization include:

    • The number of people inside and outside your company that touch your contracts.
    • The number of hours spent weekly, monthly, and annually managing contracts.
    • Potential efficiencies gained in better managing those contracts.
    • The total number of contracts that exist at any given time.
    • The average value and total value of those contract types.
    • The potential risk of being in breach of any of those contracts.
    • The number of places contracts are stored.
    • The level of security that exists to prevent unauthorized access.
    • The potential impact of unauthorized access to your sensitive contract data.

    CLM: An ROI Discussion 2 of 2

    Decision-Maker Apprehensions

    Decision-maker concerns arise from a common misunderstanding – that is, a fundamental failure to appreciate the true source of contract management value. This misunderstanding goes back many years to the time when analysts first started to take an interest in contract management and its automation. Their limited experience (primarily in retail and manufacturing sectors) led them to think of contract management as essentially an administrative function, primarily focused on procurement of goods. In such environments, the purpose of automation is focused on internal efficiency, augmented by the possibility of savings from reduced errors (e.g. failing to spot a renewal or expiry date) or compliance (ensuring use of standard terms).

    Today’s CLM systems and processes can provide ROI in several areas in the business.

    Info-Tech Insight

    Research on ROI of CLM software shows significant hard cost savings to an organization. For example, a $10 million company with 300 contracts valued at $3 million could realize savings of $83,400 and avoid up to $460,000 in lost revenues. (Derived from: ACCDocket, 2018)

    Additional Considerations 1 of 2

    Who should own and/or manage the CLM process within an organization? Legal, VMO, business unit, Sales?

    This is an often-discussed question. Research suggests that there is no definitive answer, as there are several variables.

    Organizations needs to review what makes the best business sense for them based on several considerations and then decide where CLM belongs.

    • Business unit budgets and time management
    • Available Administration personnel and time
    • IT resources
    • Security and access concerns
    • Best fit based on organizational structure

    35% of law professionals feel contract management is a legal responsibility, while 45% feel it’s a business responsibility and a final 20% are unsure where it belongs. (Source: “10 Eye-Popping Contract Management Statistics,” Apttus, 2018)

    Additional Considerations 2 of 2

    What type of CLM software or platform should we use?

    This too is a difficult question to answer definitively. Again, there are several variables to consider. As well, several solutions are available, and this is not a one-size-fits-all scenario.

    As with who should own the CLM process, organizations must review the various CLM software solutions available that will meet their current and future needs and then ask, “What do we need the system to do?”

    • Do you build a “homegrown” solution?
    • Should it be an add-on module to the current ERP or CRM system?
    • Is on-premises more suitable?
    • Is an adequate off-the-shelf (OTS) solution available?
    • What about the many cloud offerings?
    • Is there a basic system to start with that can expand as you grow?

    Info-Tech Insight

    When considering what type of solution to choose, prioritize what needs to been done or improved. Sometimes solutions can be deployed in phases as an “add-on” type modules.

    Summary of Accomplishment

    Knowledge Gained

    • Documented current CLM process
    • Core operational framework to build a CLM process on
    • Understanding of best practices required for a sustainable CLM

    Processes Optimized

    • Internal RASCI process identified
    • Existing internal stage improvements
    • Internal review process for risk mitigation

    Deliverables Completed

    • Existing CLM Processes Worksheet
    • CLM Maturity Assessment
    • CLM RASCI Chart
    • CLM improvement plan

    Project Step Summary

    Client Project: CLM Assessment and Improvement Plan

    1. Set your goals – what do you want to achieve in your CLM project?
    2. Assess your organization’s current CLM position in relation to CLM best practices and stages.
    3. Map your organization’s RASCI structure for CLM.
    4. Identify opportunities for stage improvements or target all low stage assessments.
    5. Prioritize improvement processes.
    6. Track ROI metrics.
    7. Develop a CLM implementation or improvement plan.

    Info-Tech Insight

    This project can fit your organization’s schedule:

    • Do-it-yourself with your team.
    • Remote delivery (Info-Tech Guided Implementation).

    CLM Blueprint Summary and Conclusion

    • Contract management is a vital component of a responsible VMO that will benefit all business units in an organization, save time and money, and reduce risk exposure.
    • A basic well-deployed and well-managed CLM will provide ROI in the short term.
    • Setting an improvement plan with concise improvements and potential cost savings based on process improvements will help your business case for CLM get approval and leadership buy-in.
    • Educating and aligning all business units and stakeholders to any changes to CLM processes will ensure that cost savings and ROI are achieved.
    • When evaluating a CLM software solution, use the operational framework and the ten process stages in this blueprint as a reference guide for CLM vendor functionality and selection.

    Related Info-Tech Research

    Master Contract Review and Negotiation

    Optimize spend with significant cost savings and negotiate from a position of strength.

    Manage Your Vendors Before They Manage You

    Maximize the value of vendor relationships.

    Bibliography

    Burla, Daniel. “The Must Know Of Transition to Dynamics 365 on Premise.” Sherweb, 14 April 2017. Web.

    Anand, Vishal, “Strategic Considerations in Implementing an End-to-End Contract Lifecycle Management Solution.” DWF Mindcrest, 20 Aug. 2016. Web.

    Alspaugh, Zach. “10 Eye-Popping Contract Management Statistics from the General Counsel’s Technology Report.” Apttus, 23 Nov. 2018. Web.

    Bishop, Randy. “Contract Management is not just a cost center.” ContractSafe, 9 Sept. 2019. Web.

    Bryce, Ian. “Contract Management KPIs - Measuring What Matters.” Gatekeeper, 2 May 2019. Web.

    Busch, Jason. “Contract Lifecycle Management 101.” Determine. 4 Jan. 2018. Web.

    “Contract Management Software Buyer's Guide.” TechnologyAdvice, 5 Aug. 2019. Web.

    Dunne, Michael. “Analysts Predict that 2019 will be a Big Year for Contract Lifecycle Management.” Apttus, 19 Nov. 2018. Web.

    “FIS Case Study.” Apttus, n.d. Web.

    Gutwein, Katie. “3 Takeaways from the 2018 State of Contract Management Report.” SpringCM, 2018. Web.

    “IACCM 2019 Benchmark Report.” IAACM, 4 Sept. 2019. Web.

    Linsley, Rod. “How Proverbial Wisdom Can Help Improve Contract Risk Mitigation.” Gatekeeper, 2 Aug. 2019. Web.

    Mars, Scott. “Contract Management Data Extraction.” Exari, 20 June 2017. Web.

    Rodriquez, Elizabeth. “Global Contract Life-Cycle Management Market Statistics and Trends 2019.” Business Tech Hub, 17 June 2017. Web.

    “State of Contract Management Report.” SpringCM, 2018. Web.

    Teninbaum, Gabriel, and Arthur Raguette. “Realizing ROI from Contract Management Technology.” ACCDocket.com, 29 Jan. 2018. Web.

    Wagner, Thomas. “Strategic Report on Contract Life cycle Management Software Market with Top Key Players- IBM Emptoris, Icertis, SAP, Apttus, CLM Matrix, Oracle, Infor, Newgen Software, Zycus, Symfact, Contract Logix, Coupa Software.” Market Research, 21 June 2019. Web.

    “What is Your Contract Lifecycle Management (CLM) Persona?” Spend Matters, 19 Oct. 2017. Web.

    Build Resilience Against Ransomware Attacks

    • Buy Link or Shortcode: {j2store}317|cart{/j2store}
    • member rating overall impact: 9.5/10 Overall Impact
    • member rating average dollars saved: $68,467 Average $ Saved
    • member rating average days saved: 21 Average Days Saved
    • Parent Category Name: Threat Intelligence & Incident Response
    • Parent Category Link: /threat-intelligence-incident-response
    • Sophisticated ransomware attacks are on the rise and evolving quickly.
    • Executives want reassurance but are not ready to write a blank check. We need to provide targeted and justified improvements.
    • Emerging strains can exfiltrate sensitive data, encrypt systems, and destroy backups in hours, which makes recovery a grueling challenge.

    Our Advice

    Critical Insight

    • Malicious agents design progressive, disruptive attacks to pressure organizations to pay a ransom.
    • Organizations misunderstand ransomware risk scenarios, which obscures the likelihood and impact of an attack.
    • Conventional approaches focus on response and recovery, which do nothing to prevent an attack and are often ineffective against sophisticated attacks.

    Impact and Result

    • Conduct a thorough assessment of your current state; identify potential gaps and assess the possible outcomes of an attack.
    • Analyze attack vectors and prioritize controls that prevent ransomware attacks, and implement ransomware protections and detection to reduce your attack surface.
    • Visualize, plan, and practice your response and recovery to reduce the potential impact of an attack.

    Build Resilience Against Ransomware Attacks Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Build Resilience Against Ransomware Attacks

    Use this step-by-step guide to assess your ransomware readiness and implement controls that will improve your ability to prevent incursions and defend against attacks.

    • Build Resilience Against Ransomware Attacks – Phases 1-4

    2. Ransomware Resilience Assessment – Complete the ransomware resilience assessment and establish metrics.

    Use this assessment tool to assess existing protection, detection, response, and recovery capabilities and identify potential improvements.

    • Ransomware Resilience Assessment

    3. Threat Preparedness Workbook – Improve protection and detection capabilities.

    Use this threat preparedness workbook to evaluate the threats and tactics in the ransomware kill chain using the MITRE framework and device appropriate countermeasures.

    • Enterprise Threat Preparedness Workbook

    4. Tabletop Planning Exercise and Example Results – Improve response and recovery capabilities with a tabletop exercise for your internal IT team.

    Adapt this tabletop planning session template to plan and practice the response of your internal IT team to a ransomware scenario.

    • Tabletop Exercise – Internal (Ransomware Template)
    • Ransomware Tabletop Planning Results – Example (Visio)
    • Ransomware Tabletop Planning Results – Example (PDF)

    5. Ransomware Response Runbook and Workflow – Document ransomware response steps and key stakeholders.

    Adapt these workflow and runbook templates to coordinate the actions of different stakeholders through each stage of the ransomware incident response process.

    • Ransomware Response Runbook Template
    • Ransomware Response Workflow Template (Visio)
    • Ransomware Response Workflow Template (PDF)

    6. Extended Tabletop Exercise and Leadership Guide – Run a tabletop test to plan and practice the response of your leadership team.

    Adapt this tabletop planning session template to plan leadership contributions to the ransomware response workflow. This second tabletop planning session will focus on communication strategy, business continuity plan, and deciding whether the organization should pay a ransom.

    • Tabletop Exercise – Extended (Ransomware Template)
    • Leadership Guide for Extended Ransomware

    7. Ransomware Resilience Summary Presentation – Summarize status and next steps in an executive presentation.

    Summarize your current state and present a prioritized project roadmap to improve ransomware resilience over time.

    • Ransomware Resilience Summary Presentation

    Infographic

    Workshop: Build Resilience Against Ransomware Attacks

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Assess Ransomware Resilience

    The Purpose

    Set workshop goals, review ransomware trends and risk scenarios, and assess the organization’s resilience to ransomware attacks.

    Key Benefits Achieved

    Develop a solid understanding of the likelihood and impact of a ransomware attack on your organization.

    Complete a current state assessment of key security controls in a ransomware context.

    Activities

    1.1 Review incidents, challenges, and project drivers.

    1.2 Diagram critical systems and dependencies and build risk scenario.

    1.3 Assess ransomware resilience.

    Outputs

    Workshop goals

    Ransomware Risk Scenario

    Ransomware Resilience Assessment

    2 Protect and Detect

    The Purpose

    Improve your capacity to protect your organization from ransomware and detect attacks along common vectors.

    Key Benefits Achieved

    Identify targeted countermeasures that improve protection and detection capabilities.

    Activities

    2.1 Assess ransomware threat preparedness.

    2.2 Determine the impact of ransomware techniques on your environment.

    2.3 Identify countermeasures to improve protection and detection capabilities.

    Outputs

    Targeted ransomware countermeasures to improve protection and detection capabilities.

    Targeted ransomware countermeasures to improve protection and detection capabilities.

    Targeted ransomware countermeasures to improve protection and detection capabilities.

    3 Respond and Recover

    The Purpose

    · Improve your organization’s capacity to respond to ransomware attacks and recover effectively.

    Key Benefits Achieved

    Build response and recovery capabilities that reduce the potential business disruption of successful ransomware attacks.

    Activities

    3.1 Review the workflow and runbook templates.

    3.2 Update/define your threat escalation protocol.

    3.3 Define scenarios for a range of incidents.

    3.4 Run a tabletop planning exercise (IT).

    3.5 Update your ransomware response runbook.

    Outputs

    Security Incident Response Plan Assessment.

    Tabletop Planning Session (IT)

    Ransomware Workflow and Runbook.

    4 Improve Ransomware Resilience.

    The Purpose

    Identify prioritized initiatives to improve ransomware resilience.

    Key Benefits Achieved

    Identify the role of leadership in ransomware response and recovery.

    Communicate workshop outcomes and recommend initiatives to improve ransomware resilience.

    Activities

    4.1 Run a tabletop planning exercise (Leadership).

    4.2 Identify initiatives to close gaps and improve resilience.

    4.3 Review broader strategies to improve your overall security program.

    4.4 Prioritize initiatives based on factors such as effort, cost, and risk.

    4.5 Review the dashboard to fine tune your roadmap.

    4.6 Summarize status and next steps in an executive presentation.

    Outputs

    Tabletop Planning Session (Leadership)

    Ransomware Resilience Roadmap and Metrics

    Ransomware Workflow and Runbook

    Further reading

    Build Ransomware Resilience

    Prevent ransomware incursions and defend against ransomware attacks

    EXECUTIVE BRIEF

    Executive Summary

    Your Challenge

    Ransomware is a high-profile threat that demands immediate attention:

    • Sophisticated ransomware attacks are on the rise and evolving quickly.
    • Emerging strains can exfiltrate sensitive data, encrypt systems, and destroy backups in only a few hours, which makes recovery a grueling challenge.
    • Executives want reassurance but aren't ready to write a blank check. Improvements must be targeted and justified.

    Common Obstacles

    Ransomware is more complex than other security threats:

    • Malicious agents design progressive, disruptive attacks to pressure organizations to pay a ransom.
    • Organizations misunderstand ransomware risk scenarios, which obscures the likelihood and impact of an attack.
    • Conventional approaches focus on response and recovery, which do nothing to prevent an attack and are often ineffective against sophisticated attacks.

    Info-Tech's Approach

    To prevent a ransomware attack:

    • Conduct a through assessment of your current state, identify potential gaps, and assess the possible outcomes of an attack.
    • Analyze attack vectors and prioritize controls that prevent ransomware attacks, and implement ransomware protection and detection to reduce your attack surface.
    • Visualize, plan, and practice your response and recovery to reduce the potential impact of an attack.

    Info-Tech Insight

    Resilience is not a trampoline, where you're down one moment and up the next. It's more like climbing a mountain. It takes time, planning, and help from people around you to work through challenges. Focus on what is in your organization's control, and cultivate strengths that allow you to protect assets, detect incursions, respond effectively, and recovery quickly.

    Analyst Perspective

    Ransomware is an opportunity and a challenge.

    As I write, the frequency and impact of ransomware attacks continue to increase, with no end in sight. Most organizations will experience ransomware in the next 24 months, some more than once, and business leaders know it. You will never have a better chance to implement best practice security controls as you do now.

    The opportunity comes with important challenges. Hackers need to spend less time in discovery before they deploy an attack, which have become much more effective. You can't afford to rely solely on your ability to respond and recover. You need to build a resilient organization that can withstand a ransomware event and recover quickly.

    Resilient organizations are not impervious to attack, but they have tools to protect assets, detect incursions, and respond effectively. Resilience is not a trampoline, where you're down one moment and up the next. It's more like climbing a mountain. It takes time, planning, and help from people around you to overcome challenges and work through problems. But eventually you reach the top and look back at how far you've come.

    This is an image of Michael Hébert

    Michel Hébert
    Research Director, Security and Privacy
    Info-Tech Research Group

    Ransomware attacks are on the rise and evolving quickly.

    Three factors contribute to the threat:

    • The rise of ransomware-as-a-service, which facilitates attacks.
    • The rise of crypto-currency, which facilitates anonymous payment.
    • State sponsorship of cybercrime.

    Elementus maps ransomware payments made through bitcoin. Since 2019, victims made at least $2B in payments.

    A handful of criminal organizations, many of whom operate out of cybercrime hotbeds in Russia, are responsible for most of the damage. The numbers capture only the ransom paid, not the clean-up cost and economic fallout over attacks during this period.

    Total ransom money collected (2015 – 2021): USD 2,592,889,121

    This image contains a bubble plot graph showing the total ransom money collected between the years 2015 - 2021.

    The frequency and impact of ransomware attacks are increasing

    Emerging strains can exfiltrate sensitive data, encrypt systems and destroy backups in only a few hours, which makes recovery a grueling challenge.

    Sophos commissioned a vendor agnostic study of the real-world experience of 5,600 IT professionals in mid-sized organizations across 31 countries and 15 industries.

    The survey was conducted in Jan – Feb 2022 and asked about the experience of respondents over the previous year.

    66%
    Hit by ransomware in 2021
    (up from 37% in 2020)

    90%
    Ransomware attack affected their ability to operate

    $812,360 USD
    Average ransom payment

    $4.54M
    Average remediation cost (not including ransom)

    ONE MONTH
    Average recovery time

    Meanwhile, organizations continue to put their faith in ineffective ransomware defenses.

    Of the respondents whose organizations weren't hit by ransomware in 2021 and don't expect to be hit in the future, 72% cited either backups or cyberinsurance as reasons why they anticipated an attack.

    While these elements can help recover from an attack, they don't prevent it in the first place.

    Source: Sophos, State of Ransomware (2022)
    IBM, Cost of A Data Breach (2022)

    The 3-step ransomware attack playbook

    • Get in
    • Spread
    • Profit

    At each point of the playbook, malicious agents need to achieve something before they can move to the next step.

    Resilient organizations look for opportunities to:

    • Learn from incursions
    • Disrupt the playbook
    • Measure effectiveness

    Initial access

    Execution

    Privilege Escalation

    Credential Access

    Lateral Movement

    Collection

    Data Exfiltration

    Data encryption

    Deliver phishing email designed to avoid spam filter.

    Launch malware undetected.

    Identify user accounts.

    Target an admin account.

    Use brute force tactics to crack it.

    Move through the network and collect data.

    Infect as many critical systems and backups as possible to limit recovery options.

    Exfiltrate data to gain leverage.

    Encrypt data, which triggers alert.

    Deliver ransom note.

    Ransomware is more complex than other security threats

    Ransomware groups thrive through extortion tactics.

    • Traditionally, ransomware attacks focused on encrypting files as an incentive for organizations to pay up.
    • As organizations improved backup and recovery strategies, gangs began targeting, encrypting, and destroying back ups.
    • Since 2019, gangs have focused on a double-extortion strategy: exfiltrate sensitive or protected data before encrypting systems and threaten to publish them.

    Organizations misunderstand ransomware risk scenarios, which obscures the potential impact of an attack.

    Ransom is only a small part of the equation. Four process-related activities drive ransomware recovery costs:

    • Detection and Response – Activities that enable detection, containment, eradication and recovery.
    • Notification – Activities that enable reporting to data subjects, regulators, law enforcement, and third parties.
    • Lost Business – Activities that attempt to minimize the loss of customers, business disruption, and revenue.
    • Post Breach Response – Redress activities to victims and regulators, and the implementation of additional controls.

    Source: IBM, Cost of a Data Breach (2022)

    Disrupt the attack each stage of the attack workflow.

    An effective response with strong, available backups will reduce the operational impact of an attack, but it won't spare you from its reputational and regulatory impact.

    Put controls in place to disrupt each stage of the attack workflow to protect the organization from intrusion, enhance detection, respond quickly, and recover effectively.

    Shortening dwell time requires better protection and detection

    Ransomware dwell times and average encryption rates are improving dramatically.

    Hackers spend less time in your network before they attack, and their attacks are much more effective.

    Avg dwell time
    3-5 Days

    Avg encryption rate
    70 GB/h

    Avg detection time
    11 Days

    What is dwell time and why does it matter?

    Dwell time is the time between when a malicious agent gains access to your environment and when they are detected. In a ransomware attack, most organizations don't detect malicious agents until they deploy ransomware, encrypt their files, and lock them out until they pay the ransom.

    Effective time is a measure of the effectiveness of the encryption algorithm. Encryption rates vary by ransomware family. Lockbit has the fastest encryption rate, clocking in at 628 GB/h.

    Dwell times are dropping, and encryption rates are increasing.

    It's more critical than ever to build ransomware resilience. Most organizations do not detect ransomware incursions in time to prevent serious business disruption.

    References: Bleeping Computers (2022), VentureBeat, Dark Reading, ZDNet.

    Resilience depends in part on response and recovery capabilities

    This blueprint will focus on improving your ransomware resilience to:

    • Protect against ransomware.
    • Detect incursions.
    • Respond and recovery effectively.

    Response

    Recovery

    This image depicts the pathway for response and recovery from a ransomware event.

    For in-depth assistance with disaster recovery planning, refer to Info-Tech's Create a Right-Sized Disaster Recovery.

    Info-Tech's ransomware resilience framework

    Disrupt the playbooks of ransomware gangs. Put controls in place to protect, detect, respond and recover effectively.

    Prioritize protection

    Put controls in place to harden your environment, train savvy end users, and prevent incursions.

    Support recovery

    Build and test a backup strategy that meets business requirements to accelerate recovery and minimize disruption.

    Protect Detect Respond

    Recover

    Threat preparedness

    Review ransomware threat techniques and prioritize detective and mitigation measures for initial and credential access, privilege escalation, and data exfiltration.

    Awareness and training

    Develop security awareness content and provide cybersecurity and resilience training to employees, contractors and third parties.

    Perimeter security

    Identify and implement network security solutions including analytics, network and email traffic monitoring, and intrusion detection and prevention.

    Respond and recover

    Identify disruption scenarios and develop incident response, business continuity, and disaster recovery strategies.

    Access management

    Review the user access management program, policies and procedures to ensure they are ransomware-ready.

    Vulnerability management

    Develop proactive vulnerability and patch management programs that mitigate ransomware techniques and tactics.

    This image contains the thought map for Info-Tech's Blueprint: Build Resilience Against Ransomware Attacks.

    Info-Tech's ransomware resilience methodology

    Assess resilience Protect and detect Respond and recover Improve resilience
    Phase steps
    1. Build ransomware risk scenario
    2. Conduct resilience assessment
    1. Assess attack vectors
    2. Identify countermeasures
    1. Review Security Incident Management Plan
    2. Run Tabletop Test (IT)
    3. Document Workflow and Runbook
    1. Run Tabletop Test (Leadership)
    2. Prioritize Resilience Initiatives
    Phase outcomes
    • Ransomware Resilience Assessment
    • Risk Scenario
    • Targeted ransomware countermeasures to improve protection and detection capabilities
    • Security Incident Response Plan Assessment
    • Tabletop Test (IT)
    • Ransomware Workflow and Runbook
    • Tabletop Test (Leadership)
    • Ransomware Resilience Roadmap & Metrics

    Insight Summary

    Shift to a ransomware resilience model

    Resilience is not a trampoline, where you're down one moment and up the next. It's more like climbing a mountain. It takes time, planning, and help from people around you to work through challenges.

    Focus on what is in your organization's control, and cultivate strengths that allow you to protect assets, detect incursions, and respond and recover quickly

    Visualize challenges

    Build risk scenarios that describe how a ransomware attack would impact organizational goals.

    Understand possible outcomes to motivate initiatives, protect your organization, plan your response, and practice recovery.

    Prioritize protection

    Dwell times and effective times are dropping dramatically. Malicious agents spend less time in your network before they deploy an attack, and their attacks are much more effective. You can't afford to rely on your ability to respond and recover alone.

    Seize the moment

    The frequency and impact of ransomware attacks continue to increase, and business leaders know it. You will never have a better chance to implement best practice security controls than you do now.

    Measure ransomware resilience

    The anatomy of ransomware attack is relatively simple: malicious agents get in, spread, and profit. Deploy ransomware protection metrics to measure ransomware resilience at each stage.

    Key deliverable

    Ransomware resilience roadmap

    The resilience roadmap captures the key insights your work will generate, including:

    • An assessment of your current state and a list of initiatives you need to improve your ransomware resilience.
    • The lessons learned from building and testing the ransomware response workflow and runbook.
    • The controls you need to implement to measure and improve your ransomware resilience over time.

    Project deliverables

    Info-Tech supports project and workshop activities with deliverables to help you accomplish your goals and accelerate your success.

    Ransomware Resilience Assessment

    Measure ransomware resilience, identify gaps, and draft initiatives.

    Enterprise Threat Preparedness Workbook

    Analyze common ransomware techniques and develop countermeasures.

    Ransomware Response Workflow & Runbook

    Capture key process steps for ransomware response and recovery.

    Ransomware Tabletop Tests

    Run tabletops for your IT team and your leadership team to gather lessons learned.

    Ransomware Resilience Roadmap

    Capture project insights and measure resilience over time.

    Plan now or pay later

    Organizations worldwide spent on average USD 4.62M in 2021 to rectify a ransomware attack. These costs include escalation, notification, lost business and response costs, but did not include the cost of the ransom. Malicious ransomware attacks that destroyed data in destructive wiper-style attacks cost an average of USD 4.69M.

    Building better now is less expensive than incurring the same costs in addition to the clean-up and regulatory and business disruption costs associated with successful ransomware attacks.

    After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research and advisory services helped them achieve.

    Source: IBM, Cost of a Data Breach (2022)

    See what members have to say about the ransomware resilience blueprint:

    • Overall Impact: 9.8 / 10
    • Average $ Saved: $98,796
    • Average Days Saved: 17

    "Our advisor was well-versed and very polished. While the blueprint alone was a good tool to give us direction, his guidance made it significantly faster and easier to accomplish than if we had tried to tackle it on our own."

    CIO, Global Manufacturing Organization

    Blueprint benefits

    IT benefits

    Business benefits

    • Provide a structured approach for your organization to identify gaps, quantify the risk, and communicate status to drive executive buy-in.
    • Create a practical ransomware incident response plan that combines a high-level workflow with a detailed runbook to coordinate response and recovery.
    • Present an executive-friendly project roadmap with resilience metrics that summarizes your plan to address gaps and improve your security posture.
    • Enable leadership to make risk-based, informed decisions on resourcing and investments to improve ransomware readiness.
    • Quantify the potential impact of a ransomware attack on your organization to drive risk awareness.
    • Identify existing gaps so they can be addressed, whether by policy, response plans, technology, or a combination of these.

    Info-Tech offers various levels of support to best suit your needs

    DIY Toolkit

    "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

    Guided Implementation

    "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

    Workshop

    "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

    Consulting

    "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

    Diagnostics and consistent frameworks used throughout all four options

    Executive brief case study

    SOURCE: Interview with CIO of large enterprise

    Organizations who "build back better" after a ransomware attack often wish they had used relevant controls sooner.

    Challenge

    In February 2020, a large organization found a ransomware note on an admin's workstation. They had downloaded a local copy of the organization's identity management database for testing and left a port open on their workstation. Hackers exfiltrated it and encrypted the data on the workstation. They demanded a ransom payment to decrypt the data.

    Complication

    Because private information was breached, the organization informed the state-level regulator. With 250,000 accounts affected, plans were made to require password changes en masse. A public announcement was made two days after the breach to ensure that everyone affected could be reached.

    The organization decided not to pay the ransom because it had a copy on an unaffected server.

    Resolution

    The organization was praised for its timely and transparent response.

    The breach motivated the organization to put more protections in place, including:

    • The implementation of a deny-by-default network.
    • The elimination of remote desktop protocol and secure shell.
    • IT mandating MFA.
    • New endpoint-detection and response systems.

    Executive brief case study

    SOURCE: Info-Tech Workshop Results
    iNDUSTRY: Government

    Regional government runs an Info-Tech workshop to fast-track its ransomware incident response planning

    The organization was in the middle of developing its security program, rolling out security awareness training for end users, and investing in security solutions to protect the environment and detect incursions. Still, the staff knew they still had holes to fill. They had not yet fully configured and deployed security solutions, key security policies were missing, and they had didn't have a documented ransomware incident response plan.

    Workshop results

    Info-Tech advisors helped the organization conduct a systematic review of existing processes, policies, and technology, with an eye to identify key gaps in the organization's ransomware readiness. The impact analysis quantified the potential impact of a ransomware attack on critical systems to improve the organizational awareness ransomware risks and improve buy-in for investment in the security program.

    Info-Tech's tabletop planning exercise provided a foundation for the organization's actual response plan. The organization used the results to build a ransomware response workflow and the framework for a more detailed runbook. The workshop also helped staff identifies ways to improve the backup strategy and bridge further gaps in their ability to recover.

    The net result was a current-state response plan, appropriate capability targets aligned with business requirements, and a project roadmap to achieve the organization's desired state of ransomware readiness.

    Guided implementation

    What kind of analyst experiences do clients have when working through this blueprint?

    Scoping Call Phase 1 Phase 2 Phase 3 Phase 4

    Call #1:

    Discuss context, identify challenges, and scope project requirements.

    Identify ransomware resilience metrics.

    Call #2:

    Build ransomware risk scenario.

    Call #4:

    Review common ransomware attack vectors.

    Identify and assess mitigation controls.

    Call #5:

    Document ransomware workflow and runbook.

    Call #7:

    Run tabletop test with leadership.

    Call #3:

    Assess ransomware resilience.

    Call #6:

    Run tabletop test with IT.

    Call #8:

    Build ransomware roadmap.

    Measure ransomware resilience metrics.

    A guided implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

    A typical GI is 6 to 8 calls over the course of 4 to 6 months.

    Workshop overview

    Contact your account representative for more information.
    workshops@infotech.com 1-888-670-8889

    Day 1 Day 2 Day 3 Day 4 Day 5
    Activities

    Assess ransomware resilience

    Protect and detect

    Respond and recover

    Improve ransomware resilience

    Wrap-up (offsite and offline)

    1.1 1 Review incidents, challenges, and project drivers.

    1.1.2 Diagram critical systems and dependencies.

    1.1.3 Build ransomware risk scenario.

    2.1 1. Assess ransomware threat preparedness.

    2.2 2. Determine the impact of ransomware techniques on your environment.

    2.3 3. Identify countermeasures to improve protection and detection capabilities.

    3.1.1 Review the workflow and runbook templates.

    3.1.2 Update/define your threat escalation protocol.

    3.2.1 Define scenarios for a range of incidents.

    3.2.2 Run a tabletop planning exercise (IT).

    3.3.1 Update your ransomware response workflow.

    4.1.1 Run a tabletop planning exercise (leadership).

    4.1.2 Identify initiatives to close gaps and improve resilience.

    4.1.3 Review broader strategies to improve your overall security program.

    4.2.1 Prioritize initiatives based on factors such as effort, cost, and risk.

    4.2.2 Review the dashboard to fine tune your roadmap.

    4.3.1 Summarize status and next steps in an executive presentation.

    5.1 Complete in-progress deliverables from previous four days.

    5.2 Set up review time for workshop deliverables and to discuss next steps.

    5.3 Revisit ransomware resilience metrics in three months.

    Deliverables
    1. Workshop goals
    2. Ransomware Risk Scenario
    3. Ransomware Resilience Assessment
    1. Targeted ransomware countermeasures to improve protection and detection capabilities.
    1. Security Incident Response Plan Assessment
    2. Tabletop Planning Session (IT)
    3. Ransomware Workflow and Runbook
    1. Tabletop Planning Session (Leadership)
    2. Ransomware Resilience Roadmap and Metrics
    3. Ransomware Summary Presentation
    1. Completed Ransomware Resilience Roadmap
    2. Ransomware Resilience Assessment
    3. Ransomware Resilience Summary Presentation

    Phase 1

    Assess ransomware resilience

    Phase 1 Phase 2 Phase 3 Phase 4

    1.1 Build ransomware risk scenario

    1.2 Conduct resilience assessment

    2.1 Assess attack vectors

    2.2 Identify countermeasures

    3.1 Review Security Incident Management Plan

    3.2 Run Tabletop Test (IT)

    3.3 Document Workflow and Runbook

    4.1 Run Tabletop Test (Leadership)

    4.2 Prioritize resilience initiatives

    4.3 Measure resilience metrics

    This phase will walk you through the following activities:

    • Conducting a maturity assessment.
    • Reviewing selected systems and dependencies.
    • Assessing a ransomware risk scenario.

    This phase involves the following participants:

    • Security Incident Response Team (SIRT)
    • System subject-matter experts (SMEs)

    Build Ransomware Resilience

    Step 1.1

    Build ransomware risk scenario

    Activities

    1.1.1 Review incidents, challenges and project drivers

    1.1.2 Diagram critical systems and dependencies

    1.1.3 Build ransomware risk scenario

    Assess ransomware resilience

    This step will guide you through the following activities:

    • Reviewing incidents, challenges, and drivers.
    • Diagraming critical systems and dependencies.
    • Building a ransomware risk scenario.

    This step involves the following participants:

    • Security Incident Response Team (SIRT)
    • Subject-Matter Experts

    Outcomes of this step

    • Establish a repeatable process to evaluate and improve ransomware readiness across your environment.
    • Build a ransomware risk scenario to assess the likelihood and impact of an attack.

    1.1.1 Review incidents, challenges, and project drivers

    1 hour

    Brainstorm the challenges you need to address in the project. Avoid producing solutions at this stage, but certainly record suggestions for later. Use the categories below to get the brainstorming session started.

    Past incidents and other drivers

    • Past incidents (be specific):
      • Past security incidents (ransomware and other)
      • Close calls (e.g. partial breach detected before damage done)
    • Audit findings
    • Events in the news
    • Other?

    Security challenges

    • Absent or weak policies
    • Lack of security awareness
    • Budget limitations
    • Other?

    Input

    • Understanding of existing security capability and past incidents.

    Output

    • Documentation of past incidents and challenges.
    • Level-setting across the team regarding challenges and drivers.

    Materials

    • Whiteboard or flip chart (or a shared screen if staff are remote)

    Participants

    • Security Incident Response Team (SIRT)

    1.1.2 Diagram critical systems and dependencies (1)

    1 hour

    Brainstorm critical systems and their dependencies to build a ransomware risk scenario. The scenario will help you socialize ransomware risks with key stakeholders and discuss the importance of ransomware resilience.

    Focus on a few key critical systems.

    1. On a whiteboard or flip chart paper, make a list of systems to potentially include in scope. Consider:
      1. Key applications that support critical business operations.
      2. Databases that support multiple key applications.
      3. Systems that hold sensitive data (e.g. data with personally identifiable information [PII]).
    2. Select five to ten systems from the list.
      1. Select systems that support different business operations to provide a broader sampling of potential impacts and recovery challenges.
      2. Include one or two non-critical systems to show how the methodology addresses a range of criticality and context.

    Input

    • High-level understanding of critical business operations and data sets.

    Output

    • Clarify context, dependencies, and security and recovery challenges for some critical systems.

    Materials

    • Whiteboard or flip chart (or a shared screen if staff are remote)

    Participants

    • Security Incident Response Team (SIRT)
    • System SMEs (if not covered by SIRT members)

    1.1.2 Diagram critical systems and dependencies (2)

    1 hour

    1. A high-level topology or architectural diagram is an effective way to identify dependencies and communicate risks to stakeholders.

    Start with a WAN diagram, then your production data center, and then each critical
    system. Use the next three slides as your guide.

    Notes:

    • If you have existing diagrams, you can review those instead. However, if they are too detailed, draw a higher-level diagram to provide context. Even a rough sketch is a useful reference tool for participants.
    • Keep the drawings tidy and high level. Visualize the final diagram before you start to draw on the whiteboard to help with spacing and placement.
    • Collaborate with relevant SMEs to identify dependencies.

    Input

    • High-level understanding of critical business operations and data sets.

    Output

    • Clarify context, dependencies, and security and recovery challenges for some critical systems.

    Materials

    • Whiteboard or flip chart (or a shared screen if staff are remote)

    Participants

    • Security Incident Response Team (SIRT)
    • System SMEs (if not covered by SIRT members)

    For your WAN diagram, focus on data center and business locations

    Start with a high-level network diagram like this one, and then dig deeper (see following slides) to provide more context. Below is an example; of course, your sketched diagrams may be rougher.

    This image contains a nexample of a High level Network Diagram.

    Diagram your production data center to provide context for the systems in scope

    Creating a high-level diagram provides context across different IT disciplines involved in creating your DRP. If you have multiple production data centers, focus on the data center(s) relevant to the selected systems. Below is an example.

    This image contains a nexample of a high level diagram which focuses on the data centers relevent to the selected system.

    Diagram each selected system to identify specific dependencies and redundancies

    Diagram the "ecosystem" for each system, identifying server, storage, and network dependencies. There may be overlap with the production data center diagram – but aim to be specific here. Below is an example that illustrates front-end and back-end components.

    When you get to this level of detail, use this opportunity to level-set with the team. Consider the following:

    • Existing security (Are these systems protected by your existing security monitoring and threat detection tools?).
    • Security challenges (e.g. public-facing systems).
    • Recovery challenges (e.g. limited or infrequent backups).
    This is an example of a diagram of a system ecosystem.

    Note the limitations of your security, backup, and DR solutions

    Use the diagrams to assess limitations. Gaps you identify here will often apply to other aspects of your environment.

    1. Security limitations
    • Are there any known security vulnerabilities or risks, such as external access (e.g. for a customer portal)? If so, are those risks mitigated? Are existing security solutions being fully used?
  • Backup limitations
    • What steps are taken to ensure the integrity of your backups (e.g. through inline or post-backup scanning, or the use of immutable backups)? Are there multiple restore points to provide more granularity when determining how far back you need to go for a clean backup?
  • Disaster recovery limitations
    • Does your DR solution account for ransomware attacks or is it designed only for one-way failover (i.e. for a smoking hole scenario)?
  • We will review the gaps we identify through the project in phase 4.

    For now, make a note of these gaps and continue with the next step.

    Draft risk scenarios to illustrate ransomware risk

    Risk scenarios help decision-makers understand how adverse events affect business goals.

    • Risk-scenario building is the process of identifying the critical factors that contribute to an adverse event and crafting a narrative that describes the circumstances and consequences if it were to happen.
    • Risk scenarios set up the risk analysis stage of the risk assessment process. They are narratives that describe in detail:
      • The asset at risk.
      • The threat that can act against the asset.
      • Their intent or motivation.
      • The circumstances and threat actor model associated with the threat event.
      • The potential effect on the organization.
      • When or how often the event might occur.

    Risk scenarios are further distilled into a single sentence or risk statement that communicates the essential elements from the scenario.

    Risk identification → Risk scenario → Risk statement

    Well-crafted risk scenarios have four components

    The slides walk through how to build a ransomware risk scenario

    THREAT Exploits an ASSET Using a METHOD Creating an EFFECT.

    An actor capable of harming an asset

    Anything of value that can be affected and results in loss

    Technique an actor uses to affect an asset

    How loss materializes

    Examples: Malicious or untrained employees, cybercriminal groups, malicious state actors

    Examples: Systems, regulated data, intellectual property, people

    Examples: Credential compromise, privilege escalation, data exfiltration

    Examples: Loss of data confidentiality, integrity, or availability; impact on staff health and safety

    Risk scenarios are concise, four to six sentence narratives that describe the core elements of forecasted adverse events.

    Use them to engage stakeholders with the right questions and guide them to make informed decisions about how to address ransomware risks.

    1.1.3 Build ransomware risk scenario (1)

    2 hours

    In a ransomware risk scenario, the threat, their motivations, and their methods are known. Malicious agents are motivated to compromise critical systems, sabotage recovery, and exfiltrate data for financial gain.

    The purpose of building the risk scenario is to highlight the assets at risk and the potential effect of a ransomware attack.

    As a group, consider critical or mission-essential systems identified in step 1.1.2. On a whiteboard, brainstorm the potential adverse effect of a loss of system availability, confidentiality or integrity.

    Consider the impact on:

    • Information systems.
    • Sensitive or regulated data.
    • Staff health and safety.
    • Critical operations and objectives.
    • Organizational finances.
    • Reputation and brand loyalty.

    Input

    • Understanding of critical systems and dependencies.

    Output

    • Ransomware risk scenario to engage guide stakeholders to make informed decisions about addressing risks.

    Materials

    • Whiteboard or flip chart (or a shared screen if staff are remote)

    Participants

    • Security Incident Response Team (SIRT)

    1.1.3 Build ransomware risk scenario (2)

    2 hours

    1. On a whiteboard, brainstorm how threat agents will exploit vulnerabilities in critical assets to reach their goal. Redefine attack vectors to capture what could result from a successful initial attack.
    2. Bring together the critical risk elements into a single risk scenario.
    3. Distill the risk scenario into a single risk statement that captures the threat, the asset it will exploit, the method it will use, and the impact it will have on the organization.
    4. You can find a sample risk scenario and risk statement on the next slide.

    THREAT Exploits an ASSET Using a METHOD Creating an EFFECT.

    Inputs for risk scenario identification

    Risk analysis

    Critical assets

    ERP, CRM, FMS, LMS

    Operational technology

    Sensitive or regulated data

    Threat agents

    Cybercriminals

    Methods

    Compromise end user devices through social engineering attacks,. Compromise networks through external exposures and software vulnerabilities.

    Identify and crack administrative account. Escalate privileges. Move laterally.

    Collect data, destroy backups, exfiltrate data for leverage, encrypt systems,.

    Threaten to publish exfiltrated data and demand ransom.

    Adverse effect

    Serious business disruption

    Financial damage

    Reputational damage

    Potential litigation

    Average downtime: 30 Days

    Average clean-up costs: USD 1.4M

    Sample ransomware risk scenario

    Likelihood: Medium
    Impact: High

    Risk scenario

    Cyber-criminals penetrate the network, exfiltrate critical or sensitive data, encrypt critical systems, and demand a ransom to restore access.

    They threaten to publish sensitive data online to pressure the organization to pay the ransom, and reach out to partners, staff, and students directly to increase the pressure on the organization.

    Network access likely occurs through a phishing attack, credential compromise, or remote desktop protocol session.

    Risk statement

    Cybercriminals penetrate the network, compromise backups, exfiltrate and encrypt data, and disrupt computer systems for financial gain.

    Threat Actor:

    • Cybercriminals

    Assets:

    • Critical systems (ERP, FMS, CRM, LMS)
    • HRIS and payroll
    • Data warehouse
    • Office 365 ecosystem (email, Teams)

    Effect:

    • Loss of system availability
    • Lost of data confidentiality

    Methods:

    • Phishing
    • Credential compromise
    • Compromised remote desktop protocol
    • Privilege escalation
    • Lateral movement
    • Data collection
    • Data exfiltration
    • Data encryption

    Step 1.2

    Conduct resilience assessment

    Activities

    1.2.1 Complete resilience assessment

    1.2.2 Establish resilience metrics

    This step will guide you through the following activities :

    • Completing a ransomware resilience assessment
    • Establishing baseline metrics to measure ransomware resilience.

    This step involves the following participants:

    • Security Incident Response Team (SIRT)
    • Subject-matter experts

    .Outcomes of this step

    • Current maturity, targets, and initial gap analysis

    Maturity levels in this blueprint draw on the CMMI framework

    The maturity levels are based on the Capability Maturity Model Integration framework. We outline our modifications below.

    CMMI Maturity Level – Default Descriptions:

    CMMI Maturity Level – Modified for This Assessment:

    • Level 1 – Initial: Unpredictable and reactive. Work gets completed but is often delayed and over budget.
    • Level 2 – Managed: Managed on the project level. Projects are planned, performed, measured, and controlled.
    • Level 3 – Defined: Proactive rather than reactive. Organization-wide standards provide guidance across projects, programs, and portfolios.
    • Level 4 – Quantitatively managed: Measured and controlled. Organization is data-driven, with quantitative performance improvement objectives that are predictable and align to meet the needs of internal and external stakeholders.
    • Level 5 – Optimizing: Stable and flexible. Organization is focused on continuous improvement and is built to pivot and respond to opportunity and change. The organization's stability provides a platform for agility and innovation.
    • Level 1 – Initial/ad hoc: Not well defined and ad hoc in nature.
    • Level 2 – Developing: Established but inconsistent and incomplete.
    • Level 3 – Defined: Formally established, documented, and repeatable.
    • Level 4 – Managed and measurable: Managed using qualitative and quantitative data to ensure alignment with business requirements.
    • Level 5 – Optimizing: Qualitative and quantitative data is used to continually improve.

    (Source: CMMI Institute, CMMI Levels of Capability and Performance)

    Info-Tech's ransomware resilience framework

    Disrupt the playbooks of ransomware gangs. Put controls in place to protect, detect, respond and recover effectively.

    Prioritize protection

    Put controls in place to harden your environment, train savvy end users, and prevent incursions.

    Support recovery

    Build and test a backup strategy that meets business requirements to accelerate recovery and minimize disruption.

    Protect Detect Respond

    Recover

    Threat preparedness

    Review ransomware threat techniques and prioritize detective and mitigation measures for initial and credential access, privilege escalation, and data exfiltration.

    Awareness and training

    Develop security awareness content and provide cybersecurity and resilience training to employees, contractors and third parties.

    Perimeter security

    Identify and implement network security solutions including analytics, network and email traffic monitoring, and intrusion detection and prevention.

    Respond and recover

    Identify disruption scenarios and develop incident response, business continuity, and disaster recovery strategies.

    Access management

    Review the user access management program, policies and procedures to ensure they are ransomware-ready.

    Vulnerability management

    Develop proactive vulnerability and patch management programs that mitigate ransomware techniques and tactics.

    1.2.1 Complete the resilience assessment

    2-3 hours

    Use the Ransomware Resilience Assessment Tool to assess maturity of existing controls, establish a target state, and identify an initial set of initiatives to improve ransomware resilience.

    Keep the assessment tool on hand to add gap closure initiatives as you proceed through the project.

    Download the Ransomware Resilience Assessment

    Outcomes:

    • Capture baseline resilience metrics to measure progress over time.
      • Low scores are common. Use them to make the case for security investment.
      • Clarify the breadth of security controls.
      • Security controls intersect with a number of key processes and technologies, each of which are critical to ransomware resilience.
    • Key gaps identified.
      • Allocate more time to subsections with lower scores.
      • Repeat the scorecard at least annually to clarify remaining areas to address.

    Input

    • Understanding of current security controls

    Output

    • Current maturity, targets, and gaps

    Materials

    • Ransomware Resilience Assessment Tool

    Participants

    • Security Incident Response Team (SIRT)

    This is an image of the Ransomeware Resilience Assessment Table from Info-Tech's Ransomware Resilience Assessment Blueprint.

    1.2.2 Establish resilience metrics

    Ransomware resilience metrics track your ability to disrupt a ransomware attack at each stage of its workflow.

    Measure metrics at the start of the project to establish a baseline, as the project nears completion to measure progress.

    Attack workflow Process Metric Target trend Current Goal
    GET IN Vulnerability Management % Critical patches applied Higher is better
    Vulnerability Management # of external exposures Fewer is better
    Security Awareness Training % of users tested for phishing Higher is better
    SPREAD Identity and Access Management Adm accounts / 1000 users Lower is better
    Identity and Access Management % of users enrolled for MFA Higher is better
    Security Incident Management Avg time to detect Lower is better
    PROFIT Security Incident Management Avg time to resolve Lower is better
    Backup and Disaster Recovery % critical assets with recovery test Higher is better
    Backup and Disaster Recovery % backup to immutable storage Higher is better

    Phase 2

    Improve protection and detection capabilities

    Phase 1Phase 2Phase 3Phase 4

    1.1 Build ransomware risk scenario

    1.2 Conduct resilience assessment

    2.1 Assess attack vectors

    2.2 Identify countermeasures

    3.1 Review Security Incident Management Plan

    3.2 Run Tabletop Test (IT)

    3.3 Document Workflow and Runbook

    4.1 Run Tabletop Test (Leadership)

    4.2 Prioritize resilience initiatives

    4.3 Measure resilience metrics

    This phase will walk you through the following activities:

    • Assessing common ransomware attack vectors.
    • Identifying countermeasures to improve protection and detection capabilities.

    This phase involves the following participants:

    • Security Incident Response Team (SIRT)
    • System subject-matter experts (SMEs)

    Build Ransomware Resilience

    Step 2.1

    Assess attack vectors

    Activities

    2.1.1 Assess ransomware threat preparedness

    2.1.2 Determine the impact of ransomware techniques on your environment

    This step involves the following activities:

    • Assessing ransomware threat preparedness.
    • Configuring the threat preparedness tool.

    This step involves the following participants:

    • Security Incident Response Team (SIRT)
    • System subject-matter experts (SMEs)

    Outcomes of this step

    Assess risks associated with common ransomware attack vectors.

    Improve protection and detection capabilities

    Use the MITRE attack framework to prepare

    This phase draws on MITRE to improve ransomware protection and detection capabilities

    • The activities in this phase provide guidance on how to use the MITRE attack framework to protect your organizations against common ransomware techniques and tactics, and detect incursions.
    • You will:
      • Review common ransomware tactics and techniques.
      • Assess their impact on your environment.
      • Identify relevant countermeasures.
    • The Enterprise Threat Preparedness Workbook included with the project blueprint will be set up to deal with common ransomware threats and tactics.

    Download the Enterprise Threat Preparedness Workbook

    Review ransomware tactics and techniques

    Ransomware attack workflow

    Deliver phishing email designed to avoid spam filter.

    Launch malware undetected.

    Identify user accounts.

    Target an admin account.

    Use brute force tactics to crack it.

    Move through the network. Collect data.

    Infect critical systems and backups to limit recovery options.

    Exfiltrate data to gain leverage.

    Encrypt data, which triggers alert.

    Deliver ransom note.

    Associated MITRE tactics and techniques

    • Initial access
    • Execution
    • Privilege escalation
    • Credential access
    • Lateral movement
    • Collection
    • Data Exfiltration
    • Data encryption

    Most common ransomware attack vectors

    • Phishing and social engineering
    • Exploitation of software vulnerabilities
    • Unsecured external exposures
      • e.g. remote desktop protocols
    • Malware infections
      • Email attachments
      • Web pages
      • Pop-ups
      • Removable media

    2.1.1 Assess ransomware threat preparedness

    Estimated Time: 1-4 hours

    1. Read through the instructions in the Enterprise Threat Preparedness Workbook.
    2. Select ransomware attack tactics to analyze. Use the workbook to understand:
      1. Risks associated with each attack vector.
      2. Existing controls that can help you protect the organization and detect an incursion.
    3. This initial analysis is meant to help you understand your risk before you apply additional controls.

    Once you're comfortable, follow the instructions on the following pages to configure the MITRE ransomware analysis and identify how to improve your protection and detection capabilities.

    Download the Enterprise Threat Preparedness Workbook

    Input

    • Knowledge about existing infrastructure.
    • Security protocols.
    • Information about ransomware attack tactics, techniques, and mitigation protocols.

    Output

    • Structured understanding of the risks facing the enterprise based on your current preparedness and security protocols.
    • Protective and detective measures to improve ransomware resilience.

    Materials

    • Enterprise Threat Preparedness Workbook

    Participants

    • Security Incident Response Team (SIRT)
    • System subject-matter experts (SMEs)

    2.1.2 Determine the impact of techniques

    Estimated Time: 1-4 hours

    1. The Enterprise Threat Preparedness Workbook included with the project blueprint is set up to deal with common ransomware use cases.

    If you would like to change the set-up, go through the following steps.

    • Review the enterprise matrix. Select the right level of granularity for your analysis. If you are new to threat preparedness exercises, the Technique Level is a good starting point.
    • As you move through each tactic, align each sheet to your chosen technique domain to ensure the granularity of your analysis is consistent.
    • Read the tactics sheet from left to right. Determine the impact of the technique on your environment. For each control, indicate current mitigation levels using the dropdown list.

    The following slides walk you through the process with screenshots from the workbook.

    Download the Enterprise Threat Preparedness Workbook

    Input

    • Knowledge about existing infrastructure.
    • Security protocols.
    • Information about ransomware attack tactics, techniques, and mitigation protocols.

    Output

    • Structured understanding of the risks facing the enterprise based on your current preparedness and security protocols.
    • Protective and detective measures to improve ransomware resilience.

    Materials

    • Enterprise Threat Preparedness Workbook

    Participants

    • Security Incident Response Team (SIRT)
    • System subject-matter experts (SMEs)

    Select the domain for the analysis

    • The Tactics Dashboard is a live feed of your overall preparedness for the potential attack vectors that your organization may face. These 14 tactics correspond to the Enterprise Matrix used by the MITRE ATT&CK® framework.
    • The technique domain on the right side of the sheet is split in two main groups:
    • The Technique Level
      • - High-level techniques that an attacker may use to gain entry to your network.
      • - The Technique Level is a great starting point if you are new to threat preparedness.
    • The Sub-Technique Level
      • - Individual sub-techniques found throughout the MITRE ATT&CK® Framework.
      • - More mature organizations will find the Sub-Technique Level generates a deeper and more precise understanding of their current preparedness.

    Info-Tech Insight

    Dwell times and effective times are dropping dramatically. Malicious agents spend less time in your network before they deploy an attack, and their attacks are much more effective. You can't afford to rely on your ability to respond and recover alone.

    This is the first screenshot from Info-Tech's Tactic Preparedness Assessment Dashboard.

    Keep an eye on the enterprise matrix

    As you fill out the Tactic tabs with your evaluation, the overall reading will display the average of your overall preparedness for that tactic.

    Choosing the Technique Domain level will increase the accuracy of the reporting at the cost of speed.

    The Technique level is faster but provides less specifics for each control and analyzes them as a group.

    The Sub-Technique level is much more granular, but each tactic and technique has several sub-techniques that you will need to account for.

    Check with the dashboard to see the associated risk level for each of the tactics based on the legend. Tactics that appear white have not yet been assessed or are rated as "N/A" (not applicable).

    This is the second screenshot from Info-Tech's Tactic Preparedness Assessment Dashboard.

    When you select your Technique Domain, you cannot change it again. Changing the domain mid-analysis will introduce inaccuracies in your security preparedness.

    Configure the tactics tabs

    • Each tactic has a corresponding tab at the bottom of the Excel workbook.
      Adjusting the Technique Domain level will change the number of controls shown.
    • Next, align the sheet to the domain you selected on Tab 2 before you continue. As shown in the example to the right,
      • Select "1" for Technique Level.
      • Select "2" for Sub-Technique Level.
    • This will collapse the controls to your chosen level of granularity.

    This is a screenshot showing how you can configure the tactics tab of the Ransomware Threat Preparedness Workbook

    Read tactic sheets from left to right

    This is a screenshot of the tactics tab of the Ransomware Threat Preparedness Workbook

    Technique:

    How an attacker will attempt to achieve their goals through a specific action.

    ID:

    The corresponding ID number on the MITRE ATT&CK® Matrix for quick reference.

    Impact of the Technique(s):

    If an attack of this type is successful on your network, how deep does the damage run?

    Current Mitigations:

    What security protocols do you have in place right now that can help prevent an attacker from successfully executing this attack technique? The rating is based on the CMMI scale.

    Determine the impact of the technique

    • For each control, indicate the current mitigation level using the dropdown list.
    • Only use "N/A" if you are confident that the control is not required in your organization.

    Info-Tech Insight

    We highly recommend that you write comments about your current-state security protocols. First, it's great to have documented your thought processes in the event of a threat modeling session. Second, you can speak to deficits clearly, when asked.

    This is the second screenshot from Info-Tech's Reconnaissance Tactic Analysis

    Review technique preparedness

    • If you have chosen the Technique level, the tool should resemble this image:
      • High-level controls are analyzed, and sub-controls hidden.
      • The sub-techniques under the broader technique show how a successful attack from this vector would impact your network.
    • Each sub-technique has a note for additional context:
      • Under Impact, select the overall impact for the listed controls to represent how damaging you believe the controls to be.
      • Next select your current preparedness maturity in terms of preparedness for the same techniques. Ask yourself "What do I have that contributes to blocking this technique?"

    This is the third screenshot from Info-Tech's Reconnaissance Tactic Analysis

    Info-Tech Insight

    You may discover that you have little to no mitigation actions in place to deal with one or many of these techniques. However, look at this discovery as a positive: You've learned more about the potential vectors and can actively work toward remediating them rather than hoping that a breach never happens through one of these avenues.

    Review sub-technique preparedness

    If you have chosen the Sub-Technique level, the tool should resemble this image.

    • The granular controls are being analyzed. However, the grouped controls will still appear. It is important to not fill the grouped sections, to make sure the calculations run properly.
    • The average of your sub-techniques will be calculated to show your overall preparedness level.
    • Look at the sub-techniques under the broader technique and consider how a successful attack from this vector would impact your network.

    Each sub-technique has a note for additional context and understanding about what the techniques are seeking to do and how they may impact your enterprise.

    • Because of the enhanced granularity, the final risk score is more representative of an enterprise's current mitigation capabilities.
    This is the fourth screenshot from Info-Tech's Reconnaissance Tactic Analysis

    Step 2.2

    Identify countermeasures

    Activities

    2.2.1 Identify countermeasures

    This step involves the following activities:

    • Identifying countermeasures

    This step involves the following participants:

    • Security Incident Response Team (SIRT)
    • System subject-matter experts (SMEs)

    Outcomes of this step

    Identification of countermeasures to common ransomware techniques, and tactics to improve protection and detection capabilities.

    Improve Protection and Detection Capabilities

    Review technique countermeasures

    As you work through the tool, your dashboard will prioritize your threat preparedness for each of the various attack techniques to give you an overall impression of your preparedness.

    For each action, the tool includes detection and remediation actions for you to consider either for implementation or as table stakes for your next threat modeling sessions.

    Note: Some sheets will have the same controls. However, the context of the attack technique may change your answers. Be sure to read the tactic and technique that you are on when responding to the controls.

    This is an image of the Privilege Escalation Tactic Analysis Table

    This is an image of the Defense Evasion Tactic Analysis Table

    Prioritize the analysis of ransomware tactics and sub-techniques identified on slide 45. If your initial analysis in Activity 2.2.1 determined that you have robust security protocols for some of the attack vectors, set these domains aside.

    2.2.1 Identify countermeasures

    Estimated Time: 1-4 hours

    1. Review the output of the Enterprise Threat Preparedness Workbook. Remediation efforts are on the right side of the sheet. These are categorized as either detection actions or mitigation actions.
      1. Detection actions:
      • What can you do before an attack occurs, and how can you block attacks? Detection actions may thwart an attack before it ever occurs.
    2. Mitigation actions:
      • If an attacker is successful through one of the attack methods, how do you lessen the impact of the technique? Mitigation actions address this function to slow and hinder the potential spread or damage of a successful attack.
  • Detection and mitigation measures are associated with each technique and sub-technique. Not all techniques will be able to be detected properly or mitigated. However, understanding their relationships can better prepare your defensive protocols.
  • Add relevant control actions to the initiative list in the Ransomware Resilience Assessment.
  • Input

    • Knowledge about existing infrastructure.
    • Security protocols.
    • Information about ransomware attack tactics, techniques, and mitigation protocols.
    • Outputs from the Threat Preparedness Workbook.

    Output

    • Structured understanding of the risks facing the enterprise based on your current preparedness and security protocols.
    • Protective and detective measures to improve ransomware resilience.

    Materials

    • Enterprise Threat Preparedness Workbook
    • Ransomware Resilience Assessment

    Participants

    • Security Incident Response Team (SIRT)
    • System subject-matter experts (SMEs)

    Phase 3

    Improve response and recovery capabilities

    Phase 1Phase 2Phase 3Phase 4

    1.1 Build ransomware risk scenario

    1.2 Conduct resilience assessment

    2.1 Assess attack vectors

    2.2 Identify countermeasures

    3.1 Review Security Incident Management Plan

    3.2 Run Tabletop Test (IT)

    3.3 Document Workflow and Runbook

    4.1 Run Tabletop Test (Leadership)

    4.2 Prioritize resilience initiatives

    4.3 Measure resilience metrics

    This phase will guide you through the following steps:

    • Documenting your threat escalation protocol.
    • Identify response steps and gaps.
    • Update your response workflow and runbook.

    This phase involves the following participants:

    • Security Incident Response Team (SIRT)

    Build Ransomware Resilience

    Step 3.1

    Review security incident management plan

    Activities

    3.1.1 Review the workflow and runbook templates

    3.1.2 Update/define your threat escalation protocol

    This step will walk you through the following activities:

    • Reviewing the example Workflow and Runbook
    • Updating and defining your threat escalation protocol.

    This step involves the following participants:

    • Security Incident Response Team (SIRT)

    Outcomes of this step

    • Clear escalation path for critical incidents.
    • Common understanding of incident severity that will drive escalation.

    Improve response and recovery capabilities

    3.1.1 Review the workflow and runbook templates

    30 minutes

    This blueprint includes sample information in the Ransomware Response Workflow Template and Ransomware Response Runbook Template to use as a starting points for the steps in Phase 3, including documenting your threat escalation protocol.

    • The Ransomware Response Workflow Template contains an example of a high-level security incident management workflow for a ransomware attack. This provides a structure to follow for the tabletop planning exercise and a starting point for your ransomware response workflow.
      The Workflow is aimed at incident commanders and team leads. It provides an at-a-glance view of the high-level steps and interactions between stakeholders to help leaders coordinate response.
    • The Ransomware Response Runbook Template is an example of a security incident management runbook for a ransomware attack. This includes a section for a threat escalation protocol that you can use as a starting point.
      The Runbook is aimed at the teams executing the response. It provides more specific actions that need to be executed at each phase of the incident response.

    Download the Ransomware Response Workflow Template

    Download the Ransomware Response Runbook Template

    Input

    • No Input Required

    Output

    • Visualize the end goal

    Materials

    • Example workflow and runbook in this blueprint

    Participants

    • Security Incident Response Team (SIRT)

    Two overlapping screenshots are depicted, including the table of contents from the Ransomware Response Runbook.

    3.1.2 Update/define your threat escalation protocol

    1-2 hours

    Document the Threat Escalation Protocol sections in the Ransomware Response Workflow Template or review/update your existing runbook. The threat escalation protocol defines which stakeholders to involve in the incident management process, depending on impact and scope. Specifically, you will need to define the following:

    Impact and scope criteria: Impact considers factors such as the criticality of the system/data, whether PII is at risk, and whether public notification is required. Scope considers how many systems or users are impacted.

    Severity assessment: Define the severity levels based on impact and scope criteria.

    Relevant stakeholders: Identify stakeholders to notify for each severity level, which can include external stakeholders.

    If you need additional guidance, see Info-Tech's Develop and Implement a Security Incident Management Program blueprint, which takes a broader look at security incidents.

    Input

    • Current escalation process (formal or informal).

    Output

    • Define criteria for severity levels and relevant stakeholders.

    Materials

    • Ransomware Response Workflow Template

    Participants

    • Security Incident Response Team (SIRT)

    This is an image of the Threat Escalation Protocol Criteria and Stakeholders.

    Step 3.2

    Run Tabletop Test (IT)

    Activities

    3.2.1 Define scenarios for a range of incidents

    3.2.2 Run a tabletop planning exercise

    This step will guide you through the following activities:

    • Defining scenarios for a range of incidents.
    • Running a tabletop planning exercise.

    This step involves the following participants:

    • Security Incident Response Team (SIRT)
    • Other stakeholders (as relevant)

    Outcomes of this step

    • Current-state incident response workflow, including stakeholders, steps, timeline.
    • Process and technology gaps to be addressed.

    Improve response and recovery capabilities

    3.2.1 Define scenarios for a range of incidents

    30 minutes

    As a group, collaborate to define scenarios that enable you to develop incident response details for a wide range of potential incidents. Below are example scenarios:

    • Scenario 1: An isolated attack on one key system. The database for a critical application is compromised. Assume the attack was not detected until files were encrypted, but that you can carry out a repair-in-place by wiping the server and restoring from backups.
    • Scenario 2: A site-wide impact that warrants broader disaster recovery. Several critical systems are compromised. It would take too long to repair in-place, so you need to failover to your DR environment, in addition to executing security response steps. (Note: If you don't have a DRP, see Info-Tech's Create a Right-Sized Disaster Recovery Plan.)
    • Scenario 3: A critical outsourced service or cloud service is compromised. You need to work with the vendor to determine the scope of impact and execute a response. This includes determining if your on-prem systems were also compromised.
    • Scenario 4: One or multiple end-user devices are compromised. Your response to the above scenarios would include assessing end-user devices as a possible source or secondary attack, but this scenario would provide more focus on the containing an attack on end-user devices.

    Note: The above is too much to execute in one 30-minute session, so plan a series of exercises as outlined on the next slide.

    Input

    • No input required

    Output

    • Determine the scope of your tabletop planning exercises

    Materials

    • Whiteboard or flip chart (or a shared screen if staff are remote)

    Participants

    • Security Incident Response Team (SIRT)

    Optimize the time spent by participants by running a series of focused exercises

    Not all stakeholders need to be present at every tabletop planning exercise. First, run an exercise with IT that focuses on the technical response. Run a second tabletop for non-IT stakeholders that focuses on the non-IT response, such as crisis communications, working with external stakeholders (e.g. law enforcement, cyberinsurance).

    Sample schedule:

    • Q1: Hold two sessions that run Scenarios 1 and 2 with relevant IT participants (see Activity 3.2.1). The focus for these sessions will be primarily on the technical response. For example, include notifying leadership and their role in decision making, but don't expand further on the details of their process. Similarly, don't invite non-IT participants to these sessions so you can focus first on understanding the IT response. Invite executives to the Q2 exercise, where they will have more opportunity to be involved.
    • Q2: Hold one session with the SIRT and non-IT stakeholders. Use the results of the Q1 exercises as a starting point and expand on the non-IT response steps (e.g. notifying external parties, executive decisions on response options).
    • Q3 and Q4: Run other sessions (e.g. for Scenarios 3 and 4) with relevant stakeholders. Ensure your ransomware incident response plan covers a wide range of possible scenarios.
    • Run ongoing exercises at least annually. Once you have a solid ransomware incident response plan, incorporate ransomware-based tabletop planning exercises into your overall security incident management testing and maintenance schedule.

    Info-Tech Insight

    Schedule these sessions well in advance to ensure appropriate resources are available. Document this in an annual test plan summary that outlines the scope, participants, and dates and times for the planned sessions.

    3.2.2 Run a tabletop planning exercise

    1-2 hours

    Remember that the goal is a deeper dive into how you would respond to an attack so you can clarify steps and gaps. This is not meant to just be a read-through of your plan. Follow the guidelines below:

    1. Select your scenario and invite relevant participants (see the previous slides).
    2. Guide participants through the incident and capture the steps and gaps along the way. Focus on one stakeholder at a time through each phase but be sure to get input from everyone. For example, focus on the Service Desk's steps for detection, then do the same as relevant to other stakeholders. Move on to analysis and do the same. (Tip: The distinction between phases is not always clear, and that's okay. Similarly, eradication and recovery might be the same set of steps. Focus on capturing the detail; you can clarify the relevant phase later.)
    3. Record the results (e.g. capture it in Visio) for reference purposes. (Tip: You can run the exercise directly in Visio. However, there's a risk that the tool may become a distraction. Enlist a scribe who is proficient with Visio so you don't need to wait for information to be captured and plan to save the detailed formatting and revising for later. )

    Refer to the Ransomware Tabletop Planning Results – Example as a guide for what to capture. Aim for more detail than found in your Ransomware Response Workflow (but not runbook-level detail).

    Download the Ransomware Tabletop Planning Results – Example

    Input

    • Baseline ransomware response workflow

    Output

    • Clarify your response workflow, capabilities, and gaps

    Materials

    • Whiteboard or sticky notes or index cards, or a shared screen

    Participants

    • Security Incident Response Team (SIRT)

    This is an example of a Ransomware Response Tabletop Planning Results Page.

    Step 3.3

    Document Workflow and Runbook

    Activities

    3.3.1 Update your ransomware response workflow

    3.3.2 Update your ransomware response runbook

    This step will guide you through the following activities:

    • Updating your ransomware response workflow.
    • Updating your ransomware response runbook.

    This step involves the following participants:

    • Security Incident Response Team (SIRT)

    Outcomes of this step

    • An updated incident response workflow and runbook based on current capabilities.

    Improve response and recovery capabilities

    3.3.1 Update your ransomware response workflow

    1 hour

    Use the results from your tabletop planning exercises (Activity 3.2.2) to update and clarify your ransomware response workflow. For example:

    • Update stakeholder swim-lanes: Clarify which stakeholders need a swim lane (e.g. where interactions between groups needs to be clarified). For example, consider an SIRT swim-lane that combines the relevant technical response roles, but have separate swim-lanes for other groups that the SIRT interacts with (e.g. Service Desk, the Executive Team).
    • Update workflow steps: Use the detail from the tabletop exercises to clarify and/or add steps, as well as further define the interactions between swim-lanes.(Tip: Your workflow needs to account for a range of scenarios. It typically won't be as specific as the tabletop planning results, which focus on only one scenario.)
    • Clarify the overall the workflow: Look for and correct any remaining areas of confusion and clutter. For example, consider adding "Go To" connectors to minimize lines crossing each other, adding color-coding to highlight key related steps (e.g. any communication steps), and/or resizing swim-lanes to reduce the overall size of the workflow to make it easier to read.
    • Repeat the above after each exercise: Continue to refine the workflow as needed until you reach the stage where you just need to validate that your workflow is still accurate.

    Input

    • Results from tabletop planning exercises (Activity 3.2.2)

    Output

    • Clarify your response workflow

    Materials

    • Ransomware Response Workflow

    Participants

    • Security Incident Response Team (SIRT)

    This is a screenshot from the ransomeware response tabletop planning

    3.3.2 Update your ransomware response runbook

    1 hour

    Use the results from your tabletop planning exercises (Activity 3.2.2) to update your ransomware response runbook. For example:

    • Align stakeholder sections with the workflow: Each stakeholder swim-lane in the workflow needs its own section in the runbook.
    • Update incident response steps: Use the detail from the tabletop exercise to clarify instructions for each stakeholder. This can include outlining specific actions, defining which stakeholders to work with, and referencing relevant documentation (e.g. vendor documentation, step-by-step restore procedures). (Tip: As with the workflow, the runbook needs to account for a range of scenarios, so it will include a list of actions that might need to be taken depending on the incident, as illustrated in the example runbook.)
    • Review and update your threat escalation protocol: It's best to define your threat escalation protocol before the tabletop planning exercise to help identify participants and avoid confusion. Now use the exercise results to validate or update that documentation.
    • Repeat the above after each exercise. Continue to refine your runbook as needed until you reach the stage where you just need to validate that your runbook is still accurate.

    Input

    • Results from tabletop planning exercises (Activity 3.2.2)

    Output

    • Clarified response runbook

    Materials

    • Ransomware Response Workflow

    Participants

    • Security Incident Response Team (SIRT)

    This is a screenshot of the Ransomware Response Runbook

    Phase 4

    Improve ransomware resilience

    Phase 1Phase 2Phase 3Phase 4

    1.1 Build ransomware risk scenario

    1.2 Conduct resilience assessment

    2.1 Assess attack vectors

    2.2 Identify countermeasures

    3.1 Review Security Incident Management Plan

    3.2 Run Tabletop Test (IT)

    3.3 Document Workflow and Runbook

    4.1 Run Tabletop Test (Leadership)

    4.2 Prioritize resilience initiatives

    4.3 Measure resilience metrics

    This phase will guide you through the following steps:

    • Identifying initiatives to improve ransomware resilience.
    • Prioritizing initiatives in a project roadmap.
    • Communicating status and recommendations.

    This phase involves the following participants:

    • Security Incident Response Team (SIRT)

    Build Ransomware Resilience

    Step 4.1

    Run Tabletop Test (leadership)

    Activities

    • 4.1.1 Identify initiatives to close gaps and improve resilience
    • 4.1.2 Review broader strategies to improve your overall security program

    This step will walk you through the following activities:

    • Identifying initiatives to close gaps and improve resilience.
    • Reviewing broader strategies to improve your overall security program.

    This step involves the following participants:

    • Security Incident Response Team (SIRT)

    Outcomes of this step

    • Specific potential initiatives based on a review of the gaps.
    • Broader potential initiatives to improve your overall security program.

    Improve ransomware resilience

    4.1.1 Identify initiatives to close gaps and improve resilience

    1 hour

    1. Use the results from the activities you have completed to identify initiatives to improve your ransomware readiness.
    2. Set up a blank spreadsheet with two columns and label them "Gaps" and "Initiatives." (It will be easier to copy the gaps and initiatives from this spreadsheet to you project roadmap, rather than use the Gap Initiative column in the Ransomware Readiness Maturity Assessment Tool.)
    3. Review your tabletop planning results:
      1. Summarize the gaps in the "Gaps" column in your spreadsheet created for this activity.
      2. For each gap, write down potential initiatives to address the gap.
      3. Where possible, combine similar gaps and initiatives. Similarly, the same initiative might address multiple gaps, so you don't need to identify a distinct initiative for every gap.
    4. Review the results of your maturity assessment completed in Phase 1 to identify additional gaps and initiatives in the spreadsheet created for this activity.

    Input

    • Tabletop planning results
    • Maturity assessment

    Output

    • Identify initiatives to improve ransomware readiness

    Materials

    • Blank spreadsheet

    Participants

    • Security Incident Response Team (SIRT)

    4.1.2 Review broader strategies to improve your overall security program

    1 hour

    1. Review the following considerations as outlined on the next few slides:
      • Implement core elements of an effective security program – strategy, operations, and policies. Leverage the work completed in this blueprint to provide context and address your immediate gaps while developing an overarching security strategy based on business requirements, risk tolerance, and overall security considerations. Security operations and policies are key to executing your overall security strategy and day to day incident management.
      • Update your backup strategy to account for ransomware attacks. Consider what your options would be today if your primary backups were infected? If those options aren't very good, your backup strategy needs a refresh.
      • Consider a zero-trust strategy. Zero trust reduces your reliance on perimeter security and moves controls to where the user accesses resources. However, it takes time to implement. Evaluate your readiness for this approach.
    2. As a team, discuss the merits of these strategies in your organization and identify potential initiatives. Depending on what you already have in place, the project may be to evaluate options (e.g. if you have not already initiated zero trust, assign a project to evaluate your options and readiness).

    Input

    • An understanding of your existing security practices and backup strategy.

    Output

    • Broader initiatives to improve ransomware readiness.

    Materials

    • Whiteboard or flip chart (or a shared screen if staff are remote)

    Participants

    • Security Incident Response Team (SIRT)

    Implement core elements of an effective security program

    There is no silver bullet. Ransomware readiness depends on foundational security best practices. Where budget allows, support that foundation with more advanced AI-based tools that identify abnormal behavior to detect an attack in progress.

    Leverage the following blueprints to implement the foundational elements of an effective security program:

    • Build an Information Security Strategy: Consider the full spectrum of information security, including people, processes, and technologies. Then base your security strategy on the risks facing your organization – not just on best practices – to ensure alignment with business goals and requirements.
    • Develop a Security Operations Strategy: Establish unified security operations that actively monitor security events and threat information, and turn that into appropriate security prevention, detection, analysis, and response processes.
    • Develop and Deploy Security Policies: Improve cybersecurity through effective policies, from acceptable use policies aimed at your end users to system configuration management policies aimed at your IT operations.

    Supplement foundational best practices with AI-based tools to counteract more sophisticated security attacks:

    • The evolution of ransomware gangs and ransomware as a service means the most sophisticated tools designed to bypass perimeter security and endpoint protection are available to a growing number of hackers.
    • Rather than activate the ransomware virus immediately, attackers will traverse the network using legitimate commands to infect as many systems as possible and exfiltrate data without generating alerts, then finally encrypt infected systems.
    • AI-based tools learn what is normal behavior and therefore can recognize unusual traffic (which could be an attack in progress) before it's too late. For example, a "user" accessing a server they've never accessed before.
    • Engage an Info-Tech analyst or consult SoftwareReviews to review products that will add this extra layer of AI-based security.

    Update your backup strategy to account for ransomware attacks

    Apply a defense-in-depth strategy. A daily disk backup that goes offsite once a week isn't good enough.

    In addition to applying your existing security practices to your backup solution (e.g. anti-malware, restricted access), consider:

    • Creating multiple restore points. Your most recent backup might be infected. Frequent backups allow you to be more granular when determining how far you need to roll back.
    • Having offsite backups and using different storage media. Reduce the risk of infected backups by using different storage media (e.g. disk, NAS, tape) and backup locations (e.g. offsite). If you can make the attackers jump through more hoops, you have a greater chance of detecting the attack before all backups are infected.
    • Investing in immutable backups. Most leading backup solutions offer options to ensure backups are immutable (cannot be altered after they are written).
    • Using the BIA you completed in Phase 2 to help decide where to prioritize investments. All the above strategies add to your backup costs and might not be feasible for all data. Use your BIA results to decide which data sets require higher levels of protection.

    This example strategy combines multiple restore points, offsite backup, different storage media, and immutable backups.

    This is an example of a backup strategy to account for ransomware attacks.

    Refer to Info-Tech's Establish an Effective Data Protection Plan blueprint for additional guidance.

    Explore zero-trust initiatives

    Zero trust is a set of principles, not a set of controls.

    Reduces reliance on perimeter security.

    Zero trust is a strategy that reduces reliance on perimeter security and moves controls to where your user accesses resources. It often consolidates security solutions, reduces operating costs, and enables business mobility.

    Zero trust must benefit the business first.

    IT security needs to determine how zero trust initiatives will affect core business processes. It's not a one-size-fits-all approach to IT security. Zero trust is the goal – but some organizations can only get so close to that ideal.

    For more information, see Build a Zero-Trust Roadmap.

    Info-Tech Insight

    A successful zero-trust strategy should evolve. Use an iterative and repeatable process to assess available zero-trust technologies and principles and secure the most relevant protect surfaces. Collaborate with stakeholders to develop a roadmap with targeted solutions and enforceable policies.

    Step 4.2

    Prioritize resilience initiatives

    Activities

    • 4.2.1 Prioritize initiatives based on factors such as effort, cost, and risk
    • 4.2.2 Review the dashboard to fine tune your roadmap

    This step will guide you through the following activities:

    • Prioritizing initiatives based on factors such as effort, cost, and risk.
    • Reviewing the dashboard to fine-tune your roadmap.

    This step involves the following participants:

    • Security Incident Response Team (SIRT)

    Outcomes of this step

    • An executive-friendly project roadmap dashboard summarizing your initiatives.
    • A visual representation of the priority, effort, and timeline required for suggested initiatives.

    Review the Ransomware Resilience Assessment

    Tabs 2 and 3 list initiatives relevant to your ransomware readiness improvement efforts.

    • At this point in the project, the Ransomware Resilience Assessment should contain a number of initiatives to improve ransomware resilience.
    • Tab 2 is prepopulated with examples of gap closure actions to consider, which are categorized into initiatives listed on Tab 3.
    • Follow the instructions in the Ransomware Resilience Assessment to:
      • Categorize gap control actions into initiatives.
      • Prioritize initiatives based on cost, effort, and benefit.
      • Construct a roadmap for consideration.

    Download the Ransomware Resilience Assessment

    4.2.1 Prioritize initiatives based on factors such as effort, cost, and risk

    1 hour

    Prioritize initiatives in the Ransomware Resilience Assessment.

    1. The initiatives listed on Tab 3 Initiative List will be copied automatically on Tab 5 Prioritization.
    2. On Tab 1 Setup:
      1. Review the weight you want to assign to the cost and effort criteria.
      2. Update the default values for FTE and Roadmap Start as needed.
    3. Go back to Tab 5 Prioritization:
      1. Fill in the cost, effort, and benefit evaluation criteria for each initiative. Hide optional columns you don't plan to use, to avoid confusion.
      2. Use the cost and benefit scores to prioritize waves and schedule initiatives on Tab 6 Gantt Chart.

    Input

    • Gaps and initiatives identified in Step 4.1

    Output

    • Project roadmap dashboard

    Materials

    • Ransomware Resilience Assessment

    Participants

    • Security Incident Response Team (SIRT)

    4.2.2 Review the dashboard to fine-tune the roadmap

    1 hour

    Review and update the roadmap dashboard in your Ransomware Resilience Assessment.

    1. Review the Gantt chart to ensure:
      1. The timeline is realistic. Avoid scheduling many high-effort projects at the same time.
      2. Higher-priority items are scheduled sooner than low-priority items.
      3. Short-term projects include quick wins (e.g. high-priority, low-effort items).
      4. It supports the story you wish to communicate (e.g. a plan to address gaps, along with the required effort and timeline).
    2. Update the values on the 5 Prioritization and 6 Gantt Chart tabs based on your review.

    Input

    • Gaps and initiatives identified in Step 4.1

    Output

    • Project roadmap dashboard

    Materials

    • Ransomware Resilience Assessment

    Participants

    • Security Incident Response Team (SIRT)

    This is an image of a sample roadmap for the years 2022-2023

    Step 4.3

    Measure resilience metrics

    Activities

    4.3.1 Summarize status and next steps in an executive presentation

    This step will guide you through the following activities:

    • Summarizing status and next steps in an executive presentation.

    This step involves the following participants:

    • Security Incident Response Team (SIRT)

    Outcomes of this step

    • Gain stakeholder buy-in by communicating the risk of the status quo and achievable next steps to improve your organization's ransomware readiness.

    Improve ransomware resilience

    4.3.1 Summarize status and next steps in an executive presentation

    1 hour

    Gain stakeholder buy-in by communicating the risk of the status quo and recommendations to reduce that risk. Specifically, capture and present the following from this blueprint:

    • Phase 1: Maturity assessment results, indicating your organization's overall readiness as well as specific areas that need to improve.
    • Phase 2: Business impact results, which objectively quantify the potential impact of downtime and data loss.
    • Phase 3: Current incident response capabilities including steps, timeline, and gaps.
    • Phase 4: Recommended projects to close specific gaps and improve overall ransomware readiness.

    Overall key findings and next steps.

    Download the Ransomware Readiness Summary Presentation Template

    Input

    • Results of all activities in Phases 1-4

    Output

    • Executive presentation

    Materials

    • Ransomware Readiness Summary Presentation Template

    Participants

    • Security Incident Response Team (SIRT)

    This is a screenshot of level 2 of the ransomware readiness maturity tool.

    Revisit metrics

    Ransomware resilience metrics track your ability to disrupt a ransomware attack at each stage of its workflow.

    Revisit metrics as the project nears completion and compare them against your baseline to measure progress.

    Attack workflow Process Metric Target trend Current Goal
    GET IN Vulnerability Management % Critical patches applied Higher is better
    Vulnerability Management # of external exposures Fewer is better
    Security Awareness Training % of users tested for phishing Higher is better
    SPREAD Identity and Access Management Adm accounts / 1000 users Lower is better
    Identity and Access Management % of users enrolled for MFA Higher is better
    Security Incident Management Avg time to detect Lower is better
    PROFIT Security Incident Management Avg time to resolve Lower is better
    Backup and Disaster Recovery % critical assets with recovery test Higher is better
    Backup and Disaster Recovery % backup to immutable storage Higher is better

    Summary of accomplishments

    Project overview

    Project deliverables

    This blueprint helped you create a ransomware incident response plan for your organization, as well as identify ransomware prevention strategies and ransomware prevention best practices.

    • Ransomware Resilience Assessment: Measure your current readiness, then identify people, policy, and technology gaps to address.
    • Ransomware Response Workflow: An at-a-glance summary of the key incident response steps across all relevant stakeholders through each phase of incident management.
    • Ransomware Response Runbook: Includes your threat escalation protocol and detailed response steps to be executed by each stakeholder.
    • Ransomware Tabletop Planning : This deep dive into a ransomware scenario will help you develop a more accurate incident management workflow and runbook, as well as identify gaps to address.
    • Ransomware Project Roadmap: This prioritized list of initiatives will address specific gaps and improve overall ransomware readiness.
    • Ransomware Readiness Summary Presentation: Your executive presentation will communicate the risk of the status quo, present recommended next steps, and drive stakeholder buy-in.

    Project phases

    Phase 1: Assess ransomware resilience

    Phase 2: Protect and detect

    Phase 3: Respond and recover

    Phase 4: Improve ransomware resilience

    Related Info-Tech Research

    Tab 3. Initiative List in the Ransomware Resilience Assessment identifies relevant Info-Tech Research to support common ransomware resilience initiatives.

    Related security blueprints:

    Related disaster recovery blueprints:

    Research Contributors and Experts

    This is an image of Jimmy Tom

    Jimmy Tom
    AVP of Information Technology and Infrastructure
    Financial Horizons

    This is an image of Dan Reisig

    Dan Reisig
    Vice President of Technology
    UV&S

    This is an image of Samuel Sutto

    Samuel Sutton
    Computer Scientist (Retired)
    FBI

    This is an image of Ali Dehghantanha

    Ali Dehghantanha
    Canada Research Chair in Cybersecurity and Threat Intelligence,
    University of Guelph

    This is an image of Gary Rietz

    Gary Rietz
    CIO
    Blommer Chocolate Company

    This is an image of Mark Roman

    Mark Roman
    CIO
    Simon Fraser University

    This is an image of Derrick Whalen

    Derrick Whalen
    Director, IT Services
    Halifax Port Authority

    This is an image of Stuart Gaslonde

    Stuart Gaslonde
    Director of IT & Digital Services
    Falmouth-Exeter Plus

    This is an image of Deborah Curtis

    Deborah Curtis
    CISO
    Placer County

    This is an image of Deuce Sapp

    Deuce Sapp
    VP of IT
    ISCO Industries

    This is an image of Trevor Ward

    Trevor Ward
    Information Security Assurance Manager
    Falmouth-Exeter Plus

    This is an image of Brian Murphy

    Brian Murphy
    IT Manager
    Placer County

    This is an image of Arturo Montalvo

    Arturo Montalvo
    CISO
    Texas General Land Office and Veterans Land Board

    No Image Available

    Mduduzi Dlamini
    IT Systems Manager
    Eswatini Railway

    No Image Available

    Mike Hare
    System Administrator
    18th Circuit Florida Courts

    No Image Available

    Linda Barratt
    Director of Enterprise architecture, IT Security, and Data Analytics, Toronto Community Housing Corporation

    This is an image of Josh Lazar

    Josh Lazar
    CIO
    18th Circuit Florida Courts

    This is an image of Douglas Williamson

    Douglas Williamson
    Director of IT
    Jamaica Civil Aviation Authority

    This is an image of Ira Goldstein

    Ira Goldstein
    Chief Operating Officer
    Herjavec Group

    This is an image of Celine Gravelines

    Celine Gravelines
    Senior Cybersecurity Analyst
    Encryptics

    This is an image of Dan Mathieson

    Dan Mathieson
    Mayor
    City of Stratford

    This is an image of Jacopo Fumagalli

    Jacopo Fumagalli
    CISO
    Omya

    This is an image of Matthew Parker

    Matthew Parker
    Program Manager
    Utah Transit Authority

    Two Additional Anonymous Contributors

    Bibliography

    2019-Data-Breach-Investigations-Report.-Verizon,-May-2019.
    2019-Midyear-Security-Roundup:-Evasive-Threats,-Persistent-Effects.-Trend-Micro,-2019.
    Abrams,-Lawrence.-"Ryuk-Ransomware-Uses-Wake-on-Lan-to-Encrypt-Offline-Devices."-Bleeping-Computer,-14-Jan.-2020.
    Abrams,-Lawrence.-"Sodinokibi-Ransomware-Publishes-Stolen-Data-for-the-First-Time."-Bleeping-Computer,-11-Jan.-2020.
    Canadian-Center-for-Cyber-Security,-"Ransomware-Playbook,"-30-November-2021.-Accessed-21-May-2022.-
    Carnegie-Endowment-for-International-Peace.-"Ransomware:-Prevention-and-Protection."-Accessed-May-2022.-
    Cawthra,-Jennifer,-Michael-Ekstrom,-Lauren-Lusty,-Julian-Sexton,-John-Sweetnam.-Special-Publication-1800-26-Data-Integrity:-Detecting-and-Responding-to-Ransomware-and-Other-Destructive-Events.-NIST,-Jan.-2020.
    Cawthra,-Jennifer,-Michael-Ekstrom,-Lauren-Lusty,-Julian-Sexton,-John-Sweetnam.-Special-Publication-1800-25-Data-Integrity:-Identifying-and-Protecting-Assets-Against-Ransomware-and-Other-Destructive-Events.-NIST,-Jan.-2020.-
    Cichonski,-P.,-T.-Millar,-T.-Grance,-and-K.-Scarfone.-"Computer-Security-Incident-Handling-Guide."-SP-800-61-Rev.-2.-NIST,-Aug.-2012.
    Cimpanu,-Catalin.-"Company-shuts-down-because-of-ransomware,-leaves-300-without-jobs-just-before-holidays."-ZDNet,-3-Jan.-2020.
    Cimpanu,-Catalin.-"Ransomware-attack-hits-major-US-data-center-provider."-ZDNet,-5-Dec.-2019.
    CISA,-"Stop-Ransomware,"-Accessed-12-May-2022.
    "CMMI-Levels-of-Capability-and-Performance."-CMMI-Institute.-Accessed-May-2022.-
    Connolly,-Lena-Yuryna,-"An-empirical-study-of-ransomware-attacks-on-organizations:-an-assessment-of-severity-and-salient-factors-affecting-vulnerability."-Journal-of-Cybersecurity,-2020,.-1-18.
    "Definitions:-Backup-vs.-Disaster-Recovery-vs.-High-Availability."-CVM-IT-&-Cloud-Services,-12-Jan.-2017.
    "Don't-Become-a-Ransomware-Target-–-Secure-Your-RDP-Access-Responsibly."-Coveware,-2019.-
    Elementus,-"Rise-of-the-Ransomware-Cartels-"(2022).-YouTube.-Accessed-May-2022.-
    Global-Security-Attitude-Survey.-CrowdStrike,-2019.
    Graham,-Andrew.-"September-Cyberattack-cost-Woodstock-nearly-$670,00:-report."-
    Global-News,-10-Dec.-2019.
    Harris,-K.-"California-2016-Data-Breach-Report."-California-Department-of-Justice,-Feb.-2016.
    Hiscox-Cyber-Readiness-Report-2019.-Hiscox-UK,-2019.
    Cost-of-A-Data-Breach-(2022).-IBM.-Accessed-June-2022.--
    Ikeda,-Scott.-"LifeLabs-Data-Breach,-the-Largest-Ever-in-Canada,-May-Cost-the-Company-Over-$1-Billion-in-Class-Action-Lawsuit."-CPO-Magazine,-2020.
    Kessem,-Limor-and-Mitch-Mayne.-"Definitive-Guide-to-Ransomware."-IBM,-May-2022.
    Krebs,-Brian.-"Ransomware-Gangs-Now-Outing-Victim-Businesses-That-Don't-Pay-Up."-Krebson-Security,-16-Dec.-2019.
    Jaquith,-Andrew-and-Barnaby-Clarke,-"Security-metrics-to-help-protect-against-ransomware."-Panaseer,-July-29,-2021,-Accessed-3-June-2022.
    "LifeLabs-pays-ransom-after-cyberattack-exposes-information-of-15-million-customers-in-B.C.-and-Ontario."-CBC-News,-17-Dec.-2019.
    Matthews,-Lee.-"Louisiana-Suffers-Another-Major-Ransomware-Attack."-Forbes,-20-Nov.-2019.
    NISTIR-8374,-"Ransomware-Risk-Management:-A-Cybersecurity-Framework-Profile."-NIST-Computer-Security-Resource-Center.-February-2022.-Accessed-May-2022.-
    "Ransomware-attack-hits-school-district-twice-in-4-months."-Associated-Press,-10-Sept.-2019.
    "Ransomware-Costs-Double-in-Q4-as-Ryuk,-Sodinokibi-Proliferate."-Coveware,-2019.
    Ransomware-Payments-Rise-as-Public-Sector-is-Targeted,-New-Variants-Enter-the-Market."-Coveware,-2019.
    Rector,-Kevin.-"Baltimore-to-purchase-$20M-in-cyber-insurance-as-it-pays-off-contractors-who-helped-city-recover-from-ransomware."-The-Baltimore-Sun,-16-Oct.-2019.
    "Report:-Average-time-to-detect-and-contain-a-breach-is-287-days."-VentureBeat,-May-25,-2022.-Accessed-June-2022.-
    "Five-Lessons-Learned-from-over-600-Ransomware-Attacks."-Riskrecon.-Mar-2022.-Accessed-May-2022.-
    Rosenberg,-Matthew,-Nicole-Perlroth,-and-David-E.-Sanger.-"-'Chaos-is-the-Point':-Russian-Hackers-and-Trolls-Grow-Stealthier-in-2020."-The-New-York-Times,-10-Jan.-2020.
    Rouse,-Margaret.-"Data-Archiving."-TechTarget,-2018.
    Siegel,-Rachel.-"Florida-city-will-pay-hackers-$600,000-to-get-its-computer-systems-back."-The-Washington-Post,-20-June-2019.
    Sheridan,-Kelly.-"Global-Dwell-Time-Drops-as-Ransomware-Attacks-Accelerate."-DarkReading,-13-April-2021.-Accessed-May-2022.-
    Smith,-Elliot.-"British-Banks-hit-by-hacking-of-foreign-exchange-firm-Travelex."-CNBC,-9-Jan.-2020.
    "The-State-of-Ransomware-2022."-Sophos.-Feb-2022.-Accessed-May-2022.-
    "The-State-of-Ransomware-in-the-U.S.:-2019-Report-for-Q1-to-Q3."-Emsisoft-Malware-Lab,-1-Oct.2019.
    "The-State-of-Ransomware-in-the-U.S.:-Report-and-Statistics-2019."-Emsisoft-Lab,-12-Dec.-2019.
    "The-State-of-Ransomware-in-2020."-Black-Fog,-Dec.-2020.
    Toulas,-Bill.-"Ten-notorious-ransomware-strains-put-to-the-encryption-speed-test."-Bleeping-Computers,-23-Mar-2022.-Accessed-May-2022.
    Tung,-Liam-"This-is-how-long-hackers-will-hide-in-your-network-before-deploying-ransomware-or-being-spotted."-zdnet.-May-19,-2021.-Accessed-June-2022.-

    AI Trends 2023

    • Buy Link or Shortcode: {j2store}207|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Business Intelligence Strategy
    • Parent Category Link: /business-intelligence-strategy

    As AI technologies are constantly evolving, organizations are looking for AI trends and research developments to understand the future applications of AI in their industries.

    Our Advice

    Critical Insight

    • Understanding trends and the focus of current and future AI research helps to define how AI will drive an organization’s new strategic opportunities.
    • Understanding the potential application of AI and its promise can help plan the future investments in AI-powered technologies and systems.

    Impact and Result

    Understanding AI trends and developments enables an organization’s competitive advantage.

    AI Trends 2023 Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. AI Trends 2023 – An overview of trends that will continue to drive AI innovation.

    • AI Trends Report 2023
    [infographic]

    Further reading

    AI Trends Report 2023

    The eight trends:

    1. Design for AI
    2. Event-Based Insights
    3. Synthetic Data
    4. Edge AI
    5. AI in Science and Engineering
    6. AI Reasoning
    7. Digital Twin
    8. Combinatorial Optimization
    Challenges that slowed the adoption of AI

    To overcome the challenges, enterprises adopted different strategies

    Data Readiness

    • Lack of unified systems and unified data
    • Data quality issues
    • Lack of the right data required for machine learning
    • Improve data management capabilities, including data governance and data initiatives
    • Create data catalogs
    • Document data and information architecture
    • Solve data-related problems including data quality, privacy, and ethics

    ML Operations Capabilities

    • Lack of tools, technologies, and methodologies to operationalize models created by data scientists
    • Increase availability of cloud platforms, tools, and capabilities
    • Develop and grow machine learning operations (MLOps) tools, platforms, and methodologies to enable model operationalizing and monitoring in production

    Understanding of AI Role and Its Business Value

    • Lack of understanding of AI use cases – how AI/ML can be applied to solve specific business problems
    • Lack of understanding how to define the business value of AI investments
    • Identify AI C-suite toolkits (for example, Empowering AI Leadership from the World Economic Forum, 2022)
    • Document industry use cases
    • Use frameworks and tools to define business value for AI investments

    Design for AI

    Sustainable AI system design needs to consider several aspects: the business application of the system, data, software and hardware, governance, privacy, and security.

    It is important to define from the beginning how AI will be used by and for the application to clearly articulate business value, manage expectations, and set goals for the implementation.

    Design for AI will change how we store and manage data and how we approach the use of data for development and operation of AI systems.

    An AI system design approach should cover all stages of AI lifecycle, from design to maintenance. It should also support and enable iterative development of an AI system.

    To take advantage of different tools and technologies for AI system development, deployment, and monitoring, the design of an AI system should consider software and hardware needs and design for seamless and efficient integrations of all components of the system and with other existing systems within the enterprise.

    AI in Science and Engineering

    AI helps sequence genomes to identify variants in a person’s DNA that indicate genetic disorders. It allows researchers to model and calculate complicated physics processes, to forecast the genesis of the universe’s structure, and to understand planet ecosystem to help advance the climate research. AI drives advances in drug discovery and can assist with molecule synthesis and molecular property identification.

    AI finds application in all areas of science and engineering. The role of AI in science will grow and allow scientists to innovate faster.

    AI will further contribute to scientific understanding by assisting scientists in deriving new insights, generating new ideas and connections, generalizing scientific concepts, and transferring them between areas of scientific research.

    Using synthetic data and combining physical and machine learning models and other advances of AI/ML – such as graphs, use of unstructured data (language models), and computer vision – will accelerate the use of AI in science and engineering.

    Event- and Scenario-Driven AI

    AI-driven signal-gathering systems analyze a continuous stream of data to generate insights and predictions that enable strategic decision modeling and scenario planning by providing understanding of how and what areas of business might be impacted by certain events.

    AI enables the scenario-based approach to drive insights through pattern identification in addition to familiar pattern recognition, helping to understand how events are related.

    A system with anticipatory capabilities requires an event-driven architecture that enables gathering and analyzing different types of data (text, video, images) across multiple channels (social media, transactional systems, news feeds, etc.) for event-driven and event-sequencing modeling.

    ML simulation-based training of the model using advanced techniques under the umbrella of Reinforcement Learning in conjunction with statistically robust Bayesian probabilistic framework will aid in setting up future trends in AI.

    AI Reasoning

    Most of the applications of machine learning and AI today is about predicting future behaviors based on historical data and past behaviors. We can predict what product the customer would most likely buy or the price of a house when it goes on sale.

    Most of the current algorithms use the correlation between different parameters to make a prediction, for example, the correlation between the event and the outcome can look like “When X occurs, we can predict that Y will occur.” This, however, does not translate into “Y occurred because of X.”

    The development of a causal AI that uses causal inference to reason and identify the root cause and the causal relationships between variables without mistaking correlation and causation is still in its early stages but rapidly evolving.

    Some of the algorithms that the researchers are working with are casual graph models and algorithms that are at the intersection of causal inference with decision making and reinforcement learning (Causal Artificial Intelligence Lab, 2022).

    Synthetic Data

    Synthetic data is artificially generated data that mimics the structure of real-life data. It should also have the same mathematical and statistical properties as the real-world data that it is created to replicate.

    Synthetic data is used to train machine learning models when there is not enough real data or the existing data does not meet specific needs. It allows users to remove contextual bias from data sets containing personal data, prevent privacy concerns, and ensure compliance with privacy laws and regulations.

    Another application of synthetic data is solving data-sharing challenges.

    Researchers learned that quite often synthetic data sets outperform real-world data. Recently, a team of researchers at MIT built a synthetic data set of 150,000 video clips capturing human actions and used that data set to train the model. The researchers found that “the synthetically trained models performed even better than models trained on real data for videos that have fewer background objects” (MIT News Office, 2022).

    Today, synthetic data is used in language systems, in training self-driving cars, in improving fraud detection, and in clinical research, just to name a few examples.

    Synthetic data opens the doors for innovation across all industries and applications of AI by enabling access to data for any scenario and technology and business needs.

    Digital Twins

    Digital twins (DT) are virtual replicas of physical objects, devices, people, places, processes, and systems. In Manufacturing, almost every product and manufacturing process can have a complete digital replica of itself thanks to IoT, streaming data, and cheap cloud storage.

    All this data has allowed for complex simulations of, for example, how a piece of equipment will perform over time to predict future failures before they happen, reducing costly maintenance and extending equipment lifetime.

    In addition to predictive maintenance, DT and AI technologies have enabled organizations to design and digitally test complex equipment such as aircraft engines, trains, offshore oil platforms, and wind turbines before physically manufacturing them. This helps to improve product and process quality, manufacturing efficiency, and costs. DT technology also finds applications in architecture, construction, energy, infrastructure industries, and even retail.

    Digital twins combined with the metaverse provide a collaborative and interactive environment with immersive experience and real-time physics capabilities (as an example, Siemens presented an Immersive Digital Twin of a Plant at the Collision 2022 conference).

    Future trends include enabling autonomous behavior of a DT. An advanced DT can replicate itself as it moves into several devices, hence requiring the autonomous property. Such autonomous behavior of the DT will in turn influence the growth and further advancement of AI.

    Edge AI

    A simple definition for edge AI: A combination of edge computing and artificial intelligence, it enables the deployment of AI applications in devices of the physical world, in the field, where the data is located, such as IoT devices, devices on the manufacturing floor, healthcare devices, or a self-driving car.

    Edge AI integrates AI into edge computing devices for quicker and improved data processing and smart automation.

    The main benefits of edge AI include:

    • Real-time data processing capabilities to reduce latency and enable near real-time analytics and insights.
    • Reduced cost and bandwidth requirements as there is no need to transfer data to the cloud for computing.
    • Increased data security as the data is processed locally, on the device, reducing the risk of loss of sensitive data.
    • Improved automation by training machines to perform automated tasks.

    Edge AI is already used in a variety of applications and use cases including computer vision, geospatial intelligence, object detection, drones, and health monitoring devices.

    Combinatorial Optimization

    “Combinatorial optimization is a subfield of mathematical optimization that consists of finding an optimal object from a finite set of objects” (Wikipedia, retrieved December 2022).

    Applications of combinatorial optimization include:

    • Supply chain optimization
    • Scheduling and logistics, for example, vehicle routing where the trucks are making stops for pickup and deliveries
    • Operations optimization

    Classical combinatorial optimization (CO) techniques were widely used in operations research and played a major role in earlier developments of AI.

    The introduction of deep learning algorithms in recent years allowed researchers to combine neural network and conventional optimization algorithms; for example, incorporating neural combinatorial optimization algorithms in the conventional optimization framework. Researchers confirmed that certain combinations of these frameworks and algorithms can provide significant performance improvements.

    The research in this space continues and we look forward to learning how machine learning and AI (backtracking algorithms, reinforcement learning, deep learning, graph attention networks, and others) will be used for solving challenging combinatorial and decision-making problems.

    References

    “AI Can Power Scenario Planning for Real-Time Strategic Insights.” The Wall Street Journal, CFO Journal, content by Deloitte, 7 June 2021. Accessed 11 Dec. 2022.
    Ali Fdal, Omar. “Synthetic Data: 4 Use Cases in Modern Enterprises.” DATAVERSITY, 5 May 2022. Accessed
    11 Dec. 2022.
    Andrews, Gerard. “What Is Synthetic Data?” NVIDIA, 8 June 2021. Accessed 11 Dec. 2022.
    Bareinboim, Elias. “Causal Reinforcement Learning.” Causal AI, 2020. Accessed 11 Dec. 2022.
    Bengio, Yoshua, Andrea Lodi, and Antoine Prouvost. “Machine learning for combinatorial optimization: A methodological tour d’horizon.” European Journal of Operational Research, vol. 290, no. 2, 2021, pp. 405-421, https://doi.org/10.1016/j.ejor.2020.07.063. Accessed 11 Dec. 2022.
    Benjamins, Richard. “Four design principles for developing sustainable AI applications.” Telefónica S.A., 10 Sept. 2018. Accessed on 11 Dec. 2022.
    Blades, Robin. “AI Generates Hypotheses Human Scientists Have Not Thought Of.” Scientific American, 28 October 2021. Accessed 11 Dec. 2022.
    “Combinatorial Optimization.” Wikipedia article, Accessed 11 Dec. 2022.
    Cronholm, Stefan, and Hannes Göbel. “Design Principles for Human-Centred Artificial Intelligence.” University of Borås, Sweden, 11 Aug. 2022. Accessed on 11 Dec. 2022
    Devaux, Elise. “Types of synthetic data and 4 real-life examples.” Statice, 29 May 2022. Accessed 11 Dec. 2022.
    Emmental, Russell. “A Guide to Causal AI.” ITBriefcase, 30 March 2022. Accessed 11 Dec. 2022.
    “Empowering AI Leadership: AI C-Suite Toolkit.” World Economic Forum, 12 Jan. 2022. Accessed 11 Dec 2022.
    Falk, Dan. “How Artificial Intelligence Is Changing Science.” Quanta Magazine, 11 March 2019. Accessed 11 Dec. 2022.
    Fritschle, Matthew J. “The Principles of Designing AI for Humans.” Aumcore, 17 Aug. 2018. Accessed 8 Dec. 2022.
    Garmendia, Andoni I., et al. Neural Combinatorial Optimization: a New Player in the Field.” IEEE, arXiv:2205.01356v1, 3 May 2022. Accessed 11 Dec. 2022.
    Gülen, Kerem. “AI Is Revolutionizing Every Field and Science is no Exception.” Dataconomy Media GmbH, 9 Nov. 9, 2022. Accessed 11 Dec. 2022
    Krenn, Mario, et al. “On scientific understanding with artificial intelligence.” Nature Reviews Physics, vol. 4, 11 Oct. 2022, pp. 761–769. https://doi.org/10.1038/s42254-022-00518-3. Accessed 11 Dec. 2022.
    Laboratory for Information and Decision Systems. “The real promise of synthetic data.” MIT News, 16 Oct. 2020. Accessed 11 Dec. 2022.
    Lecca, Paola. “Machine Learning for Causal Inference in Biological Networks: Perspectives of This Challenge.” Frontiers, 22 Sept. 2021. Accessed 11 Dec. 2022. Mirabella, Lucia. “Digital Twin x Metaverse: real and virtual made easy.” Siemens presentation at Collision 2022 conference, Toronto, Ontario. Accessed 11 Dec. 2022. Mitchum, Rob, and Louise Lerner. “How AI could change science.” University of Chicago News, 1 Oct. 2019. Accessed 11 Dec. 2022.
    Okeke, Franklin. “The benefits of edge AI.” TechRepublic, 22 Sept. 2022, Accessed 11 Dec. 2022.
    Perlmutter, Nathan. “Machine Learning and Combinatorial Optimization Problems.” Crater Labs, 31 July 31, 2019. Accessed 11 Dec. 2022.
    Sampson, Ovetta. “Design Principles for a New AI World.” UX Magazine, 6 Jan. 2022. Accessed 11 Dec. 2022.
    Sgaier, Sema K., Vincent Huang, and Grace Charles. “The Case for Causal AI.” Stanford Social Innovation Review, Summer 2020. Accessed 11 Dec. 2022.
    “Synthetic Data.” Wikipedia article, Accessed 11 Dec. 2022.
    Take, Marius, et al. “Software Design Patterns for AI-Systems.” EMISA Workshop 2021, CEUR-WS.org, Proceedings 30. Accessed 11 Dec. 2022.
    Toews, Rob. “Synthetic Data Is About To Transform Artificial Intelligence.” Forbes, 12 June 2022. Accessed
    11 Dec. 2022.
    Zewe, Adam. “In machine learning, synthetic data can offer real performance improvements.” MIT News Office, 3 Nov. 2022. Accessed 11 Dec. 2022.
    Zhang, Junzhe, and Elias Bareinboim. “Can Humans Be out of the Loop?” Technical Report, Department of Computer Science, Columbia University, NY, June 2022. Accessed 11 Dec. 2022.

    Contributors

    Irina Sedenko Anu Ganesh Amir Feizpour David Glazer Delina Ivanova

    Irina Sedenko

    Advisory Director

    Info-Tech

    Anu Ganesh

    Technical Counselor

    Info-Tech

    Amir Feizpour

    Co-Founder & CEO

    Aggregate Intellect Inc.

    David Glazer

    VP of Analytics

    Kroll

    Delina Ivanova

    Associate Director, Data & Analytics

    HelloFresh

    Usman Lakhani

    DevOps

    WeCloudData

    Take Control of Infrastructure and Operations Metrics

    • Buy Link or Shortcode: {j2store}460|cart{/j2store}
    • member rating overall impact: 8.5/10 Overall Impact
    • member rating average dollars saved: $7,199 Average $ Saved
    • member rating average days saved: 11 Average Days Saved
    • Parent Category Name: Operations Management
    • Parent Category Link: /i-and-o-process-management
    • Measuring the business value provided by IT is very challenging.
    • You have a number of metrics, but they may not be truly meaningful, contextual, or actionable.
    • You know you need more than a single metric to tell the whole story. You also suspect that metrics from different systems combined will tell an even fuller story.
    • You are being asked to provide information from different levels of management, for different audiences, conveying different information.

    Our Advice

    Critical Insight

    • Many organizations collect metrics to validate they are keeping the lights on. But the Infrastructure and Operations managers who are benefitting the most are taking steps to ensure they are getting the right metrics to help them make decisions, manage costs, and plan for change.
    • Complaints about metrics are often rooted in managers wading through too many individual metrics, wrong metrics, or data that they simply can’t trust.
    • Info-Tech surveyed and interviewed a number of Infrastructure managers, CIOs, and IT leaders to understand how they are leveraging metrics. Successful organizations are using metrics for everything from capacity planning to solving customer service issues to troubleshooting system failures.

    Impact and Result

    • Manage metrics so they don’t become time wasters and instead provide real value.
    • Identify the types of metrics you need to focus on.
    • Build a metrics process to ensure you are collecting the right metrics and getting data you can use to save time and make better decisions.

    Take Control of Infrastructure and Operations Metrics Research & Tools

    Start here – read the Executive Brief

    Read our concise Executive Brief to find out why you should implement a metrics program in your Infrastructure and Operations practice, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Gap analysis

    This phase will help you identify challenges that you want to avoid by implementing a metrics program, discover the main IT goals, and determine your core metrics.

    • Take Control of Infrastructure and Operations Metrics – Phase 1: Gap Analysis
    • Infra & Ops Metrics Executive Presentation

    2. Build strategy

    This phase will help you make an actionable plan to implement your metrics program, define roles and responsibilities, and communicate your metrics project across your organization and with the business division.

    • Take Control of Infrastructure and Operations Metrics – Phase 2: Build Strategy
    • Infra & Ops Metrics Definition Template
    • Infra & Ops Metrics Tracking and Reporting Tool
    • Infra & Ops Metrics Program Roles & Responsibilities Guide
    • Weekly Metrics Review With Your Staff
    • Quarterly Metrics Review With the CIO
    [infographic]

    Tactics to Retain IT Talent

    • Buy Link or Shortcode: {j2store}549|cart{/j2store}
    • member rating overall impact: N/A
    • member rating average dollars saved: N/A
    • member rating average days saved: N/A
    • Parent Category Name: Engage
    • Parent Category Link: /engage
    • Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.
    • Many organizations focus on increasing engagement to improve retention, but this approach doesn’t address the entire problem.

    Our Advice

    Critical Insight

    • Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Impact and Result

    • Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.
    • Target employee segments and work with management to develop solutions to retain top talent.

    Tactics to Retain IT Talent Research & Tools

    Besides the small introduction, subscribers and consulting clients within this management domain have access to:

    1. Tactics to Retain IT Talent Storyboard – Use this storyboard to develop a targeted talent retention plan to retain top and core talent in the organization.

    Integrate data from exit surveys and interviews, engagement surveys, and stay interviews to understand the most commonly cited reasons for employee departure in order to select and prioritize tactics that improve retention. This blueprint will help you identify reasons for regrettable turnover, select solutions, and create an action plan.

    • Tactics to Retain IT Talent Storyboard

    2. Retention Plan Workbook – Capture key information in one place as you work through the process to assess and prioritize solutions.

    Use this tool to document and analyze turnover data to find suitable retention solutions.

    • Retention Plan Workbook

    3. Stay Interview Guide – Managers will use this guide to conduct regular stay interviews with employees to anticipate and address turnover triggers.

    The Stay Interview Guide helps managers conduct interviews with current employees, enabling the manager to understand the employee's current engagement level, satisfaction with current role and responsibilities, suggestions for potential improvements, and intent to stay with the organization.

    • Stay Interview Guide

    4. IT Retention Solutions Catalog – Use this catalog to select and prioritize retention solutions across the employee lifecycle.

    Review best-practice solutions to identify those that are most suitable to your organizational culture and employee needs. Use the IT Retention Solutions Catalog to explore a variety of methods to improve retention, understand their use cases, and determine stakeholder responsibilities.

    • IT Retention Solutions Catalog
    [infographic]

    Workshop: Tactics to Retain IT Talent

    Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

    1 Identify Reasons for Regrettable Turnover

    The Purpose

    Identify the main drivers of turnover at the organization.

    Key Benefits Achieved

    Find out what to explore during focus groups.

    Activities

    1.1 Review data to determine why employees join, stay, and leave.

    1.2 Identify common themes.

    1.3 Prepare for focus groups.

    Outputs

    List of common themes/pain points recorded in the Retention Plan Workbook.

    2 Conduct Focus Groups

    The Purpose

    Conduct focus groups to explore retention drivers.

    Key Benefits Achieved

    Explore identified themes.

    Activities

    2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities.

    2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

    Outputs

    Focus group feedback.

    Focus group feedback analyzed and organized by themes.

    3 Identify Needs and Retention Initiatives

    The Purpose

    Home in on employee needs that are a priority.

    Key Benefits Achieved

    A list of initiatives to address the identified needs

    Activities

    3.1 Create an empathy map to identify needs.

    3.2 Shortlist retention initiatives.

    Outputs

    Employee needs and shortlist of initiatives to address them.

    4 Prepare to Communicate and Launch

    The Purpose

    Prepare to launch your retention initiatives.

    Key Benefits Achieved

    A clear action plan for implementing your retention initiatives.

    Activities

    4.1 Select retention initiatives.

    4.2 Determine goals and metrics.

    4.3 Plan stakeholder communication.

    4.4 Build a high-level action plan.

    Outputs

    Finalized list of retention initiatives.

    Goals and associated metrics recorded in the Retention Plan Workbook.

    Further reading

    Tactics to Retain IT Talent

    Keep talent from walking out the door by discovering and addressing moments that matter and turnover triggers.

    Executive Summary

    Your Challenge

    Many organizations are facing an increase in voluntary turnover as low unemployment, a lack of skilled labor, and a rise in the number of vacant roles have given employees more employment choices.

    Common Obstacles

    Regrettable turnover is impacting organizational productivity and leading to significant costs associated with employee departures and the recruitment required to replace them.

    Many organizations tackle retention from an engagement perspective: Increase engagement to improve retention. This approach doesn't consider the whole problem.

    Info-Tech's Approach

    Build the case for creating retention plans by leveraging employee data and feedback to identify the key reasons for turnover that need to be addressed.

    Target employee segments and work with management to develop solutions to retain top talent.

    Info-Tech Insight

    Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    This research addresses regrettable turnover

    This is an image of a flow chart with three levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable: The loss of employees that the organization did not wish to keep, e.g. low performers, and Regrettable:  The loss of employees that the organization wishes it could have kept.

    Low unemployment and rising voluntary turnover makes it critical to focus on retention

    As the economy continues to recover from the pandemic, unemployment continues to trend downward even with a looming recession. This leaves more job openings vacant, making it easier for employees to job hop.

    This image contains a graph of the US Employment rate between 2020 - 2022 from the US Bureau of Economic Analysis and Bureau of Labor Statistics (BLS), 2022, the percentage of individuals who change jobs every one to five years from 2022 Job Seeker Nation Study, Jobvite, 2022, and voluntary turnover rates from BLS, 2022

    With more employees voluntarily choosing to leave jobs, it is more important than ever for organizations to identify key employees they want to retain and put plans in place to keep them.

    Retention is a challenge for many organizations

    The number of HR professionals citing retention/turnover as a top workforce management challenge is increasing, and it is now the second highest recruiting priority ("2020 Recruiter Nation Survey," Jobvite, 2020).

    65% of employees believe they can find a better position elsewhere (Legaljobs, 2021). This is a challenge for organizations in that they need to find ways to ensure employees want to stay at the organization or they will lose them, which results in high turnover costs.

    Executives and IT are making retention and turnover – two sides of the same coin – a priority because they cost organizations money.

    • 87% of HR professionals cited retention/turnover as a critical and high priority for the next few years (TINYpulse, 2020).
    • $630B The cost of voluntary turnover in the US (Work Institute, 2020).
    • 66% of organizations consider employee retention to be important or very important to an organization (PayScale, 2019).

    Improving retention leads to broad-reaching organizational benefits

    Cost savings: the price of turnover as a percentage of salary

    • 33% Improving retention can result in significant cost savings. A recent study found turnover costs, on average, to be around a third of an employee's annual salary (SHRM, 2019).
    • 37.9% of employees leave their organization within the first year. Employees who leave within the first 90 days of being hired offer very little or no return on the investment made to hire them (Work Institute, 2020).

    Improved performance

    Employees with longer tenure have an increased understanding of an organization's policies and processes, which leads to increased productivity (Indeed, 2021).

    Prevents a ripple effect

    Turnover often ripples across a team or department, with employees following each other out of the organization (Mereo). Retaining even one individual can often have an impact across the organization.

    Transfer of knowledge

    Retaining key individuals allows them to pass it on to other employees through communities of practice, mentoring, or other knowledge-sharing activities.

    Info-Tech Insight

    Improving retention goes beyond cost savings: Employees who agree with the statement "I expect to be at this organization a year from now" are 71% more likely to put in extra hours and 32% more likely to accomplish more than what is expected of their role (McLean & Company Engagement Survey, 2021; N=77,170 and 97,326 respectively).

    However, the traditional engagement-focused approach to retention is not enough

    Employee engagement is a strong driver of retention, with only 25% of disengaged employees expecting to be at their organization a year from now compared to 92% of engaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Average employee Net Promoter Score (eNPS)

    This image contains a graph of the Average employee Net Promoter Score (eNPS)

    Individual employee Net Promoter Scores (eNPS)

    This image contains a graph of the Individual employee Net Promoter Scores (eNPS)

    However, engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave.

    This analysis of McLean & Company's engagement survey results shows that while an organization's average employee net promoter score (eNPS) stays relatively static, at an individual level there is a huge amount of volatility.

    This demonstrates the need for an approach that is more capable of responding to or identifying employees' in-the-moment needs, which an annual engagement survey doesn't support.

    Turnover triggers and moments that matter also have an impact on retention

    Retention needs to be monitored throughout the employee lifecycle. To address the variety of issues that can appear, consider three main paths to turnover:

    1. Employee engagement – areas of low engagement.
    2. Turnover triggers that can quickly lead to departures.
    3. Moments that matter in the employee experience (EX).

    Employee engagement

    Engagement drivers are strong predictors of turnover.

    Employees who are highly engaged are 3.6x more likely to believe they will be with the organization 12 months from now than disengaged employees (McLean & Company Engagement Survey, 2018-2021; N=117,307).

    Turnover triggers

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers are a cause for voluntary turnover more often than accumulated issues (Lee et al.).

    Moments that matter

    Employee experience is the employee's perception of the accumulation of moments that matter within their employee lifecycle.

    Retention rates increase from 21% to 44% when employees have positive experiences in the following categories: belonging, purpose, achievement, happiness, and vigor at work. (Workhuman, 2020).

    While managers do not directly impact turnover, they do influence the three main paths to turnover

    Research shows managers do not appear as one of the common reasons for employee turnover.

    Top five most common reasons employees leave an organization (McLean & Company, Exit Survey, 2018-2021; N=107 to 141 companies,14,870 to 19,431 responses).

    Turnover factorsRank
    Opportunities for career advancement1
    Satisfaction with my role and responsibilities2
    Base pay3
    Opportunities for career-related skill development4
    The degree to which my skills were used in my job5

    However, managers can still have a huge impact on the turnover of their team through each of the three main paths to turnover:

    Employee engagement

    Employees who believe their managers care about them as a person are 3.3x more likely to be engaged than those who do not (McLean & Company, 2021; N=105,186).

    Turnover triggers

    Managers who are involved with and aware of their staff can serve as an early warning system for triggers that lead to turnover too quickly to detect with data.

    Moments that matter

    Managers have a direct connection with each individual and can tailor the employee experience to meet the needs of the individuals who report to them.

    Gallup has found that 52% of exiting employees say their manager could have done something to prevent them from leaving (Gallup, 2019). Do not discount the power of managers in anticipating and preventing regrettable turnover.

    Addressing engagement, turnover triggers, and moments that matter is the key to retention

    This is an image of a flow chart with four levels. The top level has only one box, labeled Turnover.  the Second level has 2 boxes, labeled Voluntary, and Involuntary.  The third level has two boxes under Voluntary, labeled Non-regrettable, and Regrettable.  The fourth level has three boxes under Regrettable, labeled Employee Engagement, Turnover triggers, and Moments that matter

    Info-Tech Insight

    HR traditionally seeks to examine engagement levels when faced with retention challenges, but engagement is only a part of the full picture. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

    Follow Info-Tech's two-step process to create a retention plan

    1. Identify Reasons for Regrettable Turnover

    2. Select Solutions and Create an Action Plan

    Step 1

    Identify Reasons for Regrettable Turnover

    After completing this step you will have:

    • Analyzed and documented why employees join, stay, and leave your organization.
    • Identified common themes and employee needs.
    • Conducted employee focus groups and prioritized employee needs.

    Step 1 focuses on analyzing existing data and validating it through focus groups

    Employee engagement

    Employee engagement and moments that matter are easily tracked by data. Validating employee feedback data by speaking and empathizing with employees helps to uncover moments that matter. This step focuses on analyzing existing data and validating it through focus groups.

    Engagement drivers such as compensation or working environment are strong predictors of turnover.
    Moments that matter
    Employee experience (EX) is the employee's perception of the accumulation of moments that matter with the organization.
    Turnover triggers
    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Turnover triggers

    This step will not touch on turnover triggers. Instead, they will be discussed in step 2 in the context of the role of the manager in improving retention.

    Turnover triggers are events that act as shocks or catalysts that quickly lead to an employee's departure.

    Info-Tech Insight

    IT managers often have insights into where and why retention is an issue through their day-to-day work. Gathering detailed quantitative and qualitative data provides credibility to these insights and is key to building a business case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

    Gather data to better understand why employees join, stay, and leave

    Start to gather and examine additional data to accurately identify the reason(s) for high turnover. Begin to uncover the story behind why these employees join, stay, and leave your organization through themes and trends that emerge.

    Look for these icons throughout step 2.

    Join

    Why do candidates join your organization?

    Stay

    Why do employees stay with your organization?

    Leave

    Why do employees leave your organization?

    For more information on analysis, visualization, and storytelling with data, see Info-Tech's Start Making Data-Driven People Decisions blueprint.

    Employee feedback data to look at includes:

    Gather insights through:

    • Focus groups
    • Verbatim comments
    • Exit interviews
    • Using the employee value proposition (EVP) as a filter (does it resonate with the lived experience of employees?)

    Prepare to draw themes and trends from employee data throughout step 1.

    Uncover employee needs and reasons for turnover by analyzing employee feedback data.

    • Look for trends (e.g. new hires join for career opportunities and leave for the same reason, or most departments have strong work-life balance scores in engagement data).
    • Review if there are recurring issues being raised that may impact turnover.
    • Group feedback to highlight themes (e.g. lack of understanding of EVP).
    • Identify which key employee needs merit further investigation or information.

    This is an image showing how you can draw out themes and trends using employee data throughout step 1.

    Classify where key employee needs fall within the employee lifecycle diagram in tab 2 of the Retention Plan Workbook. This will be used in step 2 to pinpoint and prioritize solutions.

    Info-Tech Insight

    The employee lifecycle is a valuable way to analyze and organize engagement pain points, moments that matter, and turnover triggers. It ensures that you consider the entirety of an employee's tenure and the different factors that lead to turnover.

    Examine new hire data and begin to document emerging themes

    Join

    While conducting a high-level analysis of new hire data, look for these three key themes impacting retention:

    Issues or pain points that occurred during the hiring process.

    Reasons why employees joined your organization.

    The experience of their first 90 days. This can include their satisfaction with the onboarding process and their overall experience with the organization.

    Themes will help to identify areas of strength and weakness organization-wide and within key segments. Document in tab 3 of the Retention Plan Workbook.

    1. Start by isolating the top reasons employees joined your organization. Ask:
      • Do the reasons align with the benefits you associate with working at your organization?
      • How might this impact your EVP?
      • If you use a new hire survey, look at the results for the following questions:
      • For which of the following reasons did you apply to this organization?
      • For what reasons did you accept the job offer with this organization?
    2. then, examine other potential problem areas that may not be covered by your new hire survey, such as onboarding or the candidate experience during the hiring process.
      • If you conduct a new hire survey, look at the results in the following sections:
        • Candidate Experience
        • Acclimatization
        • Training and Development
        • Defining Performance Expectations

      Analyze engagement data to identify areas of strength that drive retention

      Employees who are engaged are 3.6x more likely to believe they will be with the organization 12 months from now (McLean & Company Engagement Survey, 2018-2021; N=117,307). Given the strength of this relationship, it is essential to identify areas of strength to maintain and leverage.

      1. Look at the highest-performing drivers in your organization's employee engagement survey and drivers that fall into the "leverage" and "maintain" quadrants of the priority matrix.
        • These drivers provide insight into what prompts broader groups of employees to stay.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      1. Look into what efforts have been made to maintain programs, policies, and practices related to these drivers and ensure they are consistent across the entire organization.
      2. Document trends and themes related to engagement strengths in tab 2 of the Retention Plan Workbook.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Identify areas of weakness that drive turnover in your engagement data

      1. Look at the lowest-performing drivers in your organization's employee engagement survey and drivers that fall into the "improve" and "evaluate" quadrants of the priority matrix.
        • These drivers provide insight into what pushes employees to leave the organization.
      2. Delve into organizational efforts that have been made to address issues with the programs, policies, and practices related to these drivers. Are there any projects underway to improve them? What are the barriers preventing improvements?
      3. Document trends and themes related to engagement weaknesses in tab 2 of the Retention Plan Workbook.

      If you use a product other than Info-Tech's Engagement Survey, your results will look different. The key is to look at areas of weakness that emerge from the data.

      This is an image of a quadrant analysis, with the following quadrants in order from left to right, top to bottom.  Improve; Leverage; Evaluate; Maintain.

      If you use Info-Tech's Engagement Survey, look in detail at what are classified as "Retention Drivers": total compensation, working environment, and work-life balance.

      Mine exit surveys to develop an integrated, holistic understanding of why employees leave

      Conduct a high-level analysis of the data from your employee exit diagnostic. While analyzing this data, consider the following:

      • What are the trends and quantitative data about why employees leave your organization that may illuminate employee needs or issues at specific points throughout the employee lifecycle?
      • What are insights around your key segments? Data on key segments is easily sliced from exit survey results and can be used as a starting point for digging deeper into retention issues for specific groups.
      • Exit surveys are an excellent starting point. However, it is valuable to validate the data gathered from an exit survey using exit interviews.
      1. Isolate results for key segments of employees to target with retention initiatives (e.g. by age group or by department).
      2. Identify data trends or patterns over time; for example, that compensation factors have been increasing in importance.
      3. Document trends and themes taken from the exit survey results in tab 2 of the Retention Plan Workbook.

      If your organization conducts exit interviews, analyze the results alongside or in lieu of exit survey data.

      Compare new hire data with exit data to identify patterns and insights

      Determine if new hire expectations weren't met, prompting employees to leave your organization, to help identify where in the employee lifecycle issues driving turnover may be occurring.

      1. Look at your new hire data for the top reasons employees joined your organization.
        • McLean & Company's New Hire Survey database shows that the top three reasons candidates accept job offers on average are:
          1. Career opportunities
          2. Nature of the job
          3. Development opportunities
      2. Next, look at your exit data and the top reasons employees left your organization.
        1. McLean & Company's Exit Survey database shows that the top three reasons employees leave on average are:
          1. Opportunities for career advancement
          2. Base pay
          3. Satisfaction with my role and responsibilities
      3. Examine the results and ask:
        • Is there a link between why employees join and leave the organization?
        • Did they cite the same reasons for joining and for leaving?
        • What do the results say about what your employees do and do not value about working at your organization?
      4. Document the resulting insights in tab 2 of the Retention Plan Workbook.

      Example:

      A result where employees are leaving for the same reason they're joining the organization could signal a disconnect between your organization's employee value proposition and the lived experience.

      Revisit your employee value proposition to uncover misalignment

      Your employee value proposition (EVP), formal or informal, communicates the value your organization can offer to prospective employees.

      If your EVP is mismatched with the lived experience of your employees, new hires will be in for a surprise when they start their new job and find out it isn't what they were expecting.

      Forty-six percent of respondents who left a job within 90 days of starting cited a mismatch of expectations about their role ("Job Seeker Nation Study 2020," Jobvite, 2020).

      1. Use the EVP as a filter through which you look at all your employee feedback data. It will help identify misalignment between the promised and the lived experience.
      2. If you have EVP documentation, start there. If not, go to your careers page and put yourself in the shoes of a candidate. Ask what the four elements of an EVP look like for candidates:
        • Compensation and benefits
        • Day-to-day job elements
        • Working conditions
        • Organizational elements
      3. Next, compare this to your own day-to-day experiences. Does it differ drastically? Are there any contradictions with the lived experience at your organization? Are there misleading statements or promises?
      4. Document any insights or patterns you uncover in tab 2 of the Retention Plan Workbook.

      Conduct focus groups to examine themes

      Through focus groups, explore the themes you have uncovered with employees to discover employee needs that are not being met. Addressing these employee needs will be a key aspect of your retention plan.

      Identify employee groups who will participate in focus groups:

      • Incorporate diverse perspectives (e.g. employees, managers, supervisors).
      • Include employees from departments and demographics with strong and weak engagement for a full picture of how engagement impacts your employees.
      • Invite boomerang employees to learn why an individual might return to your organization after leaving.

      image contains two screenshots Mclean & Company's Standard Focus Group Guide.

      Customize Info-Tech's Standard Focus Group Guide based on the themes you have identified in tab 3 of the Retention Plan Workbook.

      The goal of the focus group is to learn from employees and use this information to design or modify a process, system, or other solution that impacts retention.

      Focus questions on the employees' personal experience from their perspective.

      Key things to remember:

      • It is vital for facilitators to be objective.
      • Keep an open mind; no feelings are wrong.
      • Beware of your own biases.
      • Be open and share the reason for conducting the focus groups.

      Info-Tech Insight

      Maintaining an open dialogue with employees will help flesh out the context behind the data you've gathered and allow you to keep in mind that retention is about people first and foremost.

      Empathize with employees to identify moments that matter

      Look for discrepancies between what employees are saying and doing.

      1. Say

      "What words or quotes did the employee use?"

      3.Think

      "What might the employee be thinking?"

      Record feelings and thoughts discussed, body language observed, tone of voice, and words used.

      Look for areas of negative emotion to determine the moments that matter that drive retention.

      2. Do

      "What actions or behavior did the employee demonstrate?"

      4. Feel

      "What might the employee be feeling?"

      Record them in tab 3 of the Retention Plan Workbook.

      5. Identify Needs

      "Needs are verbs (activities or desires), not nouns (solutions)"

      Synthesize focus group findings using Info-Tech's Empathy Map Template.

      6. Identify Insights

      "Ask yourself, why?"

      (Based on Stanford d.school Empathy Map Method)

      Distill employee needs into priority issues to address first

      Take employee needs revealed by your data and focus groups and prioritize three to five needs.

      Select a limited number of employee needs to develop solutions to ensure that the scope of the project is feasible and that the resources dedicated to this project are not stretched too thin. The remaining needs should not be ignored – act on them later.

      Share the needs you identify with stakeholders so they can support prioritization and so you can confirm their buy-in and approval where necessary.

      Ask yourself the following questions to determine your priority employee needs:

      • Which needs will have the greatest impact on turnover?
      • Which needs have the potential to be an easy fix or quick win?
      • Which themes or trends came up repeatedly in different data sources?
      • Which needs evoked particularly strong or negative emotions in the focus groups?

      This image contains screenshots of two table templates found in tab 5 of the Retention Plan Workbook

      In the Retention Plan Workbook, distill employee needs on tab 2 into three to five priorities on tab 5.

      Step 2

      Select Solutions and Create an Action Plan

      After completing this step, you will have:

      • Selected and prioritized solutions to address employee needs.
      • Created a plan to launch stay interviews.
      • Built an action plan to implement solutions.

      Select IT-owned solutions and implement people leader–driven initiatives

      Solutions

      First, select and prioritize solutions to address employee needs identified in the previous step. These solutions will address reasons for turnover that influence employee engagement and moments that matter.

      • Brainstorm solutions using the Retention Solutions Catalog as a starting point. Select a longlist of solutions to address your priority needs.
      • Prioritize the longlist of solutions into a manageable number to act on.

      People leaders

      Next, create a plan to launch stay interviews to increase managers' accountability in improving retention. Managers will be critical to solving issues stemming from turnover triggers.

      • Clarify the importance of harnessing the influence of people leaders in improving retention.
      • Discover what might cause individual employees to leave through stay interviews.
      • Increase trust in managers through training.

      Action plan

      Finally, create an action plan and present to senior leadership for approval.

      Look for these icons in the top right of slides in this step.

      Select solutions to employee needs, starting with the Retention Solutions Catalog

      Based on the priority needs you have identified, use the Retention Solutions Catalog to review best-practice solutions for pain points associated with each stage of the lifecycle.

      Use this tool as a starting point, adding to it and iterating based on your own experience and organizational culture and goals.

      This image contains three screenshots from Info-Tech's Retention Solutions Catalog.

      Use Info-Tech's Retention Solutions Catalog to start the brainstorming process and produce a shortlist of potential solutions that will be prioritized on the next slide.

      Info-Tech Insight

      Unless you have the good fortune of having only a few pain points, no single initiative will completely solve your retention issues. Combine one or two of these broad solutions with people-leader initiatives to ensure employee needs are addressed on an individual and an aggregate level.

      Prioritize solutions to be implemented

      Target efforts accordingly

      Quick wins are high-impact, low-effort initiatives that will build traction and credibility within the organization.

      Long-term initiatives require more time and need to be planned for accordingly but will still deliver a large impact. Review the planning horizon to determine how early these need to begin.

      Re-evaluate low-impact and low-effort initiatives and identify ones that either support other higher impact initiatives or have the highest impact to gain traction and credibility. Look for low-hanging fruit.

      Deprioritize initiatives that will take a high degree of effort to deliver lower-value results.

      When assessing the impact of potential solutions, consider:

      • How many critical segments or employees will this solution affect?
      • Is the employee need it addresses critical, or did the solution encompass several themes in the data you analyzed?
      • Will the success of this solution help build a case for further action?
      • Will the solution address multiple employee needs?

      Info-Tech Insight

      It's better to master a few initiatives than under-deliver on many. Start with a few solutions that will have a measurable impact to build the case for further action in the future.

      Solutions

      Low ImpactMedium ImpactLarge Impact
      Large EffortThis is an image of the used to help you prioritize solutions to be implemented.
      Medium Effort
      Low Effort

      Use tab 3 of the Retention Plan Workbook to prioritize your shortlist of solutions.

      Harness the influence of people leaders to improve employee retention

      Leaders at all levels have a huge impact on employees.

      Effective people leaders:

      • Manage work distribution.
      • Create a motivating work environment.
      • Provide development opportunities.
      • Ensure work is stimulating and challenging, but not overwhelming.
      • Provide clear, actionable feedback.
      • Recognize team member contributions.
      • Develop positive relationships with their teams.
      • Create a line of sight between what the employee is doing and what the organization's objectives are.

      Support leaders in recommitting to their role as people managers through Learning & Development initiatives with particular emphasis on coaching and building trust.

      For coaching training, see Info-Tech's Build a Better Manager: Team Essentials – Feedback and Coaching training deck.

      For more information on supporting managers to become better people leaders, see Info-Tech's Build a Better Manager: Manage Your People blueprint.

      "HR can't fix turnover. But leaders on the front line can."
      – Richard P. Finnegan, CEO, C-Suite Analytics

      Equip managers to conduct regular stay interviews to address turnover triggers

      Managers often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews are an effective way of uncovering potential retention issues and allowing managers to act as an early warning system for turnover triggers.

      Examples of common turnover triggers and potential manager responses:

      • Moving, creating a long commute to the office.
        • Through stay interviews, a manager can learn that a long commute is an issue and can help find workarounds such as flexible/remote work options.
      • Not receiving an expected promotion.
        • A trusted manager can anticipate issues stemming from this, discuss why the decision was made, and plan development opportunities for future openings.

      Stay interview best practices

      1. Conducted by an employee's direct manager.
      2. Happen regularly as a part of an ongoing process.
      3. Based on the stay interview, managers produce a turnover forecast for each direct report.
        1. The method used by stay interview expert Richard P. Finnegan is simple: red for high risk, yellow for medium, and green for low.
      4. Provide managers with training and a rough script or list of questions to follow.
        1. Use and customize Info-Tech's Stay Interview Guide to provide a guide for managers on how to conduct a stay interview.
      5. Managers use the results to create an individualized retention action plan made up of concrete actions the manager and employee will take.

      Sources: Richard P. Finnegan, CEO, C-Suite Analytics; SHRM

      Build an action plan to implement the retention plan

      For each initiative identified, map out timelines and actions that need to be taken.

      When building actions and timelines:

      • Refer to the priority needs you identified in tab 4 of the Retention Plan Workbook and ensure they are addressed first.
      • Engage internal stakeholders who will be key to the development of the initiatives to ensure they have sufficient time to complete their deliverables.
        • For example, if you conduct manager training, Learning & Development needs to be involved in the development and launch of the program.
      • Include a date to revisit your baseline retention and engagement data in your project milestones.
      • Designate process owners for new processes such as stay interviews.

      Plan for stay interviews by determining:

      • Whether stay interviews will be a requirement for all employees.
      • How much flexibility managers will have with the process.
      • How you will communicate the stay interview approach to managers.
      • If manager training is required.
      • How managers should record stay interview data and how you will collect this data from them as a way to monitor retention issues.
        • For example, managers can share their turnover forecasts and action plans for each employee.

      Be clear about manager accountabilities for initiatives they will own, such as stay interviews. Plan to communicate the goals and timelines managers will be asked to meet, such as when they must conduct interviews or their responsibility to follow up on action items that come from interviews.

      Track project success to iterate and improve your solutions

      Analyze measurements

      • Regularly remeasure your engagement and retention levels to identify themes and trends that provide insights into program improvements.
      • For example, look at the difference in manager relationship score to see if training has had an impact, or look at changes in critical segment turnover to calculate cost savings.

      Revisit employee and manager feedback

      • After three to six months, conduct additional surveys or focus groups to determine the success of your initiatives and opportunities for improvement. Tweak the program, including stay interviews, based on manager and employee feedback.

      Iterate frequently

      • Revisit your initiatives every two or three years to determine if a refresh is necessary to meet changing organizational and employee needs and to update your goals and targets.

      Key insights

      Insight 1Insight 2Insight 3

      Retention and turnover are two sides of the same coin. You can't fix retention without first understanding turnover.

      Engagement surveys mask the volatility of the employee experience and hide the reason why individual employees leave. You must also talk to employees to understand the moments that matter and engage managers to understand turnover triggers.

      Improving retention isn't just about lowering turnover, it's about discovering what healthy retention looks like for your organization.

      Insight 4Insight 5Insight 6

      HR professionals often have insights into where and why retention is an issue. Gathering detailed employee feedback data through surveys and focus groups provides credibility to these insights and is key to building a case for action. Keep an open mind and allow the data to inform your gut feeling, not the other way around.

      Successful retention plans must be owned by both IT leaders and HR.

      IT leaders often have the most visibility into their employees' personal and work lives and have a key opportunity to anticipate and address turnover triggers.

      Stay interviews help managers anticipate potential retention issues on their teams.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Info-Tech AnalystsPre-workPost-work
      Client Data Gathering and PlanningImplementation Supported Through Analyst Calls

      1.1 Discuss participants, logistics, overview of workshop activities

      1.2 Provide support to client for below activities through calls.

      2.1 Schedule follow-up calls to work through implementation of retention solutions based on identified needs.
      Client

      1.Gather results of engagement survey, new hire survey, exit survey, and any exit and stay interview feedback.

      2.Gather and analyze turnover data.

      3.Identify key employee segment(s) and identify and organize participants for focus groups.

      4.Complete cost of turnover analysis.

      5.Review turnover data and prioritize list of employee segments.

      1.Obtain senior leader approval to proceed with retention plan.

      2.Finalize and implement retention solutions.

      3.Prepare managers to conduct stay interviews.

      4.Communicate next steps to stakeholders.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      ActivitiesDay 1Day 2Day 3Day 4
      Assess Current StateConduct Focus GroupsIdentify Needs and Retention InitiativesPrepare to Communicate and Launch

      1.1 Review data to determine why employees join, stay, and leave.

      1.2 Identify common themes.

      1.3 Prepare for focus groups.

      2.1 Conduct four 1-hour focus groups with the employee segment(s) identified in the pre-workshop activities..

      2.2 Info-Tech facilitators independently analyze results of focus groups and group results by theme.

      3.1 Create an empathy map to identify needs

      3.2 Shortlist retention initiatives

      4.1 Select retention initiatives

      4.2 Determine goals and metrics

      4.3 Plan stakeholder communication4.4 Build a high-level action plan

      Deliverables

      1.List of common themes/pain points recorded in the Retention Plan Workbook

      2.Plan for focus groups documented in the Focus Group Guide

      1.Focus group feedback

      2.Focus group feedback analyzed and organized by themes

      1.Employee needs and shortlist of initiatives to address them1.Finalized list of retention initiatives

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Research Contributors and Experts

      Jeff Bonnell
      VP HR
      Info-Tech Research Group

      Phillip Kotanidis
      CHRO
      Michael Garron Hospital

      Michael McGuire
      Director, Organizational Development
      William Osler Health System

      Dr. Iris Ware
      Chief Learning Officer
      City of Detroit

      Richard P. Finnegan
      CEO
      C-Suite Analytics

      Dr. Thomas Lee
      Professor of Management
      University of Washington

      Jane Moughon
      Specialist in increasing profits, reducing turnover, and maximizing human potential in manufacturing companies

      Lisa Kaste
      Former HR Director
      Citco

      Piyush Mathur
      Head of Workforce Analytics
      Johnson & Johnson

      Gregory P. Smith
      CEO
      Chart Your Course

      Works Cited

      "17 Surprising Statistics about Employee Retention." TINYpulse, 8 Sept. 2020. Web.
      "2020 Job Seeker Nation Study." Jobvite, April 2020. Web.
      "2020 Recruiter Nation Survey." Jobvite, 2020. Web.
      "2020 Retention Report: Insights on 2019 Turnover Trends, Reasons, Costs, & Recommendations." Work Institute, 2020. Web.
      "25 Essential Productivity Statistics for 2021." TeamStage, 2021. Accessed 22 Jun. 2021.
      Agovino, Theresa. "To Have and to Hold." SHRM, 23 Feb. 2019. Web.
      "Civilian Unemployment Rate." Bureau of Labor Statistics, June 2020. Web.
      Foreman, Paul. "The domino effect of chief sales officer turnover on salespeople." Mereo, 19 July 2018. Web.
      "Gross Domestic Product." U.S. Bureau of Economic Analysis, 27 May 2021. Accessed 22 Jun. 2020.
      Kinne, Aaron. "Back to Basics: What is Employee Experience?" Workhuman, 27August 2020. Accessed 21 Jun. 2021.
      Lee, Thomas W, et al. "Managing employee retention and turnover with 21st century ideas." Organizational Dynamics, vol 47, no. 2, 2017, pp. 88-98. Web.
      Lee, Thomas W. and Terence R. Mitchell. "Control Turnover by Understanding its Causes." The Blackwell Handbook of Principles of Organizational Behaviour. 2017. Print.
      McFeely, Shane, and Ben Wigert. "This Fixable Problem Costs U.S. Businesses $1 Trillion." Gallup. 13 March 2019. Web.
      "Table 18. Annual Quit rates by Industry and Region Not Seasonally Adjusted." Bureau of Labor Statistics. June 2021. Web.
      "The 2019 Compensation Best Practices Report: Will They Stay or Will They Go? Employee Retention and Acquisition in an Uncertain Economy." PayScale. 2019. Web.
      Vuleta, Branka. "30 Troubling Employee Retention Statistics." Legaljobs. 1 Feb. 2021. Web.
      "What is a Tenured Employee? Top Benefits of Tenure and How to Stay Engaged as One." Indeed. 22 Feb. 2021. Accessed 22 Jun. 2021.

      Voka 2025 Resilience Scores

       

      Test uw digitale slagkracht!

      Jammer! U bent te laat.

      De VOKA Bedrijven Contact Dagen 2025 zijn voorbij en onze winnaars zijn bekend!

      Liguris: 80 points
      Keiretsu: 71 points
      Staffler: 69 points
      Xpo group: 67 points
      Actief: 66 points

      Continue reading

      Domino – Maintain, Commit to, or Vacate?

      • Buy Link or Shortcode: {j2store}113|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Organizational Design
      • Parent Category Link: /strategy-and-organizational-design

      If you have a Domino/Notes footprint that is embedded within your business units and business processes and is taxing your support organization, you may have met resistance from the business and been asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses and a multipurpose solution that, over the years, became embedded within core business applications and processes.

      Our Advice

      Critical Insight

      For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.

      Impact and Result

      The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.

      Domino – Maintain, Commit to, or Vacate? Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Domino – Maintain, Commit to, or Vacate? – A brief deck that outlines key migration options for HCL Domino platforms.

      This blueprint will help you assess the fit, purpose, and price of Domino options; develop strategies for overcoming potential challenges; and determine the future of Domino for your organization.

      • Domino – Maintain, Commit to, or Vacate? Storyboard

      2. Application Rationalization Tool – A tool to understand your business-developed applications, their importance to business process, and the potential underlying financial impact.

      Use this tool to input the outcomes of your various application assessments.

      • Application Rationalization Tool
      [infographic]

      Further reading

      Domino – Maintain, Commit to, or Vacate?

      Lotus Domino still lives, and you have options for migrating away from or remaining with the platform.

      Executive Summary

      Info-Tech Insight

      “HCL announced that they have somewhere in the region of 15,000 Domino customers worldwide, and also claimed that that number is growing. They also said that 42% of their customers are already on v11 of Domino, and that in the year or so since that version was released, it’s been downloaded 78,000 times. All of which suggests that the Domino platform is, in fact, alive and well.”
      – Nigel Cheshire in Team Studio

      Your Challenge

      You have a Domino/Notes footprint embedded within your business units and business processes. This is taxing your support organization; you are meeting resistance from the business, and you are now asked to help the organization migrate away from the Lotus Notes platform. The Lotus Notes platform was long used by technology and businesses as a multipurpose solution that, over the years, became embedded within core business applications and processes.

      Common Obstacles

      For organizations that are struggling to understand their options for the Domino platform, the depth of business process usage is typically the biggest operational obstacle. Migrating off the Domino platform is a difficult option for most organizations due to business process and application complexity. In addition, migrating clients have to resolve the challenges with more than one replaceable solution.

      Info-Tech Approach

      The most common tactic is for the organization to better understand their Domino migration options and adopt an application rationalization strategy for the Domino applications entrenched within the business. Options include retiring, replatforming, migrating, or staying with your Domino platform.

      Review

      Is “Lotus” Domino still alive?

      Problem statement

      The number of member engagements with customers regarding the Domino platform has, as you might imagine, dwindled in the past couple of years. While many members have exited the platform, there are still many members and organizations that have entered a long exit program, but with how embedded Domino is in business processes, the migration has slowed and been met with resistance. Some organizations had replatformed the applications but found that the replacement target state was inadequate and introduced friction because the new solution was not a low-code/business-user-driven environment. This resulted in returning the Domino platform to production and working through a strategy to maintain the environment.

      This research is designed for:

      • IT strategic direction decision-makers
      • IT managers responsible for an existing Domino platform
      • Organizations evaluating migration options for mission-critical applications running on Domino

      This research will help you:

      1. Evaluate migration options.
      2. Assess the fit and purpose.
      3. Consider strategies for overcoming potential challenges.
      4. Determine the future of this platform for your organization.

      The “everything may work” scenario

      Adopt and expand

      Believe it or not, Domino and Notes are still options to consider when determining a migration strategy. With HCL still committed to the platform, there are options organizations should seek to better understand rather than assuming SharePoint will solve all. In our research, we consider:

      Importance to current business processes

      • Importance of use
      • Complexity in migrations
      • Choosing a new platform

      Available tools to facilitate

      • Talent/access to skills
      • Economies of scale/lower cost at scale
      • Access to technology

      Info-Tech Insight

      With multiple options to consider, take the time to clearly understand the application rationalization process within your decision making.

      • Archive/retire
      • Application migration
      • Application replatform
      • Stay right where you are

      Eliminate your bias – consider the advantages

      “There is a lot of bias toward Domino; decisions are being made by individuals who know very little about Domino and more importantly, they do not know how it impacts business environment.”

      – Rob Salerno, Founder & CTO, Rivet Technology Partners

      Domino advantages include:

      Modern Cloud & Application

      • No-code/low-code technology

      Business-Managed Application

      • Business written and supported
      • Embrace the business support model
      • Enterprise class application

      Leverage the Application Taxonomy & Build

      • A rapid application development platform
      • Develop skill with HCL training

      HCL Domino is a supported and developed platform

      Why consider HCL?

      • Consider scheduling a Roadmap Session with HCL. This is an opportunity to leverage any value in the mission and brand of your organization to gain insights or support from HCL.
      • Existing Domino customers are not the only entities seeking certainty with the platform. Software solution providers that support enterprise IT infrastructure ecosystems (backup, for example) will also be seeking clarity for the future of the platform. HCL will be managing these relationships through the channel/partner management programs, but our observations indicate that Domino integrations are scarce.
      • HCL Domino should be well positioned feature-wise to support low-code/NoSQL demands for enterprises and citizen developers.

      Visualize Your Application Roadmap

      1. Focus on the application portfolio and crafting a roadmap for rationalization.
        • The process is intended to help you determine each application’s functional and technical adequacy for the business process that it supports.
      2. Document your findings on respective application capability heatmaps.
        • This drives your organization to a determination of application dispositions and provides a tool to output various dispositions for you as a roadmap.
      3. Sort the application portfolio into a disposition status (keep, replatform, retire, consolidate, etc.)
        • This information will be an input into any cloud migration or modernization as well as consolidation of the infrastructure, licenses, and support for them.

      Our external support perspective

      by Darin Stahl

      Member Feedback

      • Some members who have remaining Domino applications in production – while the retire, replatform, consolidate, or stay strategy is playing out – have concerns about the challenges with ongoing support and resources required for the platform. In those cases, some have engaged external services providers to augment staff or take over as managed services.
      • While there could be existing support resources (in house or on retainer), the member might consider approaching an external provider who could help backstop the single resource or even provide some help with the exit strategies. At this point, the conversation would be helpful in any case. One of our members engaged an external provider in a Statement of Work for IBM Domino Administration focused on one-time events, Tier 1/Tier 2 support, and custom ad hoc requests.
      • The augmentation with the managed services enabled the member to shift key internal resources to a focus on executing the exit strategies (replatform, retire, consolidate), since the business knowledge was key to that success.
      • The member also very aggressively governed the Domino environment support needs to truly technical issues/maintenance of known and supported functionality rather than coding new features (and increasing risk and cost in a migration down the road) – in short, freezing new features and functionality unless required for legal compliance or health and safety.
      • There obviously are other providers, but at this point Info-Tech no longer maintains a market view or scan of those related to Domino due to low member demand.

      Domino database assessments

      Consider the database.

      • Domino database assessments should be informed through the lens of a multi-value database, like jBase, or an object system.
      • The assessment of the databases, often led by relational database subject matter experts grounded in normalized databases, can be a struggle since Notes databases must be denormalized.
      Key/Value Column

      Use case: Heavily accessed, rarely updated, large amounts of data
      Data Model: Values are stored in a hash table of keys.
      Fast access to small data values, but querying is slow
      Processor friendly
      Based on amazon's Dynamo paper
      Example: Project Voldemort used by LinkedIn

      this is a Key/Value example

      Use case: High availability, multiple data centers
      Data Model: Storage blocks of data are contained in columns
      Handles size well
      Based on Google's BigTable
      Example: Hadoop/Hbase used by Facebook and Yahoo

      This is a Column Example
      Document Graph

      Use case: Rapid development, Web and programmer friendly
      Data Model: Stores documents made up of tagged elements. Uses Key/Value collections
      Better query abilities than Key/Value databases.
      Inspired by Lotus Notes.
      Example: CouchDB used by BBC

      This is a Document Example

      Use case: Best at dealing with complexity and relationships/networks
      Data model: Nodes and relationships.
      Data is processed quickly
      Inspired by Euler and graph theory
      Can easily evolve schemas
      Example: Neo4j

      This is a Graph Example

      Understand your options

      Archive/Retire

      Store the application data in a long-term repository with the means to locate and read it for regulatory and compliance purposes.

      Migrate

      Migrate to a new version of the application, facilitating the process of moving software applications from one computing environment to another.

      Replatform

      Replatforming is an option for transitioning an existing Domino application to a new modern platform (i.e. cloud) to leverage the benefits of a modern deployment model.

      Stay

      Review the current Domino platform roadmap and understand HCL’s support model. Keep the application within the Domino platform.

      Archive/retire

      Retire the application, storing the application data in a long-term repository.

      Abstract

      The most common approach is to build the required functionality in whatever new application/solution is selected, then archive the old data in PDFs and documents.

      Typically this involves archiving the data and leveraging Microsoft SharePoint and the new collaborative solutions, likely in conjunction with other software-as-a-service (SaaS) solutions.

      Advantages

      • Reduce support cost.
      • Consolidate applications.
      • Reduce risk.
      • Reduce compliance and security concerns.
      • Improve business processes.

      Considerations

      • Application transformation
      • eDiscovery costs
      • Legal implications
      • Compliance implications
      • Business process dependencies

      Info-Tech Insights

      Be aware of the costs associated with archiving. The more you archive, the more it will cost you.

      Application migration

      Migrate to a new version of the application

      Abstract

      An application migration is the managed process of migrating or moving applications (software) from one infrastructure environment to another.

      This can include migrating applications from one data center to another data center, from a data center to a cloud provider, or from a company’s on-premises system to a cloud provider’s infrastructure.

      Advantages

      • Reduce hardware costs.
      • Leverage cloud technologies.
      • Improve scalability.
      • Improve disaster recovery.
      • Improve application security.

      Considerations

      • Data extraction, starting from the document databases in NSF format and including security settings about users and groups granted to read and write single documents, which is a powerful feature of Lotus Domino documents.
      • File extraction, starting from the document databases in NSF format, which can contain attachments and RTF documents and embedded files.
      • Design of the final relational database structure; this activity should be carried out without taking into account the original structure of the data in Domino files or the data conversion and loading, from the extracted format to the final model.
      • Design and development of the target-state custom applications based on the new data model and the new selected development platform.

      Application replatform

      Transition an existing Domino application to a new modern platform

      Abstract

      This type of arrangement is typically part of an application migration or transformation. In this model, client can “replatform” the application into an off-premises hosted provider platform. This would yield many benefits of cloud but in a different scaling capacity as experienced with commodity workloads (e.g. Windows, Linux) and the associated application.

      Two challenges are particularly significant when migrating or replatforming Domino applications:

      • The application functionality/value must be reproduced/replaced with not one but many applications, either through custom coding or a commercial-off-the-shelf/SaaS solution.
      • Notes “databases” are not relational databases and will not migrate simply to an SQL database while retaining the same business value. Notes databases are essentially NoSQL repositories and are difficult to normalize.

      Advantages

      • Leverage cloud technologies.
      • Improve scalability.
      • Align to a SharePoint platform.
      • Improve disaster recovery.
      • Improve application security.

      Considerations

      • Application replatform resource effort
      • Network bandwidth
      • New platform terms and conditions
      • Secure connectivity and communication
      • New platform security and compliance
      • Degree of complexity

      Info-Tech Insights

      There is a difference between a migration and a replatform application strategy. Determine which solution aligns to the application requirements.

      Stay with HCL

      Stay with HCL, understanding its future commitment to the platform.

      Abstract

      Following the announced acquisition of IBM Domino and up until around December 2019, HCL had published no future roadmap for the platform. The public-facing information/website at the time stated that HCL acquired “the product family and key lab services to deliver professional services.” Again, there was no mention or emphasis on upcoming new features for the platform. The product offering on their website at the time stated that HCL would leverage its services expertise to advise clients and push applications into four buckets:

      1. Replatform
      2. Retire
      3. Move to cloud
      4. Modernize

      That public-facing messaging changed with release 11.0, which had references to IBM rebranded to HCL for the Notes and Domino product – along with fixes already inflight. More information can be found on HCL’s FAQ page.

      Advantages

      • Known environment
      • Domino is a supported platform
      • Domino is a developed platform
      • No-code/low-code optimization
      • Business developed applications
      • Rapid application framework

      This is the HCL Domino Logo

      Understand your tools

      Many tools are available to help evaluate or migrate your Domino Platform. Here are a few common tools for you to consider.

      Notes Archiving & Notes to SharePoint

      Summary of Vendor

      “SWING Software delivers content transformation and archiving software to over 1,000 organizations worldwide. Our solutions uniquely combine key collaborative platforms and standard document formats, making document production, publishing, and archiving processes more efficient.”*

      Tools

      Lotus Notes Data Migration and Archiving: Preserve historical data outside of Notes and Domino

      Lotus Note Migration: Replacing Lotus Notes. Boost your migration by detaching historical data from Lotus Notes and Domino.

      Headquarters

      Croatia

      Best fit

      • Application archive and retire
      • Migration to SharePoint

      This is an image of the SwingSoftware Logo

      * swingsoftware.com

      Domino Migration to SharePoint

      Summary of Vendor

      “Providing leading solutions, resources, and expertise to help your organization transform its collaborative environment.”*

      Tools

      Notes Domino Migration Solutions: Rivit’s industry-leading solutions and hardened migration practice will help you eliminate Notes Domino once and for all.

      Rivive Me: Migrate Notes Domino applications to an enterprise web application

      Headquarters

      Canada

      Best fit

      • Application Archive & Retire
      • Migration to SharePoint

      This is an image of the RiVit Logo

      * rivit.ca

      Lotus Notes to M365

      Summary of Vendor

      “More than 300 organizations across 40+ countries trust skybow to build no-code/no-compromise business applications & processes, and skybow’s community of customers, partners, and experts grows every day.”*

      Tools

      SkyBow Studio: The low-code platform fully integrated into Microsoft 365

      Headquarters:

      Switzerland

      Best fit

      • Application Archive & Retire
      • Migration to SharePoint

      This is an image of the SkyBow Logo

      * skybow.com | About skybow

      Notes to SharePoint Migration

      Summary of Vendor

      “CIMtrek is a global software company headquartered in the UK. Our mission is to develop user-friendly, cost-effective technology solutions and services to help companies modernize their HCL Domino/Notes® application landscape and support their legacy COBOL applications.”*

      Tools

      CIMtrek SharePoint Migrator: Reduce the time and cost of migrating your IBM® Lotus Notes® applications to Office 365, SharePoint online, and SharePoint on premises.

      Headquarters

      United Kingdom

      Best fit

      • Application replatform
      • Migration to SharePoint

      This is an image of the CIMtrek Logo

      * cimtrek.com | About CIMtrek

      Domino replatform/Rapid application selection framework

      Summary of Vendor

      “4WS.Platform is a rapid application development tool used to quickly create multi-channel applications including web and mobile applications.”*

      Tools

      4WS.Platform is available in two editions: Community and Enterprise.
      The Platform Enterprise Edition, allows access with an optional support pack.

      4WS.Platform’s technical support provides support services to the users through support contracts and agreements.

      The platform is a subscription support services for companies using the product which will allow customers to benefit from the knowledge of 4WS.Platform’s technical experts.

      Headquarters

      Italy

      Best fit

      • Application replatform

      This is an image of the 4WS PLATFORM Logo

      * 4wsplatform.org

      Activity

      Understand your Domino options

      Application Rationalization Exercise

      Info-Tech Insight

      Application rationalization is the perfect exercise to fully understand your business-developed applications, their importance to business process, and the potential underlying financial impact.

      This activity involves the following participants:

      • IT strategic direction decision-makers.
      • IT managers responsible for an existing Domino platform
      • Organizations evaluating platforms for mission-critical applications.

      Outcomes of this step:

      • Completed Application Rationalization Tool

      Application rationalization exercise

      Use this Application Rationalization Tool to input the outcomes of your various application assessments

      In the Application Entry tab:

      • Input your application inventory or subset of apps you intend to rationalize, along with some basic information for your apps.

      In the Business Value & TCO Comparison tab, determine rationalization priorities.

      • Input your business value scores and total cost of ownership (TCO) of applications.
      • Review the results of this analysis to determine which apps should require additional analysis and which dispositions should be prioritized.

      In the Disposition Selection tab:

      • Add to or adapt our list of dispositions as appropriate.

      In the Rationalization Inputs tab:

      • Add or adapt the disposition criteria of your application rationalization framework as appropriate.
      • Input the results of your various assessments for each application.

      In the Disposition Settings tab:

      • Add or adapt settings that generate recommended dispositions based on your rationalization inputs.

      In the Disposition Recommendations tab:

      • Review and compare the rationalization results and confirm if dispositions are appropriate for your strategy.

      In the Timeline Considerations tab:

      • Enter the estimated timeline for when you execute your dispositions.

      In the Portfolio Roadmap tab:

      • Review and present your roadmap and rationalization results.

      Follow the instructions to generate recommended dispositions and populate an application portfolio roadmap.

      This image depicts a scatter plot graph where the X axis is labeled Business Value, and the Y Axis is labeled Cost. On the graph, the following datapoints are displayed: SF; HRIS; ERP; ALM; B; A; C; ODP; SAS

      Info-Tech Insight

      Watch out for misleading scores that result from poorly designed criteria weightings.

      Related Info-Tech Research

      Build an Application Rationalization Framework

      Manage your application portfolio to minimize risk and maximize value.

      Embrace Business-Managed Applications

      Empower the business to implement their own applications with a trusted business-IT relationship.

      Satisfy Digital End Users With Low- and No-Code

      Extend IT, automation, and digital capabilities to the business with the right tools, good governance, and trusted organizational relationships.

      Maximize the Benefits from Enterprise Applications with a Center of Excellence

      Optimize your organization’s enterprise application capabilities with a refined and scalable methodology.

      Drive Successful Sourcing Outcomes With a Robust RFP Process

      Leverage your vendor sourcing process to get better results.

      Research Authors

      Darin Stahl, Principal Research Advisor, Info-Tech Research Group

      Darin Stahl, Principal Research Advisor,
      Info-Tech Research Group

      Darin is a Principal Research Advisor within the Infrastructure practice, leveraging 38+ years of experience. His areas of focus include IT operations management, service desk, infrastructure outsourcing, managed services, cloud infrastructure, DRP/BCP, printer management, managed print services, application performance monitoring, managed FTP, and non-commodity servers (zSeries, mainframe, IBM i, AIX, Power PC).

      Troy Cheeseman, Practice Lead, Info-Tech Research Group

      Troy Cheeseman, Practice Lead,
      Info-Tech Research Group

      Troy has over 24 years of experience and has championed large enterprise-wide technology transformation programs, remote/home office collaboration and remote work strategies, BCP, IT DRP, IT operations and expense management programs, international right placement initiatives, and large technology transformation initiatives (M&A). Additionally, he has deep experience working with IT solution providers and technology (cloud) startups.

      Research Contributors

      Rob Salerno, Founder & CTO, Rivit Technology Partners

      Rob Salerno, Founder & CTO, Rivit Technology Partners

      Rob is the Founder and Chief Technology Strategist for Rivit Technology Partners. Rivit is a system integrator that delivers unique IT solutions. Rivit is known for its REVIVE migration strategy which helps companies leave legacy platforms (such as Domino) or move between versions of software. Rivit is the developer of the DCOM Application Archiving solution.

      Bibliography

      Cheshire, Nigel. “Domino v12 Launch Keeps HCL Product Strategy On Track.” Team Studio, 19 July 2021. Web.

      “Is LowCode/NoCode the best platform for you?” Rivit Technology Partners, 15 July 2021. Web.

      McCracken, Harry. “Lotus: Farewell to a Once-Great Tech Brand.” TIME, 20 Nov. 2012. Web.

      Sharwood, Simon. “Lotus Notes refuses to die, again, as HCL debuts Domino 12.” The Register, 8 June 2021. Web.

      Woodie, Alex. “Domino 12 Comes to IBM i.” IT Jungle, 16 Aug. 2021. Web.

      Make the Case for Product Delivery

      • Buy Link or Shortcode: {j2store}184|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $41,674 Average $ Saved
      • member rating average days saved: 13 Average Days Saved
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Organizations are traditionally organized to deliver initiatives in specific periods of time. This is in contention with product-centric delivery practices. This form of delivery acknowledges the reality that solutions of all shapes and sizes deliver continual and evolving business value over their lifetime.
      • Delivering multiple products together creates additional challenges because each product has its own pedigree, history, and goals.
      • Product owners struggle to prioritize changes to deliver product value. This creates a gap and conflict between product and enterprise goals.

      Our Advice

      Critical Insight

      • Delivering products doesn’t mean you will stop delivering projects! Product-centric delivery is intended to address the misalignment between the long-term delivery of value that organizations demand and the nature of traditional project-focused environments.

      Impact and Result

      • We will help you build a proposal deck to make the case to your stakeholders for product-centric delivery.
      • You will build this proposal deck by answering key questions about product-centric delivery so you can identify:
        • A common definition of product.
        • How this form of delivery differs from traditional project-centric approaches.
        • Key challenges and benefits.
        • The capabilities needed to effectively own products and deliver value.
        • What you are asking of stakeholders.
        • A roadmap of how to get started.

      Make the Case for Product Delivery Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Make the Case for Product Delivery Deck – A guide to help align your organization on the practices to deliver what matters most.

      This project will help you define “product” for your organization, define your drivers and goals for moving to product delivery, understand the role of product ownership, lay out the case to your stakeholders, and communicate what comes next for your transition to product.

      • Make the Case for Product Delivery Storyboard

      2. Make the Case for Product Delivery Presentation Template – A template to help you capture and detail your case for product delivery.

      Build a proposal deck to help make the case to your stakeholders for product-centric delivery.

      • Make the Case for Product Delivery Presentation Template

      3. Make the Case for Product Delivery Workbook – A tool to capture the results of exercises to build your case to change your product delivery method.

      This workbook is designed to capture the results of the exercises in the Make the Case for Product Delivery Storyboard. Each worksheet corresponds to an exercise in the storyboard. The workbook is also a living artifact that should be updated periodically as the needs of your team and organization change.

      • Make the Case for Product Delivery Workbook
      [infographic]

      Further reading

      Make the Case for Product Delivery

      Align your organization on the practices to deliver what matters most.

      Table of Contents

      Define product

      Define your drivers and goals

      Understand the role of product ownership

      Communicate what comes next

      Make the case to your stakeholders

      Appendix: Additional research

      Appendix: Product delivery strategy communication

      Appendix: Manage stakeholder influence

      Appendix: Product owner capability details

      Executive Summary

      Your Challenge
      • Products are the lifeblood of an organization. They deliver the capabilities needed to deliver value to customers, internal users, and stakeholders.
      • Organizations are under pressure to align the value they provide with the organization’s goals and overall company vision.
      • You need to clearly convey the direction and strategy of your product portfolio to gain alignment, support, and funding from your organization.
      Common Obstacles
      • IT organizations are traditionally organized to deliver initiatives in specific periods of time. This is in contention with product-centric delivery.
      • Product delivery acknowledges the reality that solutions of all shapes and sizes deliver continual and evolving business value over their lifetime.
      • Delivering multiple products together creates additional challenges because each product has its own pedigree, history, and goals.
      • Product owners struggle to prioritize changes to deliver product value. This creates a gap and conflict between product and enterprise goals.
      Info-Tech’s Approach
      • Info-Tech will enable you to build a proposal deck to make the case to your stakeholders for product-centric delivery.
      • You will build this proposal deck by answering key questions about product-centric delivery so you can identify:
        • A common definition of product.
        • How this form of delivery differs from traditional project-centric approaches.
        • Key challenges and benefits.
        • The capabilities needed to effectively own products and deliver value.
        • What you are asking of stakeholders.
        • A roadmap of how to get started.

      Info-Tech Insight

      Delivering products doesn’t mean you will stop delivering projects! Product-centric delivery is intended to address the misalignment between the long-term delivery of value that organizations demand and the nature of traditional project-focused environments.

      Many executives perceive IT as being poorly aligned with business objectives

      Info-Tech’s CIO Business Vision Survey data highlights the importance of IT initiatives in supporting the business in achieving its strategic goals.

      However, Info-Tech’s CEO-CIO Alignment Survey (2021; N=58) data indicates that CEOs perceive IT to be poorly aligned to business’ strategic goals.

      Info-Tech CEO-CIO Alignment Diagnostics, 2021 (N=58)

      40% Of CEOs believe that business goals are going unsupported by IT.

      34% Of business stakeholders are supporters of their IT departments (n=334).

      40% Of CIOs/CEOs are misaligned on the target role for IT.

      Info-Tech Insight

      Great technical solutions are not the primary driver of IT success. Focusing on delivery of digital products that align with organizational goals will produce improved outcomes and will foster an improved relationship between business and IT.

      Increase product success by involving IT, business, and customers in your product roadmaps, planning, and delivery

      Product management and delivery seek to promote improved relationships among IT, business, and customers, a critical driver for business satisfaction.

      IT

      Stock image of an IT professional.

      1

      Collaboration

      IT, business, and customers work together through all stages of the product lifecycle, from market research through the roadmapping and delivery processes and into maintenance and retirement. The goal is to ensure the risks and dependencies are realized before work is committed.

      Stakeholders, Customers, and Business

      Stock image of a business professional.

      2

      Communication

      Prioritize high-value modes of communication to break down existing silos and create common understanding and alignment across functions. This approach increases transparency and visibility across the entire product lifecycle.

      3

      Integration

      Explore methods to integrate the workflows, decision making, and toolsets among the business, IT, and customers. The goal is to become more reactive to changes in business and customer expectations and more proactive about market trends.

      Product does not mean the same thing to everyone

      Do not expect a universal definition of products.
      Every organization and industry has a different definition of what a product is. Organizations structure their people, processes, and technologies according to their definition of the products they manage. Conflicting product definitions between teams increase confusion and misalignment of product roadmaps.

      “A product [is] something (physical or not) that is created through a process and that provides benefits to a market.” (Mike Cohn, Founding Member of Agile Alliance and Scrum Alliance) “A product is something ... that is created and then made available to customers, usually with a distinct name or order number.” (TechTarget) “A product is the physical object ... , software or service from which customer gets direct utility plus a number of other factors, services, and perceptions that make the product useful, desirable [and] convenient.” (Mark Curphey)

      Organizations need a common understanding of what a product is and how it pertains to the business.

      This understanding needs to be accepted across the organization.

      “There is not a lot of guidance in the industry on how to define [products]. This is dangerous because what will happen is that product backlogs will be formed in too many areas. All that does is create dependencies and coordination across teams … and backlogs.” (Chad Beier, “How Do You Define a Product?” Scrum.org)

      Products enable the long-term and continuous delivery of value

      Diagram laying out the lifecycles and roadmaps contributing to the 'Continuous delivery of value'. Beginning with 'Project Lifecycle' in which Projects with features and services end in a Product Release that is disconnected from the continuum. Then the 'Hybrid Lifecycle' and 'Product Lifecycle' which are connected by a 'Product Roadmap' and 'Product Backlog' have Product Releases that connect to the continuum.

      Phase 1

      Build the case for product-centric delivery

      Phase 1
      1.1 Define product
      1.2 Define your drivers and goals
      1.3 Understand the role of product ownership
      1.4 Communicate what comes next
      1.5 Make the case to your stakeholders

      This phase will walk you through the following activities:

      • Define product in your context.
      • Define your drivers and goals for moving to product delivery.
      • Understand the role of product ownership.
      • Communicate what comes next for your transition to product.
      • Lay out the case to your stakeholders.

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Step 1.1

      Define product

      Activities
      • 1.1.1 Define “product” in your context
      • 1.1.2 Consider examples of what is (and is not) a product in your organization
      • 1.1.3 Identify the differences between project and product delivery

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • A clear definition of product in your organization’s context.

      Make the Case for Product Delivery

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5

      Exercise 1.1.1 Define “product” in your context

      30-60 minutes

      Output: Your enterprise/organizational definition of products and services

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Discuss what “product” means in your organization.
      2. Create a common, enterprise-wide definition for “product.”
      “A product [is] something (physical or not) that is created through a process and that provides benefits to a market.” (Mike Cohn, Founding Member of Agile Alliance and Scrum Alliance) “A product is something ... that is created and then made available to customers, usually with a distinct name or order number.” (TechTarget) “A product is the physical object ... , software or service from which customer gets direct utility plus a number of other factors, services, and perceptions that make the product useful, desirable [and] convenient.” (Mark Curphey)

      Record the results in the Make the Case for Product-Centric Delivery Workbook.

      Example: What is a product?

      Not all organizations will define products in the same way. Take this as a general example:

      “A tangible solution, tool, or service (physical or digital) that enables the long-term and evolving delivery of value to customers and stakeholders based on business and user requirements.”

      Info-Tech Insight

      A proper definition of product recognizes three key facts:

      1. Products are long-term endeavors that don’t end after the project finishes.
      2. Products are not just “apps” but can be software or services that drive the delivery of value.
      3. There is more than one stakeholder group that derives value from the product or service.
      Stock image of an open human head with gears and a city for a brain.

      How do we know what is a product?

      What isn’t a product:
      • Features (on their own)
      • Transactions
      • Unstructured data
      • One-time solutions
      • Non-repeatable processes
      • Solutions that have no users or consumers
      • People or teams
      You have a product if the given item...
      • Has end users or consumers
      • Delivers quantifiable value
      • Evolves or changes over time
      • Has predictable delivery
      • Has definable boundaries
      • Has a cost to produce and operate

      Exercise 1.1.2 Consider examples of what is (and is not) a product in your organization

      15 minutes

      Output: Examples of what is and isn’t a product in your specific context.

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Leverage the definition you created in exercise 1.1.1 and the explanation on the slide What is a product?
      2. Pick examples that effectively show the difference between products and non-products and facilitate a conversation on the ones that seem to be on the line. Specific server instances, or instances of providing a service, are worthwhile examples to consider.
      3. From the list you come up with, take the top three examples and put them into the Make the Case for Product Delivery Presentation Template.
      Example:
      What isn’t a product?
      • Month-end SQL scripts to close the books
      • Support Engineer doing a password reset
      • Latest research project in R&D
      What is a product?
      • Self-service password reset portal
      • Oracle ERP installation
      • Microsoft Office 365

      Record the results in the Make the Case for Product Delivery Workbook.

      Product delivery practices should consider everything required to support it, not just what users see.

      Cross-section of an iceberg above and below water with visible product delivery practices like 'Funding', 'External Relationships', and 'Stakeholder Management' above water and internal product delivery practices like 'Product Governance', 'Business Functionality', and 'R&D' under water. There are far more processes below the water.

      Products and services share the same foundation and best practices

      For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. Product is used for consistency but would apply to services as well.

      Product = Service

      “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:
      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Exercise 1.1.3 Identify the differences between project and product delivery

      30-60 minutes

      Output: List of differences between project and product delivery

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Consider project delivery and product delivery.
      2. Discuss what some differences are between the two.
        Note: This exercise is not about identifying the advantages and disadvantages of each style of delivery. This is to identify the variation between the two.
      Theme Project Delivery (Current) Product Delivery (Future)
      Timing Defined start and end Does not end until the product is no longer needed
      Funding Funding projects Funding products and teams
      Prioritization LoB sponsors Product owner
      Capacity Management Project management Managed by product team

      Record the results in the Make the Case for Product Delivery Workbook.

      Identify the differences between a project-centric and a product-centric organization

      Project Product
      Fund projects — Funding –› Fund products or teams
      Line of business sponsor — Prioritization –› Product owner
      Makes specific changes to a product —Product management –› Improves product maturity and support
      Assignment of people to work — Work allocation –› Assignment of work to product teams
      Project manager manages — Capacity management –› Team manages capacity

      Info-Tech Insights

      • Product ownership should be one of your first areas of focus when transitioning from project to product delivery.
      • Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.

      Projects can be a mechanism for funding product changes and improvements

      Diagram laying out the lifecycles and roadmaps contributing to the 'Continuous delivery of value'. Beginning with 'Project Lifecycle' in which Projects with features and services end in a Product Release that is disconnected from the continuum. Then the 'Hybrid Lifecycle' and 'Product Lifecycle' which are connected by a 'Product Roadmap' and 'Product Backlog' have Product Releases that connect to the continuum. Projects within products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

      The purpose of projects is to deliver the scope of a product release. The shift to product delivery leverages a product roadmap and backlog as the mechanism for defining and managing the scope of the release.

      Eventually, teams progress to continuous integration/continuous delivery (CI/CD) where they can release on demand or as scheduled, requiring org change management.

      Step 1.2

      Define your drivers and goals

      Activities
      • 1.2.1 Understand your drivers for product-centric delivery
      • 1.2.2 Define the goals for your product-centric organization

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • A clear understanding of your motivations and desired outcomes for moving to product delivery.

      Make the Case for Product Delivery

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5

      Exercise 1.2.1 Understand your drivers for product-centric delivery

      30-60 minutes

      Output: Organizational drivers to move to product-centric delivery.

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Identify your pain points in the current delivery model.
      2. What is the root cause of these pain points?
      3. How will a product-centric delivery model fix the root cause (drivers)?
      Pain Points
      • Lack of ownership
      Root Causes
      • Siloed departments
      Drivers
      • Accountability

      Record the results in the Make the Case for Product Delivery Workbook.

      Exercise 1.2.2 Define the goals for your product-centric organization

      30 minutes

      Output: Goals for product-centric delivery

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Review the differences between project and product delivery from exercise 1.1.3 and the list of drivers from exercise 1.2.1.
      2. Define your goals for achieving a product-centric organization.
        Note: Your drivers may have already covered the goals. If so, review if you would like to change the drivers based on your renewed understanding of the differences between project and product delivery.
      Pain Points
      • Lack of ownership
      Root Causes
      • Siloed departments
      Drivers
      • Accountability
      Goals
      • End-to-end ownership

      Record the results in the Make the Case for Product Delivery Workbook.

      Step 1.3

      Understand the role of product ownership

      Activities
      • 1.3.1 Identify product ownership capabilities

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • Product owner capabilities that you agree are critical to start your product transformation.

      Make the Case for Product Delivery

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5

      Accountability for the delivery of value through product ownership is not optional

      Tree of 'Enterprise Goals and Priorities' leading to 'Product' through a 'Product Family'.

      Info-Tech Insight

      People treat the assignment of accountability for products (aka product ownership) as optional. Without assigning accountability up front, your transition to product delivery will stall. Accountable individuals will be focused on the core outcome for product delivery, which is the delivery of the right value, at the right time, to the right people.

      Description of the tree levels shown in the diagram on the left. First is 'Enterprise Goals and Priorities', led by 'Executive Leadership' using the 'Enterprise Strategic Roadmap'. Second is 'Product Family', led by 'Product Manager' using the 'Product Family Roadmap'. Last is 'Product', led by the 'Product Owner' using the 'Product Roadmap' and 'Backlog' on the strategic end, and 'Releases' on the Tactical end. In the holistic context, 'Product Family is considered 'Strategic' while 'Product' is 'Tactical'.

      Recognize the different product owner perspectives

      Business
      • Customer facing, revenue generating
      Technical
      • IT systems and tools
      Operations
      • Keep the lights on processes

      Info-Tech Best Practice

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Info-Tech Insight

      Recognize that product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their perspective.

      “A Product Owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The Product Owner is someone who really 'owns' the product.” (Robbin Schuurman, “Tips for Starting Product Owners”)

      Implement the Info-Tech product owner capability model

      As discussed in Build a Better Product Owner, most product owners operate with an incomplete knowledge of the skills and capabilities needed to perform the role. Common gaps include focusing only on product backlogs, acting as a proxy for product decisions, and ignoring the need for key performance indicators (KPIs) and analytics in both planning and value realization. 'Product Owner Capabilities': 'Vision', 'Leadership', 'Product Lifecycle Management', 'Value Realization'.
      Vision
      • Market Analysis
      • Business Alignment
      • Product Roadmap
      Leadership
      • Soft Skills
      • Collaboration
      • Decision Making
      Product Lifecycle Management
      • Plan
      • Build
      • Run
      Value Realization
      • KPIs
      • Financial Management
      • Business Model

      Details on product ownership capabilities can be found in the appendix.

      Exercise 1.3.1 Identify product ownership capabilities

      60 minutes

      Output: Product owner capability mapping

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Write down the capabilities product owners need to perform their duties (one per sticky note) in order to describe product ownership in your organization. Consider people, processes, and tools.
      2. Mark each capability with a plus (current capability), circle (some proficiency), or dash (missing capability).
      3. Discuss each capability and place on the appropriate quadrant.

      'Product Owner Capabilities': 'Vision', 'Leadership', 'Product Lifecycle Management', 'Value Realization'.

      Record the results in the Make the Case for Product Delivery Workbook.

      Differentiate between product owners and product managers

      Product Owner (Tactical Focus)
      • Backlog management and prioritization
      • Epic/story definition, refinement in conjunction with business stakeholders
      • Sprint planning with Scrum Master
      • Working with Scrum Master to minimize disruption to team velocity
      • Ensuring alignment between business and Scrum teams during sprints
      • Profit and loss (P&L) product analysis and monitoring
      Product Manager (Strategic Focus)
      • Product strategy, positioning, and messaging
      • Product vision and product roadmap
      • Competitive analysis and positioning
      • New product innovation/definition
      • Release timing and focus (release themes)
      • Ongoing optimization of product-related marketing and sales activities
      • P&L product analysis and monitoring

      Info-Tech Insight

      “Product owner” and “product manager” are terms that should be adapted to fit your culture and product hierarchy. These are not management relationships but rather a way to structure related products and services that touch the same end users.

      Step 1.4

      Communicate what comes next

      Activities
      • 1.4.1 How do we get started?

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • A now, next, later roadmap indicating your overall next steps.

      Make the Case for Product Delivery

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5

      Make a plan in order to make a plan!

      Consider some of the techniques you can use to validate your strategy.

      Cyclical diagram of the 'Continuous Delivery of Value' within 'Business Value'. Surrounding attributes are 'User Centric', 'Adaptable', 'Accessible', 'Private & Secured', 'Informative & Insightful', 'Seamless Application Connection', 'Relationship & Network Building', 'Fit for Purpose'.

      Go to your backlog and prioritize the elements that need to be answered sooner rather than later.

      Possible areas of focus:

      • Regulatory requirements or questions to answer around accessibility, security, privacy.
      • Stress testing any new processes against situations that may occur.
      Learning Milestones

      The completion of a set of artifacts dedicated to validating business opportunities and hypotheses.

      Possible areas of focus:

      • Align teams on product strategy prior to build
      • Market research and analysis
      • Dedicated feedback sessions
      • Provide information on feature requirements
      Stock image of people learning.
      Sprint Zero (AKA Project-before-the-project)

      The completion of a set of key planning activities, typically the first sprint.

      Possible areas of focus:

      • Focus on technical verification to enable product development alignment
      • Sign off on architectural questions or concerns
      Stock photo of a person writing on a board of sticky notes.

      The “Now, Next, Later” roadmap

      Use this when deadlines and delivery dates are not strict. This is best suited for brainstorming a product plan when dependency mapping is not required.

      • Now
        What are you going to do now?
      • Next
        What are you going to do very soon?
      • Later
        What are you going to do in the future?
      A priority map laid out as a half rainbow with 'Now' as the inner, 'Next' as the middle, and 'Later' as the outer. Various 'Features', 'Releases', and an 'MVP' are mapped into the sections.
      (Source: “Tips for Agile product roadmaps & product roadmap examples,” Scrum.org, 2017)

      Exercise 1.4.1 How do we get started?

      30-60 minutes

      Output: Product transformation critical steps and basic roadmap

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Identify what the critical steps are for the organization to embrace product-centric delivery.
      2. Group each critical step by how soon you need to address it:
        • Now: Let’s do this ASAP.
        • Next: Sometime very soon, let’s do these things.
        • Later: Much further off in the distance, let’s consider these things.
      A priority map laid out as a half rainbow with 'Now' as the inner, 'Next' as the middle, and 'Later' as the outer. Various 'Features', 'Releases', and an 'MVP' are mapped into the sections.
      (Source: “Tips for Agile product roadmaps & product roadmap examples,” Scrum.org, 2017)

      Record the results in the Make the Case for Product Delivery Workbook.

      Example

      Example table for listing tasks to complete Now, Next, or Later

      Step 1.5

      Make the case to your stakeholders

      Activities
      • 1.5.1 Identify what support you need from your stakeholders
      • 1.5.2 Build your pitch for product delivery

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • A deliverable that helps make the case for product delivery.

      Make the Case for Product Delivery

      Step 1.1 Step 1.2 Step 1.3 Step 1.4 Step 1.5

      Develop a stakeholder strategy to define your product owner landscape

      Stakeholder Influence

      Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner is able to accomplish.

      Product teams operate within this network of stakeholders who represent different perspectives within the organization.

      See the appendix for activities and guidance on how to devise a strategy for managing stakeholders.

      Image of four puzzle pieces being put together, labelled 'Product Lifecycle', 'Project Delivery', 'Operational Support', 'and Stakeholder Management'.

      Exercise 1.5.1 Identify what support you need from your stakeholders

      30 minutes

      Output: Clear understanding of stakeholders, what they need from you, and what you need from them.

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. If you don’t yet know who your stakeholders are, consider completing one or more of the stakeholder management exercises in the appendix.
      2. Identify your key stakeholders who have an interest in solution delivery.
      3. Consider their perspective on product-centric delivery. (For example: For head of support, what does solution delivery mean to them?)
      4. Identify what role each stakeholder would play in the transformation.
        • This role represents what you need from them for this transformation to product-centric delivery.
      Stakeholder
      What does solution delivery mean to them?
      What do you need from them in order to be successful?

      Record the results in the Make the Case for Product Delivery Workbook.

      Exercise 1.5.2 Build your pitch deck

      30 minutes (and up)

      Output: A completed presentation to help you make the case for product delivery.

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Take the results from the Make the Case for Product Delivery Workbook and transfer them into the presentation template.
      2. Follow the instructions on each page listed in the instruction bubbles to know what results to place where.
      3. This is meant to be a template; you are welcome to add and remove slides as needed to suit your audience!

      Sample of slides from the Make the Case for Product Delivery Workbook with instruction bubbles overlaid.

      Record the results in the Make the Case for Product Delivery Workbook.

      Appendix

      Additional research to start your journey

      Related Info-Tech Research

      Product Delivery

      Deliver on Your Digital Product Vision

      • Build a product vision your organization can take from strategy through execution.

      Build a Better Product Owner

      • Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

      Build Your Agile Acceleration Roadmap

      • Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.

      Implement Agile Practices That Work

      • Improve collaboration and transparency with the business to minimize project failure.

      Implement DevOps Practices That Work

      • Streamline business value delivery through the strategic adoption of DevOps practices.

      Deliver Digital Products at Scale

      • Deliver value at the scale of your organization through defining enterprise product families.

      Extend Agile Practices Beyond IT

      • Further the benefits of Agile by extending a scaled Agile framework to the business.

      Build Your BizDevOps Playbook

      • Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.

      Embed Security Into the DevOps Pipeline

      • Shift security left to get into DevSecOps.

      Spread Best Practices With an Agile Center of Excellence

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Application Portfolio Management

      Application Portfolio Management (APM) Research Center

      • See an overview of the APM journey and how we can support the pieces in this journey.

      Application Portfolio Management for Small Enterprises

      • There is no one-size-fits-all rationalization. Tailor your framework to meet your goals.

      Streamline Application Maintenance

      • Effective maintenance ensures the long-term value of your applications.

      Build an Application Rationalization Framework

      • Manage your application portfolio to minimize risk and maximize value.

      Modernize Your Applications

      • Justify modernizing your application portfolio from both business and technical perspectives.

      Review Your Application Strategy

      • Ensure your applications enable your business strategy.

      Application Portfolio Management Foundations

      • Ensure your application portfolio delivers the best possible return on investment.

      Streamline Application Management

      • Move beyond maintenance to ensuring exceptional value from your apps.

      Optimize Applications Release Management

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Embrace Business-Managed Applications

      • Empower the business to implement their own applications with a trusted business-IT relationship.

      Related Info-Tech Research

      Value, Delivery Metrics, Estimation

      Build a Value Measurement Framework

      • Focus product delivery on business value–driven outcomes.

      Select and Use SDLC Metrics Effectively

      • Be careful what you ask for, because you will probably get it.

      Application Portfolio Assessment: End User Feedback

      • Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.

      Create a Holistic IT Dashboard

      • Mature your IT department by measuring what matters.

      Refine Your Estimation Practices With Top-Down Allocations

      • Don’t let bad estimates ruin good work.

      Estimate Software Delivery With Confidence

      • Commit to achievable software releases by grounding realistic expectations

      Reduce Time to Consensus With an Accelerated Business Case

      • Expand on the financial model to give your initiative momentum.

      Optimize IT Project Intake, Approval, and Prioritization

      • Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.

      Enhance PPM Dashboards and Reports

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Related Info-Tech Research

      Org Design and Performance

      Redesign Your IT Organizational Structure

      • Focus product delivery on business value–driven outcomes.

      Build a Strategic IT Workforce Plan

      • Have the right people, in the right place, at the right time.

      Implement a New IT Organizational Structure

      • Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.

      Build an IT Employee Engagement Program

      • Measure employee sentiment to drive IT performance

      Set Meaningful Employee Performance Measures

      • Set holistic measures to inspire employee performance.

      Master Organizational Change Management Practices

      • PMOs, if you don't know who is responsible for org change, it's you.

      Appendix

      Product delivery strategy communication

      Product roadmaps guide delivery and communicate your strategy

      In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.

      Diagram on how to get from product owner capabilities to 'Business Value Realization' through 'Product Roadmap' with a 'Tiered Backlog', 'Delivery Capacity and Throughput' via a 'Product Delivery Pipeline'.
      (Adapted from: Pichler, “What Is Product Management?”)

      Info-Tech Insight

      The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver.
      Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      Two-part diagram showing the 'Product Backlog' segmented into '1. Current: Features/ Stories', '2. Near-term: Capabilities', and '3. Future: Epics', and then the 'Product Roadmap' with the same segments placed into a timeline.

      Multiple roadmap views can communicate differently, yet tell the same truth

      Product managers and product owners have many responsibilities, and a roadmap can be a useful tool to complete those objectives through communication or organization of tasks.

      However, not all roadmaps address the correct audience and achieve those objectives. Care must be taken to align the view to the given audience.

      Pie Chart showing the surveyed most important reason for using a product roadmap. From largest to smallest are 'Communicate a strategy', 'Plan and prioritize', 'Communicate milestones and releases', 'Get consensus on product direction', and 'Manage product backlog'.
      Surveyed most important reason for using a product roadmap (Source: ProductPlan, 2018)

      Audience
      Business/ IT leaders Users/Customers Delivery teams
      Roadmap View
      Portfolio Product Technology
      Objectives
      To provide a snapshot of the portfolio and priority apps To visualize and validate product strategy To coordinate and manage teams and show dev. progress
      Artifacts
      Line items or sections of the roadmap are made up of individual apps, and an artifact represents a disposition at its highest level. Artifacts are generally grouped by various product teams and consist of strategic goals and the features that realize those goals. Artifacts are grouped by the teams who deliver that work and consist of features and technical enablers that support those features.

      Appendix

      Managing stakeholder influence

      From Build a Better Product Owner

      Step 1.3 (from Build a Better Product Owner)

      Manage Stakeholder Influence

      Activities
      • 1.3.1 Visualize interrelationships to identify key influencers
      • 1.3.2 Group your product owners into categories
      • 1.3.3 Prioritize your stakeholders
      • 1.3.4 Delegation Poker: Reach better decisions

      This step will walk you through the following activities:

      To be successful, product owners need to identify and manage all stakeholders for their products. This step will build a stakeholder map and strategy.

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Delivery managers
      • Business analysts

      Outcomes of this step

      • Relationships among stakeholders and influencers
      • Categorization of stakeholders and influencers
      • Stakeholder and influencer prioritization
      • Better understanding of decision-making approaches and delegation
      Product Owner Foundations
      Step 1.1 Step 1.2 Step 1.3

      Develop a product owner stakeholder strategy

      Stakeholder Influence

      Stakeholders are a critical cornerstone to product ownership. They provide the context, alignment, and constraints that influence or control what a product owner is able to accomplish.

      Product owners operate within this network of stakeholders who represent different perspectives within the organization.

      First, product owners must identify members of their stakeholder network. Next, they should devise a strategy for managing stakeholders.

      Without accomplishing these missing pieces, product owners will encounter obstacles, resistance, or unexpected changes.

      Image of four puzzle pieces being put together, labelled 'Product Lifecycle', 'Project Delivery', 'Operational Support', 'and Stakeholder Management'.

      Create a stakeholder network map to product roadmaps and prioritization

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

      Legend
      Black arrow with a solid line and single direction. Black arrows indicate the direction of professional influence
      Green arrow with a dashed line and bi-directional. Dashed green arrows indicate bidirectional, informal influence relationships

      Info-Tech Insight

      Your stakeholder map defines the influence landscape your product operates in. It is every bit as important as the teams who enhance, support, and operate your product directly.

      Use “connectors” to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantive relationships with your stakeholders.

      1.3.1 Visualize interrelationships to identify key influencers

      60 minutes

      Input: List of product stakeholders

      Output: Relationships among stakeholders and influencers

      Materials: Whiteboard/flip charts, Markers, Build a Better Product Owner Workbook

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. List direct stakeholders for your product.
      2. Determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
      3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
      4. Construct a diagram linking stakeholders and their influencers together.
        1. Use black arrows to indicate the direction of professional influence.
        2. Use dashed green arrows to indicate bidirectional, informal influence relationships.
      5. Record the results in the Build a Better Product Owner Workbook.

      Record the results in the Build a Better Product Owner Workbook.

      Categorize your stakeholders with a prioritization map

      A stakeholder prioritization map helps product owners categorize their stakeholders by their level or influence and ownership in the product and/or teams.

      Stakeholder prioritization map split into four quadrants along two axes, 'Influence', and 'Ownership/Interest': 'Players' (high influence, high interest); 'Mediators' (high influence, low interest); 'Noisemakers' (low influence, high interest); 'Spectators' (low influence, low interest). Source: Info-Tech Research Group

      There are four areas in the map, and the stakeholders within each area should be treated differently.
      • Players – players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.
      • Mediators – mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.
      • Noisemakers – noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.
      • Spectators – generally, spectators are apathetic and have little influence over or interest in the initiative.

      1.3.2 Group your product owners into categories

      30 minutes

      Input: Stakeholder map

      Output: Categorization of stakeholders and influencers

      Materials: Whiteboard/flip charts, Markers, Build a Better Product Owner Workbook

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Identify your stakeholder’s interest in and influence on your Agile implementation as high, medium, or low by rating the attributes below.
      2. Map your results to the model below to determine each stakeholder’s category.
      3. Record the results in the Build a Better Product Owner Workbook.
      Same stakeholder prioritization map as before but with example positions mapped onto it.
      Level of Influence
      • Power: Ability of a stakeholder to effect change.
      • Urgency: Degree of immediacy demanded.
      • Legitimacy: Perceived validity of stakeholder’s claim.
      • Volume: How loud their “voice” is or could become.
      • Contribution: What they have that is of value to you.
      Level of Interest

      How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product?

      Record the results in the Build a Better Product Owner Workbook.

      Prioritize your stakeholders

      There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

      Stakeholder prioritization table with 'Stakeholder Category' as row headers ('Player', 'Mediator', 'Noisemaker', 'Spectator') and 'Level of Support' as column headers ('Supporter', 'Evangelist', 'Neutral', 'Blocker'). Importance ratings are 'Critical', 'High', 'Medium', 'Low', and 'Irrelevant'.

      Consider the three dimensions for stakeholder prioritization: influence, interest, and support. Support can be determined by rating the following question: how likely is it that your stakeholder would recommend your product? These parameters are used to prioritize which stakeholders are most important and should receive the focus of your attention. The table to the right indicates how stakeholders are ranked.

      1.3.3 Prioritize your stakeholders

      30 minutes

      Input: Stakeholder matrix, Stakeholder prioritization

      Output: Stakeholder and influencer prioritization

      Materials: Whiteboard/flip charts, Markers, Build a Better Product Owner Workbook

      Participants: Product owners, Product managers, Development team leads, Portfolio managers, Business analysts

      1. Identify the level of support of each stakeholder by answering the following question: how likely is it that your stakeholder would endorse your product?
      2. Prioritize your stakeholders using the prioritization scheme on the previous slide.
      3. Record the results in the Build a Better Product Owner Workbook.
      Stakeholder Category Level of Support Prioritization
      CMO Spectator Neutral Irrelevant
      CIO Player Supporter Critical

      Record the results in the Build a Better Product Owner Workbook.

      Define strategies for engaging stakeholders by type

      Stakeholder strategy map assigning stakeholder strategies to stakeholder categories, as described in the adjacent table.

      Info-Tech Insight

      Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying your stakeholder groups, the product owner can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers, while ensuring the needs of the Mediators and Players are met.

      Type Quadrant Actions
      Players High influence; high interest – actively engage Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success.
      Mediators High influence; low interest – keep satisfied They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.
      Noisemakers Low influence; high interest – keep informed Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.
      Spectators Low influence; low interest – monitor They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      Appendix

      Product owner capability details

      From Build a Better Product Owner

      Develop product owner capabilities

      Capability 'Vision' with sub-capabilities 'Market Analysis, 'Business Alignment', and 'Product Roadmap'.

      Each capability has three components needed for successful product ownership.

      Definitions are on the following slides.

      Central diagram title 'Product Owner Capabilities'.

      Define the skills and activities in each component that are directly related to your product and culture.

      Capability 'Leadership' with sub-capabilities 'Soft Skills', 'Collaboration', and 'Decision Making'.
      Capability 'Product Lifecycle Management' with sub- capabilities 'Plan', 'Build', and 'Run'. Capability 'Value Realization' with sub-capabilities 'KPIs', 'Financial Management', and 'Business Model'.

      Capabilities: Vision

      Market Analysis

      • Unique solution: Identify the target users and unique value your product provides that is not currently being met.
      • Market size: Define the size of your user base, segmentation, and potential growth.
      • Competitive analysis: Determine alternative solutions, products, or threats that affect adoption, usage, and retention.

      Business Alignment

      • SWOT analysis: Complete a SWOT analysis for your end-to-end product lifecycle. Use Info-Tech’s Business SWOT Analysis Template.
      • Enterprise alignment: Align product to enterprise goals, strategies, and constraints.
      • Delivery strategy: Develop a delivery strategy to achieve value quickly and adapt to internal and external changes.

      Product Roadmap

      • Roadmap strategy: Determine the duration, detail, and structure of your roadmap to accurately communicate your vision.
      • Value prioritization: Define criteria used to evaluate and sequence demand.
      • Go to market strategy: Create organizational change management, communications, and a user implementation approach.

      Info-Tech Insight

      Data comes from many places and may still not tell the complete story.

      Capability 'Vision' with sub-capabilities 'Market Analysis, 'Business Alignment', and 'Product Roadmap'.

      “Customers are best heard through many ears.” (Thomas K. Connellan, Inside the Magic Kingdom)

      Capabilities: Leadership

      Soft Skills

      • Communication: Maintain consistent, concise, and appropriate communication using SMART guidelines (specific, measurable, attainable, relevant, and timely).
      • Integrity: Stick to your values, principles, and decision criteria for the product to build and maintain trust with your users and teams.
      • Influence: Manage stakeholders using influence and collaboration over contract negotiation.

      Collaboration

      • Stakeholder management: Build a communications strategy for each stakeholder group, tailored to individual stakeholders.
      • Relationship management: Use every interaction point to strengthen relationships, build trust, and empower teams.
      • Team development: Promote development through stretch goals and controlled risks to build team capabilities and performance.

      Decision Making

      • Prioritized criteria: Remove personal bias by basing decisions off data analysis and criteria.
      • Continuous improvement: Balance new features with the need to ensure quality and create an environment of continuous improvement.
      • Team empowerment/negotiation: Push decisions to teams closest to the problem and solution, using Delegation Poker to guide you.

      Info-Tech Insight

      Product owners cannot be just a proxy for stakeholder decisions. The product owner owns product decisions and management of all stakeholders.

      Capability 'Leadership' with sub-capabilities 'Soft Skills', 'Collaboration', and 'Decision Making'.

      “Everything walks the walk. Everything talks the talk.” (Thomas K. Connellan, Inside the Magic Kingdom)

      Capabilities: Product lifecycle management

      Plan

      • Product backlog: Follow a schedule for backlog intake, refinement, updates, and prioritization.
      • Journey map: Create an end-user journey map to guide adoption and loyalty.
      • Fit for purpose: Define expected value and intended use to ensure the product meets your end user’s needs.

      Build

      • Capacity management: Work with operations and delivery teams to ensure consistent and stable outcomes.
      • Release strategy: Build learning, release, and critical milestones into a repeatable release plan.
      • Compliance: Build policy compliance into delivery practices to ensure alignment and reduce avoidable risk (privacy, security).

      Run

      • Adoption: Focus attention on end-user adoption and proficiency to accelerate value and maximize retention.
      • Support: Build operational support and business continuity into every team.
      • Measure: Measure KPIs and validate expected value to ensure product alignment to goals and consistent product quality.

      Info-Tech Insight

      Product owners must actively manage the full lifecycle of the product.

      Capability 'Product Lifecycle Management' with sub- capabilities 'Plan', 'Build', and 'Run'.

      “Pay fantastic attention to detail. Reward, recognize, celebrate.” (Thomas K. Connellan, Inside the Magic Kingdom)

      Capabilities: Value realization

      Key Performance Indicators (KPIs)

      • Usability and user satisfaction: Assess satisfaction through usage monitoring and end-user feedback.
      • Value validation: Directly measure performance against defined value proposition, goals, and predicted ROI.
      • Fit for purpose: Verify the product addresses the intended purpose better than other options.

      Financial Management

      • P&L: Manage each product as if it were its own business with profit and loss statements.
      • Acquisition cost/market growth: Define the cost of acquiring a new consumer, onboarding internal users, and increasing product usage.
      • User retention/market share: Verify product usage continues after adoption and solution reaches new user groups to increase value.

      Business Model

      • Defines value proposition: Dedicate your primary focus to understanding and defining the value your product will deliver.
      • Market strategy and goals: Define your acquisition, adoption, and retention plan for users.
      • Financial model: Build an end-to-end financial model and plan for the product and all related operational support.

      Info-Tech Insight

      Most organizations stop with on-time and on-budget. True financial alignment needs to define and manage the full lifecycle P&L.

      Capability 'Value Realization' with sub-capabilities 'KPIs', 'Financial Management', and 'Business Model'.

      “The competition is anyone the customer compares you with.” (Thomas K. Connellan, Inside the Magic Kingdom)

      Avoid common capability gaps

      Vision

      • Focusing solely on backlog refining (tactical only)
      • Ignoring or failing to align product roadmap to enterprise goals
      • Operational support and execution
      • Basing decisions on opinion rather than market data
      • Ignoring or missing internal and external threats to your product

      Leadership

      • Failing to include feedback from all teams who interact with your product
      • Using a command-and-control approach
      • Viewing product owner as only a delivery role
      • Acting as a proxy for stakeholder decisions
      • Avoiding tough strategic decisions in favor of easier tactical choices

      Product Lifecycle Management

      • Focusing on delivery and not the full product lifecycle
      • Ignoring support, operations, and technical debt
      • Failing to build knowledge management into the lifecycle
      • Underestimating delivery capacity, capabilities, or commitment
      • Assuming delivery stops at implementation

      Value Realization

      • Focusing exclusively on “on time/on budget” metrics
      • Failing to measure a 360-degree end-user view of the product
      • Skipping business plans and financial models
      • Limiting financial management to project/change budgets
      • Ignoring market analysis for growth, penetration, and threats

      Bibliography – Product Ownership

      A, Karen. “20 Mental Models for Product Managers.” Medium, Product Management Insider, 2 Aug. 2018. Web.

      Adams, Paul. “Product Teams: How to Build & Structure Product Teams for Growth.” Inside Intercom, 30 Oct. 2019. Web.

      Agile Alliance. “Product Owner.” Agile Alliance, n.d. Web.

      Banfield, Richard, et al. “On-Demand Webinar: Strategies for Scaling Your (Growing) Enterprise Product Team.” Pluralsight, 31 Jan. 2018. Web.

      Blueprint. “10 Ways Requirements Can Sabotage Your Projects Right From the Start.” Blueprint, 2012. Web.

      Breddels, Dajo, and Paul Kuijten. “Product Owner Value Game.” Agile2015 Conference, 2015. Web.

      Cagan, Martin. “Behind Every Great Product.” Silicon Valley Product Group, 2005. Web.

      Cohn, Mike “What is a product?” Mountain Goat Software, 16 Sept. 2016, Web

      Connellan, Thomas K. Inside the Magic Kingdom. Bard Press, 1997. Print.

      Curphey, Mark, “Product Definition.” slideshare.net, 25 Feb. 2007. Web

      Eringa, Ron. “Evolution of the Product Owner.” RonEringa.com, 12 June 2016. Web.

      Fernandes, Thaisa. “Spotify Squad Framework - Part I.” Medium.com, 6 March 2017. Web.

      Galen, Robert. “Measuring Product Ownership – What Does ‘Good’ Look Like?” RGalen Consulting, 5 Aug. 2015. Web.

      Halisky, Merland, and Luke Lackrone. “The Product Owner’s Universe.” Agile Alliance, Agile2016, 2016. Web.

      Kamer, Jurriaan. “How to Build Your Own ‘Spotify Model’.” Medium.com, 9 Feb. 2018. Web.

      Kendis Team. “Exploring Key Elements of Spotify’s Agile Scaling Model.” Medium.com, 23 July 2018. Web.

      Lindstrom, Lowell. “7 Skills You Need to Be a Great Product Owner.” Scrum Alliance, n.d. Web.

      Lukassen, Chris. “The Five Belts Of The Product Owner.” Xebia.com, 20 Sept. 2016. Web.

      Management 3.0. “Delegation Poker Product Image.” Management 3.0, n.d. Web.

      McCloskey, Heather. “Scaling Product Management: Secrets to Defeating Common Challenges.” ProductPlan, 12 July 2019. Web.

      Bibliography – Product Ownership

      McCloskey, Heather. “When and How to Scale Your Product Team.” UserVoice, 21 Feb. 2017. Web.

      Mironov, Rich. “Scaling Up Product Manager/Owner Teams: Rich Mironov's Product Bytes.” Rich Mironov's Product Bytes, Mironov Consulting, 12 April 2014 . Web.

      Overeem, Barry. “A Product Owner Self-Assessment.” Barry Overeem, 6 March 2017. Web.

      Overeem, Barry. “Retrospective: Using the Team Radar.” Barry Overeem, 27 Feb. 2017. Web.

      Pichler, Roman. “How to Scale the Scrum Product Owner.” Roman Pichler, 28 June 2016 . Web.

      Pichler, Roman. “Product Management Framework.” Pichler Consulting Limited, 2014. Web.

      Pichler, Roman. “Sprint Planning Tips for Product Owners.” LinkedIn, 4 Sept. 2018. Web.

      Pichler, Roman. “What Is Product Management?” Pichler Consulting Limited, 26 Nov. 2014. Web.

      Radigan, Dan. “Putting the ‘Flow' Back in Workflow With WIP Limits.” Atlassian, n.d. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Agile Product Management.” Scrum.org, 28 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on (Business) Value.” Scrum.org, 30 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Scrum.org, 5 Dec. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on the Product Vision.” Scrum.org, 29 Nov. 2017. Web.

      Schuurman, Robbin. “Tips for Starting Product Owners.” Scrum.org, 27 Nov. 2017. Web.

      Sharma, Rohit. “Scaling Product Teams the Structured Way.” Monetary Musings, 28 Nov. 2016. Web.

      Bibliography – Product Ownership

      Steiner, Anne. “Start to Scale Your Product Management: Multiple Teams Working on Single Product.” Cprime, 6 Aug. 2019. Web.

      Shirazi, Reza. “Betsy Stockdale of Seilevel: Product Managers Are Not Afraid To Be Wrong.” Austin VOP #50, 2 Oct. 2018. Web.

      “The Standish Group 2015 Chaos Report.” The Standish Group, 2015. Web.

      Theus, Andre. “When Should You Scale the Product Management Team?” ProductPlan, 7 May 2019. Web.

      Tolonen, Arto. “Scaling Product Management in a Single Product Company.” Smartly.io, 26 Apr. 2018. Web.

      Ulrich, Catherine. “The 6 Types of Product Managers. Which One Do You Need?” Medium.com, 19 Dec. 2017. Web.

      VersionOne. “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.

      Verwijs, Christiaan. “Retrospective: Do The Team Radar.” Medium.com, 10 Feb. 2017. Web.

      “How do you define a product?” Scrum.org, 4 April 2017, Web.

      “Product Definition.” TechTarget, Sept. 2005. Web

      Bibliography – Product Roadmap

      Ambysoft. “2018 IT Project Success Rates Survey Results.” Ambysoft. 2018. Web.

      Bastow, Janna. “Creating Agile Product roadmaps Everyone Understands.” ProdPad, 22 Mar. 2017. Accessed Sept. 2018.

      Bastow, Janna. “The Product Tree Game: Our Favorite Way To Prioritize Features.” ProdPad, 21 Feb. 2016. Accessed Sept. 2018.

      Chernak, Yuri. “Requirements Reuse: The State of the Practice.” 2012, Herzlia, Israel, 2012 IEEE International Conference on Software Science, Technology and Engineering, 12 June 2012. Web.

      Fowler, Martin. “Application Boundary.” MartinFowler.com, 11 Sept. 2003. Accessed 20 Nov. 2017.

      Harrin, Elizabeth. “Learn What a Project Milestone Is.” The Balance Careers, 10 May 2018. Accessed Sept. 2018.

      “How to create a product roadmap.” Roadmunk, n.d. Accessed Sept. 2018.

      Johnson, Steve. “How to Master the 3 Horizons of Product Strategy.” Aha!, 24 Sept. 2015. Accessed Sept. 2018.

      Johnson, Steve. “The Product Roadmap vs. the Technology Roadmap.” Aha!, 23 June 2016. Accessed Sept. 2018

      Juncal, Shaun. “How Should You Set Your Product Roadmap Timeframes?” ProductPlan, n.d. Accessed Sept. 2018.

      Leffingwell, Dean. “SAFe 4.0.” Scaled Agile, Inc., 2017. Web.

      Maurya, Ash. “What is a Minimum Viable Product (MVP)?” LEANSTACK, 12 June 2017. Accessed Sept. 2018.

      Pichler, Roman. “10 Tips for Creating an Agile Product Roadmap.” Roman Pichler, 20 July 2016. Accessed Sept. 2018.

      Pichler, Roman. Strategize: Product Strategy and Product Roadmap Practices for the Digital Age. Pichler Consulting, 2016.

      “Product Roadmap Contents: What Should You Include?” ProductPlan, n.d. Accessed 20 Nov. 2017.

      Saez, Andrea. “Why Your Roadmap Is Not a Release Plan.” ProdPad, 23 Oct. 2015. Accessed Sept. 2018.

      Schuurman, Robbin. “Tips for Agile product roadmaps & product roadmap examples.” Scrum.org, 7 Dec. 2017. Accessed Sept. 2018

      Research Contributors and Experts

      Photo of Emily Archer, Lead Business Analyst, Enterprise Consulting, authentic digital agency.

      Emily Archer
      Lead Business Analyst,
      Enterprise Consulting, authentic digital agency

      Emily Archer is a consultant currently working with Fortune 500 clients to ensure the delivery of successful projects, products, and processes. She helps increase the business value returned for organizations’ investments in designing and implementing enterprise content hubs and content operations, custom web applications, digital marketing, and e-commerce platforms.

      Photo of David Berg, Founder & CTO, Strainprint Technologies Inc.

      David Berg
      Founder & CTO
      Strainprint Technologies Inc.

      David Berg is a product commercialization expert that has spent the last 20 years of his career delivering product management and business development services across a broad range of industries. Early in his career, David worked with product management and engineering teams to build core network infrastructure products that secure and power the internet we benefit from today. David’s experience also includes working with clean technologies in the area of clean power generation, agritech, and Internet of Things infrastructure. Over the last five years, David has been focused on his latest venture, Strainprint Technologies, a data and analytics company focused on the medical cannabis industry. Strainprint has built the largest longitudinal medical cannabis dataset in the world with the goal to develop an understanding of treatment behavior, interactions, and chemical drivers to guide future product development.

      Research Contributors and Experts

      Blank photo template.

      Kathy Borneman
      Digital Product Owner, SunTrust Bank

      Kathy Borneman is a senior product owner who helps people enjoy their jobs again by engaging others in end-to-end decision making to deliver software and operational solutions that enhance the client experience and allow people to think and act strategically.

      Photo of Charlie Campbell, Product Owner, Merchant e-Solutions.

      Charlie Campbell
      Product Owner, Merchant e-Solutions

      Charlie Campbell is an experienced problem solver with the ability to quickly dissect situations and recommend immediate actions to achieve resolution, liaise between technical and functional personnel to bridge the technology and communication gap, and work with diverse teams and resources to reach a common goal.

      Research Contributors and Experts

      Photo of Yarrow Diamond, Sr. Director, Business Architecture, Financial Services.

      Yarrow Diamond
      Sr. Director, Business Architecture
      Financial Services

      Yarrow Diamond is an experienced professional with expertise in enterprise strategy development, project portfolio management, and business process reengineering across financial services, healthcare and insurance, hospitality, and real estate environments. She has a master’s in Enterprise Architecture from Penn State University, LSSMBB, PMP, CSM, ITILv3.

      Photo of Cari J. Faanes-Blakey, CBAP, PMI-PBA, Enterprise Business Systems Analyst, Vertex, Inc.

      Cari J. Faanes-Blakey, CBAP, PMI-PBA
      Enterprise Business Systems Analyst,
      Vertex, Inc.

      Cari J. Faanes-Blakey has a history in software development and implementation as a Business Analyst and Project Manager for financial and taxation software vendors. Active in the International Institute of Business Analysis (IIBA), Cari participated on the writing team for the BA Body of Knowledge 3.0 and the certification exam.

      Research Contributors and Experts

      Photo of Kieran Gobey, Senior Consultant Professional Services, Blueprint Software Systems.

      Kieran Gobey
      Senior Consultant Professional Services
      Blueprint Software Systems

      Kieran Gobey is an IT professional with 24 years of experience, focused on business, technology, and systems analysis. He has split his career between external and internal customer-facing roles, and this has resulted in a true understanding of what is required to be a Professional Services Consultant. His problem-solving skills and ability to mentor others have resulted in successful software implementations.

      Kieran’s specialties include deep system troubleshooting and analysis skills, facilitating communications to bring together participants effectively, mentoring, leadership, and organizational skills.

      Photo of Rupert Kainzbauer, VP Product, Digital Wallets, Paysafe Group.

      Rupert Kainzbauer
      VP Product, Digital Wallets
      Paysafe Group

      Rupert Kainzbauer is an experienced senior leader with a passion for defining and delivering products that deliver real customer and commercial benefit. Together with a team of highly experienced and motivated product managers, he has successfully led highly complex, multi-stakeholder payments initiatives, from proposition development and solution design through to market delivery. Their domain experience is in building online payment products in high-risk and emerging markets, remittance, prepaid cards, and mobile applications.

      Research Contributors and Experts

      Photo of Saeed Khan, Founder, Transformation Labs.

      Saeed Khan
      Founder,
      Transformation Labs

      Saeed Khan has been working in high tech for 30 years in both Canada and the US and has held a number of leadership roles in Product Management over that time. He speaks regularly at conferences and has been writing publicly about technology product management since 2005.

      Through Transformation Labs, Saeed helps companies accelerate product success by working with product teams to improve their skills, practices, and processes. He is a cofounder of ProductCamp Toronto and currently runs a Meetup group and global Slack community called Product Leaders, the only global community of senior-level product executives.

      Photo of Hoi Kun Lo, Product Owner, Nielsen.

      Hoi Kun Lo
      Product Owner
      Nielsen

      Hoi Kun Lo is an experienced change agent who can be found actively participating within the IIBA and WITI groups in Tampa, FL, and a champion for Agile, architecture, diversity, and inclusion programs at Nielsen. She is currently a Product Owner in the Digital Strategy team within Nielsen Global Watch Technology.

      Research Contributors and Experts

      Photo of Abhishek Mathur, Sr Director, Product Management, Kasisto, Inc.

      Abhishek Mathur
      Sr Director, Product Management
      Kasisto, Inc.

      Abhishek Mathur is a product management leader, an artificial intelligence practitioner, and an educator. He has led product management and engineering teams at Clarifai, IBM, and Kasisto to build a variety of artificial intelligence applications within the space of computer vision, natural language processing, and recommendation systems. Abhishek enjoys having deep conversations about the future of technology and helping aspiring product managers enter and accelerate their careers.

      Photo of Jeff Meister, Technology Advisor and Product Leader.

      Jeff Meister
      Technology Advisor and Product Leader

      Jeff Meister is a technology advisor and product leader. He has more than 20 years of experience building and operating software products and the teams that build them. He has built products across a wide range of industries and has built and led large engineering, design, and product organizations.

      Jeff most recently served as Senior Director of Product Management at Avanade, where he built and led the product management practice. This involved hiring and leading product managers, defining product management processes, solution shaping and engagement execution, and evangelizing the discipline through pitches, presentations, and speaking engagements.

      Jeff holds a Bachelor of Applied Science (Electrical Engineering) and a Bachelor of Arts from the University of Waterloo, an MBA from INSEAD (Strategy), and certifications in product management, project management, and design thinking.

      Research Contributors and Experts

      Photo of Vincent Mirabelli, Principal, Global Project Synergy Group.

      Vincent Mirabelli
      Principal,
      Global Project Synergy Group

      With over 10 years of experience in both the private and public sectors, Vincent Mirabelli possesses an impressive track record of improving, informing, and transforming business strategy and operations through process improvement, design and re-engineering, and the application of quality to business analysis, project management, and process improvement standards.

      Photo of Oz Nazili, VP, Product & Growth, TWG.

      Oz Nazili
      VP, Product & Growth
      TWG

      Oz Nazili is a product leader with a decade of experience in both building products and product teams. Having spent time at funded startups and large enterprises, he thinks often about the most effective way to deliver value to users. His core areas of interest include Lean MVP development and data-driven product growth.

      Research Contributors and Experts

      Photo of Mark Pearson, Principal IT Architect, First Data Corporation.

      Mark Pearson
      Principal IT Architect
      First Data Corporation

      Mark Pearson is an executive business leader grounded in the process, data, technology, and operations of software-driven business. He knows the enterprise software landscape and is skilled in product, technology, and operations design and delivery within information technology organizations, outsourcing firms, and software product companies.

      Photo of Brenda Peshak, Product Owner, Widget Industries, LLC.

      Brenda Peshak
      Product Owner,
      Widget Industries, LLC

      Brenda Peshak is skilled in business process, analytical skills, Microsoft Office Suite, communication, and customer relationship management (CRM). She is a strong product management professional with a Master’s focused in Business Leadership (MBL) from William Penn University.

      Research Contributors and Experts

      Photo of Mike Starkey, Director of Engineering, W.W. Grainger.

      Mike Starkey
      Director of Engineering
      W.W. Grainger

      Mike Starkey is a Director of Engineering at W.W. Grainger, currently focusing on operating model development, digital architecture, and building enterprise software. Prior to joining W.W. Grainger, Mike held a variety of technology consulting roles throughout the system delivery lifecycle spanning multiple industries such as healthcare, retail, manufacturing, and utilities with Fortune 500 companies.

      Photo of Anant Tailor, Cofounder & Head of Product, Dream Payments Corp.

      Anant Tailor
      Cofounder & Head of Product
      Dream Payments Corp.

      Anant Tailor is a cofounder at Dream Payments where he currently serves as the COO and Head of Product, having responsibility for Product Strategy & Development, Client Delivery, Compliance, and Operations. He has 20+ years of experience building and operating organizations that deliver software products and solutions for consumers and businesses of varying sizes.

      Prior to founding Dream Payments, Anant was the COO and Director of Client Services at DonRiver Inc, a technology strategy and software consultancy that he helped to build and scale into a global company with 100+ employees operating in seven countries.

      Anant is a Professional Engineer with a Bachelor’s degree in Electrical Engineering from McMaster University and a certificate in Product Strategy & Management from the Kellogg School of Management at Northwestern University.

      Research Contributors and Experts

      Photo of Angela Weller, Scrum Master, Businessolver.

      Angela Weller
      Scrum Master, Businessolver

      Angela Weller is an experienced Agile business analyst who collaborates with key stakeholders to attain their goals and contributes to the achievement of the company’s strategic objectives to ensure a competitive advantage. She excels when mediating or facilitating teams.

      Deliver on Your Digital Product Vision

      • Buy Link or Shortcode: {j2store}351|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $133,318 Average $ Saved
      • member rating average days saved: 30 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Product organizations are under pressure to align the value they provide to the organization’s goals and overall company vision.
      • You need to clearly convey your direction, strategy, and tactics to gain alignment, support, and funding from your organization.
      • Products require continuous additions and enhancements to sustain their value. This requires detailed, yet simple communication to a variety of stakeholders.

      Our Advice

      Critical Insight

      • A vision without tactics is an unsubstantiated dream, while tactics without a vision is working without a purpose. You need to have a handle on both to achieve outcomes that are aligned with the needs of your organization.

      Impact and Result

      • Recognize that a vision is only as good as the data that backs it up – lay out a comprehensive backlog with quality built-in that can be effectively communicated and understood through roadmaps.
      • Your intent is only a dream if it cannot be implemented – define what goes into a release plan via the release canvas.
      • Define a communication approach that lets everyone know where you are heading.

      Deliver on Your Digital Product Vision Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a digital product vision that you can stand behind. Review Info-Tech’s methodology and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define a digital product vision

      Define a digital product vision that takes into account your objectives, business value, stakeholders, customers, and metrics.

      • Deliver on Your Digital Product Vision – Phase 1: Define a Digital Product Vision
      • Digital Product Strategy Template
      • Digital Product Strategy Supporting Workbook

      2. Build a better backlog

      Build a structure for your backlog that supports your product vision.

      • Deliver on Your Digital Product Vision – Phase 2: Build a Better Backlog
      • Product Backlog Item Prioritization Tool

      3. Build a product roadmap

      Define standards, ownership for your backlog to effectively communicate your strategy in support of your digital product vision.

      • Deliver on Your Digital Product Vision – Phase 3: Build a Product Roadmap
      • Product Roadmap Tool

      4. Release and deliver value

      Understand what to consider when planning your next release.

      • Deliver on Your Digital Product Vision – Phase 4: Release and Deliver Value

      5. Communicate the strategy – make it happen

      Build a plan for communicating and updating your strategy and where to go next.

      • Deliver on Your Digital Product Vision – Phase 5: Communicate the Strategy – Make It Happen!

      Infographic

      Workshop: Deliver on Your Digital Product Vision

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define a Digital Product Vision

      The Purpose

      Understand the elements of a good product vision and the pieces that back it up.

      Key Benefits Achieved

      Provide a great foundation for an actionable vision and goals people can align to.

      Activities

      1.1 Build out the elements of an effective digital product vision

      Outputs

      Completed product vision definition for a familiar product via the product canvas

      2 Build a Better Backlog

      The Purpose

      Define the standards and approaches to populate your product backlog that support your vision and overall strategy.

      Key Benefits Achieved

      A prioritized backlog with quality throughout that enables alignment and the operationalization of the overall strategy.

      Activities

      2.1 Introduction to key activities required to support your digital product vision

      2.2 What do we mean by a quality backlog?

      2.3 Explore backlog structure and standards

      2.4 Define backlog data, content, and quality filters

      Outputs

      Articulate the activities required to support the population and validation of your backlog

      An understanding of what it means to create a quality backlog (quality filters)

      Defining the structural elements of your backlog that need to be considered

      Defining the content of your backlog and quality standards

      3 Build a Product Roadmap

      The Purpose

      Define standards and procedures for creating and updating your roadmap.

      Key Benefits Achieved

      Enable your team to create a product roadmap to communicate your product strategy in support of your digital product vision.

      Activities

      3.1 Disambiguating backlogs vs. roadmaps

      3.2 Defining audiences, accountability, and roadmap communications

      3.3 Exploring roadmap visualizations

      Outputs

      Understand the difference between a roadmap and a backlog

      Roadmap standards and agreed-to accountability for roadmaps

      Understand the different ways to visualize your roadmap and select what is relevant to your context

      4 Define Your Release, Communication, and Next Steps

      The Purpose

      Build a release plan aligned to your roadmap.

      Key Benefits Achieved

      Understand what goes into defining a release via the release canvas.

      Considerations in communication of your strategy.

      Understand how to frame your vision to enable the communication of your strategy (via an executive summary).

      Activities

      4.1 Lay out your release plan

      4.2 How to introduce your product vision

      4.3 Communicate changes to your strategy

      4.4 Where do we get started?

      Outputs

      Release canvas

      An executive summary used to introduce other parties to your product vision

      Specifics on communication of the changes to your roadmap

      Your first step to getting started

      Define the Role of Project Management in Agile and Product-Centric Delivery

      • Buy Link or Shortcode: {j2store}352|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $3,000 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • There are many voices with different opinions on the role of project management. This causes confusion and unnecessary churn.
      • Project management and product management naturally align to different time horizons. Harmonizing their viewpoints can take significant work.
      • Different parts of the organization have diverse views on how to govern and fund pieces of work, which leads to confusion when it comes to the role of project management.

      Our Advice

      Critical Insight

      There is no one-size-fits-all approach to product delivery. For many organizations product delivery requires detailed project management practices, while for others it requires much less. Taking an outcome-first approach when planning your product transformation is critical to make the right decision on the balance between project and product management.

      Impact and Result

      • Get alignment on the definition of projects and products.
      • Understand the differences between delivering projects and delivering products.
      • Line up your project management activities with the needs of Agile and product-centric projects.
      • Understand how funding can change when moving away from project-centric delivery.

      Define the Role of Project Management in Agile and Product-Centric Delivery Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define the Role of Project Management in Agile and Product-Centric Delivery – A guide that walks you through how to define the role of project management in product-centric and Agile delivery environments.

      The activities in this research will guide you through clarifying how you want to talk about projects and products, aligning project management and agility, specifying the different activities for project management, and identifying key differences with funding of products instead of projects.

      • Define the Role of Project Management in Agile and Product-Centric Delivery Storyboard
      [infographic]

      Further reading

      Define the Role of Project Management in Agile and Product-Centric Delivery

      Projects and products are not mutually exclusive.

      Table of Contents

      3 Analyst Perspective

      4 Executive Summary

      7 Step 1.1: Clarify How You Want to Talk About Projects and Products

      13 Step 1.2: Align Project Management and Agility

      16 Step 1.3: Specify the Different Activities for Project Management

      20 Step 1.4: Identify Key Differences in Funding of Products Instead of Projects

      25 Where Do I Go Next?

      26 Bibliography

      Analyst Perspective

      Project management still has an important role to play!

      When moving to more product-centric delivery practices, many assume that projects are no longer necessary. That isn’t necessarily the case!

      Product delivery can mean different things to different organizations, and in many cases it can involve the need to maintain both projects and project delivery.

      Projects are a necessary vehicle in many organizations to drive value delivery, and the activities performed by project managers still need to be done by someone. It is the form and who is involved that will change the most.

      Photo of Ari Glaizel, Practice Lead, Applications Delivery and Management, Info-Tech Research Group.

      Ari Glaizel
      Practice Lead, Applications Delivery and Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge
      • Organizations are under pressure to align the value they provide with the organization’s goals and overall company vision.
      • In response, they are moving to more product-centric delivery practices.
      • Previously, project managers focused on the delivery of objectives through a project, but changes in delivery practices result in de-emphasizing this. What should project managers should be doing?
      Common Obstacles
      • There are many voices with different opinions on the role of project management. This causes confusion and unnecessary churn.
      • Project management and product management naturally align to different time horizons. Harmonizing their viewpoints can take significant work.
      • Different parts of the organization have very specific views on how to govern and fund pieces of work, which leads to confusion about the role of project management.
      Info-Tech’s Approach
      • Get alignment on the definition of projects and products.
      • Understand the differences between delivering projects and products.
      • Line up your project management activities with the needs of Agile and product-centric projects.
      • Understand how funding can change when moving away from project-centric delivery.

      Info-Tech Insight

      There is no one-size-fits-all approach to product delivery. For many organizations product delivery requires detailed project management practices, while for others it requires much less. Taking an outcome-first approach when planning your product transformation is critical to make the right decision on the balance between project and product management.

      Your evolution of delivery practice is not a binary switch

      1. PROJECTS WITH WATERFALL The project manager is accountable for delivery of the project, and the project manager owns resources and scope.
      2. PROJECTS WITH AGILE DELIVERY A transitional state where the product owner is accountable for feature delivery and the project manager accountable for the overall project.
      3. PRODUCTS WITH AGILE PROJECT AND OPERATIONAL DELIVERY The product owner is accountable for the delivery of the project and products, and the project manager plays a role of facilitator and enabler.
      4. PRODUCTS WITH AGILE DELIVERY Delivery of products can happen without necessarily having projects. However, projects could be instantiated to cover major initiatives.

      Info-Tech Insight

      • Organizations do not need to go to full product and Agile delivery to improve delivery practices! Every organization needs to make its own determination on how far it needs to go. You can do it in one step or take each step and evaluate how well you are delivering against your goals and objectives.
      • Many organizations will go to Products With Agile Project and Operational Delivery, and some will go to Products With Agile Delivery.

      Activities to undertake as you transition to product-centric delivery

      1. PROJECTS WITH WATERFALL
        • Clarify how you want to talk about projects and products. The center of the conversation will start to change.
      2. PROJECTS WITH AGILE DELIVERY
        • Align project management and agility. They are not mutually exclusive (but not necessarily always aligned).
      3. PRODUCTS WITH AGILE PROJECT AND OPERATIONAL DELIVERY
        • Specify the different activities for project management. As you mature your product practices, project management becomes a facilitator and collaborator.
      4. PRODUCTS WITH AGILE DELIVERY
        • Identify key differences in funding. Delivering products instead of projects requires a change in the focus of your funding.

      Step 1.1

      Clarify How You Want to Talk About Projects and Products

      Activities
      • 1.1.1 Define “product” and “project” in your context
      • 1.1.2 Brainstorm potential changes in the role of projects as you become Agile and product-centric

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • An understanding of how the role can change through the evolution from project to more product-centric practices

      Definition of terms

      Project

      “A temporary endeavor undertaken to create a unique product, service, or result. The temporary nature of projects indicates a beginning and an end to the project work or a phase of the project work. Projects can stand alone or be part of a program or portfolio.” (PMBOK, PMI)
      Stock image of an open head with a city for a brain.

      Product

      “A tangible solution, tool, or service (physical or digital) that enables the long-term and evolving delivery of value to customers and stakeholders based on business and user requirements.” (Deliver on Your Digital Product Vision, Info-Tech Research Group)

      Info-Tech InsightLet these definitions be a guide, not necessarily to be taken verbatim. You need to define these terms in your context based on your particular needs and objectives. The only caveat is to be consistent with your usage of these terms in your organization.

      1.1.1 Define “product” and “project” in your context

      30-60 minutes

      Output: Your enterprise/organizational definition of products and projects

      Participants: Executives, Product/project managers, Applications teams

      1. Discuss what “product” and “project” mean in your organization.
      2. Create common, enterprise-wide definitions for “product” and “project.”
      3. Screenshot of the previous slide's definitions of 'Project' and 'Product'.

      Agile and product management does not mean projects go away

      Diagram laying out the roadmap for 'Continuous delivery of value'. Beginning with 'Projects With Agile Delivery' in which Projects with features and services end in a Product Release that is disconnected from the continuum. Then the 'Products With Agile Project and Operational Delivery' and 'Products With Agile Delivery' which are connected by a 'Product Roadmap' and 'Product Backlog' have Product Releases that connect to the continuum.

      Projects Within Products

      Regardless of whether you recognize yourself as a “product-based” or “project-based” shop, the same basic principles should apply.

      You go through a period or periods of project-like development to build or implement a version of an application or product.

      You also have parallel services along with your project development that encompass the more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

      Info-Tech Note

      As your product transformation continues, projects can become optional and needed only as part of your organization’s overall delivery processes

      Identify the differences between a project-centric and a product-centric organization

      Project Product
      Fund projects — Funding –› Fund teams
      Line-of-business sponsor — Prioritization –› Product owner
      Project owner — Accountability –› Product owner
      Makes specific changes to a product —Product management –› Improves product maturity and support of the product
      Assignment of people to work — Work allocation –› Assignment of work to product teams
      Project manager manages — Capacity management –› Team manages

      Info-Tech Insight

      Product delivery requires significant shifts in the way you complete development and implementation work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.

      1.1.2 Brainstorm potential changes in the role of projects as you become Agile and product-centric

      5-10 minutes

      Output: Increased appreciation of the relationship between project and product delivery

      Participants: Executives, Product/project managers, Applications teams

      • Discuss as a group:
        • What stands out in the evolution from project to product?
        • What concerns do you have with the change?
        • What will remain the same?
        • Which changes feel the most impactful?
        • Screenshot of the slide's 'Continuous delivery of value' diagram.

      Step 1.2

      Align Project Management and Agility

      Activities
      • 1.2.1 Explore gaps in Agile/product-centric delivery of projects

      This step involves the following participants:

      • Executives
      • Product/Project managers
      • Applications teams

      Outcomes of this step

      • A clearer view of how agility can be introduced into projects.

      Challenges with the project management role in Agile and product-centric organizations

      Many project managers feel left out in the cold. That should not be the case!

      In product-centric, Agile teams, many roles that a project manager previously performed are now taken care of to different degrees by the product owner, delivery team, and process manager.

      The overall change alters the role of project management from one that orchestrates all activities to one that supports, monitors, and escalates.

      Product Owner
      • Defines the “what” and heavily involved in the “when” and the “why”
      • Accountable for delivery of value
      Delivery team members
      • Define the “how”
      • Accountable for building and delivering high-quality deliverables
      • Can include roles like user experience, interaction design, business analysis, architecture
      Process Manager
      • Facilitates the other teams to ensure valuable delivery
      • Can potentially, in a Scrum environment, play the scrum master role, which involves leading scrums, retrospectives, and sprint reviews and working to resolve team issues and impediments
      • Evolves into more of a facilitator and communicator role

      1.2.1 Explore gaps in Agile/ product-centric delivery of projects

      5-10 minutes

      Output: An assessment of what is in the way to effectively deliver on Agile and product-focused projects

      Participants: Executives, Product/project managers, Applications teams

      • Discuss as a group:
        • What project management activities do you see in Agile/product roles?
        • What gaps do you see?
        • How can project management help Agile/product teams be successful?

      Step 1.3

      Specify the Different Activities for Project Management

      Activities
      • 1.3.1 Articulate the changes in a project manager’s role

      This step involves the following participants:

      • Executives
      • Product/Project managers
      • Applications teams

      Outcomes of this step

      • An understanding of the role of project management in an Agile and product context

      Kicking off the project

      Product-centric delivery still requires key activities to successfully deliver value. Where project managers get their information from does change.

      Stock photo of many hands grabbing a 2D rocketship.
      Project Charter

      Project managers should still define a charter and capture the vision and scope. The vision and high-level scope is primarily defined by the product owner.

      Key Stakeholders and Communication

      Clearly defining stakeholders and communication needs is still important. However, they are defined based on significant input and cues by the product owner.

      Standardizing on Tools and Processes

      To ensure consistency across projects, project managers will want to align tools to how the team manages their backlog and workflow. This will smooth communication about status with stakeholders.

      Info-Tech Insight

      1. Product management plays a similar role to the one that was traditionally filled by the project sponsor except for a personal accountability to the product beyond the life of the project.
      2. When fully transitioned to product-centric delivery, these activities could be replaced by a product canvas. See Deliver on Your Digital Product Vision for more information.

      During the project: Three key activities

      The role of project management evolves from a position of ownership to a position of communication, collaboration, and coordination.

      1. Support
        • Communicate Agile/product team needs to leadership
        • Liaise and co-ordinate for non-Agile/product-focused parts of the organization
        • Coach members of the team
      2. Monitoring
        • Regular status updates to PMO still required
        • Metrics aligned with Agile/product practices
        • Leverage similar tooling and approaches to what is done locally on Agile/product teams (if possible)
      3. Escalation
        • Still a key escalation point for roadblocks that go outside the product teams
        • Collaborate closely with Agile/product team leadership and scrum masters (if applicable)
      Cross-section of a head, split into three levels with icons representing the three steps detailed on the left, 'Support', 'Monitoring', and 'Escalation'.

      1.3.1: Articulate the changes in a project manager’s role

      5-10 minutes

      Output: Current understanding of the role of project management in Agile/product delivery

      Participants: Executives, Product/project managers, Applications teams

      Why is this important?

      Project managers still have a role to play in Agile projects and products. Agreeing to what they should be doing is critical to successfully moving to a product-centric approach to delivery.

      • Review how Info-Tech views the role of project management at project initiation and during the project.
      • Review the state of your Agile and product transformation, paying special attention to who performs which roles.
      • Discuss as a group:
        • What are the current activities of project managers in your organization?
        • Based on how you see delivery practices evolving, what do you see as the new role of project managers when it comes to Agile-centric and product-centric delivery.

      Step 1.4

      Identify Key Differences in Funding of Products Instead of Projects

      Activities
      • 1.4.1 Discuss traditional versus product-centric funding methods

      This step involves the following participants:

      • Executives
      • Product owners
      • Product managers
      • Project managers
      • Delivery managers

      Outcomes of this step

      • Identified differences in funding of products instead of projects

      Planning and budgeting for products and families

      Reward for delivering outcomes, not features

      Autonomy

      Icon of a diamond.

      Fund what delivers value

      Fund long-lived delivery of value through products (not projects).

      Give autonomy to the team to decide exactly what to build.

      Flexibility

      Icon of a dollar sign.

      Allocate iteratively

      Allocate to a pool based on higher-level business case.

      Provide funds in smaller amounts to different product teams and initiatives based on need.

      Arrow cycling right in a clockwise motion.



      Arrow cycling left in a clockwise motion.

      Accountability

      Icon of a target.

      Measure and adjust

      Product teams define metrics that contribute to given outcomes.

      Track progress and allocate more (or less) funds as appropriate.

      Stock image of two suited hands exchanging coins.

      Info-Tech Insight

      Changes to funding require changes to product and Agile practices to ensure product ownership and accountability.

      (Adapted from Bain & Company)

      Budgeting approaches must evolve as you mature your product operating environment

      TRADITIONAL PROJECTS WITH WATERFALL DELIVERY TRADITIONAL PROJECTS WITH AGILE DELIVERY PRODUCTS WITH AGILE PROJECT DELIVERY PRODUCTS WITH AGILE DELIVERY

      WHEN IS THE BUDGET TRACKED?

      Budget tracked by major phases Budget tracked by sprint and project Budget tracked by sprint and project Budget tracked by sprint and release

      HOW ARE CHANGES HANDLED?

      All change is by exception Scope change is routine; budget change is by exception Scope change is routine; budget change is by exception Budget change is expected on roadmap cadence

      WHEN ARE BENEFITS REALIZED?

      Benefits realization post project completion Benefits realization ongoing throughout the life of the project Benefits realization ongoing throughout the life of the product Benefits realization ongoing throughout life of the product

      WHO DRIVES?

      Project Manager
      • Project team delivery role
      • Refines project scope, advocates for changes in the budget
      • Advocates for additional funding in the forecast
      Product Owner
      • Project team delivery role
      • Refines project scope, advocates for changes in the budget
      • Advocates for additional funding in the forecast
      Product Manager
      • Product portfolio team role
      • Forecasting new initiatives during delivery to continue to drive value throughout the life of the product
      Product Manager
      • Product family team role
      • Forecasting new initiatives during delivery to continue to drive value throughout the life of the product
      ˆ ˆ
      Hybrid Operating Environments

      Info-Tech Insight

      As you evolve your approach to product delivery, you will be decoupling the expected benefits, forecast, and budget. Managing them independently will improve your ability adapt to change and drive the right outcomes!

      1.4.1 Discuss traditional versus product-centric funding methods

      30 minutes

      Output: Understanding of funding principles and challenges

      Participants: Executives, Product owners, Product managers, Project managers, Delivery managers

      1. Discuss how projects are currently funded.
      2. Review how the Agile/product funding models differ from how you currently operate.
      3. What changes do you need to consider to support a product delivery model?
      4. For each change, identify the key stakeholders and list at least one action to take.

      Case Study

      Global Digital Financial Services Company

      This financial services company looked to drive better results by adopting more product-centric practices.

      • Its projects exhibited:
        • High complexity/strong dependencies between components
        • High implementation effort
        • High clarification/reconciliation (more than two departments involved)
        • Multiple methodologies (Agile/Waterfall/Hybrid)
      • The team recognized they could not get rid of projects entirely, but getting to a level where there was a coordinated delivery between projects and products being implemented is important.
      Results
      • Moving several initiatives to more product-centric practices allowed for:
        • Delivery within current assigned capacity
        • Limited need for coordination across departments
        • Lower complexity
        • A unified Agile approach to delivery
      • Through balancing the needs of projects and products, there were three key insights about the project management’s role:
        • The role of project management changes depending on the context of the work. There is no one-size-fits-all definition.
        • Project management played a much bigger role when work spanned multiple products and business units.
        • Project management was used as a key coordinator when delivery became complicated and multilayered.
      Example of a company where practices fall equally into 'Project' and 'Product' categories, with some being shared by both.
      Example of a product-centric company where practices fall mainly into the 'Product category', leaving only one in 'Project'.

      Where Do I Go Next?

      Deliver on Your Digital Product Vision

      • Build a product vision your organization can take from strategy through execution.

      Build a Better Product Owner

      • Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

      Implement Agile Practices That Work

      • Improve collaboration and transparency with the business to minimize project failure.

      Implement DevOps Practices That Work

      • Streamline business value delivery through the strategic adoption of DevOps practices.

      Prepare an Actionable Roadmap for Your PMO

      • Turn planning into action with a realistic PMO timeline.

      Deliver Digital Products at Scale

      • Deliver value at the scale of your organization through defining enterprise product families.

      Extend Agile Practices Beyond IT

      • Further the benefits of Agile by extending a scaled Agile framework to the business.

      Spread Best Practices With an Agile Center of Excellence

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Tailor IT Project Management Processes to Fit Your Projects

      • Spend less time managing processes and more time delivering results.

      Bibliography

      Cobb, Chuck. “Are there Project Managers in Agile?” High Impact Project Management, n.d. Web.

      Cohn, Mike. “What Is a Product?” Mountain Goat Software, 6 Sept. 2016. Web.

      Cobb, Chuck. “Agile Project Manager Job Description.” High Impact Project Management, n.d. Web.

      “How do you define a product?” Scrum.org, 4 April 2017. Web.

      Johnson, Darren, et al. “How to Plan and Budget for Agile at Scale.” Bain & Company, 8 Oct. 2019. Web.

      “Product Definition.” SlideShare, uploaded by Mark Curphey, 25 Feb. 2007. Web.

      Project Management Institute. A Guide to the Project Management Body of Knowledge (PMBOK Guide). 7th ed., Project Management Institute, 2021.

      Schuurman, Robbin. “Scrum Master vs Project Manager – An Overview of the Differences.” Scrum.org, 11 Feb 2020. Web.

      Schuurman, Robbin. “Product Owner vs Project Manager.” Scrum.org, 12 March 2020. Web.

      Vlaanderen, Kevin. “Towards Agile Product and Portfolio Management.” Academia.edu, 2010. Web.

      “What is a Developer in Scrum?” Scrum.org, n.d. Web.

      “What is a Scrum Master?” Scrum.org, n.d. Web.

      “What is a Product Owner?” Scrum.org, n.d. Web.

      Design Data-as-a-Service

      • Buy Link or Shortcode: {j2store}129|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $1,007 Average $ Saved
      • member rating average days saved: 31 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Lack of a consistent approach in accessing internal and external data within the organization and sharing data with third parties.
      • Data consumed by most organizations lacks proper data quality, data certification, standards tractability, and lineage.
      • Organizations are looking for guidance in terms of readily accessible data from others and data that can be shared with others or monetized.

      Our Advice

      Critical Insight

      • Despite data being everywhere, most organizations struggle to find accurate, trustworthy, and meaningful data when required.
      • Connecting to data should be as easy as connecting to the internet. This is achievable if all organizations start participating in the data marketplace ecosystem by leveraging a Data-as-a-Service (DaaS) framework.

      Impact and Result

      • Data marketplaces facilitate data sharing between the data producer and the data consumer. The data product must be carefully designed to truly benefit in today’s connected data ecosystem.
      • Follow Info-Tech’s step-by-step approach to establish your DaaS framework:
        1. Understand Data Ecosystem
        2. Design Data Products
        3. Establish DaaS framework

      Design Data-as-a-Service Research & Tools

      Start here – Read the Executive Brief

      Read our concise Executive Brief to find out why you should design Data-as-a-Service (DaaS), review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Understand data ecosystem

      Provide clear benefits of adopting the DaaS framework and solid rationale for moving towards a more connected data ecosystem and avoiding data silos.

      • Design Data-as-a-Service – Phase 1: Understand Data Ecosystem

      2. Design data product

      Leverage design thinking methodology and templates to document your most important data products.

      • Design Data-as-a-Service – Phase 2: Design Data Product

      3. Establish a DaaS framework

      Capture internal and external data sources critical to data products success for the organization and document an end-to-end DaaS framework.

      • Design Data-as-a-Service – Phase 3: Establish a DaaS Framework
      [infographic]

      Workshop: Design Data-as-a-Service

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Data Marketplace and DaaS Explained

      The Purpose

      The purpose of this module is to provide a clear understanding of the key concepts such as data marketplace, data sharing, and data products.

      Key Benefits Achieved

      This module will provide clear benefits of adopting the DaaS framework and solid rationale for moving towards a more connected data ecosystem and avoiding data silos.

      Activities

      1.1 Review the business context

      1.2 Understand the data ecosystem

      1.3 Draft products ideas and use cases

      1.4 Capture data product metrics

      Outputs

      Data product ideas

      Data sharing use cases

      Data product metrics

      2 Design Data Product

      The Purpose

      The purpose of this module is to leverage design thinking methodology and templates to document the most important data products.

      Key Benefits Achieved

      Data products design that incorporates end-to-end customer journey and stakeholder map.

      Activities

      2.1 Create a stakeholder map

      2.2 Establish a persona

      2.3 Data consumer journey map

      2.4 Document data product design

      Outputs

      Data product design

      3 Assess Data Sources

      The Purpose

      The purpose of this module is to capture internal and external data sources critical to data product success.

      Key Benefits Achieved

      Break down silos by integrating internal and external data sources

      Activities

      3.1 Review the conceptual data model

      3.2 Map internal and external data sources

      3.3 Document data sources

      Outputs

      Internal and external data sources relationship map

      4 Establish a DaaS Framework

      The Purpose

      The purpose of this module is to document end-to-end DaaS framework.

      Key Benefits Achieved

      End-to-end framework that breaks down silos and enables data product that can be exchanged for long-term success.

      Activities

      4.1 Design target state DaaS framework

      4.2 Document DaaS framework

      4.3 Assess the gaps between current and target environments

      4.4 Brainstorm initiatives to develop DaaS capabilities

      Outputs

      Target DaaS framework

      DaaS initiative

      Manage the Active Directory in the Service Desk

      • Buy Link or Shortcode: {j2store}489|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Actively maintaining the Active Directory is a difficult task that only gets more difficult with issues like stale accounts and privilege creep.
      • Adding permissions without removing them in lateral transfers creates access issues, especially when regulatory requirements like HIPAA require tight controls.
      • With the importance of maintaining and granting permissions within the Active Directory, organizations are hesitant to grant domain admin access to Tier 1 of the service desk. However, inundating Tier 2 analysts with requests to grant permissions takes away project time.

      Our Advice

      Critical Insight

      • Do not treat the Active Directory like a black box. Strive for accurate data and be proactive by managing your monitoring and audit schedules.
      • Catch outage problems before they happen by splitting monitoring tasks between daily, weekly, and monthly routines.
      • Shift left to save resourcing by employing workflow automation or scripted authorization for Tier 1 technicians.
      • Design actionable metrics to monitor and manage your Active Directory.

      Impact and Result

      • Consistent and right-sized monitoring and updating of the Active Directory is key to clean data.
      • Split monitoring activities between daily, weekly, and monthly checklists to raise efficiency.
      • If need be, shift-left strategies can be implemented for identity and access management by scripting the process so that it can be done by Tier 1 technicians.

      Manage the Active Directory in the Service Desk Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should manage your Active Directory in the service desk, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Maintain your Active Directory with clean data

      Building and maintaining your Active Directory does not have to be difficult. Standardized organization and monitoring with the proper metrics help you keep your data accurate and up to date.

      • Active Directory Standard Operating Procedure
      • Active Directory Metrics Tool

      2. Structure your service desk Active Directory processes

      Build a comprehensive Active Directory workflow library for service desk technicians to follow.

      • Active Directory Process Workflows (Visio)
      • Active Directory Process Workflows (PDF)
      [infographic]

      Develop an IT Strategy to Support Customer Service

      • Buy Link or Shortcode: {j2store}528|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • Customer expectations regarding service are rapidly evolving. As your current IT systems may be viewed as ineffective at delivering upon these expectations, a transformation is called for.
      • It is unclear whether IT has the system architecture/infrastructure to support modern Customer Service channels and technologies.
      • The relationship between Customer Service and IT is strained. Strategic system-related decisions are being made without the inclusions of IT, and IT is only engaged post-purchase to address integration or issues as they arise.
      • Scope: An ABPM-centric approach is taken to model the desired future state, and retrospectively look into the current state to derive gaps and sequential requirements. The requirements are bundled into logical IT initiatives to be plotted on a roadmap and strategy document.
      • Challenge: The extent to which business processes can be mapped down to task-based Level 5 can be challenging depending on the maturity of the organization.
      • Pain/Risk: The health of the relationship between IT and Customer Service may determine project viability. Poor collaboration and execution may strain the relationship further.

      Our Advice

      Critical Insight

      • When transformation is called for, start with future state visioning. Current state analysis can impede your ability to see future needs and possibilities.
      • Solve your own problems by enhancing core or “traditional” Customer Service functionality first, and then move on to more ambitious business enabling functionality.
      • The more rapidly businesses can launch applications in today’s market, the better positioned they are to improve customer experience and reap the associated benefits. Ensure that technology is implemented with a solid strategy to support the initiative.

      Impact and Result

      • The right technology is established to support current and future Customer Service needs.
      • Streamlined and optimized Customer Service processes that drive efficiency and improve Customer Service quality are established.
      • The IT and Customer Service functions are both transformed from a cost center into a competitive advantage.

      Develop an IT Strategy to Support Customer Service Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Structure the project

      Identify project stakeholders, define roles, and create the project charter.

      • Develop an IT Strategy to Support Customer Service Storyboard
      • Project RACI Chart
      • Project Charter

      2. Define vision for future state

      Identify and model the future state of key business processes.

      • Customer Service Business Process Shortlisting Tool
      • Customer Service Systems Strategy Tool

      3. Document current state and assess gaps

      Model the current state of key business processes and assess gaps.

      4. Evaluate solution options

      Review the outputs of the current state architecture health assessment and adopt a preliminary posture on architecture.

      5. Evaluate application options

      Evaluate the marketplace applications to understand the “art of the possible.”

      6. Frame desired state and develop roadmap

      Compile and score a list of initiatives to bridge the gaps, and plot the initiatives on a strategic roadmap.

      • Customer Service Initiative Scoring and Roadmap
      [infographic]

      Workshop: Develop an IT Strategy to Support Customer Service

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Vision for Future State

      The Purpose

      Discuss Customer Service-related organizational goals and align goals with potential strategies for implementation.

      Score level 5 Customer Service business processes against organizational goals to come up with a shortlist for modeling.

      Create a future state model for one of the shortlisted business processes.

      Draft the requirements as they relate to the business process.

      Key Benefits Achieved

      Preliminary list of Customer Service-related business goals

      List of Customer Service business processes (Task Level 5)

      Pre-selected Customer Service business process for modeling

      Activities

      1.1 Outline and prioritize your customer goals and link their relevance and value to your Customer Service processes with the Customer Service Business Process Shortlisting Tool.

      1.2 Score customer service business processes against organizational goals with the Customer Service Systems Strategy Tool.

      Outputs

      Initial position on viable Customer Service strategies

      Shortlist of key business processes

      Documented future state business process model

      Business/functional/non-functional requirements

      2 Document Current State and Assess Gaps

      The Purpose

      Create a current state model for the shortlisted business processes.

      Score the functionality and integration of current supporting applications.

      Revise future state model and business requirements.

      Key Benefits Achieved

      Inventory of Customer Service supporting applications

      Inventory of related system interfaces

      Activities

      2.1 Holistically assess multiple aspects of Customer Service-related IT assets with the Customer Service Systems Strategy Tool.

      Outputs

      Documented current state business process model

      Customer Service systems health assessment

      3 Adopt an Architectural Posture

      The Purpose

      Review the Customer Service systems health assessment results.

      Discuss options.

      Key Benefits Achieved

      Completed Customer Service systems health assessment

      Application options

      Activities

      3.1 Analyze CS Systems Strategy and review results with the Customer Service Systems Strategy Tool

      Outputs

      Posture on system architecture

      4 Frame Desired State and Develop Roadmap

      The Purpose

      Draft a list of initiatives based on requirements.

      Score and prioritize the initiatives.

      Plot the initiatives on a roadmap.

      Key Benefits Achieved

      Business/functional/non-functional requirements

      Activities

      4.1 Help project and management stakeholders visualize the implementation of Customer Service IT initiatives with the Customer Service Initiative Scoring and Roadmap Tool.

      Outputs

      Scored and prioritized list of initiatives

      Customer Service implementation roadmap

      Further reading

      Develop an IT Strategy to Support Customer Service

      E-commerce is accelerating, and with it, customer expectations for exceptional digital service.

      Analyst Perspective

      The future of Customer Service is digital. Your organization needs an IT strategy to meet this demand.

      The image contains a picture of Thomas E. Randall.

      As the pandemic closed brick-and-mortar stores, the acceleration of ecommerce has cemented Customer Service’s digital future. However, the pandemic also revealed severe cracks in the IT strategy of organizations’ Customer Service – no matter the industry. These cracks may include low resolution and high wait times through the contact center, or a lack of analytics that fuel a reactive environment. Unfortunately, organizations have no time to waste in resolving these issues. Customer patience for poor digital service has only decreased since March 2020, leaving organizations with little to no runway for ramping up their IT strategy.

      Organizations that quickly mature their digital Customer Service will come out the other side of COVID-19 more competitive and with a stronger reputation. This move necessitates a concrete IT strategy for coordinating what the organization’s future state should look like and agreeing on the technologies and software required to meet this state across the entire organization.

      Thomas E. Randall, Ph.D.

      Senior Research Analyst, Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Solution

      • COVID-19 has accelerated ecommerce, rapidly evolving customer expectations about the service they should receive. Without a robust IT strategy for enabling remote, contactless points of service, your organization will quickly fall behind.
      • The organization would like to use modern channels and technologies to enhance customer service, but it is unclear whether IT has the infrastructure to support them.
      • The relationship between Customer Service and IT is strained. Strategic system-related decisions are being made without the inclusion of IT.
      • IT is in a permanent reactive state, only engaged post-purchase to fix issues as they arise and to offer workarounds.
      • Use Info-Tech’s methodology to produce an IT strategy for Customer Service:
        • Phase 1: Define Project and Future State
        • Phase 2: Evaluate Current State
        • Phase 3: Build a Roadmap to Future State
      • Each phase contributes toward this blueprint’s key deliverable: the Strategic Roadmap.

      Info-Tech Insight

      IT must proactively engage with the organization to define what good customer service should look like. This ensures IT has a fair say in what kinds of architectural solutions are feasible for any projected future state. In this proactive scenario, IT can help build the roadmap for implementing and maintaining customer service infrastructure and operations, reducing the time and resources spent on putting out preventable fires or trying to achieve an unworkable goal set by the organization.

      Key insights

      Develop an IT Strategy to Support Customer Service

      Ecommerce growth has increased customer expectations

      Despite the huge obstacles that organizations are having to overcome to meet accelerating ecommerce from the pandemic, customers have not increased their tolerance for organizations with poor service. Indeed, customer expectations for excellent digital service have only increased since March 2020. If organizations cannot meet these demands, they will become uncompetitive.

      The future of customer service is tied up in analytics

      Without a coordinated IT strategy for leveraging technology and data to improve Customer Service, the organization will quickly be left behind. Analytics and reporting are crucial for proactively engaging with customers, planning marketing campaigns, and building customer profiles. Failing to do so leaves the organization blind to customer needs and will constantly be in firefighting mode.

      Meet the customer wherever they are – no matter the channel

      Providing an omnichannel experience is fast becoming a table stakes offering for customers. To maximize customer engagement and service, the organization must connect with the customer on whatever channel the customer prefers – be it social media, SMS, or by phone. While voice will continue to dominate how Customer Service connects with customers, demographics are shifting toward a digital-first generation. Organizations must be ready to capture this rapidly expanding audience.

      This blueprint will achieve:

      Increased customer satisfaction

      • An IT strategy for Customer Service that proactively meets customer demand, improving overall customer satisfaction with the organization’s services.
      • A process for identifying the organization’s future state of Customer Service and developing a concrete gap analysis.

      Time saved

      • Ready-to-use deliverables that analyze and provide a roadmap toward the organization’s desired future state.
      • Market analyses and rapid application selection through SoftwareReviews to streamline project time-to-completion.

      Increased ROI

      • A modernization process that aids Customer Service digital transformation, with a view to achieve high ROI.
      • Save costs through an effective requirements gathering method.
      • Building and expanding the organization’s customer base to increase revenues by meeting the customers where they are – no matter what channel.

      An IT strategy for customer service is imperative for a post-COVID world

      COVID-19 has accelerated ecommerce, rapidly evolving customer expectations for remote, contactless service.

      59% Of customers agree that the pandemic has raised their standards for service (Salesforce, 2020).

      • With COVID-19, most customer demand and employment moved online and turned remote.
      • Retailers had to rapidly respond, meeting customer demand through ecommerce. This not only entailed a complete shift in how customers could buy their goods but how retailers could provide a remote customer journey from discovery to post-purchase support.

      Info-Tech Insight

      The pandemic did not improve customer tolerance for bad service – instead, the demand for good service increased dramatically. Organizations need an IT strategy to meet customer support demands wherever the customer is located.

      The technology to provide remote customer support is surging

      IT needs to be at the forefront of learning about and suggesting new technologies, working with Customer Service to deliver a consistent, business-driven approach.

      78%

      Of decision makers say they’ve invested in new technology as a result of the pandemic (Salesforce, 2020).

      OMNICHANNEL SUPPORT

      Rapidly changing demographics and modes of communications require an evolution toward omnichannel engagement. Agents need customer information synced across each channel they use, meeting the customer’s needs where they are.

      78%

      Of customers have increased their use of self-service during the pandemic (Salesforce, 2020).

      INTELLIGENT SELF-SERVICE PORTALS

      Customers want their issues resolved as quickly as possible. Machine-learning self-service options deliver personalized customer experiences, which also reduce both agent call volume and support costs for the organization.

      90%

      Of global executives who use data analytics report that they improved their ability to deliver a great customer experience (Gottlieb, 2019).

      LEVERAGING ANALYTICS

      The future of customer service is tied up with analytics: from AI-driven capabilities that include agent assist and using biometric data (e.g., speech) for security, to feeding real insights about how customers and agents are doing and performing.

      Executive Brief – Case Study

      Self-service options improve quality of service and boost organization’s competitiveness in a digital marketspace.

      INDUSTRY: Financial Services

      SOURCE: TSB

      Situation

      Solution

      Results

      • The pandemic increased pressure on TSB’s Customer Service, with higher call loads from their five million customers who were anxious about their financial situation.
      • TSB needed to speed up its processing times to ensure loan programs and other assistances were provided as quickly as possible.
      • As meeting in-person became impossible due to the lockdown, TSB had to step up its digital abilities to serve their customers.
      • TSB sought to boost its competitiveness by shifting as far as possible to digital services.
      • TSB launched government loan programs in 36 hours, ahead of its competitors.
      • TSB created and released 21 digital self-service forms for customers to complete without needing to interact with bank staff.
      • TSB processed 140,000 forms in three months, replacing 15,000 branch visits.
      • TSB increased digital self-service rate by nine percent.

      IT can demonstrate its value to business by enhancing remote customer service

      IT must engage with Customer Service – otherwise, IT risks being perennially reactive and dictated to as remote customer service needs increase.

      IT benefits

      Customer Service benefits

      • The right technology is established to support Customer Service.
      • IT is viewed as a strategic partner and innovator, not just a cost center and support function.
      • Streamlined and optimized Customer Service processes that drive efficiency and improve Customer Service quality.
      • Transformation of the Customer Service function into a competitive advantage.

      Info-Tech Insight

      Change to how Customer Service will operate is inevitable. This is an opportunity for IT to establish their value to the business and improve their autonomy in how new technologies should be onboarded and utilized.

      Customer Service and IT need to work together to mitigate their pain points

      IT and Customer Service have an opportunity to reinforce and build their organization’s customer base by working together to streamline operations.

      IT pain points

      Customer Service pain points

      • IT lacks understanding of Customer Service challenges and pain points.
      • IT has technical debt or constrained technology funding.
      • The IT department is viewed as a cost center and support organization, not an engine of innovation, growth, and service delivery performance.
      • Processes supporting Customer Service delivery may be sub-optimal.
      • The existing technology cannot support the increasingly advanced needs of Customer Service functions.
      • Customer Service isn’t fully aware of what your customers think of your service quality. There is little to no monitoring of customer sentiment.
      • There is a lack of value-based segmentation of customers and information on their channel usage and preferences.
      • Competitor actions are not actively monitored.

      IT often cannot spark a debate with Customer Service on whether a decision made without IT is misaligned with corporate direction. It’s almost always an uphill battle for IT.

      Sahri Lava, Research Director, IDC

      Develop an IT Strategy to Support Customer Service

      DON’T FALL BEHIND

      70% of companies either have a digital transformation strategy in place or are working on one (Tech Pro Research, 2018). Unless IT can enable technology that meets the customer where they are, the organization will quickly fall behind in an age of accelerating ecommerce.

      DEVELOP FUTURE STATES

      Many customer journeys are now exclusively digital – 63% of customers expect to receive service over social media (Ringshall, 2020). Organization’s need an IT strategy to develop the future of their customer service – from leveraging analytics to self-service AI portals.

      BUILD GAP ANALYSIS

      73% of customers prefer to shop across multiple channels (Sopadjieva et al., 2017). Assess your current state’s application integrations and functionality to ensure your future state can accurately sync customer information across each channel.

      SHORTLIST SOLUTIONS

      Customer relationship management software is one of the world's fastest growing industries (Kuligowski, 2022). Choosing a best-fit solution requires an intricate analysis of the market, future trends, and your organization’s requirements.

      ADVANCE CHANGE

      95% of customers cite service as key to their brand loyalty (Microsoft, 2019). Build out your roadmap for the future state to retain and build your customer base moving forward.

      Use Info-Tech’s method to produce an IT strategy for Customer Service:

      PHASE 1: Define Project and Future State

      Output: Project Charter and Future State Business Processes

      1.1 Structure the Project

      1.2 Define a Vision for Future State

      1.3 Document Preliminary Requirements

      KEY DELIVERABLE:

      Strategic Roadmap

      The image contains a screenshot of the strategic roadmap.

      PHASE 2: Evaluate Current State

      Output: Requirements Identified to Bridge Current to Future State

      2.1 Document Current State Business Processes

      2.2 Assess Current State Architecture

      2.3 Review and Finalize Requirements for Future State

      PHASE 3: Build a Roadmap to Future State

      Output: Initiatives and Strategic Roadmap

      3.1 Evaluate Architectural and Application Options

      3.2 Understand the Marketplace

      3.3 Score and Plot Initiatives Along Your Strategic Roadmap

      Key deliverable and tools outline

      Each step of this blueprint is accompanied by supporting materials to help you accomplish your goals.

      Project RACI Chart

      Activity 1.1a Organize roles and responsibilities for carrying out project steps.

      The image contains a screenshot of the Project RACI Chart.

      Key Deliverable:

      Strategic Roadmap

      Develop, prioritize, and implement key initiatives for your customer service IT strategy, plotting and tracking them on an easy-to-read timeline.

      The image contains a screenshot of the Strategic Roadmap.

      Business Process Shortlisting Tool

      Activities 1.2a, 1.2b, and 2.1aOutline and prioritize customer service goals.

      The image contains a screenshot of the Business Process Shortlisting Tool.

      Project Charter Template

      Activity 1.1b Define the project, its key deliverables, and metrics for success.

      The image contains a screenshot of the Project Charter Template.

      Systems Strategy Tool

      Activities 1.3a, Phase 2, 3.1a Prioritize requirements, assess current state customer service functions, and decide what to do with your current systems going forward.

      .The image contains a screenshot of the Systems Strategy Tool.

      Looking ahead: defining metrics for success

      Phase 1 of this blueprint will help solidify how to measure this project’s success. Start looking ahead now.

      For example, the metrics below show the potential business benefits for several stakeholders through building an IT strategy for Customer Service. These stakeholders include agents, customers, senior leadership, and IT. The benefits of this project are listed to the right.

      Metric Description

      Current Metric

      Future Goal

      Number of channels for customer contact

      1

      6

      Customer self-service resolution

      0%

      50%

      % ROI

      - 4%

      11%

      Agent satisfaction

      42%

      75%

      As this project nears completion:

      1. Customers will have more opportunities for self-service resolution.
      2. Agents will experience higher satisfaction, improving attrition rates.
      3. The organization will experience higher ROI from its digital Customer Service investments.
      4. Customers can engage the contact center via a communication channel that suits them.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”“Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”“We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”“Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical Guided Implementation on this topic look like?

      Define Project and Future StateDocument and Assess Current StateEvaluate Architectural and Application OptionsBuild Roadmap to Future State

      Call #1: Introduce project, defining its vision and metrics of success.

      Call #2: Review environmental scan to define future state vision.

      Call #3: Examine future state business processes to compile initial requirements.

      Call #4: Document current state business processes.

      Call #5: Assess current customer service IT architecture.

      Call #6: Refine and prioritize list of requirements for future state.

      Call #7: Evaluate architectural options.

      Call #8: Evaluate application options.

      Call #9:Develop and score initiatives to future state.

      Call #10: Develop timeline and roadmap.

      Call #11: Review progress and wrap-up project.

      A Guided Implementation is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical Guided Implementation is two to 12 calls over the course of four to six months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com1-888-670-8889

      Day 1Day 2Day 3Day 4Day 5

      Define Your Vision for Future State

      Document Current State and Assess Gaps

      Adopt an Architectural Posture

      Frame Desired State and Develop Roadmap

      Communicate and Implement

      Activities

      1.1 Outline and prioritize your customer goals.

      1.2 Link customer service goals’ relevance and value to your Customer Service processes.

      1.3 Score Customer Service business processes against organizational goals.

      2.1 Holistically assess multiple aspects of Customer Service-related IT assets with Customer Service Systems Strategy Tool.

      3.1 Analyze Customer Service Systems Strategy and review results with the Customer Service Systems Strategy Tool.

      4.1 Help project management stakeholders visualize implementation of Customer Service IT initiatives.

      4.2 Build strategic roadmap and plot initiatives.

      5.1 Finalize deliverables.

      5.2 Support communication efforts.

      5.3 Identify resources in support of priority initiatives.

      Deliverables

      1. Initial position on viable Customer Service strategies.
      2. Shortlist of key business processes.
      3. Documented future-state business process model.
      4. Business/functional/non-functional requirements.
      1. Documented current state business process model.
      2. Customer Service systems health assessment.
      3. Inventory of Customer Service supporting applications.
      4. Inventory of related system interfaces.
      1. Posture on system architecture.
      2. Completed Customer Service systems health assessment.
      3. List of application options.
      1. Scored and prioritized list of initiatives.
      2. Customer Service implementation roadmap.
      1. Customer Service IT Strategy Roadmap.
      2. Mapping of Info-Tech resources against individual initiatives.

      Phase 1

      Define Project and Future State

      Phase 1

      Phase 2

      Phase 3

      1.1 Structure the Project

      1.2 Define Vision for Future State

      1.3 Document Preliminary Requirements

      2.1 Document Current State Business Processes

      2.2 Assess Current State Architecture

      2.3 Review and Finalize Requirements for Future State

      3.1 Evaluate Architectural and Application Options

      3.2 Understand the Marketplace

      3.3 Score and Plot Initiatives Along Strategic Roadmap

      This phase will guide you through the following activities:

      1.1a Create your project’s RACI chart to establish key roles throughout the timeline of the project.

      1.1b Finalize your project charter that captures the key goals of the project, ready to communicate to stakeholders for approval.

      1.2a Begin documenting business processes to establish potential future states.

      1.2b Model future state business processes for looking beyond current constraints and building the ideal scenario.

      1.3a Document your preliminary requirements for concretizing a future state and performing a gap analysis.

      Participants required for Phase 1:

      • Applications Director
      • Customer Service Director
      • IT and Customer Service Representatives

      1.1 Identify process owners early for successful project execution

      IT and Customer Service must work in tandem throughout the project. Both teams’ involvement ensures all stakeholders are heard and support the final decision.

      Customer Service Perspective

      IT Perspective

      • Customer Service is the victim of pain points resulting from suboptimal systems and it stands to gain the most benefits from a well-planned systems strategy.
      • Looking to reduce pain points, Customer Service will likely initiate, own, and participate heavily in the project.
      • Customer Service must avoid the tendency to make IT-independent decisions. This could lead to disparate systems that contribute little to the overall organizational goals.
      • IT owns the application and back-end support of all Customer Service business processes. Any technological aspect of processes will need IT involvement.
      • IT may or may not have the mandate to run the Customer Service strategy project. Responsibility for systems decisions remains with IT.
      • IT should own the task of filtering out unnecessary or infeasible application and technology decisions. IT capabilities to support such acquisitions and post-purchase maintenance must be considered.

      Info-Tech Insight

      While involving management is important for high-level strategic decisions, input from those who interact day-to-day with the systems is a crucial component to a well-planned strategy.

      1.1 Define project roles and responsibilities to improve progress tracking

      Assign responsibilities, accountabilities, and other project involvement roles using a RACI chart.

      • IT should involve Customer Service from the beginning of project planning to implementation and execution. The project requires input and knowledge from both functions to succeed.
      • Do not let the tasks be forgotten within inter-functional communication. Define roles and responsibilities for the project as early as possible.
      • Each member of the project team should be given a RACI designation, which will vary for each task to ensure clear ownership, execution, and progress tracking.
      • Assigning RACI early can:
        • Improve project quality by assigning the right people to the right tasks.
        • Improve chances of project task completion by assigning clear accountabilities.
        • Improve project buy-in by ensuring that stakeholders are kept informed of project progress, risks, and successes.

      R – Responsibility

      A – Accountability

      C – Consulted

      I – Informed

      1.1 Use Info-Tech’s recommended process owners and roles for this blueprint

      Customer Service Head

      Customer Service Director

      CIO

      Applications Director*

      CEO/COO

      Marketing Head

      Sales Head

      Determine Project Suitability

      ARCCCII

      Phase 1.1

      CCARIII

      Phases 1.2 – 1.3

      ARCCICC

      Phase 2

      ARICIII

      Phase 3.1

      (Architectural options)

      CCARIII

      Phase 3.1

      (Application options)

      ACIRICC

      Phases 3.2 – 3.3

      CCARCII

      * The Applications Director is to compile a list of Customer Service systems; the Customer Service Director is responsible for vetting a list and mapping it to Customer Service functions.

      ** The Applications Director is responsible for technology-related decisions (e.g. SaaS or on-premise, integration issues); the Customer Service Director is responsible for functionality-related decisions.

      1.1a Create your project’s RACI chart

      1 hour

      1. The Applications Director and Customer Service Head should identify key participants and stakeholders of the project.
      2. Use Info-Tech’s Project RACI Chart to identify ownership of tasks.
      3. Record roles in the Project RACI Chart.
      The image contains a screenshot of the project RACI chart.
      InputOutput
      • Identification of key project participants and stakeholders.
      • Identification of key project participants and stakeholders.

      Materials

      Participants

      • Project RACI Chart
      • Applications Director
      • Customer Service Director

      Download the Project RACI Chart

      1.1 Start developing the project charter

      A project charter should address the following:

      • Executive Summary and Project Overview
        • Goals
        • Benefits
        • Critical Success Factors
      • Scope
      • Key Deliverables
      • Stakeholders and RACI
      • Risk Assessment
        • What are some risks you may encounter during project execution?
      • Projected Timeline and Key Milestones
      • Review and Approval Process

      What is a project charter?

      • The project charter defines the project and lays the foundation for all subsequent project planning.
      • Once approved by the business, the charter gives the project lead formal authority to initiate the project.

      Why create a project charter?

      • The project charter allows all parties involved to reach an agreement and document major aspects of the project.
      • It also supports the decision-making process and can be used as a communication tool.

      Stakeholders must:

      • Understand and agree on the objectives and important characteristics of the project charter before the project is initiated.
      • Be given the opportunity to adjust the project charter to better address their needs and concerns.

      1.1b Finalize the project charter

      1-2 hours

      1. Request relevant individuals and parties to complete sections of Info-Tech’s Project Charter Template.
      2. Input the simplified RACI output from tab 3 in Info-Tech’s Project RACI Chart tool into the RACI section of the charter.
      3. Send the completed template to the CIO and Customer Service Head for approval.
      4. Communicate the document to stakeholders for changes and finalization.
      The image contains a screenshot of the Project Charter Template.

      Input

      Output

      • Customer Service and IT strategies
      • Justification of impetus to begin this project
      • Timeline estimates
      • A completed project charter that captures the key goals of the project, ready to communicate to stakeholders for approval.

      Materials

      Participants

      • Project RACI Chart
      • Project Charter Template
      • Applications Director
      • Customer Service Director

      Download the Project Charter Template

      1.2 IT must play a role shaping Customer Service’s future vision

      IT is only one or two degrees of separation from the end customer – their involvement can significantly impact the customer experience.

      IT

      Customer Service

      Customer

      Customer Service-Facing Application

      Customer-Facing Application

      • IT enables, supports, and maintains the applications used by the Customer Service organization to service customers. IT provides the infrastructural and technical foundation to operate the function.
      • IT supports customer-facing interfaces and channels for Customer Service interaction.
      • Channel examples include web pages, mobile device applications and optimization, and interactive voice response for callers.

      1.2 Establish a vision for Customer Service excellence

      Info-Tech has identified three prominent Customer Service strategic patterns. Evaluate which fits best with your situation and organization.

      Retention

      Efficiency

      Cross-Sell/Up-Sell

      Ensuring customers remain customers by providing proactive customer service and a seamless omnichannel strategy.

      Reducing costs by diverting customers to lower cost channels and empowering agents to solve problems quickly.

      Maximizing the value of existing customers by capitalizing on cross-sell and up-sell opportunities.

      1.2 Let profitability goals help reveal which strategy to pursue

      Profitability goals are tied to the enabling of customer service strategies.

      • If looking to drive cost decreases across the organization, pursue cost efficiency strategies such as customer volume diversion in order to lower cost channels and avoid costly escalations for customer complaints and inquiries.
      • Ongoing Contribution Margin is positive only once customer acquisition costs (CAC) have been paid back. For every customer lost, another customer has to be acquired in order to experience no loss. In this way, customer retention strategies help decrease your overall costs.
      • Once cost reduction and customer retention measures are in place, look to increase overall revenue through cross-selling and up-selling activities with your customers.
      The image contains a screenshot of a diagram to demonstrate the relationship between goals and enabling strategies.

      Info-Tech Insight

      Purely driving efficiency is not the goal. Create a balance that does not compromise customer satisfaction.

      Customer Service strategies: Case studies

      Efficiency

      • Volume diversion to lower cost channels
      • Agent empowerment

      MISS DIG 811 – a utility notification system – sought to make their customer service more efficient by moving to softphones. Using the Cisco Customer Journey Platform, Miss Dig saw a 9% YoY increase in agent productivity and 83% reduction in phone equipment costs. Source: (Cisco, 2018).

      Retention

      • Proactive Customer Service
      • Seamless omnichannel strategy

      VoiceSage worked with Home Retail Group – a general merchandise retailer – to proactively increase customer outreach, reducing the number of routine customer order and delivery queries received. In four weeks, Home Retail Group increased their 30-40% answer rate from customers to 100%, with 90% of incoming calls answered and 60% of contacts made via SMS. Source: (VoiceSage, 2018)

      Cross-Sell/

      Up-Sell

      • Cross-Sell and Up-Sell opportunities

      A global brand selling language-learning software utilized Callzilla to help improve their call conversion rate of 2%. After six months of agent and supervisor training, this company increased their call conversion rate to 16% and their upsell rate to 40%. Their average order value increased from < $300 to $465. Source: (Callzilla, n.d.)

      1.2 Performing an environmental scan can help IT optimize Customer Service support

      Though typically executed by Customer Service, IT can gain valuable insights for best supporting infrastructure, applications, and operations from an environmental scan.

      An environmental scan seeks to understand your organization’s customers from multiple directions. It considers:

      • Customers’ value-based segmentations.
      • The interaction channels customers prefer to use.
      • Customers’ likes and dislikes.
      • The general sentiment of your customer service quality.
      • What your competitors are doing in this space.
      The image contains a screenshot of a diagram to demonstrate how performing an environmental scan can help IT optimize Customer Service support.

      Info-Tech Insight

      Business processes must directly relate to customer service. Failing to correlate customer experience with business performance outcomes overlooks the enormous cost of negative sentiment.

      1.2 The environmental scan results should drive IT’s strategy and resource spend

      Insights derived from this scan can help frame IT’s contributions to Customer Service’s future vision.

      Why IT should care:

      Implications:

      Each customer experience, from product/service selection to post-transaction support, can have a significant impact on business performance.

      It is not just IT or Customer Service that should care; rather, it should be an organizational responsibility to care about what customers say.

      Customers have little tolerance for mediocrity or poor service and simply switch their allegiances to those that can satisfy their expectations.

      Do not ignore your competitors; they may be doing something well in Customer Service technology which may serve as your organization’s benchmark.

      With maturing mobile and social technologies, customers want to be treated as individuals rather than as a series of disconnected accounts

      Do not ignore your customers’ plea for individuality through mobile and social. Assess your customers’ technology channel preferences.

      Customer service’s perception of service quality may be drastically different than what is expected by the customers.

      Prevent your organization from investing in technology that will have no positive impact on your customer experience.

      Some customers may not provide your organization the business value that surpasses your cost to serve them.

      Focus on enhancing the technology and customer service experience for your high-value customers.

      1.2 Have Customer Service examine feedback across channels for a holistic view

      Your method of listening needs to evolve to include active listening on social and mobile channels.

      Insights and Implications for Customer Service

      Limitations of conventional listening:

      • Solicited customer feedback, such as surveys, do not provide an accurate feedback method since customers only have one channel to express their views.
      • Sentiment, voice, and text analytics within social media channels provide the most accurate and timely intelligence.

      How IT Can Help

      IT can help facilitate the customer feedback process by:

      • Conducting customer feedback with voice recognition software.
      • Monitoring customer sentiment on mobile and social channels.
      • Utilizing customer data analytic engines on social media management platforms.
      • Referring Customer Service to customer advisory councils and their databases.

      1.2 Benchmark IT assets by examining your competitors’ Customer Service capabilities

      The availability of the internet means almost complete transparency between your products and services, and those of your competitors.

      Insights and implications from Customer Service

      How IT can help

      Competitor actions are crucial. Watch your competitors to learn how they use Customer Service as a competitive differentiator and a customer acquisition tool.

      Do not learn about a competitor’s actions because your customers are already switching to them. Track your competitors before getting a harsh surprise from your customers.

      View the customer service experience from the outside in. Assessing from the inside out gives an internal perspective on how good the service is, rather than what customers are experiencing.

      Take a data and analytics-driven approach to mine insights on what customers are saying about your competitors. Negative sentiment and specific complaints can be used as reference for IT and Customer Service to:

      • Avoid repeating the competitor’s mistakes.
      • Utilize sentiment as a benchmark for goal setting and improvements.
      • Duplicate successful technology initiatives to realize business value.

      Info-Tech Insight

      Look to your competitors for comparative models but do not pursue to solely replicate what they currently have. Aim higher and attempt to surpass their capabilities and brand value.

      1.2 Collaborate with Customer Service to understand customer value segments

      Let segmentation help you gain intelligence on customers’ expectations.

      Insights and implications from customer service

      • Segment your customers based on their value relative to the cost to serve. The easiest way to do so is with channel preference categorization.
      • If the cost for retention attempts are higher than the value that those customers provide, there is little business case to pursue retention action.

      How IT can help

      • Couple value-based segmentation with channel preference and satisfaction levels of your most-valued customers to effectively target IT investments in channels that maximize service customization and quality.
      • Correlate the customers’ channel and technology usage with their business value to see which IT assets are delivering on their investments.

      The image contains a screenshot of a graph to demonstrate the relationship between cost of retention and value.

      “If you're developing a Customer Service strategy, it has to start with who your clients are, what [they are] trying to do, and through what channels […] and then your decision around processes have to fall out of that. If IT is trying to lead the conversation, or bring people together to lead the conversation, then marketing and whoever does segmentation has to be at the table as a huge component of this.”

      Lisa Woznica, Director of Client Experience, BMO Financial Group

      1.2 Be mindful of trends in the consumer and technology landscape

      Building a future vision of customer service requires knowing what upcoming technologies can aid the organization.

      OMNICHANNEL SUPPORT

      Rapidly changing demographics and modes of communication requires an evolution toward omnichannel engagement. 63% of customers now expect to communicate with contact centers over their social media (Ringshall 2020). Agents need customer information synced across each channel they use, meeting the customer’s needs where they are.

      INTELLIGENT SELF-SERVICE PORTALS

      Customers want their issues resolved as quickly as possible. Machine learning self-service options deliver personalized customer experiences, which also reduce both agent call volume and support costs for the organization. 60% of contact centers are using or plan to use AI in the next 12 months to improve their customer (Canam Research 2020).

      LEVERAGING ANALYTICS

      The future of customer service is tied up with analytics. This not only entails AI-driven capabilities that fetch the agent relevant information, but it finds skills-based routing and uses biometric data (e.g., speech) for security. It also feeds operations leaders’ need for easy access to real insights about how their customers and agents are doing.

      Phase 1 – Case Study

      Omnichannel support delivers a financial services firm immediate customer service results.

      INDUSTRY: Financial Services

      SOURCE: Mattsen Kumar

      Situation

      Solution

      Results

      • A financial services firm’s fast growth began to show cracks in their legacy customer service system.
      • Costs to support the number of customer queries increased.
      • There was a lack of visibility into incoming customer communications and their resolutions.
      • Business opportunities were lost due to a lack of information on customers’ preferences and challenges. Customer satisfaction was decreasing, negatively impacting the firm’s brand.
      • Mattsen Kumar diagnosed that the firm’s major issue was that their customer service processes required a high percentage of manual interventions.
      • Mattsen Kumar developed an omnichannel strategy, including a mix of social channels joined together by a CRM.
      • A key aspect of this omnichannel experience was designing automated processes with minimal manual intervention.
      • 25% reduction in callbacks from customers.
      • $50,000 reduction in operational costs.
      • Two minutes wait time reduction for chat process.
      • 14% decrease in average handle time.
      • Scaled up from 6000 to 50,000 monthly calls that could be handled by the current team.
      • Enabled more than 10,000 customer queries over chats.

      1.2 Construct your future state using a business process management approach

      Documenting and evaluating your business processes serves as a good starting point for defining the overall Customer Service strategy.

      • Examining key Customer Service business processes can unlock clues around the following:
        • Driving operational effectiveness.
        • Identifying, implementing, and maintaining reusable enterprise systems.
        • Identifying gaps that can be addressed by acquisition of additional systems.
      • Business process modeling facilitates the collaboration between business and IT, recording the sequence of events, tasks performed, by whom they are performed, and the levels of interaction with the various supporting applications.
      • By identifying the events and decision points in the process, and overlaying the people that perform the functions and technologies that support them, organizations are better positioned to identify gaps that need to be bridged.
      • Encourage the analysis by compiling the inventory of Customer Service business processes that are relevant to the organization.

      Info-Tech Insight

      A process-oriented approach helps organizations see the complete view of the system by linking strategic requirements to business requirements, and business requirements to system requirements.

      1.2 Use the APQC Framework to define your Customer Service-related processes

      • APQC’s Process Classification Framework (PCF) is a taxonomy of cross-functional business processes intended to allow the objective comparison of organizational performance within and among organizations.
      • Section 5 of the PCF details various levels of Customer Service business processes, useful for mapping on to your own organization’s current state.
      • The APQC Framework can be accessed through the following link: APQC’s Process Classification Framework.

      The APQC Framework serves as a high-level, industry-neutral enterprise model that allows organizations to see activities from a cross-industry process perspective.

      The image contains a screenshot example of the APQC Process Classification Framework.
      Source: (Ziemba and Eisenbardt 2015)

      Info-Tech Caution

      The APQC framework does not list all processes within a specific organization, nor are the processes which are listed in the framework present in every organization. It is designed as a framework and global standard to be customized for use in any organization.

      1.2 Each APQC process has five levels that represent its logical components

      The image contains a screenshot of the APQC five levels. The levels include: category, process group, process, and activity.

      The PCF provides L1 through 4 for the Customer Service Framework.

      L5 processes are task- and industry-specific and need to be defined by the organization.

      Source: (APQC 2020)
      This Industry Process Classification Framework was jointly developed by APQC and IBM to facilitate improvement through process management and benchmarking. ©2018 APQC and IBM. ALL RIGHTS RESERVED.

      1.2a Begin documenting business processes

      4 hours

      1. Using Info-Tech’s Customer Service Business Process Shortlisting Tool, list the Customer Service goals and rank them by importance.
      2. Score the APQC L4 processes by relevance to the defined goals and perceived satisfaction index.
      3. Define the L5 processes for the top scoring L4 process.
      4. Leave Tab 5, Columns G – I for now. These columns will be revisited in activities 1.2b and 2.1a.
      The image contains a screenshot of the Customer Service Process Shortlisting Tool.

      Input

      Output

      • List of Customer Service goals
      • A detailed prioritization of Customer Service business processes to model for future states

      Materials

      Participants

      • Whiteboard
      • Writing materials
      • Customer Service Business Process Shortlisting Tool
      • Applications Director
      • Customer Service Director
      • IT and Customer Service Representatives

      Download the Customer Service Business Process Shortlisting Tool

      1.2 Start designing the future state of key business processes

      If Customer Service transformation is called for, start with your future-state vision. Don’t get stuck in current state and the “art of the possible” within its context.

      Future-State Analysis

      Start by designing your future state business processes (based on the key processes shortlisting exercise). Design these processes as they would exist as your “ideal scenario.” Next, analyze your current state to help better your understanding of:

      • The gaps that exist and must be bridged to achieve the future-state vision.
      • Whether or not any critical functions that support your business were omitted accidentally from the future-state processes.
      • Whether or not any of the supporting applications or architecture can be salvaged and used toward delivery of your future-state vision.

      Though it’s a commonly used approach, documenting your current-state business processes first can have several drawbacks:

      • Current-state analysis can impede your ability to see future possibility.
      • Teams will spend a great deal of time and effort on documenting current state and inevitably succumb to “analysis paralysis.”
      • Current state assessment, when done first, limits the development of the future (or target) state, constraining thinking to the limitations of the current environment rather than the requirements of the business strategy.

      Current-State Analysis

      “If you're fairly immature and looking for a paradigm shift or different approach [because] you recognize you're totally doing it wrong today, then starting with documenting current state doesn't do a lot except make you sad. You don't want to get stuck in [the mindset of] ‘Here's the current state, and here’s the art of the possible.’”

      Trevor Timbeck, Executive Coach, Parachute Executive Coaching

      1.2 Start modeling future-state processes

      Build buy-in and accountability in process owners through workshops and whiteboarding – either in-person or remotely.

      Getting consensus on the process definition (who does what, when, where, why, and how) is one of the hardest parts of BPM.

      Gathering process owners for a process-defining workshop isn’t easy. Getting them to cooperate can be even harder. To help manage these difficulties during the workshop, make sure to:

      • Keep the scope contained to the processes being defined in order to make best use of everyone’s time, as taking time away from employees is a cost too.
      • Prior to the workshop, gather information about the processes with interviews, questionnaires, and/or system data gathering and analysis.
      • Use the information gathered to have real-life examples of the processes in question so that time isn’t wasted.

      Info-Tech Insight

      Keep meetings short and on task as tangents are inevitable. Set ground rules at the beginning of any brainstorming or whiteboarding session to ensure that all participants are aligned.

      1.2 Use the five W’s to help map out your future-state processes

      Define the “who, what, why, where, when, and how” of the process to gain a better understanding of individual activities.

      Owner

      Who

      What

      When

      Where

      Why

      How

      Record Claim

      Customer Service

      Customer Service Rep.

      Claim

      Accident

      Claims system

      Customer notification

      Agent enters claim into the system and notifies claims department

      Manage Claim

      Claims Department

      Claims Clerk

      Claim

      Agent submitted the claim

      Claims system

      Agent notification

      Clerk enters claim into the claims system

      Investigate Claim

      Claims Investigation

      Adjuster

      Claim

      Claim notification

      Property where claim is being made

      Assess damage

      Evaluation and expert input

      Settle Claim

      Claims Department

      Claim Approver

      Claim and Adjuster’s evaluation

      Receipt of Adjuster’s report

      Claims system

      Evaluation

      Approval or denial

      Administer Claim

      Finance Department

      Finance Clerk

      Claim amount

      Claim approval notification

      Finance system

      Payment required

      Create payment voucher and cut check

      Close Claim

      Claims Department

      Claims Clerk

      Claim and all supporting documentation

      Payment issued

      Claims system

      Claim processed

      Close the claim in the system

      Info-Tech Insight

      It’s not just about your internal processes. To achieve higher customer retention and satisfaction, it’s also useful to map the customer service process from the customer perspective to identify customer pain points and disconnects.

      1.2 Use existing in-house software as a simplistic entry point to process modeling

      A diagramming tool like Visio enables you to plot process participants and actions using dedicated symbols and connectors that indicate causality.

      • Models can use a stick-figure format, a cross-functional workflow format, or BPMN notation.
      • Plot the key activities and decision points in the process using standard flowcharting shapes. Identify the data that belongs to each step in a separate document or as call-outs on the diagram.
      • Document the flow control between steps, i.e., what causes one step to finish and another to start?

      The image contains a screenshot of the sample cross-functional diagram using the claims process.

      Info-Tech Best Practice

      Diagramming tools can force the process designer into a specific layout: linear or cross-functional/swim lane.

      • A linear format is recommended for single function and system processes.
      • A swim lane format is recommended for cross-functional and cross-departmental processes.

      1.2 Introduce low investment alternatives for process modeling for modeling disciplines

      SaaS and low-cost modeling tools are emerging to help organizations with low to medium BPM maturity visualize their processes.

      • Formal modeling tools allow a designer to model in any view and easily switch to other views to gain new perspectives on the process.
      • Subscription-based, best-of-breed SaaS tools provide scalable and flexible process modeling capabilities.
      • Open source and lower cost tools also exist to help distribute BPM modeling discipline and standards.
      • BPMS suites incorporate advanced modeling tools with process execution engines for end-to-end business process management. Integrate process discovery with modeling, process simulation, and analysis. Deploy, monitor, and measure process models in process automation engines.

      The image contains a screenshot of a diagram of the claims process.

      Explore SoftwareReviews’ Business Process Management market analysis by clicking here.

      1.2b Model future state business processes

      4 hours

      1. Model the future state of the most critical business processes.
      2. Use Tab 5, Columns G – H of Info-Tech’s Customer Service Business Process Shortlisting Tool to keep stock of what processes are targeted for modeling, and whether the models have been completed.
      The image contains a screenshot of the Customer Service Business Process Shortlisting Tool.

      Input

      Output

      • Modeled future Customer Service business processes
      • An inventory of modeled future states for critical Customer Service business processes

      Materials

      Participants

      • Whiteboard
      • Writing materials
      • Customer Service Business Process Shortlisting Tool
      • Applications Director
      • Customer Service Director

      Download the Customer Service Business Process Shortlisting Tool

      1.3 Start a preliminary inventory of your requirements

      Use the future state business process models as a source for software requirements.

      • Business process modeling deals with business requirements that can be used as the foundation for elicitation of system (functional and non-functional) requirements.
      • Modeling creates an understanding of the various steps and transfers in each business process, as well as the inputs and outputs of the process.
      • The future state models form an understanding of what information is needed and how it flows from one point to another in each process.
      • Understand what technologies are (or can be) leveraged to facilitate the exchange of information and facilitate the process.

      For each task or event in the process, ask the following questions:

      • What is the input?
      • What is the output?
      • What are the underlying risks and how can they be mitigated?
      • What conditions should be met to mitigate or eliminate each risk?
      • What are the improvement opportunities?
      • What conditions should be met to enable these opportunities?

      Info-Tech Insight

      Incorporate future considerations into the requirements. How will the system need to adapt over time to accommodate additional processes, process variations, introduction of additional channels and capabilities, etc. Do not overreach by identifying system capabilities that cannot possibly be met.

      1.3 Understand the four different requirements to document

      Have a holistic view for capturing the various requirements the organization has for a Customer Service strategy.

      Business requirements

      High-level requirements that management would typically understand.

      User requirements

      High-level requirements on how the tool should empower users’ lives.

      Non-functional requirements

      Criteria that can be used to judge the operation of a contact center. It defines how the system should perform for the organization.

      Functional requirements

      Outline the technical requirements for the desired contact center.

      1.3 Extract requirements from the business process models

      To see how, let us examine our earlier example for the Claims Process, extracting requirements from the “Record Claim” task.

      The image contains an example of the claims process, and focuses on the record claim task.

      1.3a Document your preliminary requirements

      4 hours

      1. The Applications Director and Customer Service Head are to identify participants based on the business processes that will be reviewed.
      2. They are to conduct a workshop to gather all requirements that can be taken from the business process models.
      3. Use Tab 4 of Info-Tech’s Customer Service Systems Strategy Tool to document your preliminary requirements.
      The image contains a screenshot of the Customer Service Systems Strategy Tool.
      InputOutput
      • Half-day workshop to review the proposed future-state diagrams and distill from them the business, functional, and non-functional requirements
      • Future state business process models from activities 1.2a and 1.2b
      • An inventory of preliminary requirements for modeled future states
      MaterialsParticipants
      • Whiteboard
      • Writing materials
      • Customer Service Systems Strategy Tool
      • Results of activities 1.2a and 1.2b
      • Applications Director
      • Customer Service Director
      • IT and Customer Service Representatives

      Download the Customer Service Systems Strategy Tool

      Phase 2

      Evaluate Current State

      Phase 1

      Phase 2

      Phase 3

      1.1 Structure the Project

      1.2 Define Vision for Future State

      1.3 Document Preliminary Requirements

      2.1 Document Current State Business Processes

      2.2 Assess Current State Architecture

      2.3 Review and Finalize Requirements for Future State

      3.1 Evaluate Architectural and Application Options

      3.2 Understand the Marketplace

      3.3 Score and Plot Initiatives Along Strategic Roadmap

      This phase will guide you through the following activities:

      2.1a Model current-state business processes for an inventory to compare against future-state models.

      2.1b Compare future and current business states for a preliminary gap analysis.

      2.1c Begin compiling an inventory of CS Systems by function for an overview of your current state map.

      2.2a Rate your functional and integration quality to assess the performance of your application portfolio.

      2.3a Compare states and propose action to bridge current business processes with viable future alternatives.

      2.3b Document finalized requirements, ready to enact change.

      Participants required for Phase 2:

      • Applications Director
      • Customer Service Director
      • IT and Customer Service Representatives
      • IT Managers

      2.1 Document the current state of your key business processes

      Doing so will solidify your understanding of the gaps, help identify any accidental omissions from the future state vision, and provide clues as to what can be salvaged.

      • Analysis of the current state is important in the context of gap analysis. It aids in understanding the discrepancies between your baseline and the future-state vision, and ensuring that these gaps are recorded as part of the overall requirements.
      • By analyzing the current state of key business processes, you may identify critical functions that are in place today that were not taken into consideration during the future-state business process visioning exercise.
      • By overlaying the current state process models with the applications that support them, the current state models will indicate what systems and interfaces can be salvaged.
      • The baseline feeds the business case, allowing the team to establish proposed benefits and improvements from implementing the future-state vision. Seek to understand the following:
        • The volumes of work
        • Major exceptions
        • Number of employees involved
        • Amount of time spent in each area of the process

      2.1 Assess the current state to drive the gap analysis

      Before you choose any solution, identify what needs to be done to your current state in order to achieve the vision you have defined.

      • By beginning with the future state in mind, you have likely already envisioned some potential solutions.
      • By reviewing your current situation in contrast with your desired future state, you can deliberate what needs to be done to bridge the gap. The differences between the models allow you to define a set of changes that must be enacted in sequence or in parallel. These represent the gaps.
      • The gaps, once identified, translate themselves into additional requirements.

      Assessment Example

      Future State

      Current Situation

      Next Actions/ Proposals

      Incorporate social channels for responding to customer inquiries.

      No social media monitoring or channels for interaction exist at present.

      1. Implement a social media monitoring platform tool and integrate it with the current CSM.
      2. Recruit additional Customer Service representatives to monitor and respond to inquiries via social channels.
      3. Develop report(s) for analyzing volumes of inquiries received through social channels.

      Info-Tech Insight

      It is important to allot time for the current-state analysis, confine it to the minimum effort required to understand the gaps, and identify any missing pieces from your future-state vision. Make sure the work expended is proportional to the benefit derived from this exercise.

      2.1a Model current-state business processes

      2 hours

      1. Model the current state of the most critical business processes, using the work done in activities 1.2a and 1.2b to help identify these processes.
      2. Use Tab 5, Column I of Info-Tech’s Customer Service Business Process Shortlisting Tool to keep stock of what models have been completed.
      3. This tool is now complete.
      The image contains a screenshot of the Customer Service Business Process Shortlisting Tool.
      InputOutput
      • Modeled current-state Customer Service business processes
      • An inventory of modeled current states for critical Customer Service business processes
      MaterialsParticipants
      • Whiteboard
      • Writing materials
      • Customer Service Business Process Shortlisting Tool
      • Results of activities 1.2a and 1.2b.
      • Applications Director
      • Customer Service Director

      Download the Customer Service Business Process Shortlisting Tool

      2.1b Compare future and current business states

      2 hours

      1. Use Tab 9 of Info-Tech’s Customer Service Systems Strategy Tool to record a summary of the future state, current state, and actions proposed in order to bridge the gaps.
        • Fill out the desired future state of the business processes and IT architecture.
        • Fill out the current state of the business processes and IT architecture.
        • Fill out the actions required to mitigate the gaps between the future and current state.
      The image contains a screenshot of thr Customer Service Systems Strategy Tool.
      InputOutput
      • The results of activities 1.2a, 1.2b, and 2.1a.
      • Modeled future- and current-state business processes
      • An overview and analysis of how to reach certain future states from the current state.
      • A preliminary list of next steps through bridging the gap between current and future states.
      MaterialsParticipants
      • Whiteboard
      • Writing materials
      • Customer Service Business Process Shortlisting Tool
      • Applications Director
      • Customer Service Director

      Download the Customer Service Systems Strategy Tool

      2.1 Assess whether Customer Service architecture can meet future-state vision

      Approach your CS systems holistically to identify opportunities for system architecture optimization.

      • Organizations often do not have a holistic view of their Customer Service systems. These systems are often cobbled together from disparate parts, such as:
        • Point solutions (both SaaS and on-premise).
        • Custom interfaces between applications and databases.
        • Spreadsheets and other manual workarounds.
      • A high degree of interaction between multiple systems can cause distention in the application portfolio and databases, creating room for error and more work for CS and IT staff. Mapping your systems and architectural landscape can help you:
        • Identify the number of manual processes you currently employ.
        • Eliminate redundancies.
        • Allow for consolidation and/or integration.

      Consider the following metrics when tracking your CS systems:

      Time needed to perform core tasks (i.e., resolving a customer complaint)

      Accuracy of basic information (customer history, customer product portfolio)

      CSR time spent on manual process/workarounds

      Info-Tech Insight

      There is a two-step process to document the current state of your Customer Service systems:

      1. Compile an inventory of systems by function
      2. Identify points of integration across systems

      2.1c Begin compiling an inventory of CS systems by function

      2 hours

      1. Using Tab 2 of Info-Tech’s Customer Service Systems Strategy Tool, request that the CS managers fill in the application inventory template with all the CS systems that they use.
      2. Questions to trigger exercise:
        • Which applications am I using?
        • Which CS function does the application support?
        • How many applications support the same function?
        • What spreadsheets or manual workarounds do I use to fill in system gaps?
      3. Send the filled-in template to IT Managers to validate and fill in missing system information.
      InputOutput
      • Applications Directors’ knowledge of the current state
      • IT Managers’ validation of this state
      • A corroborated inventory of the current state for Customer Service systems
      MaterialsParticipants
      • Customer Service Systems Strategy Tool
      • Applications Director
      • IT managers

      Download the Customer Service Systems Strategy Tool

      2.1 Use activity 2.1c for an overview of your current state map

      The image contains a screenshot of activity 2.1.

      Info-Tech Insight

      A current-state map of CS systems can offer insight on:

      • Coverage, i.e. whether all functional areas are supported by systems.
      • Redundancies, i.e. functional areas with multiple systems. If a customer’s records are spread across multiple systems, it may be difficult to obtain a single source of truth.

      2.2 Assess current state with user interface architecture diagrams

      Understand a high-level overview of how your current state integrates together to rate its overall quality.

      • If IT already has an architecture diagram, use this in conjunction with your application inventory for the basis of current state discussions.
      • If your organization does not already have an architecture diagram for review and discussion, consider creating one in its most simplistic form using the following guidelines (see illustrative example on next slide):

      Represent each of your systems as a labelled shape with a unique number (this number can be referenced in other artifacts that can provide more detail).

      Color coding can also be applied to differentiate these objects, e.g., to indicate an internal system (where development is owned by your organization) vs. an external system (where development is outside of your organization’s control).

      2.2 Example: Current state with user interface architecture diagrams

      The image contains a screenshot of an example of current state with user interface architecture diagrams.

      2.2 Evaluate application functionality and functional coverage

      Use this documentation of the current state as an opportunity to spot areas for rationalizing your application portfolio.

      If an application is well-received by the organization and is an overall good platform, consider acquiring more modules from the same vendor application.

      The image contains a screenshot of a diagram to demonstrate functionality and functional coverage.

      If you have more than one application for a function, consider why that is and how you might consolidate into a single application.

      Measure the effectiveness of applications under consideration. For example, consider the number of failures when an application attempts a function (by ticket numbers), and overall satisfaction/ease of use.

      The above steps will reveal capability overlaps and application pain points and show how the overall portfolio could be made more efficient.

      2.2 Determine the degree of integration between systems

      Data and system integration are key components of an effective CS system portfolio.

      The needed level of integration will depend on three major factors:

      Integration between systems helps facilitate reporting. The required reports will vary from organization to organization:

      How many other systems benefit from the data of the application?

      Large workforces will benefit from more detailed WFM reports for optimizing workforce planning and talent acquisition.

      Will automating the integration between systems alleviate a significant amount of manual effort?

      Organizations with competitive sales and incentives will want to strategize around talent management and compensation.

      What kind of reports will your organization require in order to perform core and business-enabling functions?

      Aging workforces or organizations with highly specialized skills can benefit from detailed analysis around succession planning.

      Phase 2 – Case Study

      Integrating customer relationship information streamlines customer service and increases ROI for the organization.

      INDUSTRY: Retail and Wholesale

      SOURCE: inContact

      Situation

      Solution

      Results

      • Hall Automotive – a group of 14 multi-franchise auto dealerships located throughout Virginia and North Carolina – had customer information segmented throughout their CRM system at each dealership.
      • Call center agents lacked the technology to synthesize this information, leading customers to receive multiple and unrelated service calls.
      • Hall Automotive wanted to avoid embarrassing information gaps, integrate multiple CRM systems, and help agents focus on customers.
      • Hall Automotive utilized an inContact solution that included Automated Call Distributor, Computer Telephony Integration, and IVR technologies.
      • This created a complete customer-centric system that interfaced with multiple CRM and back-office systems.
      • The inContact solution simplified intelligent call flows, routed contacts to the right agent, and provided comprehensive customer information.
      • Call time decreased from five minutes to one minute and 23 seconds.
      • 350% increase in production.
      • Market response time down from three months to one day.
      • Cost per call cut from 83 cents to 23 cents.
      • Increased agents’ calls-per-hour from 12 to 43.
      • Scalability matched seasonal fluctuations in sales.

      2.2a Rate your functional and integration quality

      2 hours

      1. Using Tab 5 of Info-Tech’s Customer Service Systems Strategy Tool, evaluate the functionality of your applications.
      2. Then, use Tab 6 of the Customer Service Systems Strategy Tool to evaluate the integration of your applications.
      The image contains screenshots of the Customer Service Systems Strategy Tool.
      InputOutput
      • Applications Directors’ knowledge of the current state
      • IT Managers’ validation of this state
      • A documented evaluation of the organization’s application portfolio regarding functional and integration quality
      MaterialsParticipants
      • Customer Service Systems Strategy Tool
      • Applications Director
      • IT managers

      Download the Customer Service Systems Strategy Tool

      2.3 Revisit and refine the future-state business processes and list of requirements

      With a better understanding of the current state, determine whether the future-state models hold up. Ensure that the requirements are updated accordingly to reflect the full set of gaps identified.

      • Future-state versus current-state modeling is an iterative process.
      • By assessing the gaps between target state and current state, you may decide that:
        • The future state model was overly ambitious for what can reasonably be delivered in the near-term.
        • Core functions that exist today were accidentally omitted from the future state models and need to be incorporated.
        • There are systems or processes that your organization would like to salvage, and they must be worked into the future-state model.
      • Once the future state vision is stabilized, ensure that all gaps have been translated into business requirements.
        • If possible, categorize all gaps by functional and non-functional requirements.

      2.3a Compare states and propose action

      3 hours

      • Revisit Tab 9 of Info-Tech’s Customer Service Systems Strategy Tool to more accurately compare your organization’s current- and future-state business processes.
      • Ensure that gaps in the system architecture have been captured.
      The image contains a screenshot of the Customer Service Systems Strategy Tool.
      InputOutput
      • Modeled future- and current-state business processes
      • Refined and prioritized list of requirements
      • An accurate list of action steps for bridging current and future state business processes
      MaterialsParticipants
      • Whiteboard
      • Writing materials
      • Customer Service Systems Strategy Tool
      • Applications Director
      • IT managers

      Download the Customer Service Systems Strategy Tool

      2.3 Prioritize and finalize the requirements

      Prioritizing requirements will help to itemize initiatives and the timing with which they need to occur.

      Requirements are to be prioritized based on relative important and the timing of the respective initiatives.

      Prioritize the full set of requirements by assigning a priority to each:

      1. High/Critical: A critical requirement; without it, the product is not acceptable to the stakeholders.
      2. Medium/Important: A necessary but deferrable requirement that makes the product less usable but still functional.
      3. Low/Desirable: A nice feature to have if there are resources, but the product can function well without it.

      Requirements prioritization must be completed in collaboration with all key stakeholders (business and IT).

      Consider the following criteria when assigning the priority:

      • Business value
      • Business or technical risk
      • Implementation difficulty
      • Likelihood of success
      • Regulatory compliance
      • Relationship to other requirements
      • Urgency
      • Unified stakeholder agreement

      Stakeholders must ask themselves:

      • What are the consequences to the business objectives if this requirement is omitted?
      • Is there an existing system or manual process/workaround that could compensate for it?
      • Why can’t this requirement be deferred to the next release?
      • What business risk is being introduced if a particular requirement cannot be implemented right away?

      2.3b Document finalized requirements

      4 hours

      1. Using Tab 4 of Info-Tech’s Customer Service Systems Strategy Tool, evaluate your applications’ functionality, review, refine, prioritize, and finalize your requirements.
      2. Review the proposed future state diagrams in activity 2.3a and distill from them the business, functional, and non-functional requirements.
      3. The Applications Director and Customer Service Head are to identify participants based on the business processes that will be reviewed. They are to conduct a workshop to gather all the requirements that can be taken from the business process models.
      The image contains a screenshot of the Customer Service Systems Strategy Tool.
      InputOutput
      • Modeled future- and current-state business processes
      • Refined and prioritized list of requirements
      • A documented finalized list of requirements to achieve future state business processes
      MaterialsParticipants
      • Whiteboard
      • Writing materials
      • Customer Service Systems Strategy Tool
      • IT Applications Director
      • Customer Service Director
      • IT and Customer Service Representatives

      Download the Customer Service Systems Strategy Tool

      Phase 3

      Build Roadmap to Future State

      Phase 1

      Phase 2

      Phase 3

      1.1 Structure the Project

      1.2 Define Vision for Future State

      1.3 Document Preliminary Requirements

      2.1 Document Current State Business Processes

      2.2 Assess Current State Architecture

      2.3 Review and Finalize Requirements for Future State

      3.1 Evaluate Architectural and Application Options

      3.2 Understand the Marketplace

      3.3 Score and Plot Initiatives Along Strategic Roadmap

      This phase will guide you through the following activities:

      3.1a Analyze future architectural posture to understand how applications within the organization ought to be arranged.

      3.3a Develop a Customer Service IT Systems initiative roadmap to reach your future state.

      Participants required for Phase 3:

      • Applications Director
      • CIO
      • Customer Service Director
      • Customer Service Head
      • IT and Customer Service Representatives
      • IT Applications Director

      3.1a Analyze future architectural posture

      1 hour

      Review Tab 8 of the Customer Service Systems Strategy Tool.

      This tab plots each system that supports Customer Service on a 2x2 framework based on its functionality and integration scores. Where these systems plot on each 2x2 provides clues as to whether they should be considered for retention, functional enhancement (upgrade), increased system integration, or replacement.

      • Integrate: The application is functionally rich, so integrate it with other modules by building or enhancing interfaces.
      • Retain: The application satisfies both functionality and integration requirements, so it should be considered for retention.
      • Replace: The application neither offers the functionality sought, nor is it integrated with other modules.
      • Replace/Enhance: The module offers poor functionality but is well integrated with other modules. If enhancing for functionality is easy (e.g., through configuration or custom development), consider enhancement or replace it altogether.
      The image contains a screenshot of tab 8 of the Customer Service Systems Strategy Tool.
      InputOutput
      • Review Tab 8 of the Customer Service Systems Strategy Tool
      • An overview of how different applications in the organization ought to be assessed
      MaterialsParticipants
      • Customer Service Systems Strategy Tool
      • IT Applications Director
      • Customer Service Director
      • IT and Customer Service Representatives

      Download the Customer Service Systems Strategy Tool

      3.1 Interpret 3.1a’s results for next steps

      Involving both sales and marketing in these discussions will provide a 360-degree view on what the modifications should accomplish.

      If the majority of applications are plotted in the “Integrate” quadrant:

      The applications are performing well in terms of functionality but have poor integration. Determine what improvements can be made to enhance integration between the systems where required (e.g. re-working existing interfaces to accommodate additional data elements, automating interfaces, or creating brand new custom interfaces where warranted).

      If the applications are spread across “Integrate,” “Retain,” and “Replace/Enhance”:

      There is no clear recommended direction in this case. Weigh the effort required to replace/enhance/integrate specific applications critical for supporting processes. If resource usage for piecemeal solutions is too high, consider replacement with suite.

      If the majority of applications are plotted in the “Retain” quadrant:

      All applications satisfy both functionality and integration requirements. There is no evidence that significant action is required.

      If the application placements are split between the “Retain” and “Replace/Enhance” quadrants:

      Consider whether or not IT has the capabilities to execute application replacement procedures. If considering replacement, consider the downstream impact on applications that the system in question is currently integrated with. Enhancing an application usually implies upgrading or adding a module to an existing application. Consider the current satisfaction with the application vendor and whether the upgrade or additional module will satisfy your customer service needs.

      3.1 Work through architectural considerations to narrow future states

      Best-of-breeds vs. suite

      Integration and consolidation

      Deployment

      Does the organization only need a point solution or an entire platform of solutions?

      Does the current state enable interoperability between software? Is there room for rationalization?

      Should any new software be SaaS-based, on-premises, or a hybrid?

      Info-Tech Insight

      Decommissioning and replacing entire applications can put well-functioning modules at risk. Make sure to drill down into the granular features to assess if the feature level performance prompts change. The goal is to make the architecture more efficient for Customer Service and easier to manage for IT. If integration has been chosen as a course of action, make sure that the spend on resources and effort is less than that on system replacement. Also make sure that the intended architecture streamlines usability for agents.

      3.1 Considerations: Best-of-breeds vs. suite

      If requirements extend beyond the capabilities of a best-of-breed solution, a suite of tools may be required.

      Best-of-breed

      Suite

      Benefits

      • Features may be more advanced for specific functional areas and a higher degree of customization may be possible.
      • If a potential delay in real-time customer data transfer is acceptable, best-of-breeds provide a similar level of functionality to suites for a lower price.
      • Best-of-breeds allow value to be realized faster than suites, as they are easier and faster to implement and configure.
      • Rip and replace is easier and vendor updates are relatively quick to market.

      Benefits

      • Everyone in the organization works from the same set of customer data.
      • There is a “lowest common denominator” for agent learning as consistent user interfaces lower learning curves and increase efficiency in usage.
      • There is a broader range of functionality using modules.
      • Integration between functional areas will be strong and the organization will be in a better position to enable version upgrades without risking invalidation of an integration point between separate systems.

      Challenges

      • Best-of-breeds typically cover less breadth of functionality than suites.
      • There is a lack of uniformity in user experience across best-of-breeds.
      • Data integrity risks are higher.
      • Variable infrastructure may be implemented due to multiple disparate systems, which adds to architecture complexity and increased maintenance.
      • There is potential for redundant functionality across multiple best-of-breeds.

      Challenges

      • Suites exhibit significantly higher costs compared to point solutions.
      • Suite module functionality may not have the same depth as point solutions.
      • Due to high configuration availability and larger-scale implementation requirements, the time to deploy is longer than point solutions.

      3.1 Considerations: Integration and consolidation

      Use Tab 7 of Info-Tech’s Customer Service Systems Strategy Tool to gauge the need for consolidation.

      IT benefits

      • Decreased spend on infrastructure, application acquisition, and development.
      • Reduced complexity in vendor management.
      • Less resources and effort spent on internal integration and functional customization.

      Customer Service benefits

      • Reduced user confusion and application usage efficiency.
      • Increased operational visibility and ease process mapping.
      • Improved data management and integrity.

      Theoretical scenarios and recommendations

      The image contains a screenshot of an example of a customer service functional purpose.

      Problem:

      • Large Redundancy – multiple applications address the same function, but one application performs better than others.

      Recommendation:

      • Consolidate the functions into Application 1 and consider decommissioning Applications 2 to 4.
      The image contains a screenshot of an example of a customer service functional purpose.

      Problem:

      • Large Redundancy – multiple applications address the same function, but none of them do it well.

      Recommendation:

      • None of the applications perform well in functional support. Consider replacing with suite or leveraging the Application 3 vendor for functional module expansion, if feasible.

      3.1 Considerations: Deployment

      SaaS is typically recommended as it reduces IT support needs. However, customization limitations and higher long-term TCO values continue to be a challenge for SaaS.

      On-premises deployment

      Hybrid deployment

      Public cloud deployment

      Benefits

      • Solution and deployment are highly customizable.
      • There are fewer compliance and security risks because customer data is kept on premises.

      Challenges

      • There is slower physical deployment.
      • Physical hardware and software are required.
      • There are higher upfront costs.

      Benefits

      • Pick-and-mix which aspects to keep on premises and which to outsource.
      • Benefits of scaling and flexibility for outsourced solution.

      Challenges

      • Expensive to maintain.
      • Requires in-house skillset for on-premises option.
      • Some control is lost over outsourced customization.

      Benefits

      • Physical hardware is not required.
      • There is rapid deployment, vendor managed product updates, and server maintenance.
      • There are lower upfront costs.

      Challenges

      • There is higher TCO over time.
      • There are perceived security risks.
      • There are service availability and reliability risks.
      • There is limited customization.

      3.1 Considerations: Public cloud deployment

      Functionality is only one aspect of a broader range of issues to narrow down the viability of a cloud-based architecture.

      Security/Privacy Concerns:

      Whether the data is stored on premise or in the cloud, it is never 100% safe. The risk increases with a multi-tenant cloud solution where a single vendor manages the data of multiple clients. If your data is particularly sensitive, heavily scrutinize the security infrastructure of potential vendors or store the data internally if internal security is deemed stronger than that of a vendor.

      Location:

      If there are individuals that need to access the system database and work in different locations, centralizing the system and its database in the cloud may be an effective approach.

      Compatibility:

      Assess the compatibility of the cloud solutions with your internal IT systems. Cloud solutions should be well-integrated with internal systems for data flow to ensure efficiency in service operations.

      Cost/Budget Constraints:

      SaaS allows conversion of up-front CapEx to periodic OpEx. It assists in bolstering a business case as costs in the short-run are much more manageable. On-premise solutions have a much higher upfront TCO than cloud solutions. However, the TCO for the long-term usage of cloud solutions under the licensing model will exceed that of an on-premise solution, especially with a growing business and user base.

      Functionality/Customization:

      Ensure that the function or feature that you need is available on the cloud solution market and that the feature is robust enough to meet service quality standards. If the available cloud solution does not support the processes that fit your future-state vision and gaps, it has little business value. If high levels of customization are required to meet functionality, the amount of effort and cost in dealing with the cloud vendor may outweigh the benefits.

      Maintenance/Downtime:

      For most organizations, lapses in cloud-service availability can become disastrous for customer satisfaction and service quality. Organizations should be prepared for potential outages since customers require constant access to customer support.

      3.2 Explore the customer service technology marketplace

      Your requirements, gap analysis, and assessment of current applications architecture may have prompted the need for a new solutions purchase.

      • Customer service technology has come a long way since PABX in 1960s call centers. Let Info-Tech give you a quick overview of the market and the major systems that revolve around Customer Service.
      • The image contains a screenshot of a timeline of the market and major systems that revolve  around customer service.

      Info-Tech Insight

      While Customer Relationships Management systems interlock several aspects of the customer journey, best-of-breed software for specific aspects of this journey could provide a better ROI if the organization’s coverage of these aspects are only “good enough” and need boosting.

      3.2 The CRM software market will continue to grow at an aggressive rate

      • In recent years, CRM suite solutions have matured significantly in their customer support capabilities. Much of this can be attributed to their acquisitions of smaller best-of-breed Customer Service vendors.
      • Many of the larger CRM solutions (like those offered by Salesforce) have now added social media engagement, knowledge bases, and multi-channel capabilities into their foundational offering.
      • CRM systems are capable of huge sophistication and integration with the core ERP, but they also have heavy license and implementation costs, and therefore may not be for everyone.
      • In some cases, customers are looking to augment upon very specific capabilities that are lacking from their customer service foundation. In these cases, best-of-breed solutions ought to be integrated with a CRM, ERP, or with one another through API integration.
      The image contains a screenshot of a graph that demonstrates the CRM global market growth, 2019-2027.

      3.2 Utilize SoftwareReviews to focus on which CS area needs enhancing

      Contact Center as a Service (CCaaS)

      Cloud-based customer experience solution that allows organizations to utilize a provider’s software to administer incoming support or inquiries from consumers in a hosted, subscription model.

      Customer Service Management (CSM)

      Supports an organization's interaction with current and potential customers. It uses data-driven tools designed to help organizations drive sales and deliver exceptional customer experiences.

      Customer Intelligence Platform

      Gather and analyze data from both structured and unstructured sources regarding your customers, including their demographic/firmographic details and activities, to build deeper and more effective customer relationships and improve business outcomes.

      Enterprise Social Media Management

      Software for monitoring social media activity with the goal of gaining insight into user opinion and optimizing social media campaigns.

      Customer Relationship Management (CRM)

      Consists of applications designed to automate and manage the customer life cycle. CRM software optimizes customer data management, lead tracking, communication logging, and marketing campaigns.

      Virtual Assistants and Chatbots

      interactive applications that use Artificial Intelligence (AI) to engage in conversation via speech or text. These applications simulate human interaction by employing natural language input and feedback.

      3.2 SoftwareReviews’ data accelerates and improves the software selection process

      SoftwareReviews collects and analyzes detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      With SoftwareReviews:

      • Access premium reports to understand the marketspace of 193 software categories.
      • Compare vendors with SoftwareReviews’ Data Quadrant Reports.
      • Discover which vendors have better customer relations management with SoftwareReviews’ Emotional Footprint Reports.
      • Explore the Product Scorecards of single vendors for a detailed analysis of their software offerings.
      The image contains a screenshot of the Software Reviews offerings.

      3.2 Speak with category experts to dive deeper into the vendor landscape

      Fact-based reviews of business software from IT professionals.

      Product and category reports with state-of-the-art data visualization.

      Top-tier data quality backed by a rigorous quality assurance process.

      User-experience insight that reveals the intangibles of working with a vendor.

      CLICK HERE to access SoftwareReviews

      Comprehensive software reviews to make better IT decisions.

      We collect and analyze the most detailed reviews on enterprise software from real users to give you an unprecedented view into the product and vendor before you buy.

      SoftwareReviews is powered by Info-Tech.

      Technology coverage is a priority for Info-Tech, and SoftwareReviews provides the most comprehensive unbiased data on today’s technology. The insights of our expert analysts provide unparalleled support to our members at every step of their buying journey.

      3.2 Leverage Info-Tech’s Rapid Application Selection Framework

      Improve your key software selection metrics for best-of-breed customer service software.

      The image contains a screenshot of an example of Info-Tech's Rapid Application Selection Framework.

      A simple measurement of the number of days from intake to decision.

      Use our Project Satisfaction Tool to measure stakeholder project satisfaction.

      Use our Application Portfolio Assessment Tool annually to measure application satisfaction.

      Use our Contract Review Service to benchmark and optimize your technology spending.

      Learn more about Info-Tech’s The Rapid Application Selection Framework

      The Rapid Application Selection Framework (RASF) is best geared toward commodity and mid-tier enterprise applications

      Not all software selection projects are created equal – some are very small, some span the entire enterprise. To ensure that IT is using the right framework, understand the cost and complexity profile of the application you’re looking to select. The RASF approach is best for commodity and mid-tier enterprise applications; selecting complex applications is better handled by the methodology described in Implement a Proactive and Consistent Vendor Selection Process.

      RASF Methodology

      Commodity & Personal Applications

      • Simple, straightforward applications (think OneNote vs. Evernote)
      • Total application spend of up to $10,000; limited risk and complexity
      • Selection done as a single, rigorous, one-day session

      Complex Mid-Tier Applications

      • More differentiated, department-wide applications (Marketo vs. Pardot)
      • Total application spend of up to $100,000; medium risk and complexity
      • RASF approach done over the course of an intensive 40-hour engagement

      Consulting Engagement

      Enterprise Applications

      Sophisticated, enterprise-wide applications (Salesforce vs. Dynamics)

      Total application spend of over $100,000; high risk and complexity

      Info-Tech can assist with tailored, custom engagements

      3.3 Translate gathered requirements and gaps into project-based initiatives

      Identify initiatives that can address multiple requirements simultaneously.

      The Process

      • You now have a list of requirements from assessing business processes and the current Customer Service IT systems architecture.
      • With a viable architecture and application posture, you can now begin scoring and plotting key initiatives along a roadmap.
      • Group similar requirements into categories of need and formulate logical initiatives to fulfill the requirements.
      • Ensure that all requirements are related to business needs, measurable, sufficiently detailed, and prioritized, and identify initiatives that meet the requirements.

      Consider this case:

      Paul’s organization, a midsize consumer packaged goods retailer, needs to monitor social media for sentiment, use social analytics to gain intelligence, and receive and respond to inquiries made over Twitter.

      The initiative:

      Implement a social media management platform (SMMP): A SMMP is able to deliver on all of the above requirements. SMMPs are highly capable platforms that have social listening modules and allow costumer service representatives to post to and monitor social media.

      3.3 Prioritize your initiatives and plan the order of rollout

      Initiatives should not and cannot be tackled all at once. There are three key factors that dictate the prioritization of initiatives.

      1. Value
        • What is the monetary value/perceived business value?
        • Are there regulatory or security related impacts if the initiative is not undertaken?
        • What is the time to market and is it an easily achievable goal?
        • How well does it align with the strategic direction?
      2. Risk
        • How technically complex is it?
        • Does it impact existing business processes?
        • Are there ample resources and right skillsets to support it?
      3. Dependencies
        • What initiatives must be undertaken first?
        • Which subsequent initiatives will it support?

      Example scenario using Info-Tech’s Initiative Scoring and Roadmap Tool

      An electronics distributor wants to implement social media monitoring and response. Its existing CRM does not have robust channel management functions. The organization plans to replace its CRM in the future, but because of project size and impact and budgetary constraints, the replacement project has been scheduled to occur two years from now.

      • The SMMP solution proposed for implementation has a high perceived value and is low risk.
      • The CRM replacement has higher value, but also carries significantly more risk.
      • Option 1: Complete the CRM replacement first, and overlay the social media monitoring component afterward (as the SMMP must be integrated with the CRM).
      • Option 2: Seize the easily achievable nature of the SMMP initiative. Implement it now and plan to re-work the CRM integration later.
      The image contains a screenshot of an example scenario using Info-Tech's Initiative Scoring and Roadmap Tool.

      3.3a Develop a Customer Service IT Systems initiative roadmap

      1 hour

      • Complete the tool as a team during a one-hour meeting to collaborate and agree on criteria and weighting.
        1. Input initiative information.
        2. Determine value and risk evaluation criteria.
        3. Evaluate each initiative to determine its priority.
        4. Create a roadmap of prioritized initiatives.
      The image contains a screenshot of the Customer Service Initiative Scoring and Roadmap Tool.
      InputOutput
      • Input the initiative information including the start date, end date, owner, and dependencies
      • Adjust the evaluation criteria, i.e., the value and risk factors
      • A list of initiatives and a roadmap toward the organization’s future state of Customer Service IT Systems
      MaterialsParticipants
      • Customer Service Initiative Scoring and Roadmap Tool
      • Applications Director
      • CIO
      • Customer Service Head

      Download the Customer Service Initiative Scoring and Roadmap Tool

      Document and communicate the strategy

      Leverage the artifacts of this blueprint to summarize your findings and communicate the outcomes of the strategy project to the necessary stakeholders.

      Document Section

      Proposed Content

      Leverage the Following Artifacts

      Executive Summary

      • Introduction
      • The opportunity
      • The scope
      • The stakeholders
      • Project success measures

      Project Charter section:

      • 1.1 Project Overview
      • 1.2 Project Objectives
      • 1.3 Project Benefits
      • 2.0 Scope

      Project RACI Chart Tool:

      • Tab 3. Simplified Output
      The image contains screenshots from the Project Charter, and the RACI Chart Tool.

      Background

      • The project approach
      • Current situation overview
      • Results of the environmental scan

      Blueprint slides:

      • Info-Tech’s methodology to develop your IT Strategy for CS Systems
      The image contains a screenshot from the blueprint slides.

      Future-State Vision

      • Customer service goals
      • Future-state modeling findings

      Customer Service Business Process Shortlisting Tool:

      • Tab 2. Customer Service Goals
      • Tab 5. Level 5 Process Inventory

      Future State Business Process Models

      The image contains screenshots from the Customer Service Business Process Shortlisting Tool.

      Current Situation

      • Current-state modeling findings
      • Current-state architecture findings
      • Gap assessment
      • Requirements

      Customer Service Systems Strategy Tool:

      • Tab 2. Inventory of Applications
      • Tab 7. Systems Health Heat Map
      • Tab 8. Systems Health Dashboard
      • Tab 9. Future vs. Current State
      • Tab 4. Requirements Collection
      The image contains screenshots from the Customer Service Systems Strategy Tool.

      Summary of Recommendations

      • Optimization opportunities
      • New capabilities

      N/A

      IT Strategy Implementation Plan

      • Implementation plan
      • Business case

      Customer Service Initiative Scoring and Roadmap Tool:

      • Tab 2. CS Initiative Definition
      • Tab 4. CS Technology Roadmap
      The image contains screenshots from the Customer Service Initiative Scoring and Roadmap Tool.

      Summary of Accomplishment

      Develop an IT Strategy to Support Customer Service

      With ecommerce accelerating and customer expectations rising with it, organizations must have an IT strategy to support Customer Service.

      The deliverable you have produced from this blueprint provides a solution to this problem: a roadmap to a desired future state for how IT can ground an effective customer service engagement. From omnichannel to self-service, IT will be critical to enabling the tools required to digitally meet customer needs.

      Begin implementing your roadmap!

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Related Info-Tech Research

      Deliver a Customer Service Training Program to Your IT Department

      • One training session is not enough to make a change. Leaders must embed the habits, create a culture of engagement and positivity, provide continual coaching and development, regularly gather customer feedback, and seek ways to improve.

      Build a Chatbot Proof of Concept

      • When implemented effectively, chatbots can help save costs, generate new revenue, and ultimately increase customer satisfaction for both external- and internal-facing customers.

      The Rapid Application Selection Framework

      • Application selection is a critical activity for IT departments. Implement a repeatable, data-driven approach that accelerates application selection efforts.

      Bibliography (1/2)

      • Callzilla. "Software Maker Compares Call Center Companies, Switches to Callzilla After 6 Months of Results." Callzilla. N.d. Accessed: 4 Jul. 2022.
      • Cisco. “Transforming Customer Service.” Cisco. 2018. Accessed: 8 Feb. 2021.
      • Gottlieb, Giorgina. “The Importance of Data for Superior Customer Experience and Business Success.” Medium. 23 May 2019. Accessed: 8 Feb. 2021.
      • Grand View Research. “Customer Relationship Management Market Size, Share & Trends Analysis Report By Solution, By Deployment, By Enterprise Size, By End Use, By Region, And Segment Forecasts, 2020 – 2027.” Grand View Research. April 2020. Accessed: 17 Feb. 2021.
      • inContact. “Hall Automotive Accelerates Customer Relations with inContact.” inContact. N.d. Accessed: 8 Feb. 2021.
      • Kulbyte, Toma. “37 Customer Experience Statistics to Know in 2021.” Super Office. 4 Jan. 2021. Accessed: 5 Feb. 2021.
      • Kuligowski, Kiely. "11 Benefits of CRM Systems." Business News Daily. 29 Jun. 2022. Accessed: 4 Jul. 2022.
      • Mattsen Kumar. “Ominchannel Support Transforms Customer Experience for Leading Fintech Player in India.” Mattsen Kumar. 4 Apr. 2020. Accessed: 8 Feb. 2021.
      • Microsoft. “State of Global Customer Service Report.” Microsoft. Mar. 2019. Accessed: 8 Feb. 2021.
      • Ringshall, Ben. “Contact Center Trends 2020: A New Age for the Contact Center.” Fonolo. 20 Oct. 2020. Accessed 2 Nov. 2020.
      • Salesforce. “State of Service.” Salesforce. 4th ed. 2020. Accessed: 8 Feb. 2021.
      • Sopadjieva, Emma, Utpal M. Dholakia, and Beth Benjamin. “A Study of 46,000 Shoppers Shows That Omnichannel Retailing Works.” Harvard Business Review. 3 Jan. 2017. Accessed: 8 Feb. 2021.

      Bibliography (2/2)

      • Tech Pro Research. “Digital Transformation Research Report 2018: Strategy, Returns on Investment, and Challenges.” Tech Pro Research. 29 Jul. 2018. Accessed: 5 Feb. 2021.
      • TSB. “TSB Bank Self-Serve Banking Increases 9% with Adobe Sign.” TSB. N.d. Accessed: 8 Feb. 2021.
      • VoiceSage. “VoiceSage Helps Home Retail Group Transform Customer Experience.” VoiceSage. 4 May 2018. Accessed: 8 Feb. 2021.

      Build a Chatbot Proof of Concept

      • Buy Link or Shortcode: {j2store}532|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $9,566 Average $ Saved
      • member rating average days saved: 7 Average Days Saved
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Implement a chatbot proof of concept mapped to business needs.
      • Scale up customer service delivery in a cost-effective manner.
      • Objectively measure the success of the chatbot proof of concept with metrics-based data.
      • Choose the ticket categories to build during your chatbot proof of concept.

      Our Advice

      Critical Insight

      • Build your chatbot to create business value. Whether it is increasing service or resource efficiency, keep the goal of value in mind when making decisions with your proof of concept.

      Impact and Result

      • When implemented effectively, chatbots can help save costs, generate new revenue, and ultimately increase customer satisfaction for both external- and internal-facing customers.

      Build a Chatbot Proof of Concept Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a chatbot proof of concept, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Form your chatbot strategy

      Build action-based metrics to measure the success of your chatbot proof of concept.

      • Chatbot ROI Calculator
      • Chatbot POC Metrics Tool

      2. Build your chatbot foundation

      Put business value first to architect your chatbot before implementation.

      • Chatbot Conversation Tree Library (Visio)
      • Chatbot Conversation Tree Library (PDF)

      3. Continually improve your chatbot

      Continue to grow your chatbot beyond the proof of concept.

      • Chatbot POC RACI
      • Chatbot POC Implementation Roadmap
      • Chatbot POC Communication Plan
      [infographic]

      Workshop: Build a Chatbot Proof of Concept

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build Your Strategy

      The Purpose

      Build your strategy.

      Key Benefits Achieved

      Calculate your chatbot’s ROI to determine its success.

      Organize your chatbot proof of concept (POC) metrics to keep the project on track.

      Objectively choose chatbot ticket categories.

      Activities

      1.1 Customize your chatbot ROI calculator.

      1.2 Choose your proof of concept ticket categories.

      1.3 Design chatbot metrics to measure success.

      Outputs

      Chatbot ROI Calculator

      Chatbot POC Implementation Roadmap

      Chatbot POC Metrics Tool

      2 Architect Your Chatbot

      The Purpose

      Architect your chatbot.

      Key Benefits Achieved

      Design your integrations with business value in mind.

      Begin building chatbot decision trees.

      Activities

      2.1 List and map your chatbot integrations.

      2.2 Build your conversation tree library.

      Outputs

      Chatbot Integration Map

      Chatbot Conversation Tree Library

      3 Architect Your Chatbot Conversations

      The Purpose

      Architect your chatbot conversations.

      Key Benefits Achieved

      Detail your chatbot conversations in the decision trees.

      Activities

      3.1 Build your conversation tree library.

      Outputs

      Chatbot Conversation Tree Library

      4 Continually Grow Your Chatbot

      The Purpose

      Continually grow your chatbot.

      Key Benefits Achieved

      Identify talent for chatbot support.

      Create an implementation plan.

      Activities

      4.1 Outline the support responsibilities for your chatbot.

      4.2 Build a communication plan.

      Outputs

      Chatbot POC RACI

      Chatbot POC Communication Plan

      Build a Service-Based Security Resourcing Plan

      • Buy Link or Shortcode: {j2store}267|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $20,799 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Security Processes & Operations
      • Parent Category Link: /security-processes-and-operations
      • IT and security leaders across all industries must determine what and how many resources are needed to support the information security program.
      • Estimating current usage and future demand for security resources can be a difficult and time-consuming exercise.

      Our Advice

      Critical Insight

      Not all security programs need to be the same. A service-aligned security resourcing strategy will put organizations in the best position to respond to current and future service demands and address business needs as they evolve over time.

      Impact and Result

      • Info-Tech’s approach to resource planning focuses less on benchmarks and more on estimating actual demand for security services to ensure that there are enough resources to deliver them.
      • A well-designed security services portfolio is the first step towards determining resourcing needs.
      • When planning resource allocations, plan for both mandatory and discretionary demand to optimize utilization.

      Build a Service-Based Security Resourcing Plan Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a Service-Based Security Resourcing Plan – A blueprint to help you define security roles, build a service portfolio, estimate demand, and determine resourcing needs.

      This storyboard will help you to determine your security resourcing needs using a service-based approach.

      • Build a Service-Based Security Resourcing Plan – Phases 1-3

      2. Security Resources Planning Workbook – This tool will result in a defined security service portfolio and a three-year resourcing plan.

      Use this tool to build your security service portfolio and to determine resourcing needs to meet your service demand.

      • Security Resources Planning Workbook

      Infographic

      Workshop: Build a Service-Based Security Resourcing Plan

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Roles and Select Services

      The Purpose

      Identify the roles needed to implement and deliver your organization’s security services.

      Key Benefits Achieved

      A security services portfolio allows you to assign job roles to each service, which is the first step towards determining resourcing needs. Improve employee engagement and satisfaction with clearly defined job roles, responsibilities, and service levels.

      Activities

      1.1 Assess security needs and business pressures.

      1.2 Define security job roles.

      1.3 Define security services and assign ownership.

      Outputs

      Security Roles Definition

      Security Services Portfolio

      2 Estimate Current and Future Demand

      The Purpose

      Estimate the actual demand for security resources and determine how to allocate resources accordingly.

      Key Benefits Achieved

      Allocate resources more effectively across your Security and Risk teams.

      Raise the profile of your security team by aligning security service offerings with the demands of the business.

      Activities

      2.1 Estimate current and future demand.

      2.2 Review demand summary.

      2.3 Allocate resources where they are needed the most.

      Outputs

      Demand Estimates

      Resourcing Plan

      3 Identify Required Skills

      The Purpose

      When defining roles, consider the competencies needed to deliver your security services. Make sure to account for this need in your resource planning.

      Key Benefits Achieved

      Leverage the NCWF to establish the building blocks of a capable and ready cybersecurity workforce to effectively identify, recruit, develop and maintain cybersecurity talent.

      Activities

      3.1 Identify skills needed for planned initiatives.

      3.2 Prioritize your skill requirements.

      3.3 Assign work roles to the needs of your target environment.

      3.4 Discuss the NICE cybersecurity workforce framework.

      3.5 Develop technical skill requirements for current and future work roles.

      Outputs

      Prioritized Skill Requirements and Associated Roles

      4 Future Planning

      The Purpose

      Create a development plan to train and upskill your employees to address current and future service requirements.

      Key Benefits Achieved

      Skill needs are based on the strategic requirements of a business-aligned security program.

      Activities

      4.1 Continue developing technical skill requirements for current and future work roles.

      4.2 Conduct current workforce skills assessment.

      4.3 Develop a plan to acquire skills.

      4.4 Discuss training and certification opportunities for staff.

      4.5 Discuss next steps for closing the skills gap.

      4.6 Debrief.

      Outputs

      Role-Based Skills Gaps

      Workforce Development Plan

      Further reading

      Build a Service-Based Security Resourcing Plan

      Every security program is unique; resourcing allocations should reflect this.

      Analyst Perspective

      Start by looking inward.

      The image is a picture of Logan Rohde.The image is a picture of Isabelle Hertanto.

      Organizations have a critical need for skilled cybersecurity resources as the cyberthreat landscape becomes more complex. This has put a strain on many security teams who must continue to meet demand for an increasing number of security services. To deliver services well, we first need to determine what are the organization’s key security requirements. While benchmarks can be useful for quick peer-to-peer comparisons to determine if we are within the average range, they tend to make all security programs seem the same. This can lead to misguided investments in security services and personnel that might be better used elsewhere.

      Security teams will be most successful when organizations take a personalized approach to security, considering what must be done to lower risk and operate more efficiently and effectively.

      Logan Rohde

      Senior Research Analyst, Security

      Info-Tech Research Group

      Isabelle Hertanto

      Principal Research Director, Security

      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      • IT and Security leaders across all industries must determine what and how many resources are needed to support the information security program.
      • Estimating current usage, the right allocations, and future demand for security resources can be a difficult and time-consuming exercise.
      • Needing to provide a benchmark to justify increasing headcount.
      • Absence of formally defined security service offerings and service owners.
      • Lack of skills needed to provide necessary security services.
      • Info-Tech’s approach to resource planning focuses less on benchmarks and more on estimating actual demand for security services to ensure that there are enough resources to deliver them.
      • A well-designed security services portfolio is the first step toward determining resourcing needs.
      • When allocating resources, plan for both mandatory and discretionary demand to position yourself for greatest success.

      Info-Tech Insight

      Not all security programs need to be the same. A service-aligned security resourcing strategy will put organizations in the best position to respond to current and future service demands and address business needs as they evolve over time.

      Your challenge

      This research is designed to help organizations who are looking to:

      • Determine what and how many resources are needed to support the information security program.
      • Identify the organization's key service offerings and the required resourcing to support delivery of such services.
      • Estimate current staff utilization and required allocations to satisfy future demand for services.

      Every organization is unique and will need different security research allocations aligned with their business needs.

      “The number of priorities that CISOs have continues to grow, but if everything is a priority, nothing is. It’s important to focus on the ones that deliver the most value to your organization and that are synchronized with the overall business strategy.”

      Paige H. Adams

      Global CISO at Zurich

      Insurance

      Source: Proofpoint, 2021

      Common obstacles

      These barriers make this challenge difficult to address for many organizations:

      • Security leaders sometimes try to cut to the chase and lean on staffing benchmarks to justify their requests for resources. However, while staffing benchmarks are useful for quick peer-to-peer validation and decision making, they tend to reduce security programs down to a set of averages, which can be misleading when used out of context.
      • A more effective approach is to determine what security services need to be provided, the level of demand, and what it will take to meet that demand currently and in the coming years.
      • With these details available, it becomes much easier to predict what roles need to be hired, what skills need to be developed, and whether outsourcing is an option.

      Hiring delays and skills gaps can fuel resourcing challenges

      59% of organizations report taking 3-6+ months to fill a vacant cybersecurity position.

      Source: ISACA, 2020

      30% report IT knowledge as the most prevalent skills gap in today’s cybersecurity professionals.

      Source: ISACA, 2020

      Info-Tech’s methodology for Building a Service-Based Security Resourcing Plan

      1. Determine Security Service Portfolio Offerings

      2. Plan for Mandatory Versus Discretionary Demand

      3. Define Your Resourcing Model

      Phase Steps

      1 Gather Requirements and Define Roles

      1.2 Choose Security Service Offerings

      2.1 Assess Demand

      3.1 Review Demand Summary

      3.2 Develop an Action Plan

      Phase Outcomes

      Security requirements

      Security service portfolio

      Service demand estimates

      Service hour estimates

      Three-year resourcing plan

      Stay on top of resourcing demands with a security service portfolio

      Security programs should be designed to address unique business needs.

      A service-aligned security resourcing strategy will put organizations in the best position to respond to current and future service demands and address business needs as they evolve over time.

      Watch out for role creep.

      It may be tempting to assign tasks to the people who already know how to do them, but we should consider which role is most appropriate for each task. If all services are assigned to one or two people, we’ll quickly use up all their time.

      Time estimates will improve with practice.

      It may be difficult to estimate exactly how long it takes to carry out each service at first. But making the effort to time your activities each quarter will help you to improve the accuracy of your estimates incrementally.

      Start recruiting well in advance of need.

      Security talent can be difficult to come by, so make sure to begin your search for a new hire three to six months before your demand estimates indicate the need will arise.

      People and skills are both important.

      As the services in your portfolio mature and become more complex, remember to consider the skills you will need to be able to provide that service. Make sure to account for this need in your resource planning and keep in mind that we can only expect so much from one role. Therefore, hiring may be necessary to keep up with the diverse skills your services may require.

      Make sure your portfolio reflects reality.

      There’s nothing wrong with planning for future state, but we should avoid using the portfolio as a list of goals.

      Blueprint deliverable

      Use this tool to build your security services portfolio, estimate demand and hours needed, and determine FTE requirements.

      The image contains screenshots of the Security Resources Planning Workbook.

      Key deliverable:

      Security Resources Planning Workbook

      The Security Resources Planning Workbook will be used to:

      • Build a security services portfolio.
      • Estimate demand for security services and the efforts to deliver them.
      • Determine full-time equivalent (FTE) requirements for each service.
      The image contains a thought model to demonstrate the benchmarks that lead to a one-size-fits-all approach to security.

      Blueprint benefits

      IT Benefits

      Business Benefits

      • Allocate resources more effectively across your security and risk teams.
      • Improve employee engagement and satisfaction with clearly defined job roles, responsibilities, and service levels.
      • Raise the profile of your security team by aligning security service offerings with the demands of the business.
      • Ensure that people, financial, knowledge, and technology resources are appropriately allocated and leveraged across the organization.
      • Improve your organization’s ability to satisfy compliance obligations and reduce information security risk.
      • Increase customer and business stakeholder satisfaction through reliable service delivery.

      Measure the value of this blueprint

      Use these metrics to realize the value of completing this blueprint.

      Metric

      Expected Improvement

      Level of business satisfaction with IT security

      You can expect to see a 20% improvement in your IT Security Business Satisfaction Diagnostic.

      Reports on key performance indicators and service level objectives

      Expect to see a 40% improvement in security service-related key performance indicators and service level objectives.

      Employee engagement scores

      You can expect to see approximately a 10% improvement in employee engagement scores.

      Changes in rates of voluntary turnover

      Anticipating demand and planning resources accordingly will help lower employee turnover rates due to burnout or stress leave by as much as 10%.

      47% of cybersecurity professionals said that stress and burnout has become a major issue due to overwork, with most working over 41 hours a week, and some working up to 90.

      Source: Security Boulevard, 2021

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.” “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.” “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.” “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2 Phase 3

      Call #1: Scope requirements, objectives, and your specific drivers.

      Call #2: Discuss roles and duties.

      Call #3: Build service portfolio and assign ownership.

      Call #4: Estimate required service hours.

      Call #5: Review service demand and plan for future state.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 4 to 6 calls over the course of 2 to 3 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5

      Define Roles and Select Services

      Estimate Current and Future Demand

      Identify Required Skills

      Future Planning

      Next Steps and
      Wrap-Up (offsite)

      Activities

      1.1 Assess Security Needs and Business Pressures.

      1.2 Define Security Job Roles.

      1.3 Define Security Services and Assign Ownership.

      2.1 Estimate Current and Future Demand.

      2.2 Review Demand Summary.

      2.3 Allocate Resources Where They Are Needed the Most.

      3.1 Identify Skills Needed Skills for Planned Initiatives.

      3.2 Prioritize Your Skill Requirements.

      3.3 Assign Work Roles to the Needs of Your Target Environment.

      3.4 Discuss the NICE Cybersecurity Workforce Framework.

      3.5 Develop Technical Skill Requirements for Current and Future Work Roles.

      4.1 Continue Developing Technical Skill Requirements for Current and Future Work Roles.

      4.2 Conduct Current Workforce Skills Assessment.

      4.3 Develop a Plan to Acquire Skills.

      4.4 Discuss Training and Certification Opportunities for Staff.

      4.5 Discuss Next Steps for Closing the Skills Gap.

      4.6 Debrief.

      5.1 Complete In-Progress Deliverables From Previous Four Days.

      5.2 Set Up Review Time for Workshop Deliverables and to Discuss Next steps.

      Deliverables
      1. FTE-Hours Calculation
      2. Security Roles Definition
      3. Security Services Portfolio
      1. Demand Estimates
      2. Resourcing Plan
      1. Skills Gap Prioritization Tool
      2. Technical Skills Tool
      1. Technical Skills Tool
      2. Current Workforce Skills Assessment
      3. Skills Development Plan

      Phase 1

      Determine Security Service Portfolio Offerings

      Phase 1

      Phase 2

      Phase 3

      1.1 Gather Requirements and Define Roles

      1.2 Choose Security Service Offerings

      2.1 Assess Demand

      3.1 Determine Resourcing Status

      This phase involves the following participants:

      • CISO
      • Core Security Team
      • Business Representative (optional)

      Step 1.1

      Gather Requirements and Define Roles

      Activities

      1.1.1 Assess Business Needs and Pressures

      1.1.2 Define Security Roles

      This step involves the following participants:

      • CISO
      • Core Security Team
      • Business Representative (optional)

      Outcomes of this step

      • Security program requirements
      • Security roles definitions

      1.1.1 Assess security needs and pressures

      1 hour

      1. As a group, brainstorm the security requirements for your organization and any business pressures that exist within your industry (e.g. compliance obligations).
      • To get started, consider examples of typical business pressures on the next slides. Determine how your organization must respond to these points (note: this is not an exhaustive list).
      • You will likely notice that these requirements have already influenced the direction of your security program and the kinds of services it needs to provide to the business side of the organization.
    • There may be some that have not been well addressed by current service offerings (e.g. current service maturity, under/over definition of a service). Be sure to make a note of these areas and what the current challenge is and use these details in Step 1.2.
    • Document the results for future use in Step 1.2.1.
    • Input Output
      • List of key business requirements and industry pressures
      • Prioritized list of security program requirements
      Materials Participants
      • Whiteboard
      • Sticky notes
      • CISO
      • Core Security Team
      • Business Representative (optional)

      Typical business pressures examples

      The security services you will provide to the organization should be based on its unique business requirements and pressures, which will make certain services more applicable than others. Use this exercise to get an idea of what those business drivers might be.

      The image contains a screenshot of Typical business pressures examples.

      1.1.2 Define security roles

      1-2 hours

      1. Using the link below, download the Security Resources Planning Workbook and review the examples provided on the next slide.
      2. On tab 1 (Roles), review the example roles and identify which roles you have within your security team.
      • If necessary, customize the roles and descriptions to match your security team’s current make up.
      • If you have roles within your security team that do not appear in the examples, you can add them to the bottom of the table.
    • For each role, use columns D-F to indicate how many people (headcount) you have, or plan to have, in that role.
    • Use columns H-J to indicate how many hours per year each role has available to deliver the services within your service catalog.
    • Input Output
      • Full-time hours worked per week Weeks worked per year Existing job descriptions/roles
      • Calculated full-time equivalents (FTE) Defined security roles
      Materials Participants
      • Security Resources Planning Workbook
      • CISO
      • Core Security Team

      Download the Security Resources Planning Workbook

      Calculating FTEs and defining security roles

      The image contains a screenshot of the workbook demonstrating calculating FTEs and defining security roles.

      1. Start by entering the current and planned headcount for each role
      2. Then enter number of hours each role works per week
      3. Estimate the number of administrative hours (e.g. team meetings, training) per week
      4. Enter the average number of weeks per year that each role is available for service delivery
      5. The tool uses the data from steps 2-4 to calculate the average number of hours each role has for service delivery per year (FTE)

      Info-Tech Insight

      Watch out for role creep. It may be tempting to assign tasks to the people who already know how to do them, but we should consider which role is most appropriate for each task. If all services are assigned to one or two people, we’ll quickly use up all their time.

      Other considerations

      Address your skills gap.

      Cybersecurity is a rapidly evolving discipline and security teams from all over are reporting challenges related to training and upskilling needed to keep pace with the developments of the threat landscape.

      95% Security leaders who agree the cybersecurity skills gap has not improved over the last few years.*

      44% Security leaders who say the skills gap situation has only gotten worse.*

      When defining roles, consider the competencies needed to deliver your security services. Use Info-Tech’s blueprint Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan to help you determine the required skillsets for each role.

      * Source: ISSA, 2021

      Info-Tech Insight

      As the services in your portfolio mature and become more complex, remember to consider the skills you need and will need to be able to provide that service. Make sure to account for this need in your resource planning and keep in mind that we can only expect so much from one role. Therefore, hiring may be necessary to keep up with the diverse skills your services may require.

      Download blueprint Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

      Step 1.2

      Choose Security Service Offerings

      Activities

      1.2.1 Define Security Services and Role Assignments

      This step involves the following participants:

      • CISO
      • Core Security Team

      Outcomes of this step

      • Service portfolio
      • Service pipeline status
      • Service ownership

      1.2.1 Define security services and role assignments

      2-4 hours

      1. As a group, review the outputs from Step 1.1.1. These requirements will serve as the basis to prioritize the service offerings of your security portfolio.
      2. Take these outputs, as well as any additional notes you’ve made, and put them side by side with the example service offerings on tab 3 of the Security Resources Planning Workbook so each service can be considered alongside these requirements (i.e. to determine if that service should be included in the security service portfolio at this time).
      3. Using the following slides as a guide, work your way down the list of example services and choose the services for your portfolio. For each service selected, be sure to customize the definition of the service and state its outcome (i.e. what time is spent when providing this service, indicate if it is outsourced, which role is responsible for delivering it, and the service pipeline status (in use, plan to use, plan to retire)).
      InputOutput
      • Business and security requirements gathered in Step 1.1.1
      • Defined security service portfolio
      • Service ownership assigned to role
      MaterialsParticipants
      • Security Resources Planning Workbook
      • CISO
      • Core Security Team

      Download the Security Resources Planning Workbook

      Service needs aligned with your control framework

      Use Info-Tech's best-of-breed Security Framework to develop a comprehensive baseline set of security service areas.

      The image contains a screenshot of the Security Framework.

      Prioritize your security services

      Example of a custom security services portfolio definition

      Security Strategy and Governance Model

      • Aligned Business Goals
      • Security Program Objectives
      • Centralized vs. Decentralized Governance Model

      Compliance Obligations

      • Penetration testing
      • Annual security audits
      • Data privacy and protection laws

      CISO Accountabilities

      • Security Policy
      • Risk Management
      • Application & Infrastructure Security
      • Program Metrics and Reporting

      Consider each of the requirement categories developed in Step 1.1.1 against the taxonomy and service domain here. If there is a clear need to add this service, use the drop-down list in the “Include in Catalog” column to indicate “Yes.” Mark un-needed services as “No.”

      The image contains a screenshot of the security services portfolio definition.

      Assigning roles to services

      The image contains an example of assigning roles to services.

      1. If the service is being outsourced, use the drop-down list to select “Yes.” This will cause the formatting to change in the neighboring cell (Role), as this cell does not need to be completed.
      2. For all in-sourced services, indicate the role assigned to perform the service.
      3. Indicate the service-pipeline status for each of the services you include. The selection you make will affect the conditional formatting on the next tab, similar to what is described in step 1.

      Info-Tech Insight

      Make sure your portfolio reflects current state and approved plans. There’s nothing wrong with planning for the future, but we should avoid using the portfolio as a list of goals.

      Phase 2

      Plan for Mandatory Versus Discretionary Demand

      Phase 1

      Phase 2

      Phase 3

      1.1 Gather Requirements and Define Roles

      1.2 Choose Security Service Offerings

      2.1 Assess Demand

      3.1 Determine Resourcing Status

      This phase involves the following participants:

      • CISO
      • Core Security Team

      Step 2.1

      Assess Demand

      Activities

      2.1.1 Estimate Current and Future Demand

      This step involves the following participants:

      • CISO
      • Core Security Team

      Outcomes of this step

      • Service demand estimates
      • Total service hours required
      • FTEs required per service

      2.1.1 Estimate current and future demand

      2-4 hours

      1. Estimate the number of hours required to complete each of the services in your portfolio and how frequently it is performed. Remember the service-hour estimates should be based on the outcome of the service (see examples on the next slide).
      • To do this effectively, think back over the last quarter and count how many times the members of your team performed each service and how many hours it took to complete.
      • Then, think back over the last year and consider if the last quarter represents typical demand (i.e. you may notice that certain services have a greater demand at different parts of the year, such as annual audit) and arrive at your best estimate for both service hours and demand.
      • See examples on next slide.

      Note: For continuous services (i.e. 24/7 security log monitoring), use the length of the work shift for estimating the Hours to Complete and the corresponding number of shifts per year for Mandatory Demand estimates. Example: For an 8-hour shift, there are 3 shifts per day at 365 days/year, resulting in 1,095 total shifts per year.

      Download the Security Resources Planning Workbook

      InputOutput
      • Service-hour estimations
      • Expected demand for service
      • Discretionary demand for service
      • Total hours required for service
      • FTEs required for service
      MaterialsParticipants
      • Security Resources Planning Workbook
      • CISO
      • Core Security Team

      Info-Tech Insight

      Time estimates will improve over time. It may be difficult to estimate exactly how long it takes to carry out each service at first. But making the effort to time your activities each quarter will help you to improve the accuracy of your estimates incrementally.

      Understanding mandatory versus discretionary demand

      Every service may have a mix of mandatory and discretionary demands. Understanding and differentiating between these types of demand is critical to developing an efficient resourcing plan.

      The image contains a picture used to represent mandatory demand.

      Mandatory Demand

      Mandatory demand refers to the amount of work that your team must perform to meet compliance obligations and critical business and risk mitigation requirements.

      Failure to meet mandatory demand levels will have serious consequences, such as regulatory fines or the introduction of risks that far exceed risk tolerances. This is work you cannot refuse.

      The image contains a diagram to demonstrate the relationship between Mandatory and Discretionary demand.

      The image contains a picture used to represent discretionary demand.

      Discretionary Demand

      Discretionary demand refers to the amount of work the security team is asked to perform that goes above and beyond your mandatory demand. Discretionary demand often comes in the form of ad hoc requests from business units or the IT department.

      Failure to meet discretionary demand levels usually has limited consequences, allowing you more flexibility to decide how much of this type of work you can accept.

      Mandatory versus discretionary demand examples

      Service Name

      Mandatory Demand Example

      Discretionary Demand Example

      Penetration Testing

      PCI compliance requires penetration testing against all systems within the cardholder data environment annually (currently 2 systems per year).

      Business units request ad hoc penetration testing against non-payment systems (expected 2-3 systems per year).

      Vendor Risk Assessments

      GDPR compliance requires vendor security assessments against all third parties that process personal information on our behalf (expected 1-2 per quarter).

      IT department has requested that the security team conduct vendor security assessments for all cloud services, regardless of whether they store personal information (expected 2-3 assessments per quarter).

      e-Discovery and Evidence Handling

      There is no mandatory demand for this service.

      The legal department occasionally asks the security team to assist with e-Discovery requests (expected demand 1-2 investigations per quarter).

      Example of service demand estimations

      The image contains a screenshot example of service demand estimations.

      1. For each service, describe the specific outcome or deliverable that the service produces. Modify the example deliverables as required.
      2. Enter the number of hours required to produce one instance of the service deliverable. For example, if the deliverable for your security training service is an awareness campaign, it may require 40 person hours to develop and deliver.
      3. Enter the number of mandatory and discretionary demands expected for each service within a given year. For instance, if you are delivering quarterly security awareness campaigns, enter 4 as the demand.

      Phase 3

      Build Your Resourcing Plan

      Phase 1

      Phase 2

      Phase 3

      1.1 Gather Requirements and Define Roles

      1.2 Choose Security Service Offerings

      2.1 Assess Demand

      3.1 Determine Resourcing Status

      This phase involves the following participants:

      • CISO
      • Security Manager

      Step 3.1

      Determine Resourcing Status

      Activities

      3.1.1 Review Demand Summary

      3.1.2 Fill Resource Gaps

      This step involves the following participants:

      • CISO
      • Security Manager

      Outcomes of this step

      • The number of FTEs required to meet demand
      • Resourcing gaps

      3.1.1 Review demand summary

      1-2 hours

      1. On tab 5 of the Security Resourcing Planning Tool (Demand Summary), review the results. This tab will show you if you have enough FTE hours per role to meet the demand level for each service.
      • Green indicates that there is a surplus of FTEs and the number displayed shows how many extra FTEs there are.
      • Yellow text that you have adequate FTEs to meet all of your mandatory demand but may not have enough to meet all of your discretionary demand.
      • Red text indicates that there are too few FTEs available, and the number displayed shows how many additional FTEs you will require.
    • Take note of how many FTEs you will need to meet expected and discretionary demand in each of the years you’ve planned for.
    • Input Output
      • Current staffing
      • Resourcing model
      Materials Participants
      • Security Resources Planning Workbook
      • CISO
      • HR Representative

      Download the Security Resources Planning Workbook

      Info-Tech Insight

      Start recruiting well in advance of need. Security talent can be difficult to come by, so make sure to begin your search for a new hire three to six months before your demand estimates indicate the need will arise.

      Example of demand planning summary (1/2)

      The image contains a screenshot of an example of demand planning summary.

      Example of demand planning summary (2/2)

      The image contains a screenshot of an example of demand planning. This image has a screenshot of the dashboard.

      3.1.2 Fill resource gaps

      2-4 hours

      1. Now that you have a resourcing model for your security services, you will need to plan to close the gaps between available FTEs and required service hours. For each role that has been under/over committed to service delivery, review the services assignments on tab 3 and determine the viability of the following gap closure actions:
        1. Reassign service responsibility to another role with fewer commitments
        2. Create efficiencies to reduce required hours
        3. Hire to meet the service demand
        4. Outsource the service
      2. Your resourcing shortages may not all be apparent at once. Therefore, build a roadmap to determine which needs must be addressed immediately and which can be scheduled for years two and three.

      Consider outsourcing

      Outsourcing provides access to tools and talent that would otherwise be prohibitively expensive. Typical reasons for outsourcing security operations include:

      • Difficulty finding or retaining security staff with advanced and often highly specialized skillsets.
      • The desire to transfer liability for high-risk operational activities such as 24/7 security monitoring.
      • Workforce scalability to accommodate irregular or infrequent events such as incident response and incident-related forensic investigations.

      Given the above, three different models have emerged for the operational security organization:

      1. Outsourced SecOps

      A fully outsourced Security Operations Center, managed and governed by a smaller in-house team

      2. Balanced Hybrid

      In-house operational security staff with some reliance on managed services

      3. In-House SecOps

      A predominantly in-house security team, augmented by a small managed services contract

      Once you have determined that further outsourcing is needed, go back and adjust the status in your service portfolio. Use Info-Tech's blueprint Develop Your Security Outsourcing Strategy to determine the right approach for your business needs.

      “The workforce of the future needs to be agile and adaptable, enabled by strong partnerships with third-party providers of managed security services. I believe these hybrid models really are the security workforce of the future.”

      – Senior Manager, Cybersecurity at EY

      Download blueprint Develop Your Security Outsourcing Strategy

      Info-Tech Insight

      Choose the right model for your organization’s size, risk tolerance, and process maturity level. For example, it might make more sense for larger enterprises with low risk tolerance to grow their internal teams and build in-house capability.

      Create efficiencies

      Resourcing challenges are often addressed more directly by increased spending. However, for a lot of organizations, this just isn’t possible. While there is no magic solution to resolve resource constraints and small budgets, the following tactics should be considered as a means to reduce the hours required for the services your team provides.

      Upskill Your Staff

      If full-scale training is not an option, see if there are individual skills that could be improved to help improve time to completion for your services. Use Info-Tech's blueprint Close the InfoSec Skills Gap to determine which skills are needed for your security team.

      Improve Process Familiarity

      In some organizations, especially low-maturity ones, problems can arise simply because there is a lack of familiarity with what needs to be done. Review the process, socialize it, and make sure your staff can execute in within the target time allotment.

      Add Technology

      Resourcing crunch or not, technology can help us do things better. Investigate whether automation software might help to shave a few hours off a given service. Use Info-Tech's blueprint Build a Winning Business Process Automation Playbook to optimize and automate your business processes with a user-centric approach.

      Download the blueprint Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

      Download the blueprint Build a Winning Business Process Automation Playbook

      Info-Tech Insight

      Every minute counts. While using these strategies may not solve every resourcing crunch you have, they can help put you in the best position possible to deliver on your commitments for each service.

      Plan for employee turnover

      Cybersecurity skills are in high demand; practitioners are few. The reality is that experienced security personnel have a lot of opportunities. While we cannot control for the personal reasons employees leave jobs, we can address the professional reasons that cause them to leave.

      Fair wage

      Reasonable expectations

      Provide training

      Defined career path

      It’s a sellers’ market for cybersecurity skills these days. Higher-paying offers are one of the major reasons security leaders leave their jobs (ISSA, 2021).

      Many teams lose out on good talent simply because they have unrealistic expectations, seeking 5+ years experience for an entry-level position, due to misalignment with HR (TECHNATION, 2021).

      Technology is changing (and being adopted) faster than security professionals can train on it. Ongoing training is needed to close these gaps (ISO, 2021).

      People want to see where they are now, visualize where they will be in the future, and understand what takes to get there. This helps to determine what types of training and specialization are necessary (DigitalGuardian, 2020).

      Use Info-Tech’s blueprint Build a Strategic IT Workforce Plan to help staff your security organization for success.

      The image contains a screenshot of the Build a Strategic IT Workforce Plan.

      Download blueprint Build a Strategic IT Workforce Plan

      Summary of Accomplishment

      Problem Solved

      You have now successfully identified your business and security drivers, determined what services your security program will provide, and determined your resourcing plan to meet these demands over the next three years.

      As needs change at your organization, don’t forget to re-evaluate the decisions you’ve made. Don’t forget that outsourcing a service may be the most reliable way to provide and resource it. However, this is just one tool among many that should be considered, along with upskilling, process improvement/familiarity, and process automation.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Research Contributors and Experts

      The image contains a picture of George Al-Koura.

      George Al-Koura

      CISO

      Ruby Life

      The image contains a picture of Brian Barniner.

      Brian Barniner

      Head of Decision Science and Analytics

      ValueBridge Advisors

      The image contains a picture of Tracy Dallaire.

      Tracy Dallaire

      CISO / Director of Information Security

      McMaster University

      The image contains a picture of Ricardo Johnson.

      Ricardo Johnson

      Chief Information Security Officer

      Citrix

      Research Contributors and Experts

      The image contains a picture of Ryan Rodriguez.

      Ryan Rodriguez

      Senior Manager, Cyber Threat Management

      EY

      The image contains a picture of Paul Townley.

      Paul Townley

      VP Information Security and Personal Technology

      Owens Corning

      13 Anonymous Contributors

      Related Info-Tech Research

      Cost-Optimize Your Security Budget

      Develop Your Security Outsourcing Strategy

      Close the InfoSec Skills Gap: Develop a Technical Skills Sourcing Plan

      Bibliography

      2021 Voice of the CISO Report.” Proofpoint, 2021. Web.

      “2022 Voice of the CISO.” Proofpoint, 2022. Web.

      Brook, Chris. “How to Find and Retain Skilled Cybersecurity Talent.” DigitalGuardian, 17 Sep. 2020. Web.

      “Canadian Cybersecurity Skills Framework” TECHNATION Canada, April 2020. Web.

      “Cybersecurity Skills Crisis Continues for Fifth Year, Perpetuated by Lack of Business Investment.” ISSA, 28 July 2021. Web.

      “Cybersecurity Workforce, National Occupational Standard.” TECHNATION Canada, April 2020. Web.

      Naden, Clare. “The Cybersecurity Skills Gap: Why Education Is Our Best Weapon against Cybercrime.” ISO, 15 April 2021. Web.

      Purse, Randy. “Four Challenges in Finding Cybersecurity Talent And What Companies Can Do About It.” TECHNATION Canada, 29 March 2021. Web.

      Social-Engineer. “Burnout in the Cybersecurity Community.” Security Boulevard, 8 Dec. 2021. Web.

      “State of Cybersecurity 2020.” ISACA, 2020. Web.

      IT Management and Policies

      • Buy Link or Shortcode: {j2store}23|cart{/j2store}
      • Related Products: {j2store}23|crosssells{/j2store}
      • InfoTech Academy Title: IT management and policies videos
      • InfoTech Academy Excerpt: More videos are available once you join. Contact us for more information.
      • Teaser Video: Visit Website
      • Teaser Video Title: Policies Academy Overview
      • member rating overall impact: 9.5/10
      • member rating average dollars saved: $23101
      • member rating average days saved: 11
      • Parent Category Name: Strategy and Governance
      • InfotechAcademy-Executivebrief: Visit Website
      • Parent Category Link: /strategy-and-governance
      Create policies that matter most to your organization.

      Management, policy, policies

      The ESG Imperative and Its Impact on Organizations

      • Buy Link or Shortcode: {j2store}196|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance
      • Global regulatory climate disclosure requirements are still evolving and are not consistent.
      • Sustainability is becoming a corporate imperative, but IT’s role is not fully clear.
      • The environmental, social, and governance (ESG) data challenge is large and continually expanding in scope.
      • Collecting the necessary data and managing ethical issues across supply chains is a daunting task.
      • Communicating long-term value is difficult when customer and employee expectations are shifting.

      Our Advice

      Critical Insight

      • An organization's approach to ESG cannot be static or tactical. It is a moving landscape that requires a flexible, holistic approach across the organization. Cross-functional coordination is essential in order to be ready to respond to changing conditions.
      • Even though the ESG data requirements are large and continually expanding in scope, many organizations have well-established data frameworks and governance practices in place to meet regulatory obligations such as Sarbanes–Oxley that should used as a starting point.

      Impact and Result

      • Organizations will have greater success if they focus their ESG program efforts on the ESG factors that will have a material impact on their company performance and their key stakeholders.
      • Continually evaluating the evolving ESG landscape and its impact on key stakeholders will enable organizations to react quickly to changing conditions.
      • A successful ESG program requires a collaborative and integrated approach across key business stakeholders.
      • Delivering high-quality metrics and performance indicators requires a flexible and digital data approach, where possible, to enable data interoperability.

      The ESG Imperative and Its Impact on Organizations Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. The ESG Imperative and Its Impact on Organizations Deck – Learn why sustainability is becoming a key measurement of corporate performance and how to set your organization up for success.

      Understand the foundational components and drivers of the broader concept of sustainability: environmental, social, and governance (ESG) and IT’s roles within an organization’s ESG program. Learn about the functional business areas involved, the roles they play and how they interact with each other to drive program success.

      • The ESG Imperative and Its Impact on Organizations Storyboard

      Infographic

      Further reading

      The ESG Imperative and Its Impact on Organizations

      Design to enable an active response to changing conditions.

      Analyst Perspective

      Environmental, social, and governance (ESG) is a corporate imperative that is tied to long-term value creation. An organization's social license to operate and future corporate performance depends on managing ESG factors well.

      Central to an ESG program is having a good understanding of the ESG factors that may have a material impact on enterprise value and key internal and external stakeholders. A comprehensive ESG strategy supported by strong governance and risk management is also essential to success.

      Capturing relevant data and applying it within risk models, metrics, and internal and external reports is necessary for sharing your ESG story and measuring your progress toward meeting ESG commitments. Consequently, the data challenges have received a lot of attention, and IT leaders have a role to play as strategic partner and enabler to help address these challenges. However, ESG is more than a data challenge, and IT leaders need to consider the wider implications in managing third parties, selecting tools, developing supporting IT architecture, and ensuring ethical design.

      For many organizations, the ESG program journey has just begun, and collaboration between IT and risk, procurement, and compliance will be critical in shaping program success.

      This is a picture of Donna Bales, Principal Research Director, Info-Tech Research Group

      Donna Bales
      Principal Research Director
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Global regulatory climate disclosure requirements are still evolving and are not consistent.
      • Sustainability is becoming a corporate imperative, but IT's role is not fully clear.
      • The ESG data challenge is large and continually expanding in scope.
      • Collecting the necessary data and managing ethical issues across supply chains is a daunting task.
      • Communicating long-term value is difficult when customer and employee expectations are shifting.

      Common Obstacles

      • The data necessary for data-driven insights and accurate disclosure is often hampered by inaccurate and incomplete primary data.
      • Other challenges include:
        • Approaching ESG holistically and embedding it into existing governance, risk, and IT capabilities.
        • Building knowledge and adapting culture throughout all levels of the organization.
        • Monitoring stakeholder sentiment and keeping strategy aligned to expectations.

      Info-Tech's Approach

      • Use this blueprint to educate yourself on ESG factors and the broader concept of sustainability.
      • Learn about Info-Tech's ESG program approach and use it as a framework to begin your ESG program journey.
      • Identify changes that may be needed in your organizational operating model, strategy, governance, and risk management approach.
      • Discover areas of IT that may need to be prioritized and resourced.

      Info-Tech Insight

      An organization's approach to ESG cannot be static or tactical. ESG is a moving landscape that requires a flexible, holistic approach across the organization. It must become part of the way you work and enable an active response to changing conditions.

      This is an image of Info-Tech's thoughtmap for eight steps of the ESG Program Journey

      Putting ESG in context

      ESG has moved beyond the tipping point to corporate table stakes

      • In recent years, ESG issues have moved from voluntary initiatives driven by corporate responsibility teams to an enterprise-wide strategic imperative.
      • Organizations are no longer being measured by financial performance but by how they contribute to a sustainable and equitable future, such as how they support sustainable innovation through their business models and their focus on collaboration and inclusion.
      • A corporation's efforts toward sustainability is measured by three components: environmental, social, and governance.

      Sustainability

      The ability of a corporation and broader society to endure and survive over the long term by managing adverse impacts well and promoting positive opportunities.

      This is an image of the United Nation's 17 sustainable goals.

      Source: United Nations

      Putting "E," "S," and "G" in context

      Corporate sustainability depends on managing ESG factors well

      • Environmental, social, and governance are the component pieces of a sustainability framework that is used to understand and measure how an organization impacts or is affected by society as a whole.
      • Human activities, particularly fossil fuel burning since the mid twentieth century, have increased greenhouse gas concentration, resulting in observable changes to the atmosphere, ocean, cryosphere, and biosphere.
      • The E in ESG relates to the positive and negative impacts an organization may have on the environment, such as the energy it takes in and the waste it discharges.
      • The S in ESG is the most ambiguous component in the framework, as social impact relates not only to risks but also prosocial behaviour. It's the most difficult to measure but can have significant financial and reputational impact on corporations if material and poorly managed.
      • The G in ESG is foundational to the realization of S and E. It encompasses how well an organization integrates these considerations into the business and how well the organization engages with key stakeholders, receives feedback, and is transparent with its intentions.

      Common examples of ESG issues include: Environmental: Climate change, greenhouse gas emissions (CHG), deforestation, biodiversity, pollution, water, waste, extended producer responsibility, etc. Social: Customer relations, employee relations, labor, human rights, occupational health and safety, community relations, supply chains, etc. Governance: Board management practices, succession planning, compensation, diversity, equity and inclusion, regulatory compliance, corruption, fraud, data hygiene and security, etc. Source: Getting started with ESG - Sustainalytics

      Understanding the drivers behind ESG

      $30 trillion is expected to be transferred from the baby boomers to Generation Z and millennials over the next decade
      – Accenture

      Drivers

      • The rapid rise of ESG investing
      • The visibility of climate change is driving governments, society, and corporations to act and to initiate and support net zero goals.
      • A younger demographic that has strong convictions and financial influence
      • A growing trend toward mandatory climate and diversity, equity, and inclusion (DEI) disclosures required by global regulators
      • Recent emphasis by regulators on board accountability and fiduciary duty
      • Greater societal awareness of social issues and sustainability
      • A new generation of corporate leadership that is focused on sustainable innovation

      The evolving regulatory landscape

      Global regulators are mobilizing toward mandatory regulatory climate disclosure

      Canada

      • Canadian Securities Administrators (CSA) NI 51-107 Disclosure of Climate-related Matters

      Europe

      • European Commission, Sustainable Finance Disclosure Regulation (SFDR)
      • European Commission, EU Supply Chain Act
      • Germany – The German Supply Chain Act (GSCA)
      • Financial Conduct Authority UK, Proposal (DP 21/4) Sustainability Disclosure Requirements and investment labels
      • UK Modern Slavery Act, 2015

      United States

      • Securities and Exchange Commission (SEC) 33-11042– The Enhancement and Standardization of Climate-Related Disclosures for Investors
      • SEC 33-11038 Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure
      • Nasdaq Board Diversity Rule (5605(f))

      New Zealand

      • New Zealand, The Financial Sector (Climate-related Disclosures and Other Matters) Amendment Act 2021

      Begin by setting your purpose

      Consider your role as a corporation in society and your impact on key stakeholders

      • The impact of a corporation can no longer be solely measured by financial impact but also its impact on social good. Corporations have become real-world actors that impact and are affected by the environment, people, and society.
      • An ESG program should start with defining your organization's purpose in terms of corporate responsibility, the role it will play, and how it will endure over time through managing adverse impacts and promoting positive impacts.
      • Corporations should look inward and outward to assess the material impact of ESG factors on their organization and key internal and external stakeholders.
      • Once stakeholders are identified, consider how the ESG factors might be perceived by delving into what matters to stakeholders and what drives their behavior.

      Understanding your stakeholder landscape is essential to achieving ESG goals

      Internal Stakeholders: Board; Management; Employees. External Stakeholders: Activists; Regulators; Customers; Lenders; Government; Investors; Stakeholders; Community; Suppliers

      Assess ESG impact

      Materiality assessments help to prioritize your ESG strategy and enable effective reporting

      • The concept of materiality as it relates to ESG is the process of gaining different perspectives on ESG issues and risks that may have significant impact (both positive and negative) on or relevance to company performance.
      • The objective of a materiality assessment is to identify material ESG issues most critical to your organization by looking a broad range of social and environmental factors. Its purpose is to narrow strategic focus and enable an organization to assess the impact of financial and non-financial risks aggregately.
      • It helps to make the case for ESG action and strategy, assess financial impact, get ahead of long-term risks, and inform communication strategies.
      • Organizations can leverage assessment tools from Sustainalytics or SASB Standards to help assess ESG risks or use guidance or benchmarking information from industry associations.

      Info-Tech Insight

      Survey key stakeholders to obtain a more holistic viewpoint of expectations and the industry landscape and gain credibility through the process.

      Use a materiality matrix to understand ESG exposure

      This is an image of a materiality matrix used to understand ESG exposure.

      Example: Beverage Company

      Follow a holistic approach

      To deliver on your purpose, sustainability must be integrated throughout the organization

      • An ESG program cannot be implemented in a silo. It must be anchored on its purpose and supported by a strong governance structure that is intertwined with other functional areas.
      • Effective governance is essential to instill trust, support sound decision making, and manage ESG.
      • Governance extends beyond shareholder rights to include many other factors, such as companies' interactions with competitors, suppliers, and governments. More transparency is sought on:
        • Corporate behavior, executive pay, and oversight of controls.
        • Board diversity, compensation, and skill set.
        • Oversight of risk management, particularly risks related to fraud, product, data, and cybersecurity

      "If ESG is the framework of non-financial risks that may have a material impact on the company's stakeholders, corporate governance is the process by which the company's directors and officers manage those risks."
      – Zurich Insurance

      A pyramid is depicted. The top of the pyramid is labeled Continual Improvement, and the following terms are inside this box. Governance: Strategy; Risk Management; Metrics & Targets. At the bottom of the pyramid is a box with right facing arrows, labeled Transparency and Disclosure. This is Informed by the TCFD Framework

      Governance and organization approach

      There is no one-size-fits-all approach

      47% of companies reported that the full board most commonly oversees climate related risks and opportunities while 20% delegate to an existing board governance committee (EY Research, 2021).

      • The organizational approach to ESG will differ across industry segments and corporations depending on material risks and their upstream and downstream value change. However, the accountability for ESG sits squarely at the CEO and board level.
      • Some organizations have taken the approach of hiring a Chief Sustainability Officer to work alongside the CEO on execution of ESG goals and stakeholder communication, while others use other members of the strategic leadership to drive the desired outcomes.
      Governance Layer Responsibilities
      Board
      • Overall accountability lies with the full board. Some responsibilities may be delegated to newly formed dedicated ESG governance committee.
      Oversight
      Executive leadership
      • Accountable for sustainability program success and will work with CEO to set ESG purpose and goals.
      Oversight and strategic direction
      Management
      • Senior management drives execution; sometimes led by a cross-functional committee.
      Execution

      Strategy alignment

      "74% of finance leaders say that investors increasingly use nonfinancial information in their decision-making."

      – "Aligning nonfinancial reporting..." EY, 2020

      • Like any journey, the ESG journey requires knowing where you are starting from and where you are heading to.
      • Once your purpose is crystalized, identify and surface gaps between where you want to go as an organization (your purpose and goals) and what you need to deliver as an organization to meet the expectations of your internal and external stakeholders (your output).
      • Using the results of the materiality assessment, weigh the risk, opportunities, and financial impact to help prioritize and determine vulnerabilities and where you might excel.
      • Finally, evaluate and make changes to areas of your business that need development to be successful (culture, accountability and board structure, ethics committee, etc.)

      Gap analysis example for delivering reporting requirements

      Organizational Goals

      • Regulatory Disclosure
        • Climate
        • DEI
        • Cyber governance
      • Performance Tracking/Annual Reporting
        • Corporate transparency on ESG performance via social, annual circular
      • Evidence-Based Business Reporting
        • Risk
        • Board
        • Suppliers

      Risk-size your ESG goals

      When integrating ESG risks, stick with a proven approach

      • Managing ESG risks is central to making sound organizational decisions regarding sustainability but also to anticipating future risks.
      • Like any new risk type, ESG risk should be interwoven into your current risk management and control framework via a risk-based approach.
      • Yet ESG presents some new risk challenges, and some risk areas may need new control processes or enhancements.
      NET NEW ENHANCEMENT
      Climate disclosure Data quality management
      Assurance specific to ESG reporting Risk sensing and assessment
      Supply chain transparency tied back to ESG Managing interconnections
      Scenario analysis
      Third-party ratings and monitoring

      Info-Tech Insight

      Integrate ESG risks early, embrace uncertainty by staying flexible, and strive for continual improvement.

      A funnel chart is depicted. The inputs to the funnel are: Strategy - Derive ESG risks from strategy, and Enterprise Risk Appetite. Inside the funnel, are the following terms: ESG; Data; Cyber. The output of the funnel is: Evidence based reporting ESG Insights & Performance metrics

      Managing supplier risks

      Suppliers are a critical input into an organization's ESG footprint

      "The typical consumer company's supply chain ... [accounts] for more than 80% of greenhouse-gas emissions and more than 90% of the impact on air, land, water, biodiversity, and geological resources."
      – McKinsey & Company, 2016

      • Although companies are accustomed to managing third parties via procurement processes, voluntary due-diligence, and contractual provisions, COVID-19 surfaced fragility across global supply chains.
      • The mismanagement of upstream and downstream risks of supply chains can harm the reputation, operations, and financial performance of businesses.
      • To build resiliency to and visibility of supply chain risk, organizations need to adapt current risk management programs, procurement practices, and risk assessment tools and techniques.
      • Procurement departments have an enhanced function, effectively acting as gatekeepers by performing due diligence, evaluating performance, and strengthening the supplier relationship through continual feedback and dialogue.
      • Technologies such as blockchain and IoT are starting to play a more dominant role in supply chain transparency.

      Raw materials are upstream and consumers are downstream.

      "Forty-five percent of survey respondents say that they either have no visibility into their upstream supply chain or that they can see only as far as their first-tier suppliers."
      – "Taking the pulse of shifting supply chains," McKinsey & Company, 2022

      Metrics and targets

      Metrics are key to stakeholder transparency, measuring performance against goals, and surfacing organizational blind spots

      • ESG metrics are qualitative or quantitative insights that measure organizations' performance against ESG goals. Along with traditional business metrics, they assist investors with assessing the long-term performance of companies based on non-financial ESG risks and opportunities.
      • Metrics, key performance indicators (KPIs), and key risk indicators (KRIs) are used to measure how ESG factors affect an organization and how an organization may impact any of the underlying issues related to each ESG factor.
      • There are several reporting standards that offer specific ESG performance metrics, such as the Global Reporting Institute (GRI), Sustainability Accounting Standards Board (SASB), and World Economic Forum (WEF).
      • For climate-related disclosures, global regulators are converging on the Task Force for Climate-related Disclosures (TCFD) and the International Sustainability Standards Board (ISSB).

      Example metrics for ESG factors

      Example metrics for environment include greenhouse gas emissions, water footprint, renewable energy share, and % of recycled material. Example social metrics include rates of injury, proportion of spend on local supplies, and percentage of gender or ethnic groups in management roles. Example governance metrics include annual CEO compensation compared to median, number of PII data breaches, and completed number of supplier assessments.

      The impact of ESG on IT

      IT plays a critical role in achieving ESG goals

      • IT groups have a critical role to play in helping organizations develop strategic plans to meet ESG goals, measure performance, monitor risks, and deliver on disclosure requirements.
      • IT's involvement extends from the CIO providing input at a strategic level to leading the charge within IT to instill new goals and adapt the culture toward one focused on sustainability.
      • To set the tone, CIOs should begin by updating their IT governance structure and setting ESG goals for IT.
      • IT leaders will need to think about resource use and efficiency and incorporate this into their IT strategy.

      Info-Tech Insight

      IT leaders need to work collaboratively with risk management to optimize decision making and continually improve ESG performance and disclosure.

      "A great strategy meeting is a meeting of the minds."
      – Max McKeown

      The data challenge

      The ESG data requirement is large and continually expanding in scope

      • To meet ESG objectives, corporations are challenged with collecting non-financial data from across functional business and geographical locations and from their supplier base and supply chains.
      • One of the biggest impediments to ESG implementation is the lack of high-quality data and of mature processes and tools to support data collection.
      • The data challenge is compounded by the availability and usability of data, immature and fragmented standards that hinder comparability, and workflow integration.

      Info-Tech Insight

      Keep your data model flexible and digital where possible to enable data interoperability.

      A flow chart is depicted. the top box is labeled ESG Program. Below that are Boxes labeled Tactical and Strategic. Below the Tactical Box, is a large X showing a lack of connection to the following points: Duplicative; Inefficient/Costly. Below the box labeled Strategic are the following terms: Data-Driven; Reusable; Digital.

      "You can have data without information, but you cannot have information without data."
      – Daniel Keys Moran

      It's more than a data challenge

      Organizations will rely on IT for execution, and IT leaders will need to be ready

      Data Management: Aggregated Reporting; Supplier Management; Cyber Management; Operational Management; Ethical Design(AI, Blockchain); IT Architecture; Resource Efficiency; Processing & Tooling; Supplier Assessment.

      Top impacts on IT departments

      1. ESG requires corporations to keep track of ESG-related risks of third parties. This will mean more robust assessments and monitoring.
      2. Many areas of ESG are new and will require new processes and tools.
      3. The SEC has upped the ante recently, requiring more rigorous accountability and reporting on cyber incidents.
      4. New IT systems and architecture may be needed to support ESG programs.
      5. Current reporting frameworks may need updating as regulators move to digital.
      6. Ethical design will need to be considered when AI is used to support risk/data management and when it is used as part of product solutions.

      Key takeaways

      • It's critical for organizations to look inward and outward to assess the material impact of ESG factors on their organization and key internal and external stakeholders.
      • ESG requires a flexible, holistic approach across the organization. It must become part of the way you work and enable an active response to changing conditions.
      • ESG introduces new risks that should not be viewed in isolation but interwoven into your current risk management and control framework via a risk-based approach.
      • Identify and integrate risks early, embrace uncertainty by staying flexible, and strive for continual improvement.
      • Metrics are key to telling your ESG story. Place the appropriate importance on the information that will be reported.
      • Recognize that the data challenge is complex and evolving and design your data model to be flexible, interoperable, and digital.
      • IT's role is far reaching, and IT will have a critical part in managing third parties, selecting tools, developing supporting IT architecture, and using ethical design.

      Definitions

      TERM DEFINITON
      Corporate Social Responsibility Management concept whereby organizations integrate social and environmental concerns in their operations and interactions with their stakeholders.
      Chief Sustainability Officer Steers sustainability commitments, helps with compliance, and helps ensure internal commitments are met. Responsibilities may extend to acting as a liaison with government and public affairs, fostering an internal culture, acting as a change agent, and leading delivery.
      ESG An acronym that stands for environment, social, and governance. These are the three components of a sustainability program.
      ESG Standard Contains detailed disclosure criteria including performance measures or metrics. Standards provide clear, consistent criteria and specifications for reporting. Typically created through consultation process.
      ESG Framework A broad contextual model for information that provides guidance and shapes the understanding of a certain topic. It sets direction but does not typically delve into the methodology. Frameworks are often used in conjunction with standards.
      ESG Factors The factors or issues that fall under the three ESG components. Measures the sustainability performance of an organization.
      ESG Rating An aggregated score based on the magnitude of an organization's unmanaged ESG risk. Ratings are provided by third-party rating agencies and are increasingly being used for financing, transparency to investors, etc.
      ESG Questionnaire ESG surveys or questionnaires are administered by third parties and used to assess an organization's sustainability performance. Participation is voluntary.
      Key Risk Indicator (KRI) A measure to indicate the potential presence, level, or trend of a risk.
      Key Performance Indicator (KPI) A measure of deviation from expected outcomes to help a firm see how it is performing.
      Materiality Material topics are topics that have a direct or indirect impact on an organization's ability to create, preserve, or erode economic, environment and social impact for itself and its stakeholder and society as a whole
      Materiality Assessment A materiality assessment is a tool to identify and prioritize the ESG issues most critical to the organization.
      Risk Sensing The range of activities carried out to identify and understand evolving sources of risk that could have a significant impact on the organization (e.g. social listening).
      Sustainability The ability of an organization and broader society to endure and survive over the long term by managing adverse impacts well and promoting positive opportunities.
      Sustainalytics Now part of Morningstar. Sustainalytics provides ESG research, ratings, and data to institutional investors and companies.
      UN Guiding Principles on Business and Human Rights (UNGPs) UN Guiding Principles on Business and Human Rights (UNGPs) provide an essential methodological foundation for how impacts across all dimensions should be assessed.

      Reporting & standard frameworks

      STANDARD DEFINITION AND FOCUS
      CDP CDP has created standards and metrics for comparing sustainability impact. Focuses on environmental data (e.g. carbon, water, and forests) and on data disclosure and benchmarking.
      (Formally Carbon Disclosure Project) Audience: All stakeholders
      Dow Jones Sustainability Indices (DJSI) Heavy on corporate governance and company performance. Equal balance of economic, environmental, and social.
      Audience: All stakeholders
      Global Reporting Initiative (GRI) International standards organization that has a set of standards to help organizations understand and communicate their impacts on climate change and social responsibility. The standard has a strong emphasis on transparency and materiality, especially on social issues.
      Audience: All stakeholders
      International Sustainability Standards Board (ISSB) Standard-setting board that sits within the International Financial Reporting Standards (IFRS) Foundation. The IFRS Foundation is a not-for-profit, public-interest organization established to develop high-quality, understandable, enforceable, and globally accepted accounting and sustainability disclosure standards.
      Audience: Investor-focused
      United Nations Sustainable Development Goals (UNSDG) Global partnership across sectors and industries to achieve sustainable development for all (17 Global Goals)
      Audience: All stakeholders
      Sustainability Accounting Standards Board (SASB) Industry-specific standards to help corporations select topics that may impact their financial performance. Focus on material impacts on financial condition or operating performance.
      Audience: Investor-focused
      Task Force Of Climate-related Disclosures (TCFD; created by the Financial Stability Board) Standards framework focused on the impact of climate risk on financial and operating performance. More broadly the disclosures inform investors of positive and negative measures taken to build climate resilience and make transparent the exposure to climate-related risk.
      Audience: Investors, financial stakeholders

      Bibliography

      Anne-Titia Bove and Steven Swartz, McKinsey, "Starting at the source: Sustainability in supply chains", 11 November 2016

      Accenture, "The Greater Wealth Transfer – Capitalizing on the intergenerational shift in wealth", 2012

      Beth Kaplan, Deloitte, "Preparing for the ESG Landscape, Readiness and reporting ESG strategies through controllership playbook", 15 February 2022

      Bjorn Nilsson et al, McKinsey & Company, "Financial institutions and nonfinancial risk: How corporates build resilience," 28 February 2022

      Bolden, Kyle, Ernst and Young, "Aligning nonfinancial reporting with your ESG strategy to communicate long-term value", 18 Dec. 2020

      Canadian Securities Administrators, "Canadian securities regulators seek comment on climate-related disclosure requirements", 18 October 2021

      Carol A. Adams et al., Global Risk Institute, "The double-materiality concept, Application and issues", May 2021

      Dunstan Allison-Hope et al, BSR, "Impact-Based Materiality, Why Companies Should-Focus Their Assessments on Impacts Rather than Perception", 3 February 2022

      EcoVadis, "The World's Most Trusted Business Sustainability Ratings",

      Ernst and Young, "Four opportunities for enhancing ESG oversight", 29 June 2021

      Federal Ministry of Labour and Social Affairs, The Act on Corporate Due Diligence Obligations in Supply Chains (Gesetz über die unternehmerischen Sorgfaltspflichten in Lieferketten)", Published into Federal Law Gazette, 22, July 2021

      "What Every Company Needs to Know", Sustainalytics

      Global Risk Institute, The GRI Perspective, "The materiality madness: why definitions matter", 22 February 2022

      John P Angkaw "Applying ERM to ESG Risk Management", 1 August 2022

      Hillary Flynn et al., Wellington Management, "A guide to ESG materiality assessments", June 2022

      Katie Kummer and Kyle Lawless, Ernst and Young, "Five priorities to build trust in ESG", 14 July 2022

      Knut Alicke et al., McKinsey & Company, "Taking the pulse of shifting supply chains", 26 August 2022

      Kosmas Papadopoulos and Rodolfo Arauj. The Harvard School Forum on Corporate Governance, "The Seven Sins of ESG Management", 23 September 2020

      KPMG, Sustainable Insight, "The essentials of materiality assessment", 2014

      Lorraine Waters, The Stack, "ESG is not an environmental issue, it's a data one", 20 May 2021

      Marcel Meyer, Deloitte, "What is TCFD and why does it matter? Understanding the various layers and implications of the recommendations",

      Michael W Peregnne et al., "The Harvard Law School Forum on Corporate Governance, The Important Legacy of the Sarbanes Oxley Act," 30 August 2022

      Michael Posner, Forbes, "Business and Human Rights: Looking Ahead To The Challenges Of 2022", 15 December 2021

      Myles Corson and Tony Kilmas, Ernst and Young, "How the CFO can balance competing demands and drive future growth", 3 November 2020

      Novisto, "Navigating Climate Data Disclosure", 2022

      Novisto, "XBRL is coming to corporate sustainability reporting", 17 April 2022

      "Official Journal of the European Union, Regulation (EU) 2019/2088 of the European Parliament and of the Council of 27 November 2019 on sustainability-related disclosures in the financial services sector", 9 December 2019

      Osler, "ESG and the future of sustainability", Podcast, 01 June 2022

      Osler, "The Rapidly Evolving World of ESG Disclosure: ISSB draft standards for sustainability and climate related disclosures", 19 May 2022

      Sarwar Choudhury and Zach Johnston, Ernst and Young "Preparing for Sox-Like ESG Regulation", 7 June 2022

      Securities and Exchange Commission, "The Enhancement and Standardization of Climate-related Disclosures for Investors", 12 May 2022

      "Securities and Exchange Commission, SEC Proposes Rules on Cybersecurity, Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies, 9 May 2022

      Sean Brown and Robin Nuttall, McKinsey & Company, "The role of ESG and purpose", 4 January 2022

      Statement by Chair Gary Gensler, "Statement on ESG Disclosure Proposal", 25 May 2022

      Svetlana Zenkin and Peter Hennig, Forbes, "Managing Supply Chain Risk, Reap ESG Rewards", 22 June 2022

      Task Force on Climate Related Financial Disclosures, "Final Report, Recommendations of the Task Force on Climate-related Financial Disclosures", June 2017

      World Economic Forum, "Why sustainable governance and corporate integrity are crucial for ESG", 29 July 2022

      World Economic Forum (in collaboration with PwC) "How to Set Up Effective Climate Governance on Corporate Boards, Guiding Principles and questions", January 2019

      World Economic Forum, "Defining the "G" in ESG Governance Factors at the Heart of Sustainable Business", June 2022

      World Economic Forum, "The Risk and Role of the Chief Integrity Officer: Leadership Imperatives in and ESG-Driven World", December 2021

      World Economic Forum, "How to Set Up Effective Climate Governance on Corporate Boards Guiding principles and questions", January 2019

      Zurich Insurance, "ESG and the new mandate for corporate governance", 2022

      Evolve Your Business Through Innovation

      • Buy Link or Shortcode: {j2store}330|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Innovation teams are tasked with the responsibility of ensuring that their organizations are in the best position to succeed while the world is in a period of turmoil, chaos, and uncertainty.
      • CIOs have been expected to help the organization transition to remote work and collaboration instantaneously.
      • CEOs are under pressure to redesign, and in some cases reinvent, their business model to cope with and compete in a new normal.

      Our Advice

      Critical Insight

      It is easy to get swept up during a crisis and cling to past notions of normal. Unfortunately, there is no controlling the fact that things have changed fundamentally, and it is now incumbent upon you to help your organization adapt and evolve. Treat this as an opportunity because that is precisely what this is.

      Impact and Result

      There are some lessons we can learn from innovators who have succeeded through past crises and from those who are succeeding now.

      There are a number of tactics an innovation team can employ to help their business evolve during this time:

      1. Double down on digital transformation (DX)
      2. Establish a foresight capability
      3. Become a platform for good

      Evolve Your Business Through Innovation Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Evolve your business through innovation

      Download our guide to learn what you can do to evolve your business and innovate your way through uncertainty.

      • Evolve Your Business Through Innovation Storyboard
      [infographic]

      Grow Your Own PPM Solution

      • Buy Link or Shortcode: {j2store}436|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $47,944 Average $ Saved
      • member rating average days saved: 29 Average Days Saved
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • As portfolio manager, you’re responsible for supporting the intake of new project requests, providing visibility into the portfolio of in-flight projects, and helping to facilitate the right approval and prioritization decisions.
      • You need a project portfolio management (PPM) tool that promotes the maintenance and flow of good data to help you succeed in these tasks. However, while throwing expensive technology at bad process rarely works, many organizations take this approach to solve their PPM problems.
      • Commercial PPM solutions are powerful and compelling, but they are also expensive, complex, and hard to use. When a solution is not properly adopted, the data can be unreliable and inconsistent, defeating the point of purchasing a tool in the first place.

      Our Advice

      Critical Insight

      • Your choice of PPM solution must be in tune with your organizational PPM maturity to ensure that you are prepared to sustain the tool use without having the corresponding PPM processes collapse under its own weight.
      • A spreadsheet-based homegrown PPM solution can provide key capabilities of an optimized PPM solution with a high level of sophistication and complexity without the prohibitive capital and labor costs demanded by commercial PPM solution.
      • Focus on your PPM decision makers that will consume the reports and insights by investigating their specific reporting needs.

      Impact and Result

      • Think outside the commercial box. Develop an affordable, adoptable, and effective PPM solution using widely available tools based on Info-Tech’s ready-to-deploy templates.
      • Make your solution sustainable. When it comes to portfolio management, high level is better. A tool that is accurate and maintainable will provide more value than one that strives for precise data yet is ultimately unmaintainable.
      • Report success. A PPM tool needs to foster portfolio visibility in order to engage and inform the executive layer and support effective decision making.

      Grow Your Own PPM Solution Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should grow your own PPM solution, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Right-size your PPM solution

      Scope an affordable, adoptable, and effective PPM solution with Info-Tech's Portfolio Manager 2017 workbook.

      • Grow Your Own PPM Solution – Phase 1: Right-Size Your PPM Solution
      • Portfolio Manager 2017 Cost-in-Use Estimation Tool
      • None

      2. Get to know Portfolio Manager 2017

      Learn how to use Info-Tech's Portfolio Manager 2017 workbook and create powerful reports.

      • Grow Your Own PPM Solution – Phase 2: Meet Portfolio Manager 2017
      • Portfolio Manager 2017
      • Portfolio Manager 2017 (with Actuals)
      • None
      • None
      • None

      3. Implement your homegrown PPM solution

      Plan and implement an affordable, adoptable, and effective PPM solution with Info-Tech's Portfolio Manager 2017 workbook.

      • Grow Your Own PPM Solution – Phase 3: Implement Your PPM Solution
      • Portfolio Manager 2017 Operating Manual
      • Stakeholder Engagement Workbook
      • Portfolio Manager Debut Presentation for Portfolio Owners
      • Portfolio Manager Debut Presentation for Data Suppliers

      4. Outgrow your own PPM solution

      Develop an exit strategy from your home-grown solution to a commercial PPM toolset. In this video, we show a rapid transition from the Excel dataset shown on this page to a commercial solution from Meisterplan. Christoph Hirnle of Meisterplan is interviewed starting at 9 minutes.

      • None
      [infographic]

      Workshop: Grow Your Own PPM Solution

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Scope a Homegrown PPM Solution for Your Organization

      The Purpose

      Assess the current state of project portfolio management capability at your organization. The activities in this module will inform the next modules by exploring your organization’s current strengths and weaknesses and identifying areas that require improvement.

      Set up the workbook to generate a fully functional project portfolio workbook that will give you a high-level view into your portfolio.

      Key Benefits Achieved

      A high-level review of your current project portfolio capability is used to decide whether a homegrown PPM solution is an appropriate choice

      Cost-benefit analysis is done to build a business case for supporting this choice

      Activities

      1.1 Review existing PPM strategy and processes.

      1.2 Perform a cost-benefit analysis.

      Outputs

      Confirmation of homegrown PPM solution as the right choice

      Expected benefits for the PPM solution

      2 Get to Know Portfolio Manager 2017

      The Purpose

      Define a list of requirements for your PPM solution that meets the needs of all stakeholders.

      Key Benefits Achieved

      A fully customized PPM solution in your chosen platform

      Activities

      2.1 Introduction to Info-Tech's Portfolio Manager 2017: inputs, outputs, and the data model.

      2.2 Gather requirements for enhancements and customizations.

      Outputs

      Trained project/resource managers on the homegrown solution

      A wish list of enhancements and customizations

      3 Implement Your Homegrown PPM Solution

      The Purpose

      Determine an action plan regarding next steps for implementation.

      Implement your homegrown PPM solution. The activities outlined in this step will help to promote adoption of the tool throughout your organization.

      Key Benefits Achieved

      A set of processes to integrate the new homegrown PPM solution into existing PPM activities

      Plans for piloting the new processes, process improvement, and stakeholder communication

      Activities

      3.1 Plan to integrate your new solution into your PPM processes.

      3.2 Plan to pilot the new processes.

      3.3 Manage stakeholder communications.

      Outputs

      Portfolio Manager 2017 operating manual, which documents how Portfolio Manager 2017 is used to augment the PPM processes

      Plan for a pilot run and post-pilot evaluation for a wider rollout

      Communication plan for impacted PPM stakeholders

      Simplify Remote Deployment With Zero-Touch Provisioning

      • Buy Link or Shortcode: {j2store}310|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $5,199 Average $ Saved
      • member rating average days saved: 5 Average Days Saved
      • Parent Category Name: End-User Computing Strategy
      • Parent Category Link: /end-user-computing-strategy

      Provide better end-user device support to a remote workforce:

      • Remain compliant while purchasing, deploying, supporting, and decommissioning devices.
      • Save time and resources during device deployment while providing a high-quality experience to remote end users.
      • Build a set of capabilities that will let you support different use cases.

      Our Advice

      Critical Insight

      • Zero-touch is more than just deployment. This is more difficult than turning on a tool and provisioning new devices to end users.
      • Consider the entire user experience and device lifecycle to show value to the organization. Don’t forget that you will eventually need to touch the device.

      Impact and Result

      Approach zero-touch provisioning and patching from the end user’s experience:

      • Align your zero-touch approach with stakeholder priorities and larger IT strategies.
      • Build your zero-touch provisioning and patching plan from both the asset lifecycle and the end-user perspective to take a holistic approach that emphasizes customer service.
      • Tailor deployment plans to more easily scope and resource deployment projects.

      Simplify Remote Deployment With Zero-Touch Provisioning Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should adopt zero-touch provisioning, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Design the zero-touch experience

      Design the user’s experience and build a vision to direct your zero-touch provisioning project. Update your ITAM practices to reflect the new experience.

      • Zero-Touch Provisioning and Support Plan
      • HAM Process Workflows (Visio)
      • HAM Process Workflows (PDF)
      • End-User Device Management Standard Operating Procedure

      2. Update device management, provisioning, and patching

      Leverage new tools to manage remote endpoints, keep those devices patched, and allow users to get the apps they need to work.

      • End-User Device Build Book Template

      3. Build a roadmap and communication plan

      Create a roadmap for migrating to zero-touch provisioning.

      • Roadmap Tool
      • Communication Plan Template
      [infographic]

      Improve IT-Business Alignment Through an Internal SLA

      • Buy Link or Shortcode: {j2store}455|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • The business is rarely satisfied with IT service levels, yet there is no clear definition of what is acceptable.
      • Dissatisfaction with service levels is often based on perception. Your uptime might be four 9s, but the business only remembers the outages.
      • IT is left trying to hit a moving target with a limited budget and no agreement on where services levels need to improve.

      Our Advice

      Critical Insight

      • Business leaders have service level expectations regardless of whether there is a formal agreement. The SLA process enables IT to manage those expectations.
      • Track current service levels and report them in plain language (e.g. hours and minutes of downtime, not “how many 9s” which then need to be translated) to gain a clearer mutual understanding of current versus desired service levels.
      • Use past incidents to provide context (how much that hour of downtime actually impacted the business) in addition to a business impact analysis to define appropriate target service levels based on actual business need.

      Impact and Result

      Create an effective internal SLA by following a structured process to report current service levels and set realistic expectations with the business. This includes:

      • Defining the current achievable service level by establishing a metrics tracking and monitoring process.
      • Determining appropriate (not ideal) business needs.
      • Creating an SLA that clarifies expectations to reduce IT-business friction.

      Improve IT-Business Alignment Through an Internal SLA Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create an internal SLA, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Scope the pilot project

      Establish the SLA pilot project and clearly document the problems and challenges that it will address.

      • Improve IT-Business Alignment Through an Internal SLA – Phase 1: Scope the Pilot Project
      • Internal SLA Process Flowcharts (PDF)
      • Internal SLA Process Flowcharts (Visio)
      • Build an Internal SLA Project Charter Template
      • Internal SLA Maturity Scorecard Tool

      2. Establish current service levels

      Expedite the SLA process by thoroughly, carefully, and clearly defining the current achievable service levels.

      • Improve IT-Business Alignment Through an Internal SLA – Phase 2: Determine Current Service Levels
      • Availability and Reliability SLA Metrics Tracking Template
      • Service Desk SLA Metrics Tracking Template
      • Service Catalog SLA Metrics Tracking Template

      3. Identify target service levels and create the SLA

      Create a living document that aligns business needs with IT targets by discovering the impact of your current service level offerings through a conversation with business peers.

      • Improve IT-Business Alignment Through an Internal SLA – Phase 3: Set Target Service Levels and Create the SLA
      • SLA Project Roadmap Tool
      • Availability Internal Service Level Agreement Template
      • Service Catalog Internal Service Level Agreement Template
      • Service Desk Internal Service Level Agreement Template
      • Internal SLA Executive Summary Presentation Template
      [infographic]

      Set a Strategic Course of Action for the PMO in 100 Days

      • Buy Link or Shortcode: {j2store}356|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $13,744 Average $ Saved
      • member rating average days saved: 19 Average Days Saved
      • Parent Category Name: Project Management Office
      • Parent Category Link: /project-management-office
      • As a new PMO director, you’ve been thrown into the middle of an unfamiliar organizational structure and a chaotic project environment.
      • The expectations are that the PMO will help improve project outcomes, but beyond that your mandate as PMO director is opaque.
      • You know that the statistics around PMO longevity aren’t good, with 50% of new PMOs closing within the first three years. As early in your tenure as possible, you need to make sure that your stakeholders understand the value that your role could provide to the organization with the right level of buy-in and support.
      • Whether you’re implementing a new PMO or taking over an already existing one, you need to quickly overcome these challenges by rapidly assessing your unfamiliar tactical environment, while at the same time demonstrating confidence and effective leadership to project staff, business stakeholders, and the executive layer.

      Our Advice

      Critical Insight

      • The first 100 days are critical. You have a window of influence where people are open to sharing insights and opinions because you were wise enough to seek them out. If you don’t reach out soon, people notice and assume you’re not wise enough to seek them out, or that you don’t think they are important enough to involve.
      • PMOs most commonly stumble when they shortsightedly provide project management solutions to what are, in fact, more complex, systemic challenges requiring a mix of project management, portfolio management, and organizational change management capabilities. If you fail to accurately diagnose pain points and needs in your first days, you could waste your tenure as PMO leader providing well-intentioned solutions to the wrong project problems.
      • You have diminishing value on your time before skepticism and doubt start to erode your influence. Use your first 100 days to define an appropriate mandate for your PMO, get the right people behind you, and establish buy-in for long-term PMO success.

      Impact and Result

      • Develop an action plan to help leverage your first 100 days on the job. Hit the ground running in your new role with an action plan to achieve realistic goals and milestones in your first 100 days. A results-driven first three months will help establish roots throughout the organization that will continue to feed and grow the PMO beyond your first year.
      • Get to know what you don’t know quickly. Use Info-Tech’s advice and tools to perform a triage of every aspect of PMO accountability as well as harvest stakeholder input to ensure that your PMO meets or exceeds expectations and establishes the right solutions to the organization’s project challenges.
      • Solidify the PMO’s long-term mission. Adopt our stakeholder engagement best practices to ensure that you knock on the right doors early in your tenure. Not only do you need to clarify expectations, but you will ultimately need buy-in from key stakeholders as you move to align the mandate, authority, and resourcing needed for long-term PMO success.

      Set a Strategic Course of Action for the PMO in 100 Days Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how capitalizing on your first 100 days as PMO leader can help ensure the long-term success of your PMO.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Survey the project landscape

      Get up-to-speed quickly on key PMO considerations by engaging PMO sponsors, assessing stakeholders, and taking stock of your PMO inventory.

      • Set a Strategic Course of Action for the PMO in 100 Days – Phase 1: Survey the Project Landscape
      • Mission Identification and Inventory Tool
      • PMO Director First 100 Days Timeline - MS Project
      • PMO Director First 100 Days Timeline - MS Excel

      2. Gather PMO requirements

      Make your first major initiative as PMO director be engaging the wider pool of PMO stakeholders throughout the organization to determine their expectations for your office.

      • Set a Strategic Course of Action for the PMO in 100 Days – Phase 2: Gather PMO Requirements
      • PMO Requirements Gathering Tool
      • PMO Course of Action Stakeholder Interview Guide

      3. Solidify your PPM goals

      Review the organization’s current PPM capabilities in order to identify your ability to meet stakeholder expectations and define a sustainable mandate.

      • Set a Strategic Course of Action for the PMO in 100 Days – Phase 3: Solidify Your PPM Goals
      • Project Portfolio Management Maturity Assessment Workbook
      • Project Management Maturity Assessment Workbook
      • Organizational Change Management Maturity Assessment Workbook
      • PMO Strategic Expectations Glossary

      4. Formalize the PMO’s mandate

      Communicate your strategic vision for the PMO and garner stakeholder buy-in.

      • Set a Strategic Course of Action for the PMO in 100 Days – Phase 4: Formalize the PMO's Mandate
      • PMO Mandate and Strategy Roadmap Template
      • PMO Director Peer Feedback Evaluation Template
      • PMO Director First 100 Days Self-Assessment Tool
      [infographic]

      Workshop: Set a Strategic Course of Action for the PMO in 100 Days

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess the Current Project Ecosystem

      The Purpose

      Quickly develop an on-the-ground view of the organization’s project ecosystem and the PMO’s abilities to effectively serve.

      Key Benefits Achieved

      A comprehensive and actionable understanding of the PMO’s tactical environment

      Activities

      1.1 Perform a PMO SWOT analysis.

      1.2 Assess the organization’s portfolio management, project management, and organizational change management capability levels.

      1.3 Take inventory of the PMO’s resourcing levels, project demand levels, and tools and artifacts.

      Outputs

      Overview of current strengths, weaknesses, opportunities, and threats

      Documentation of your current process maturity to execute key portfolio management, project management, and organizational change management functions

      Stock of the PMO’s current access to PPM personnel relative to total project demand

      2 Analyze PMO Stakeholders

      The Purpose

      Determine stakeholder expectations for the PMO.

      Key Benefits Achieved

      An accurate understanding of others’ expectations to help ensure the PMO’s course of action is responsive to organizational culture and strategy

      Activities

      2.1 Conduct a PMO Mission Identification Survey with key stakeholders.

      2.2 Map the PMO’s stakeholder network.

      2.3 Analyze key stakeholders for influence, interest, and support.

      Outputs

      An understanding of expected PMO outcomes

      A stakeholder map and list of key stakeholders

      A prioritized PMO requirements gathering elicitation plan

      3 Determine Strategic Expectations and Define the Tactical Plan

      The Purpose

      Develop a process and method to turn stakeholder requirements into a strategic vision for the PMO.

      Key Benefits Achieved

      A strategic course of action for the PMO that is responsive to stakeholders’ expectations.

      Activities

      3.1 Assess the PMO’s ability to support stakeholder expectations.

      3.2 Use Info-Tech’s PMO Strategic Expectations glossary to turn raw process and service requirements into specific strategic expectations.

      3.3 Define an actionable tactical plan for each of the strategic expectations in your mandate.

      Outputs

      An understanding of PMO capacity and limits

      A preliminary PMO mandate

      High-level statements of strategy to help support your mandate

      4 Formalize the PMO’s Mandate and Roadmap

      The Purpose

      Establish a final PMO mandate and a process to help garner stakeholder buy-in to the PMO’s long-term vision.

      Key Benefits Achieved

      A viable PMO course of action complete with stakeholder buy-i

      Activities

      4.1 Finalize the PMO implementation timeline.

      4.2 Finalize Info-Tech’s PMO Mandate and Strategy Roadmap Template.

      4.3 Present the PMO’s strategy to key stakeholders.

      Outputs

      A 3-to-5-year implementation timeline for key PMO process and staffing initiatives

      A ready-to-present strategy document

      Stakeholder buy-in to the PMO’s mandate

      Develop Your Value-First Business Process Automation Strategy

      • Buy Link or Shortcode: {j2store}236|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Optimization
      • Parent Category Link: /optimization

      Business process automation (BPA) has gained momentum, especially as pilots result in positive outcomes such as improved customer experience, efficiencies, and cost savings. Stakeholders want to invest more in BPA solutions and scale initial successes across different business and IT functions.

      But it’s critical to get it right and not fall into the hype so that the costs don’t outweigh the benefits.

      Ultimately, all BPA initiatives should align with a common vision.

      Build the right BPA strategy – smarter, not faster

      Organizations should adopt a methodical approach to growing their BPA, taking cost, talent availability, and goals into account.

      1. Recognize the true value of automation. Successful BPA improves more than cost savings and revenue generation. Employee satisfaction, organizational reputation, brand, and better-performing products and services are other sought-after benefits.
      2. Consider all relevant factors as you build a strategy. Take into account the impact BPA initiatives will have on users, risk and change appetites, customer satisfaction, and business priorities.
      3. Mature your practice as you scale your BPA technologies. Develop skills, resources, and governance practices as you scale your automation tools. Deploy BPA with quality in mind, then continuously monitor, review, and maintain the automation for success.
      4. Learn from your initial automations. Maximize what you learn from your minimum viable automations (MVA) and use that knowledge to build and scale your automation implementation across the organization.

      Develop Your Value-First Business Process Automation Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Business Process Automation Strategy Deck – A step-by-step document that walks you through how to position business process automation as a key capability and assess the organization’s readiness for its adoption.

      This blueprint helps you develop a strategy justify the scaling and maturing of your business process automation (BPA) practices and capabilities to fulfill your business priorities.

      • Develop Your Value-First Business Process Automation Strategy – Phases 1-4

      2. Business Process Automation Strategy Template – A template to help you build a clear and compelling strategy document for stakeholders.

      Document your business process automation strategy in the language your stakeholders understand. Tailor this document to fit your BPA objectives and initiatives.

      • Business Process Automation Strategy Template

      3. Business Process Automation Maturity Assessment Tool – A tool to help gauge the maturity of your BPA practice.

      Evaluate the maturity of the key capabilities of your BPA practice to determine its readiness to support complex and scaled BPA solutions.

      • Business Process Automation Maturity Assessment Tool

      Infographic

      Workshop: Develop Your Value-First Business Process Automation Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand the Context

      The Purpose

      Understand the business priorities and your stakeholders' needs that are driving your business process automation initiatives while abiding by the risk and change appetite of your organization.

      Key Benefits Achieved

      Translate business priorities to the context of business process automation.

      Arrive at a common definition of business value.

      Come to an understanding of the needs, concerns, and problems of BPA stakeholders.

      Discover organizational risk and change tolerance and appetite.

      Activities

      1.1 Set the Business Context

      1.2 Understand Your Stakeholder Needs

      1.3 Build Your Risk & Change Profile

      Outputs

      Business problem, priorities, and business value definition

      Customer and end-user assessment (e.g. personas, customer journey)

      Risk and change profile

      2 Define Your BPA Objectives and Opportunities

      The Purpose

      Set reasonable and achievable expectations for your BPA initiatives and practices, and select the right BPA opportunities to meet these expectations.

      Key Benefits Achieved

      Align BPA objectives and metrics to your business priorities.

      Create guiding principles that support your organization’s and team’s culture.

      Define a vision of your target-state BPA practice

      Create a list of BPA opportunities that will help build your practice and meet business priorities.

      Activities

      2.1 Define Your BPA Expectations

      2.2 List Your Guiding Principles

      2.3 Envision Your BPA Target State

      2.4 Build Your Opportunity Backlog

      Outputs

      BPA problem statement, objectives, and metrics

      BPA guiding principles

      Desired scaled BPA target state

      Prioritized BPA opportunities

      3 Assess Your BPA Maturity

      The Purpose

      Evaluate the current state of your BPA practice and its readiness to support scaled and complex BPA solutions.

      Key Benefits Achieved

      List key capabilities to implement and optimize to meet the target state of your BPA practice.

      Brainstorm solutions to address the gaps in your BPA capabilities.

      Activities

      3.1 Assess Your BPA Maturity

      Outputs

      BPA maturity assessment

      4 Roadmap Your BPA Initiatives

      The Purpose

      Identify high-priority key initiatives to support your BPA objectives and goals, and establish the starting point of your BPA strategy.

      Key Benefits Achieved

      Create an achievable roadmap of BPA initiatives designed to deliver good practices and valuable automations.

      Perform a risk assessment of your BPA initiatives and create mitigations for high-priority risks.

      Find the starting point in the development of your BPA strategy.

      Activities

      4.1 Roadmap Your BPA Initiatives

      4.2 Assess and Mitigate Your Risks

      4.3 Complete Your BPA Strategy

      Outputs

      List of BPA initiatives and roadmap

      BPA initiative risk assessment

      Initial draft of your BPA strategy

      Define Your Virtual and Hybrid Event Requirements

      • Buy Link or Shortcode: {j2store}64|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: End-User Computing Applications
      • Parent Category Link: /end-user-computing-applications

      Your organization is considering holding an event online, or has been, but:

      • The organization (both on the business and IT sides) may not have extensive experience hosting events online.
      • It is not immediately clear how your formerly in-person event’s activities translate to a virtual environment.
      • Like the work-from-home transformation, bringing events online instantly expands IT’s role and responsibilities.

      Our Advice

      Critical Insight

      If you don't begin with strategy, you will fit your event to technology, instead of the other way around.

      Impact and Result

      To determine your requirements:

      • Determine the scope of the event.
      • Narrow down your list of technical requirements.
      • Use Info-Tech’s Rapid Application Selection Framework to select the right software solution.

      Define Your Virtual and Hybrid Event Requirements Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define Your Virtual and Hybrid Event Requirements Storyboard – Use this storyboard to work through key decision points involved in creating digital events.

      This deck walks you through key decision points in creating virtual or hybrid events. Then, begin the process of selecting the right software by putting together the first draft of your requirements for a virtual event software solution.

      • Define Your Virtual and Hybrid Event Requirements Storyboard

      2. Virtual Events Requirements Tool – Use this tool to begin selecting your requirements for a digital event solution.

      The business should review the list of features and select which ones are mandatory and which are nice to have or optional. Add any features not included.

      • Virtual/Hybrid Event Software Feature Analysis Tool
      [infographic]

      Further reading

      Define Your Virtual and Hybrid Event Requirements

      Accelerate your event scoping and software selection process.

      Analyst Perspective

      When events go virtual, IT needs to cover its bases.

      The COVID-19 pandemic imposed a dramatic digital transformation on the events industry. Though event ticket and registration software, mobile event apps, and onsite audio/visual technology were already important pieces of live events, the total transformation of events into online experiences presented major challenges to organizations whose regular business operations involve at least one annual mid-sized to large event (association meetings, conferences, trade shows, and more).

      Many organizations worked to shift to online, or virtual events, in order to maintain business continuity. As time went on, and public gatherings began to restart, a shift to “hybrid” events began to emerge—events that accommodate both in-person and virtual attendance. Regardless of event type, this pivot to using virtual event software, or digital event technology, brings events more closely into IT’s areas of responsibility. If you don't begin with strategy, you risk fitting your event to technology, instead of the other way around.

      If virtual and hybrid events are becoming standard forms of delivering content in your organization, use Info-Tech’s material to help define the scope of the event and your requirements, and to support your software selection process.

      Photo of Emily Sugerman
      Emily Sugerman
      Research Analyst, Infrastructure & Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      The organization (both on the business and IT sides) may not have extensive experience hosting events online.

      It is not immediately clear how a formerly in-person event’s activities translate to a virtual environment.

      Like the work-from-home transformation, bringing events online expands IT’s role and responsibilities.

      Common Obstacles

      It is not clear what technological capabilities are needed for the event, which capabilities you already own, and what you may need to purchase.

      Though virtual events remove some barriers to attendance (distance, travel), it introduces new complications and considerations for planners.

      Hybrid events introduce another level of complexity.

      Info-Tech’s Approach

      In order to determine your requirements:

      Determine the scope of the event.

      Narrow down your list of technical requirements.

      Use Info-Tech’s Rapid Application Selection Framework to select the right software solution.

      Info-Tech Insight

      If you don't begin with strategy, you will fit your event to technology, instead of the other way around.

      Your challenge

      The solution you have been using for online events does not meet your needs.

      Though you do have some tools that support large meetings, it is not clear if you require a larger and more comprehensive virtual event solution. There is a need to determine what type of technology you might need to purchase versus leveraging what you already have.

      It is difficult to quickly and practically identify core event requirements and how they translate into technical capabilities.

      Maintaining or improving audience engagement is a perpetual challenge for virtual events.

      38%
      of event professionals consider virtual event technology “a tool for reaching a wider audience as part of a hybrid strategy.”

      21%
      consider it “a necessary platform for virtual events, which remain my go-to event strategy.”

      40%
      prioritize “mid-budget all-in-one event tech solution that will prevent remote attendees from feeling like second-class participants.”

      Source: Virtual Event Tech Guide, 2022

      Common obstacles

      These barriers make this challenge difficult to address for many organizations.

      Events with networking objectives are not always well served by webinars, which are traditionally more limited in their interactive elements.

      Events that include the conducting of organizational/association business (like voting) may have bylaws that make selecting a virtual solution more challenging.

      Maintaining attendee engagement is more challenging in a virtual environment.

      Prior to the pandemic, your organization may not have been as experienced in putting on fully virtual events, putting more responsibility in your corner as IT. Navigating virtual events can also require technological competencies that your attendee userbase may not universally possess.

      Technological limitations and barriers to access can exclude potential attendees just as much as bringing events online can open up attendance to new audiences.

      Opportunity: Virtual events can significantly increase an event’s reach

      Events held virtually during the pandemic noted significant increases in attendees.

      “We had 19,000 registrations from all over the world, almost 50 times the number of people we had expected to host in Amsterdam. . . . Most of this year’s [2020] attendees would not have been able to participate in a physical GrafanaCon in Amsterdam. That was a huge win.” – Raj Dutt, Grafana Labs CEO[5]

      Event In-person Online 2022
      Microsoft Build 2019: 6,000 attendees 2020: 230,000+ registrants[1] The 2022 conference was also held virtually[3]
      Stanford Institute for Human-Centered Artificial Intelligence A few hundred attendees expected for the original (cancelled) 2020 in-person conference 2020: 30,000 attendees attended the “COVID-19 and AI” virtual conference[2] The 2022 Spring Conference was a hybrid event[4]

      [1] Kelly, 2020; [2] Price, 2020; [3] Stanford Digital Economy Lab, 2022; [4] Warren, 2022; [5] Fast Company, 2020

      Info-Tech’s methodology for defining virtual/hybrid event requirements

      A diagram that shows defining event scope, creating list of requirements, and selecting software.

      Event planning phases

      Apply project management principles to your virtual/hybrid event planning process.

      Online event planning should follow the same established principles as in-person event planning.
      Align the event’s concept and objectives with organizational goals.

      A diagram of event planning phases
      Source: Adapted from Event Management Body of Knowledge, CC BY 4.0

      Gather inputs to the planning processes

      Acquire as much of this information as possible before you being the planning process.

      Budget: Determine your organization’s budget for this event to help decide the scope of the event and the purchasing decisions you make as you plan.

      Internal human resources: Identify who in your organization is usually involved in the organization of this event and if they are available to organize this one.

      List of communication and collaboration tools: Acquire the list of the existing communication and collaboration tools you are currently licensed for. Ensure you know the following information about each tool:

      • Type of license
      • License limitations (maximum number of users)
      • Internal or external-facing tool (or capable of both)
      • Level of internal training and competency on the tool

      Decision point: Relate event goals to organizational goals

      What is driving the event?

      Your organization may hold a variety of in-person events that you now wish, for various reasons, to hold fully or partially online. Each event likely has a slightly different set of goals.

      Before getting into the details of how to transition your event online, return to the business/organizational goals the event is serving.

      Ensure each event (and each component of each event) maps back to an organizational goal.

      If a component of the event does not align to an organizational goal, assess whether it should remain as part of the event.

      Common organizational goals

      • Increase revenue
      • Increase productivity
      • Attract and retain talent
      • Improve change management
      • Carry out organizational mission
      • Identify new markets
      • Increase market share
      • Improve customer service
      • Launch new product/service

      Common event goals

      • Education/training
      • Knowledge transfer
      • Decision making
      • Professional development
      • Sales/lead generation
      • Fundraising
      • Entertainment
      • Morale boosting
      • Recognition of achievement

      Decision point: Identify your organization’s digital event vision

      What do you want the outcome of this event to be?

      Attendee goals: Who are your attendees? Why do they attend this event? What attendee needs does your event serve? What is your event’s value proposition? Are they intrinsically or extrinsically motivated to attend?

      Event goals: From the organizer perspective, why do you usually hold this event? Who are your stakeholders?

      Organizational goals: How do the event goals map to your organizational goals? Is there a clear understanding of what the event’s larger strategic purpose is.

      Common attendee goals

      Education: our attendees need to learn something new that they cannot learn on their own.
      Networking: our attendees need to meet people and make new professional connections.
      Professional development: our attendees have certain obligations to keep credentials updated or to present their work publicly to advance their careers.
      Entertainment: our attendees need to have fun.
      Commerce: our attendees need to buy and sell things.

      Decision point: Level of external event production

      Will you be completely self-managed, reliant on external event production services, or somewhere in the middle?

      You can review this after working through the other decision points and the scope becomes clearer.

      A diagram that shows Level of external event production, comparing Completely self-managed vs Fully externally-managed.

      Decision point: Assign event planning roles

      Who will be involved in planning the event? Fill/combine these roles as needed.

      Planning roles Description
      Project manager Shepherd event planning until completion while ensuring project remains on schedule and on budget.
      Event manager Correspond with presenters during leadup to event, communicate how to use online event tools/platform, perform tests with presenters/exhibitors, coordinate digital event staff/volunteers.
      Program planner Select the topics, speakers, activity types, content, streams.
      Designer and copywriter Design the event graphics; compose copy for event website.
      Digital event technologist Determine event technology requirements; determine how event technology fits together; prepare RFP, if necessary, for new hardware/software.
      Platform administrator Set up registration system/integrate registrations into platform(s) of choice; upload video files and collateral; add livestream links; add/delete staff roles and set controls and permissions; collect statistics and recordings after event.
      Commercial partner liaison Recruit sponsors and exhibitors (offer sponsorship packages); facilitate agreement/contract between commercial partners and organization; train commercial partners on how to use event technology; retrieve lead data.
      Marketing/social media Plan and execute promotional campaigns (email, social media) in the lead up to, and during, the event. Post-event, send follow-up communications, recording files, and surveys.

      Decision point: Assign event production roles

      Who will be involved in running the event?

      Event production roles Description
      Hosts/MCs Address attendees at beginning and end of event, and in-between sessions
      Provide continuity throughout event
      Introduce sessions
      Producers Prepare presenters for performance
      Begin and end sessions
      Use controls to share screens, switch between feeds
      Send backchannel messages to presenters (e.g., "Up next," "Look into webcam")
      Moderators Admit attendees from waiting room
      Moderate incoming questions from attendees
      Manage slides
      Pass questions to host/panelists to answer
      Moderate chat
      IT support Manage event technology stack
      Respond to attendee technical issues
      Troubleshoot network connectivity problems
      Ensure audio and video operational
      Start and stop session recording
      Save session recordings and files (chat, Q&As)

      Decision point: Map attendee goals to event goals to organizational goals

      Input: List of attendee benefits, List of event goals, List of organizational goals
      Output: Ranked list of event goals as they relate to attendee needs and organizational goals
      Materials: Whiteboard/flip charts
      Participants: Planning team

      1. Define attendee benefits:
        1. List the attendee benefits derived from your event (as many as possible).
        2. Rank attendee benefits from most to least important.
      2. Define event goals:
        1. List your event goals (as many as possible).
        2. Draw a connecting line to your ranked list of attendee benefits.
        3. Identify if any event goals exist with no clear relationship to attendee benefits. Discuss whether this event goal needs to be re-envisioned. If it connects to no discernible attendee benefits, consider removing it. Otherwise, figure out what attendee benefits the event goal provides.
      3. Define organizational goals:
        1. Acquire a list of your organization’s main strategic goals.
        2. Draw a connecting line from each event goal to the organizational goal it supports.
        3. If most of your event goals do not immediately seem to support an organizational goal, discuss why this is. Try to find the connection. If you cannot, discuss whether the event should proceed or be rethought.

      Decision point: Break down your event into its constituent components

      Identify your event archetype

      Decompose the event into its component parts

      Identify technical requirements that help meet event goals

      Benefits:

      • Clarify how formerly in-person events map to virtual archetypes.
      • Ensure your virtual event planning is anchored to organizational goals from the outset.
      • Streamline your virtual event tech stack planning later.

      Decision point: Determine your event archetype

      Analyze your event’s:

      • Main goals.
      • The components and activities that support those goals.
      • How these components and activities fall into people- vs. content-centric activities, and real-time vs. asynchronous activities.
      1. Conference
      2. Trade show
      3. Annual general meeting
      4. Department meeting
      5. Town hall
      6. Workshop

      A diagram that shows people- vs. content-centric activities, and real-time vs. asynchronous activities

      Info-Tech Insight

      Begin the digital event planning process by understanding how your event’s content is typically consumed. This will help you make decisions later about how best to deliver the content virtually.

      Conference

      Goals: Education/knowledge transfer; professional advancement; networking.

      Major content

      • Call for proposals/circulation of abstracts
      • Keynotes or plenary address: key talk addressed to large audience
      • Panel sessions: multiple panelists deliver address on common theme
      • Poster sessions: staffed/unstaffed booths demonstrate visualization of major research on a poster
      • Association meetings (see also AGM archetype): professional associations hold AGM as one part of a larger conference agenda

      Community

      • Formal networking (happy hours, social outings)
      • Informal networking (hallway track, peer introductions)
      • Business card exchange
      • Pre- and post-event correspondence

      Commercial Partners

      • Booth reps: Publishing or industry representatives exhibit products/discuss collaboration

      A quadrants matrix of conference

      Trade show

      Objectives: Information transfer; sales; lead generation.

      Major content

      • Live booth reps answer questions
      • Product information displayed
      • Promotional/information material distributed
      • Product demonstrations at booths or onstage
      • Product samples distributed to attendees

      Community interactions

      • Statements of intent to buy
      • Lead generation (badge scanning) of booth visitors
      • Business card exchange
      • Pre- and post-event correspondence

      A quadrants matrix of Trade show

      Annual general meeting

      Objectives: Transparently update members; establish governance and alignment.

      Meeting events

      • Updates provided to members on organization’s activities/finances
      • Decisions made regarding organization’s direction
      • Governance over organization established (elections)
      • Speakers addressing large audience from stage
      • In-camera sessions
      • Translation of proceedings
      • Real-time weighted voting
      • Minutes taken during meeting

      Administration

      • Notice given of meeting within mandated time period
      • Agenda circulated prior to meeting
      • Distribution of proxy material
      • Minutes distributed

      A quadrants matrix of Annual general meeting

      Department meeting

      Objectives: Information transfer of company agenda/initiatives; group decision making.

      Major content

      • Agenda circulated prior to meeting
      • Updates provided from senior management/leadership to employees on organization’s initiatives and direction
      • Employee questions and feedback addressed
      • Group decision making
      • Minutes taken during meeting
      • Minutes or follow-up circulated

      A quadrants matrix of department meeting

      Town hall meeting

      Objectives: Update public; answer questions; solicit feedback.

      Major content

      • Public notice of meeting announced
      • Agenda circulated prior to meeting
      • Speakers addressing large audience from stage
      • Presentation of information pertinent to public interest
      • Audience members line up to ask questions/provide feedback
      • Translation of proceedings
      • Recording of meeting archived

      A quadrants matrix of Town hall meeting

      Workshop

      Objectives: Make progress on objective; achieve consensus; knowledge transfer.

      Major content

      • Scheduling of workshop
      • Agenda circulated prior to meeting
      • Facilitator leads group activities
      • Participants develop alignment on project
      • Progress achieved on workshop project
      • Feedback on workshop shared with facilitator

      A quadrants matrix of Workshop

      Decision point: Analyze your event’s purpose and value

      Use the event archetypes to help you identify your event’s core components and value proposition.

      1. Attendee types: Who typically attends your event? Exclusively internal participants? External participants? A mix of the two?
      2. Communication: How do participants usually communicate with each other during this event? How do they communicate with the event organizers? Include both formal types of communication (listening to panel sessions) and informal (serendipitous conversations in the hallway).
      3. Connection: What types of connections do your attendees need to experience? (networking with peers; interactions with booth reps; consensus building with colleagues).
      4. Exchange of material: What kind of material is usually exchanged at this event and between whom? (Pamphlets, brochures, business cards, booth swag).
      5. Engagement: How do you usually retain attendees' attention and make sure they remain engaged throughout the event?
      6. Length: How long does the event typically last?
      7. Location and setup: Where does the event usually take place and who is involved in its setup?
      8. Success metrics: How do you usually measure your event's success?

      Info-Tech Insight

      Avoid trying to exactly reproduce the formerly in-person event online. Instead, identify the value proposition of each event component, then determine what its virtual expression could be.

      Example: Trade show

      Goals: Information transfer; sales; lead generation.

      1. Identify event component(s)
      2. Document its face-to-face expression(s)
      3. Identify the expression’s value proposition
      4. Translate the value proposition to a virtual component that facilitates overall event goal

      Event component

      Face-to-face expression

      Value proposition of component

      Virtual expression

      Attendee types Paying attendees Revenue for event organizer; sales and lead generation for booth rep Access to virtual event space
      Attendee types Booth rep Revenue for event organizer; information source for paying attendees Access to virtual event space
      Communication/connection Conversation between booth rep and attendee Lead generation for booth rep; information to inform decision making for attendee Ability to enter open video breakout session staffed by booth reps OR

      Ability to schedule meeting times with booth rep

      Multiple booth reps on hand to monitor different elements of the booth (one person to facilitate the discussion over video, another to monitor chat and Q&A)
      Communication/connection Serendipitous conversation between attendees Increased attendee contacts; fun Multiple attendees can attend the booth’s breakout session simultaneously and participate in web conferencing, meeting chat, or submit questions to Q&A
      Communication/connection Badges scanned at booth/email sign-up sheets filled out at table Lead generation for exhibitors List of visitors to booth shared with exhibitor (if consent given by attendees)

      Ability for attendees to request to be contacted for more information
      Exchange of material Catering (complimentary coffee, pastries) Obviate the need for attendees to leave the event for refreshments N/A: not included in virtual event
      Exchange of material Pamphlets, product literature, swag Portable information for attendee decision making Downloadable files (pdf)
      Location Responsibility of both the organizers (tables, chairs, venue) and booth reps (posters, handouts) Booth reps need a dedicated space where they can be easily found by attendees and advertise themselves Booth reps need access to virtual platform to upload files, images, provide booth description
      Engagement Attendees able to visit all booths by strolling through space Event organizers have a captive audience who is present in the immediacy of the event site Attendees motivated to stay in the event space and attend booths through gamification strategies (points awarded for number of booths visited or appointments booked)
      Length of event 2 full days Attendees travel to event site and spend the entire 2 days at the event, allowing them to be immersed in the event and absorb as much information in as little time as possible Exhibitors’ visiting hours will be scheduled so they work for both attendees attending in Eastern Standard Time and Pacific Time
      Metrics for success -Positive word of mouth
      -Number of registrations
      These metrics can be used to advertise to future exhibitors and attendees Number of virtual booths visited

      Number of file downloads

      Survey sent to attendees after event (favorite booths, preferred way to interact with exhibitors, suggestions for improvement, most valuable part of experience)

      Plan your metrics

      Use the analytics and reporting features available in your event technology toolset to capture the data you want to measure. Decide how each metric will impact your planning process for the next event.

      Examples of metrics:

      • Number of overall participants/registrants: Did you have more or fewer registrants/attendees than previous iterations of the event? What is the difference between number of registrants and number of real attendees?
      • Locations of participants: Where are people participating from? How many are attending for the first time? Are there new audiences you can pursue next time?
      • Most/least popular sessions: How long did people stay in the sessions and the event overall?
      • Most/least popular breakout rooms and discussion boards: Which topics should be repeated/skipped next time?
      • Social media mentions: Which topics received the most engagement on social media?
      • Surveys: What do participants report enjoying most? Least?
      • Technical failures: Can your software report on failures? Identify what technical problems arose and prepare a plan to mitigate them next time.

      Ensure the data you capture feeds into better planning for the next event

      Determine compliance requirements

      A greater event reach also means new data privacy considerations, depending on the location of your guests.

      General Data Protection Regulation (GDPR)

      Concerns over the collection of personal electronic data may not have previously been a part of your event planning considerations. However, now that your event is online, it’s wise to explore which data protection regulations apply to you. Remember, even if your organization is not located in the EU, if any of your attendees are European data subjects you may still be required to comply with GDPR, which involves the notification of data collected, allowing for opt-out options and the right to have data purged. The data must be collected for a specific purpose; if that purpose is expired, it can no longer be retained. You also have an obligation to report any breaches.

      Accessibility requirements

      What kind of accessibility laws are you subject to (AODA, WCAG2)? Regardless of compliance requirements, it is a good idea to ensure the online event follows accessibility best practices.

      Decision point: Set event policies

      What event policies need to be documented?
      How will you communicate them to attendees?

      Code of conduct

      One trend in the large event and conference space in recent years has been the development of codes of conduct that attendees are required to abide by to continue participating in the event.
      Now that your event is online, consider whether your code of conduct requires updating. Are there new types of appropriate/inappropriate online behavior that you need to define for your attendees?

      Harassment reporting

      If your organization has an event harassment reporting process, determine how this process will transfer over to the digital event.
      Ensure the reporting process has an owner and a clear methodology to follow to deal with complaints, as well as a digital reporting channel (a dedicated email or form) that is only accessed by approved staff to protect sensitive information.

      Develop a risk management plan

      Plan for how you will mitigate technical risks during your virtual event
      Provide presenters with a process to follow if technical problems arise.

      • Presenter’s internet connection cuts out
      • Attendees cannot log in to event platform
      • Attendees cannot hear/see video feed
      • What process will be followed when technical problems occur: ticketing system; chatbot; generic email accessible by all IT support assigned

      Testing/Rehearsal

      Test audio hardware: Ensure speakers use headphones/earbuds and mics (they do not have to be fancy/expensive). Relying on the computer/laptop mic can lead to more ambient noise and potential feedback problems.

      Check lighting: Avoid backlighting. Reposition speakers so they are not behind windows. Ask them to open/close shades. Add lamps as needed.

      Prevent interruptions: Before the event, ask panelists to turn phone and computer notifications to silent. Put a sign on the door saying Do not Disturb.

      Control audience view of screenshare: If your presenters will be sharing their screens, teach them how this works on the platform they are using. Advise them to exit out of any other application that is not part of their presentation, so they do not share the wrong screen unintentionally. Advise them to remove anything from the desktop that they do not want the audience to see, in case their desktop becomes visible at any point.

      Control audience view of physical environment: Before the event, advise participants to turn their cameras on and examine their backgrounds. Remove anything the audience should not be able to see.

      Test network connectivity: Send the presenters a link to a speed test and check their internet speed.

      Emergency contact: Exchange cell phone numbers for emergency backchannel conversations if problems arise on the day of the event.

      Set expectations: Presenting to an online audience feels very different to a live crowd. Prepare presenters for a lack of applause and lack of ability to see their audience, and that this does not mean the presentation was unsuccessful.

      Identify requirements

      To determine what kind of technical requirements you need to build the virtual expression of your event, consult the Virtual Event Platform Requirements Tool.

      1. If you have determined that the requirements you wish to use for the event exceed the capabilities of your existing communication and collaboration toolset, identify whether these gaps tip the scale toward purchasing a new tool. Use the requirement gaps to make the business case for purchasing a new tool.
      2. Use the Virtual Event Platform Requirements Tool to create a list of requirements.
      3. Consult the Software Reviews category for Virtual Event Platform Data Quadrant and Emotional Footprint reports.
      4. Assemble your documentation for approvals and the Rapid Application Selection Process.

      A photo of Detailed Feature Analysis Worksheet.

      Download the Virtual/Hybrid Event Software Feature Analysis Tool

      Rapid Application Selection Framework and Contract Review

      A photo of Rapid Application Selection Framework
      Launch Info-Tech’s Rapid Application Selection Framework.

      Using the requirements you’ve just gathered as a base, use Info-Tech’s complete framework to improve the efficiency and effectiveness of software selection.

      Once you’ve selected a vendor(s), review the contract. Does it define an exit strategy? Does it define when your data will be deleted? Does it set service-level agreements that you find acceptable? Leverage Info-Tech’s contract review service once you have selected the virtual event solution and have received a contract from the vendor.

      Further research

      Photo of Run Better Meetings
      Run Better Meetings

      Bibliography

      Dutt, Raj. “7 Lessons from This Company’s First-Ever Virtual Conference.” Fast Company, 29 Jul 2020. Web.

      Kelly, Samantha Murphy. “Microsoft Build Proves Splashy Tech Events Can Thrive Online.” CNN, 21 May 2020. Web.

      “Phases.” Event Management Body of Knowledge (EMBOK), n.d. Web.

      Price, Michael. “As COVID-19 Forces Conferences Online, Scientists Discover Upsides of Virtual Format.” Science, 28 Apr 2020. Web.

      “Stanford HAI Spring Conference - Key Advances in Artificial Intelligence.” Stanford Digital Economy Lab, 2022. Web.

      “Virtual Event Tech Guide 2022.” Skift Meetings, April 2022. Web.

      Warren, Tom. “Microsoft Build 2022 Will Take Place May 24th–26th.” The Verge, 30 March 2022. Web.

      Contributors

      6 anonymous contributors

      Optimize IT Project Intake, Approval, and Prioritization

      • Buy Link or Shortcode: {j2store}433|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $124,419 Average $ Saved
      • member rating average days saved: 31 Average Days Saved
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • Companies are approving more projects than they can deliver. Most organizations say they have too many projects on the go and an unmanageable and ever-growing backlog of things to get to.
      • While organizations want to achieve a high throughput of approved projects, many are unable or unwilling to allocate an appropriate level of IT resourcing to adequately match the number of approved initiatives.
      • Portfolio management practices must find a way to accommodate stakeholder needs without sacrificing the portfolio to low-value initiatives that do not align with business goals.

      Our Advice

      Critical Insight

      • Approve only the right projects that you have capacity to deliver. Failure to align projects with strategic goals and resource capacity are the most common causes of portfolio waste across organizations.
      • More time spent with stakeholders during the ideation phase to help set realistic expectations for stakeholders and enhance visibility into IT’s capacity and processes is key to both project and organizational success.
      • Too much intake red tape will lead to an underground economy of projects that escape portfolio oversight, while too little intake formality will lead to a wild west of approvals that could overwhelm the PMO. Finding the right balance of intake formality for your organization is the key to establishing a PMO that has the ability to focus on the right things.

      Impact and Result

      • Establish an effective scorecard to create transparency into IT’s capacity and processes. This will help set realistic expectations for stakeholders, eliminate “squeaky wheel” prioritization, and give primacy to the highest value requests.
      • Build a centralized process that funnels requests into a single intake channel to eliminate confusion and doubt for stakeholders and staff while also reducing off-the-grid initiatives.
      • Clearly define a series of project approval steps, and communicate requirements for passing them.
      • Develop practices that incorporate the constraint of resource capacity to cap the amount of project approvals to that which is realistic to help improve the throughput of projects through the portfolio.

      Optimize IT Project Intake, Approval, and Prioritization Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize project intake, approval, and prioritization process, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Set realistic goals for optimizing project intake, approval, and prioritization process

      Get value early by piloting a scorecard for objectively determining project value, and then examine your current state of project intake to set realistic goals for optimizing the process.

      • Optimize Project Intake, Approval, and Prioritization – Phase 1: Set Realistic Goals for Optimizing Process
      • Project Value Scorecard Development Tool
      • Project Intake Workflow Template - Visio
      • Project Intake Workflow Template - PDF
      • Project Intake, Approval, and Prioritization SOP

      2. Build an optimized project intake, approval, and prioritization process

      Take a deeper dive into each of the three processes – intake, approval, and prioritization – to ensure that the portfolio of projects is best aligned to stakeholder needs, strategic objectives, and resource capacity.

      • Optimize Project Intake, Approval, and Prioritization – Phase 2: Build New Optimized Processes
      • Light Project Request Form
      • Detailed Project Request Form
      • Project Intake Classification Matrix
      • Benefits Commitment Form Template
      • Proposed Project Technology Assessment Tool
      • Fast Track Business Case Template
      • Comprehensive Business Case Template
      • Project Intake and Prioritization Tool

      3. Integrate the new optimized processes into practice

      Plan a course of action to pilot, refine, and communicate the new optimized process using Info-Tech’s expertise in organizational change management.

      • Optimize Project Intake, Approval, and Prioritization – Phase 3: Integrate the New Processes into Practice
      • Intake Process Pilot Plan Template
      • Project Backlog Manager
      • Intake and Prioritization Impact Analysis Tool
      [infographic]

      Workshop: Optimize IT Project Intake, Approval, and Prioritization

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Refocus on Project Value to Set Realistic Goals

      The Purpose

      Set the course of action for optimizing project intake, approval, and prioritization by examining the current state of the process, the team, the stakeholders, and the organization as a whole.

      Key Benefits Achieved

      The overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects. To achieve this goal, one must have a clear way to determine what are “the best” projects.

      Activities

      1.1 Define the criteria with which to determine project value.

      1.2 Envision your target state for your optimized project intake, approval, and prioritization process.

      Outputs

      Draft project valuation criteria

      Examination of current process, definition of process success criteria

      2 Examine, Optimize, and Document the New Process

      The Purpose

      Drill down into, and optimize, each of the project intake, approval, and prioritization process.

      Key Benefits Achieved

      Info-Tech’s methodology systemically fits the project portfolio into its triple constraint of stakeholder needs, strategic objectives, and resource capacity, to effectively address the challenges of establishing organizational discipline for project intake.

      Activities

      2.1 Conduct retrospectives of each process against Info-Tech’s best practice methodology for project intake, approval, and prioritization process.

      2.2 Pilot and customize a toolbox of deliverables that effectively captures the right amount of data developed for informing the appropriate decision makers for approval.

      Outputs

      Documentation of new project intake, approval, and prioritization process

      Tools and templates to aid the process

      3 Pilot, Plan, and Communicate the New Process

      The Purpose

      Reduce the risks of prematurely implementing an untested process.

      Methodically manage the risks associated with organizational change and maximize the likelihood of adoption for the new process.

      Key Benefits Achieved

      Engagement paves the way for smoother adoption. An “engagement” approach (rather than simply “communication”) turns stakeholders into advocates who can help boost your message, sustain the change, and realize benefits without constant intervention or process command-and-control.

      Activities

      3.1 Create a plan to pilot your intake, approval, and prioritization process to refine it before rollout.

      3.2 Analyze the impact of organizational change through the eyes of PPM stakeholders to gain their buy-in.

      Outputs

      Process pilot plan

      Organizational change communication plan

      Further reading

      Optimize IT Project Intake, Approval, and Prioritization

      Decide which IT projects to approve and when to start them.

      ANALYST PERSPECTIVE

      Capacity-constrained intake is the only sustainable path forward.

      "For years, the goal of project intake was to select the best projects. It makes sense and most people take it on faith without argument. But if you end up with too many projects, it’s a bad strategy. Don’t be afraid to say NO or NOT YET if you don’t have the capacity to deliver. People might give you a hard time in the near term, but you’re not helping by saying YES to things you can’t deliver."

      Barry Cousins,

      Senior Director, PMO Practice

      Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • PMO Directors who have trouble with project throughput
      • CIOs who want to improve IT’s responsive-ness to changing needs of the business
      • CIOs who want to maximize the overall business value of IT’s project portfolio

      This Research Will Help You:

      • Align project intake and prioritization with resource capacity and strategic objectives
      • Balance proactive and reactive demand
      • Reduce portfolio waste on low-value projects
      • Manage project delivery expectations and satisfaction of business stakeholders
      • Get optimized project intake processes off the ground with low-cost, high-impact tools and templates

      This Research Will Also Assist:

      • C-suite executives and steering committee members who want to ensure IT’s successful delivery of projects with high business impact
      • Project sponsors and product owners who seek visibility and transparency toward proposed projects

      This Research Will Help Them:

      • Ensure that high-impact projects are approved and delivered in a timely manner
      • Gain clarity and visibility in IT’s project approval process
      • Improve your understanding of IT’s capacity to set more realistic expectations on what gets done

      Executive summary

      Situation

      • As a portfolio manager, you do not have the authority to decline or defer new projects – but you also lack the capacity to realistically say yes to more project work.
      • Stakeholders have unrealistic expectations of what IT can deliver. Too many projects are approved, and it may be unclear why their project is delayed or in a state of suspended animation.

      Complication

      • The cycle of competition is making it increasingly difficult to follow a longer-term strategy during project intake, making it unproductive to approve projects for any horizon longer than one to two years.
      • As project portfolios become more aligned to “transformative” projects, resourcing for smaller, department-level projects becomes increasingly opaque.

      Resolution

      • Establish an effective scorecard to create transparency into IT’s capacity and processes. This will help set realistic expectations for stakeholders, eliminate “squeaky wheel” prioritization, and give primacy to the highest value requests.
      • Build a centralized process that funnels requests into a single intake channel to eliminate confusion and doubt for stakeholders and staff while also reducing off-the-grid initiatives.
      • Clearly define a series of project approval steps, and communicate requirements for passing them.
      • Developing practices that incorporate the constraint of resource capacity to cap the amount of project approvals to that which is realistic will help improve the throughput of projects through the portfolio.

      Info-Tech Insight

      1. Approve only the right projects… Counterbalance stakeholder needs with strategic objectives of the business and that of IT, in order to maintain the value of your project portfolio at a high level.
      2. …that you have capacity to deliver. Resource capacity-informed project approval process enables you to avoid biting off more than you can chew and, over time, build a track record of fulfilling promises to deliver on projects.

      Most organizations are good at approving projects, but bad at starting them – and even worse at finishing them

      Establishing project intake discipline should be a top priority from a long-term strategy and near-term tactical perspective.

      Most organizations approve more projects than they can finish. In fact, many approve more than they can even start, leading to an ever-growing backlog where project ideas – often good ones – are never heard from again.

      The appetite to approve more runs directly counter to the shortage of resources that plagues most IT departments. This tension of wanting more from less suggests that IT departments need to be more disciplined in choosing what to take on.

      Info-Tech’s data shows that most IT organizations struggle with their project backlog (Source: N=397 organizations, Info-Tech Research Group PPM Current State Scorecard, 2017).

      “There is a minimal list of pending projects”

      A bar graph is depicted. It has 5 bars to show that when it comes to minimal lists of pending projects, 34% strongly disagree, 35% disagree, and 21% are ambivalent. Only 7% agree and 3% strongly agree.

      “Last year we delivered the number of projects we anticipated at the start of the year”

      A bar graph is depicted. It has 5 bars to show that when it comes to the number of projects anticipated at the start of the year, they were delivered. Surveyors strongly disagreed at 24%, disagreed at 31%, and were ambivalent at 30%. Only 13% agreed and 2% strongly agreed.

      The concept of fiduciary duty demonstrates the need for better discipline in choosing what projects to take on

      Unless someone is accountable for making the right investment of resource capacity for the right projects, project intake discipline cannot be established effectively.

      What is fiduciary duty?

      Officers and directors owe their corporation the duty of acting in the corporation’s best interests over their own. They may delegate the responsibility of implementing the actions, but accountability can't be delegated; that is, they have the authority to make choices and are ultimately answerable for them.

      No question is more important to the organization’s bottom line. Projects directly impact the bottom line because they require investment of resource time and money for the purposes of realizing benefits. The scarcity of resources requires that choices be made by those who have the right authority.

      Who approves your projects?

      Historically, the answer would have been the executive layer of the organization. However, in the 1990s management largely abdicated its obligation to control resources and expenditures via “employee empowerment.”

      Controls on approvals became less rigid, and accountability for choosing what to do (and not do) shifted onto the shoulders of the individual worker. This creates a current paradigm where no one is accountable for the malinvestment…

      …of resources that comes from approving too many projects. Instead, it’s up to individual workers to sink or swim as they attempt to reconcile, day after day, seemingly infinite organizational demand with their finite supply of working hours.

      Ad hoc project selection schemes do not work

      Without active management, reconciling the imbalance between demand with available work hours is a struggle that results largely in one of these two scenarios:

      “Squeaky wheel”: Projects with the most vocal stakeholders behind them are worked on first.

      • IT is seen to favor certain lines of business, leading to disenfranchisement of other stakeholders.
      • Everything becomes the highest priority, which reinforces IT’s image as a firefighter, rather than a business value contributor
      • High-value projects without vocal support never get resourced; opportunities are missed.

      “First in, first out”: Projects are approved and executed in the order they are requested.

      • Urgent or important projects for the business languish in the project backlog; opportunities are missed.
      • Low-value projects dominate the project portfolio.
      • Stakeholders leave IT out of the loop and resort to “underground economy” for getting their needs addressed.

      80% of organizations feel that their portfolios are dominated by low-value initiatives that do not deliver value to the business (Source: Cooper).

      Approve the right projects that you have capacity to deliver by actively managing the intake of projects

      Project intake, approval, and prioritization (collectively “project intake”) reconciles the appetite for new projects with available resource capacity and strategic goals.

      Project intake is a key process of project portfolio management (PPM). The Project Management Institute (PMI) describes PPM as:

      "Interrelated organizational processes by which an organization evaluates, selects, prioritizes, and allocates its limited internal resources to best accomplish organizational strategies consistent with its vision, mission, and values."

      (PMI, Standard for Portfolio Management, 3rd ed.)

      Triple Constraint Model of the Project Portfolio

      Project Intake:

      • Stakeholder Need
      • Strategic Objectives
      • Resource Capacity

      All three components are required for the Project Portfolio

      Organizations practicing PPM recognize available resource capacity as a constraint and aim to select projects – and commit the said capacity – to projects that:

      1. Best satisfy the stakeholder needs that constantly change with the market
      2. Best align to the strategic objectives and contribute the most to business
      3. Have sufficient resource capacity available to best ensure consistent project throughput

      92% vs. 74%: 92% of high-performing organizations in PPM report that projects are well aligned to strategic initiatives vs. 74% of low performers (PMI, 2015).

      82% vs. 55%: 82% of high-performing organizations in PPM report that resources are effectively reallocated across projects vs. 55% of low performers (PMI, 2015)

      Info-Tech’s data demonstrates that optimizing project intake can also improve business leaders’ satisfaction of IT

      CEOs today perceive IT to be poorly aligned to business’ strategic goals:

      43% of CEOs believe that business goals are going unsupported by IT (Source: Info-Tech’s CEO-CIO Alignment Survey (N=124)).

      60% of CEOs believe that improvement is required around IT’s understanding of business goals (Source: Info-Tech’s CEO-CIO Alignment Survey (N=124)).

      Business leaders today are generally dissatisfied with IT:

      30% of business stakeholders are supporters of their IT departments (Source: Info-Tech’s CIO Business Vision Survey (N=21,367)).

      The key to improving business satisfaction with IT is to deliver on projects that help the business achieve its strategic goals:

      A chart is depicted to show a list of reported important projects, and then reordering the projects based on actual importance.
      Source: Info-Tech’s CIO Business Vision Survey (N=21,367)

      Optimized project intake not only improves the project portfolio’s alignment to business goals, but provides the most effective way to improve relationships with IT’s key stakeholders.

      Benchmark your own current state with overall & industry-specific data using Info-Tech’s Diagnostic Program.

      However, establishing organizational discipline for project intake, approval, and prioritization is difficult

      Capacity awareness

      Many IT departments struggle to realistically estimate available project capacity in a credible way. Stakeholders question the validity of your endeavor to install capacity-constrained intake process, and mistake it for unwillingness to cooperate instead.

      Many moving parts

      Project intake, approval, and prioritization involve the coordination of various departments. Therefore, they require a great deal of buy-in and compliance from multiple stakeholders and senior executives.

      Lack of authority

      Many PMOs and IT departments simply lack the ability to decline or defer new projects.

      Unclear definition of value

      Defining the project value is difficult because there are so many different and conflicting ways that are all valid in their own right. However, without it, it's impossible to fairly compare among projects to select what's "best."

      Establishing intake discipline requires a great degree of cooperation and conformity among stakeholders that can be cultivated through strong processes.

      Info-Tech’s intake, approval, and prioritization methodology systemically fits the project portfolio to its triple constraint

      Info-Tech’s Methodology

      Info-Tech’s Methodology
      Project Intake Project Approval Project Prioritization
      Project requests are submitted, received, triaged, and scoped in preparation for approval and prioritization. Business cases are developed, evaluated, and selected (or declined) for investment, based on estimated value and feasibility. Work is scheduled to begin, based on relative value, urgency, and availability of resources.
      Stakeholder Needs Strategic Objectives Resource Capacity
      Project Portfolio Triple Constraint

      Info-Tech’s methodology for optimizing project intake delivers extraordinary value, fast

      In the first step of the blueprint, you will prototype a set of scorecard criteria for determining project value.

      Our methodology is designed to tackle your hardest challenge first to deliver the highest-value part of the deliverable. Since the overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects, one must define how “the best projects” are determined.

      In nearly all instances…a key challenge for the PPM team is reaching agreement over how projects should rank.

      – Merkhofer

      A Project Value Scorecard will help you:

      • Evolve the discussions on project and portfolio value beyond a theoretical concept
      • Enable apples-to-apples comparisons amongst many different kinds of projects

      The Project Value Scorecard Development Tool is designed to help you develop the project valuation scheme iteratively. Download the pre-filled tool with content that represents a common case, and then, customize it with your data.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool

      This blueprint provides a clear path to maximizing your chance of success in optimizing project intake

      Info-Tech’s practical, tactical research is accompanied by a suite of tools and templates to accelerate your process optimization efforts.

      Organizational change and stakeholder management are critical elements of optimizing project intake, approval, and prioritization processes because they require a great degree of cooperation and conformity among stakeholders, and the list of key stakeholders are long and far-reaching.

      This blueprint will provide a clear path to not only optimize the processes themselves, but also for the optimization effort itself. This research is organized into three phases, each requiring a few weeks of work at your team’s own pace – or all in one week, through a workshop facilitated by Info-Tech analysts.

      Set Realistic Goals for Optimizing Project Intake, Approval, and Prioritization

      Tools and Templates:

      • Project Value Scorecard Development Tool (.xlsx)
      • PPM Assessment Report (Info-Tech Diagnostics)
      • Standard Operating Procedure Template (.docx)

      Build Optimized Project Intake, Approval, and Prioritization Processes

      Tools and Templates:

      • Project Request Forms (.docx)
      • Project Classification Matrix (.xlsx)
      • Benefits Commitment Form (.xlsx)
      • Proposed Project Technology Assessment Tool (.xlsx)
      • Business Case Templates (.docx)
      • Intake and Prioritization Tool (.xlsx)

      Integrate the Newly Optimized Processes into Practice

      Tools and Templates:

      • Process Pilot Plan Template (.docx)
      • Impact Assessment and Communication Planning Tool (.xlsx)

      Info-Tech’s approach to PPM is informed by industry best practices and rooted in practical insider research

      Info-Tech uses PMI and ISACA frameworks for areas of this research.

      The logo for PMI is in the picture.

      PMI’s Standard for Portfolio Management, 3rd ed. is the leading industry framework, proving project portfolio management best practices and process guidelines.

      The logo for COBIT 5 is in the picture.

      COBIT 5 is the leading framework for the governance and management of enterprise IT.

      In addition to industry-leading frameworks, our best-practice approach is enhanced by the insights and guidance from our analysts, industry experts, and our clients.

      Info-Tech's logo is shown.

      33,000+

      Our peer network of over 33,000 happy clients proves the effectiveness of our research.

      1,000+

      Our team conducts 1,000+ hours of primary and secondary research to ensure that our approach is enhanced by best practices.

      Deliver measurable project intake success for your organization with this blueprint

      Measure the value of your effort to track your success quantitatively and demonstrate the proposed benefits, as you aim to do so with other projects through improved PPM.

      Optimized project intake, approval, and prioritization processes lead to a high PPM maturity, which will improve the successful delivery and throughput of your projects, resource utilization, business alignment, and stakeholder satisfaction ((Source: BCG/PMI).

      A double bar graph is depicted to show high PPM maturity yields measurable benefits. It covers 4 categories: Management for individual projects, financial performance, strategy implementation, and organizational agility.

      Measure your success through the following metrics:

      • Reduced turnaround time between project requests and initial scoping
      • Number of project proposals with articulated benefits
      • Reduction in “off-the-grid” projects
      • Team satisfaction and workplace engagement
      • PPM stakeholder satisfaction score from business stakeholders: see Info-Tech’s PPM Customer Satisfaction Diagnostics

      $44,700: In the past 12 months, Info-Tech clients have reported an average measured value of $44,700 from undertaking a guided implementation of this research.

      Add your own organization-specific goals, success criteria, and metrics by following the steps in the blueprint.

      Case Study: Financial Services PMO prepares annual planning process with Project Value Scorecard Development Tool

      CASE STUDY

      Industry: Financial Services

      Source: Info-Tech Client

      Challenge

      PMO plays a diverse set of roles, including project management for enterprise projects (i.e. PMI’s “Directive” PMO), standards management for department-level projects (i.e. PMI’s “Supportive” PMO), process governance of strategic projects (i.e. PMI’s “Controlling” PMO), and facilitation / planning / reporting for the corporate business strategy efforts (i.e. Enterprise PMO).

      To facilitate the annual planning process, the PMO needed to develop a more data-driven and objective project intake process that implicitly aligned with the corporate strategy.

      Solution

      Info-Tech’s Project Value Scorecard tool was incorporated into the strategic planning process.

      Results

      The scorecard provided a simple way to list the competing strategic initiatives, objectively score them, and re-sort the results on demand as the leadership chooses to switch between ranking by overall score, project value, ability to execute, strategic alignment, operational alignment, and feasibility.

      The Project Value Scorecard provided early value with multiple options for prioritized rankings.

      A screenshot of the Project Value Scorecard is shown in the image.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Optimize Project Intake, Approval, and Prioritization – project overview

      1. Set Realistic Goals for Optimizing Process 2. Build New Optimized Processes 3. Integrate the New Processes into Practice
      Best-Practice Toolkit

      1.1 Define the criteria with which to determine project value.


      2.1 Streamline intake to manage stakeholder expectations.

      2.2 Set up steps of project approval to maximize strategic alignment while right-sizing the required effort.

      2.3 Prioritize projects to maximize the value of the project portfolio within the constraint of resource capacity.

      3.1 Pilot your intake, approval, and prioritization process to refine it before rollout.

      3.2 Analyze the impact of organizational change through the eyes of PPM stakeholders to gain their buy-in.

      Guided Implementations
      • Introduce Project Value Scorecard Development Tool and pilot Info-Tech’s example scorecard on your own backlog.
      • Map current project intake, approval, and prioritization process and key stakeholders.
      • Set realistic goals for process optimization.
      • Improve the management of stakeholder expectations with an optimized intake process.
      • Improve the alignment of the project portfolio to strategic objectives with an optimized approval process.
      • Enable resource capacity-constrained greenlighting of projects with an optimized prioritization process.
      • Create a process pilot strategy with supportive stakeholders.
      • Conduct a change impact analysis for your PPM stakeholders to create an effective communication strategy.
      • Roll out the new process and measure success.
      Onsite Workshop

      Module 1:

      Refocus on Project Value to Set Realistic Goals for Optimizing Project Intake, Approval, and Prioritization Process

      Module 2:

      Examine, Optimize, and Document the New Project Intake, Approval, and Prioritization Process

      Module 3:

      Pilot, Plan, and Communicate the New Process and Its Required Organizational Changes

      Phase 1 Outcome:
      • Draft project valuation criteria
      • Examination of current process
      • Definition of process success criteria
      Phase 2 Outcome:
      • Documentation of new project intake, approval, and prioritization process
      • Tools and templates to aid the process
      Phase 3 Outcome:
      • Process pilot plan
      • Organizational change communication plan

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities

      Benefits of optimizing project intake and project value definition

      1.1 Complete and review PPM Current State Scorecard Assessment

      1.2 Define project value for the organization

      1.3 Engage key PPM stakeholders to iterate on the scorecard prototype

      Set realistic goals for process optimization

      2.1 Map current intake, approval, and prioritization workflow

      2.2 Enumerate and prioritize process stakeholders

      2.3 Determine the current and target capability levels

      2.4 Define the process success criteria and KPIs

      Optimize project intake and approval processes

      3.1 Conduct focused retrospectives for project intake and approval

      3.2 Define project levels

      3.3 Optimize project intake processes

      3.4 Optimize project approval processes

      3.5 Compose SOP for intake and approval

      3.6 Document the new intake and approval workflow

      Optimize project prioritization process plan for a process pilot

      4.1 Conduct focused retrospective for project prioritization

      4.2 Estimate available resource capacity

      4.3 Pilot Project Intake and Prioritization Tool with your project backlog

      4.4 Compose SOP for prioritization

      4.5 Document the new prioritization workflow

      4.6 Discuss process pilot

      Analyze stakeholder impact and create communication strategy

      5.1 Analyze stakeholder impact and responses to impending organization change

      5.2 Create message canvas for at-risk change impacts and stakeholders

      5.3 Set course of action for communicating change

      Deliverables
      1. PPM Current State Scorecard
      2. Project Value Scorecard prototype
      1. Current intake, approval, and prioritization workflow
      2. Stakeholder register
      3. Intake process success criteria
      1. Project request form
      2. Project level classification matrix
      3. Proposed project deliverables toolkit
      4. Customized intake and approval SOP
      5. Flowchart for the new intake and approval workflow
      1. Estimated resource capacity for projects
      2. Customized Project Intake and Prioritization Tool
      3. Customized prioritization SOP
      4. Flowchart for the new prioritization workflow
      5. Process pilot plan
      1. Completed Intake and Prioritization Impact Analysis Tool
      2. Communication strategy and plan

      Phase 1

      Set Realistic Goals for Optimizing Project Intake, Approval, and Prioritization Process

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Set Realistic Goals for Project Intake, Approval, and Prioritization Process Proposed Time to Completion: 1-2 weeks

      Step 1.1: Define the project valuation criteria

      Start with an analyst kick-off call:

      • Discuss how a project value is currently determined
      • Introduce Info-Tech’s scorecard-driven project valuation approach

      Then complete these activities…

      • Create a first-draft version of a project value-driven prioritized list of projects
      • Review and iterate on the scorecard criteria

      With these tools & templates:

      Project Value Scorecard Development Tool

      Step 1.2: Envision your process target state

      Start with an analyst kick-off call:

      • Introduce Info-Tech’s project intake process maturity model
      • Discuss the use of Info-Tech’s Diagnostic Program for an initial assessment of your current PPM processes

      Then complete these activities…

      • Map your current process workflow
      • Enumerate and prioritize your key stakeholders
      • Define process success criteria

      With these tools & templates:

      Project Intake Workflow Template

      Project Intake, Approval, and Prioritization SOP Template

      Phase 1 Results & Insights:
      • The overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects. To achieve this goal, one must have a clear way to determine what are “the best” projects.

      Get to value early with Step 1.1 of this blueprint

      Define how to determine a project’s value and set the stage for maximizing the value of your project portfolio using Info-Tech’s Project Value Scorecard Development Tool.

      Where traditional models of consulting can take considerable amounts of time before delivering value to clients, Info-Tech’s methodology for optimizing project intake, approval, and prioritization process gets you to value fast.

      The overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects. To achieve this goal, one must have a clear way to determine what are “the best” projects.

      In the first step of this blueprint, you will pilot a multiple-criteria scorecard for determining project value that will help answer that question. Info-Tech’s Project Value Scorecard Development Tool is pre-populated with a ready-to-use, real-life example that you can leverage as a starting point for tailoring it to your organization – or adopt as is.

      Introduce objectivity and clarity to your discussion of maximizing the value of your project portfolio with Info-Tech’s practical IT research that drives measurable results.

      Download Info-Tech’s Project Value Scorecard Development Tool.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool

      Step 1.1: Define the criteria with which to determine project value

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Learn how to use the Project Value Scorecard Development Tool
      • Create a first-draft version of a project value-driven prioritized list of projects

      This step involves the following participants:

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • CIO (optional)

      Outcomes of this step

      • Understand the importance of devising a consensus criteria for project valuation.
      • Try a project value scorecard-driven prioritization process with your currently proposed.
      • Set the stage for optimizing project intake, approval, and prioritization processes.

      Intake, Approval, and Prioritization is a core process in Info-Tech’s project portfolio management (PPM) framework

      PPM is an infrastructure around projects that aims to ensure that the best projects are worked on at the right time with the right people.

      PPM’s goal is to maximize the throughput of projects that provide strategic and operational value to the organization. To do this, a PPM strategy must help to:

      Info-Tech's Project Portfolio Management Process Model
      3. Status & Progress Reporting
      1. Intake, Approval & Prioritization 2. Resource Management 3. Project Management 4. Project Closure 5. Benefits Tracking
      Intake Execution Closure
      1. Select the best projects
      2. Pick the right time and people to execute the projects
      3. Make sure the projects are okay
      4. Make sure the projects get done
      5. Make sure they were worth doing

      If you don’t yet have a PPM strategy in place, or would like to revisit your existing PPM strategy before optimizing your project intake, approval, and prioritization practices, see Info-Tech’s blueprint, Develop a Project Portfolio Management Strategy.

      A screenshot of Info-Tech's blueprint Develop a Project Portfolio Management Strategy is shown.

      “Too many projects, not enough resources” is the reality of most IT environments

      A profound imbalance between demand (i.e. approved project work and service delivery commitments) and supply (i.e. people’s time) is the top challenge IT departments face today.

      In today’s organizations, the desires of business units for new products and enhancements, and the appetites of senior leadership to approve more and more projects for those products and services, far outstrip IT’s ability to realistically deliver on everything.

      The vast majority of IT departments lack the resourcing to meet project demand – especially given the fact that day-to-day operational demands frequently trump project work.

      As a result, project throughput suffers – and with it, IT’s reputation within the organization.

      An image is depicted that has several projects laid out near a scale filling one side of it and off of it. On the other part of the scale which is higher, has an image of people in it to help show the relationship between resource supply and project demand.

      Info-Tech Insight

      Where does the time go? The portfolio manager (or equivalent) should function as the accounting department for time, showing what’s available in IT’s human resources budget for projects and providing ongoing visibility into how that budget of time is being spent.

      Don’t weigh your portfolio down by starting more than you can finish

      Focus on what will deliver value to the organization and what you can realistically deliver.

      Most of the problems that arise during the lifecycle of a project can be traced back to issues that could have been mitigated during the initiation phase.

      More than simply a means of early problem detection at the project level, optimizing your initiation processes is also the best way to ensure the success of your portfolio. With optimized intake processes you can better guarantee:

      • The projects you are working on are of high value
      • Your project list aligns with available resource capacity
      • Stakeholder needs are addressed, but stakeholders do not determine the direction of the portfolio

      80% of organizations feel their portfolios are dominated by low-value initiatives that do not deliver value to the business (Source: Cooper).

      "(S)uccessful organizations select projects on the basis of desirability and their capability to deliver them, not just desirability" (Source: John Ward, Delivering Value from Information Systems and Technology Investments).

      Establishing project value is the first – and difficult – step for optimizing project intake, approval, and prioritization

      What is the best way to “deliver value to the organization”?

      Every organization needs to explicitly define how to determine project value that will fairly represent all projects and provide a basis of comparison among them during approval and prioritization. Without it, any discussions on reducing “low-value initiatives” from the previous slide cannot yield any actionable plan.

      However, defining the project value is difficult, because there are so many different and conflicting ways that are all valid in their own right and worth considering. For example:

      • Strategic growth vs. operational stability
      • Important work vs. urgent work
      • Return on investment vs. cost containment
      • Needs of a specific line of business vs. business-wide needs
      • Financial vs. intangible benefits

      This challenge is further complicated by the difficulty of identifying the right criteria for determining project value:

      Managers fail to identify around 50% of the important criteria when making decisions (Source: Transparent Choice).

      Info-Tech Insight

      Sometimes it can be challenging to show the value of IT-centric, operational-type projects that maintain critical infrastructure since they don’t yield net-new benefits. Remember that benefits are only half the equation; you must also consider the costs of not undertaking the said project.

      Find the right mix of criteria for project valuation with Info-Tech’s Project Value Scorecard Development Tool

      Scorecard-driven approach is an easy-to-understand, time-tested solution to a multiple-criteria decision-making problem, such as project valuation.

      This approach is effective for capturing benefits and costs that are not directly quantifiable in financial terms. Projects are evaluated on multiple specific questions, or criteria, that each yield a score on a point scale. The overall score is calculated as a weighted sum of the scores.

      Info-Tech’s Project Value Scorecard is pre-populated with a best-practice example of eight criteria, two for each category (see box at bottom right). This example helps your effort to develop your own project scorecard by providing a solid starting point:

      60%: On their own, decision makers could only identify around 6 of their 10 most important criteria for making decisions (Source: Transparent Choice).

      Finally, in addition, the overall scores of approved projects can be used as a metric on which success of the process can be measured over time.

      Download Info-Tech’s Project Value Scorecard Development Tool.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool

      Categories of project valuation criteria

      • Strategic alignment: projects must be aligned with the strategic goals of the business and IT.
      • Operational alignment: projects must be aligned with the operational goals of the business and IT.
      • Feasibility: practical considerations for projects must be taken into account in selecting projects.
      • Financial: projects must realize monetary benefits, in increased revenue or decreased costs, while posing as little risk of cost overrun as possible.

      Review the example criteria and score description in the Project Value Scorecard Development Tool

      1.1.1 Project Value Scorecard Development Tool, Tab 2: Evaluation Criteria

      This tab lists eight criteria that cover strategic alignment, operational alignment, feasibility, and financial benefits/risks. Each criteria is accompanied by a qualitative score description to standardize the analysis across all projects and analysts. While this tool supports up to 15 different criteria, it’s better to minimize the number of criteria and introduce additional ones as the organization grows in PPM maturity.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool, Tab 2: Evaluation Criteria

      Type: It is useful to break down projects with similar overall scores by their proposed values versus ease of execution.

      Scale: Five-point scale is not required for this tool. Use more or less granularity of description as appropriate for each criteria.

      Blank Criteria: Rows with blank criteria are greyed out. Enter a new criteria to turn on the row.

      Score projects and search for the right mix of criteria weighting using the scorecard tab

      1.1.1 Project Value Scorecard Development Tool, Tab 3: Project Scorecard

      In this tab, you can see how projects are prioritized when they are scored according to the criteria from the previous tab. You can enter the scores of up to 30 projects in the scorecard table (see screenshot to the right).

      A screenshot of Info-Tech's Project Value Scorecard Development Tool, Tab 3: Project Scorecard is shown.

      Value (V) or Execution (E) & Relative Weight: Change the relative weights of each criteria and review any changes to the prioritized list of projects change, whose rankings are updated automatically. This helps you iterate on the weights to find the right mix.

      Feasibility: Custom criteria category labels will be automatically updated.

      A screenshot of Info-Tech's Project Value Scorecard Development Tool, Tab 3: Project Scorecard is shown.

      Overall: Choose the groupings of criteria by which you want to see the prioritized list. Available groupings are:

      • Overall score
      • By value or by execution
      • By category

      Ranks and weighted scores for each project is shown.

      For example, click on the drop-down and choose “Execution.”

      A screenshot of Info-Tech's Project Value Scorecard Development Tool, Tab 3: Project Scorecard is shown.

      Project ranks are based only on execution criteria.

      Create a first-draft version of a project value-driven prioritized list of projects

      1.1.1 Estimated Time: 60 minutes

      Follow the steps below to test Info-Tech’s example Project Value Scorecard and examine the prioritized list of projects.

      1. Using your list of proposed, ongoing, and completed projects, identify a representative sample of projects in your project portfolio, varying in size, scope, and perceived value – about 10-20 of them.
      2. Arrange these projects in the order of priority using any processes or prioritization paradigm currently in place in your organization.
      • In the absence of formal process, use your intuition, as well as knowledge of organizational priorities, and your stakeholders.
    • Use the example criteria and score description in Tab 2 of Info-Tech’s Project Value Scorecard Development Tool to score the same list of projects:
      • Avoid spending too much time at this step. Prioritization criteria will be refined in the subsequent parts of the blueprint.
      • If multiple scorers are involved, allow some overlap to benchmark for consistency.
    • Enter the scores in Tab 3 of the tool to obtain the first-draft version of a project value-driven prioritized project list. Compare it with your list from Step 2.
    • INPUT

      • Knowledge of proposed, ongoing, and completed projects in your project portfolio

      OUTPUT

      • Prioritized project lists

      Materials

      • Project Value Scorecard Development Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • CIO (optional)

      Iterate on the scorecard to set the stage for optimizing project intake, approval, and prioritization

      1.1.2 Estimated Time: 60 minutes

      Conduct a retrospective of the previous activity by asking these questions:

      • How smooth was the overall scoring experience (Step 3 of Activity 1.1.1)?
      • Did you experience challenges in interpreting and applying the example project valuation criteria? Why? (e.g. lack of information, absence of formalized business strategic goals, too much room for interpretation in scoring description)
      • Did the prioritized project list agree with your intuition?

      Iterate on the project valuation criteria:

      • Manipulate the relatives weights of valuation criteria to fine-tune them.
      • Revise the scoring descriptions to provide clarity or customize them to better fit your organization’s needs, then update the project scores accordingly.
      • For projects that did not score well, will this cause concern from any stakeholders? Are the concerns legitimate? If so, this may indicate the need for inclusion of new criteria.
      • For projects that score too well, this may indicate a bias toward a specific type of project or group of stakeholders. Try adjusting the relative weights of existing criteria.

      INPUT

      • Activity 1.1.1

      OUTPUT

      • Retrospective on project valuation
      • Review of project valuation criteria

      Materials

      • Project Value Scorecard Development Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • CIO (optional)

      Next steps: engage key PPM stakeholders to reach a consensus when establishing how to determine project value

      Engage these key players to create the evaluation criteria that all stakeholders will support:

      • Business units: Projects are undertaken to provide value to the business. Senior management from business units must help define how project will be valued.
      • IT: IT must ensure that technical/practical considerations are taken into account when determining project value.
      • Finance: The CFO or designated representative will ensure that estimated project costs and benefits can be used to manage the budget.
      • PMO: PMO is the administrator of the project portfolio. PMO must provide coordination and support to ensure the process operates smoothly and its goals are realized.
      • Business analysts: BAs carry out the evaluation of project value. Therefore, their understanding of the evaluation criteria and the process as a whole are critical to the success of the process.
      • Project sponsors: Project sponsors are accountable for the realization of benefits for which projects are undertaken.

      Optimize the process with the new project value definition to focus your discussion with stakeholders

      This blueprint will help you not only optimize the process, but also help you work with your stakeholders to realize the benefits of the optimized process.

      In this step, you’ve begun improving the definition of project value. Getting it right will require several more iterations and will require a series of discussions with your key stakeholders.

      The optimized intake process built around the new definition of project value will help evolve a conceptual discussion about project value into a more practical one. The new process will paint a picture of what the future state will look like for your stakeholders’ requested projects getting approved and prioritized for execution, so that they can provide feedback that’s concrete and actionable. To help you with that process, you will be taken through a series of activities to analyze the impact of change on your stakeholders and create a communication plan in the last phase of the blueprint.

      For now, in the next step of this blueprint, you will undergo a series of activities to assess your current state to identify the specific areas for process optimization.

      "To find the right intersection of someone’s personal interest with the company’s interest on projects isn’t always easy. I always try to look for the basic premise that you can get everybody to agree on it and build from there… But it’s sometimes hard to make sure that things stick. You may have to go back three or four times to the core agreement."

      -Eric Newcomer

      Step 1.2: Envision your target state for your optimized project intake, approval, and prioritization process

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Map your current project intake, approval, and prioritization workflow, and document it in a flowchart
      • Enumerate and prioritize your key process stakeholders
      • Determine your process capability level within Info-Tech’s Framework
      • Establish your current and target states for project intake, approval, and prioritization process

      This step involves the following participants:

      • CIO
      • PMO Director/Portfolio Manager
      • Project Managers
      • Business Analysts
      • Other PPM stakeholders

      Outcomes of this step

      • Current project intake, approval, and prioritization process is mapped out and documented in a flowchart
      • Key process stakeholders are enumerated and prioritized to inform future discussion on optimizing processes
      • Current and target organizational process capability levels are determined
      • Success criteria and key performance indicators for process optimization are defined

      Use Info-Tech’s Diagnostic Program for an initial assessment of your current PPM processes

      This step is highly recommended but not required. Call 1-888-670-8889 to inquire about or request the PPM Diagnostics.

      Info-Tech's Project Portfolio Management Assessmentprovides you with a data-driven view of the current state of your portfolio, including your intake processes. Our PPM Assessment measures and communicates success in terms of Info-Tech’s best practices for PPM.

      A screenshot of Info-Tech's Project Portfolio Management Assessment blueprint is shown.

      Use the diagnostic program to:

      • Assess resource utilization across the portfolio.
      • Determine project portfolio reporting completeness.
      • Solicit feedback from your customers on the clarity of your portfolio’s business goals.
      • Rate the overall quality of your project management practices and benchmark your rating over time.
      A screenshot of Info-Tech's Project Portfolio Management Assessment blueprint is shown.

      Scope your process optimization efforts with Info-Tech’s high-level intake, approval, and prioritization workflow

      Info-Tech recommends the following workflow at a high level for a capacity-constrained intake process that aligns to strategic goals and stakeholder need.

      • Intake (Step 2.1)*
        • Receive project requests
        • Triage project requests and assign a liaison
        • High-level scoping & set stakeholder expectations
      • Approval (Step 2.2)*
        • Concept approval by project sponsor
        • High-level technical solution approval by IT
        • Business case approval by business
        • Resource allocation & greenlight projects
      • Prioritization (Step 2.3)*
        • Update project priority scores & available project capacity
        • Identify high-scoring and “on-the-bubble” projects
        • Recommend projects to greenlight or deliberate

      * Steps denote the place in the blueprint where the steps are discussed in more detail.

      Use this workflow as a baseline to examine your current state of the process in the next slide.

      Map your current project intake, approval, and prioritization workflow

      1.2.1 Estimated Time: 60-90 minutes

      Conduct a table-top planning exercise to map out the processes currently in place for project intake, approval, and prioritization.

      1. Use white 4”x6” recipe cards / large sticky notes to write out unique steps of a process. Use the high-level process workflow from the previous slides as a guide.
      2. Arrange the steps into chronological order. Benchmark the arrangement through a group discussion.
      3. Use green cards to identify artifacts or deliverables that result from a step.
      4. Use yellow cards to identify who does the work (i.e. responsible parties), and who makes the decisions (i.e. accountable party). Keep in mind that while multiple parties may be responsible, accountability cannot be shared and only a single party can be accountable for a process.
      5. Use red cards to identify issues, problems, or risks. These are opportunities for optimization.

      INPUT

      • Documentation describing the current process (e.g. standard operating procedures)
      • Info-Tech’s high-level intake workflow

      OUTPUT

      • Current process, mapped out

      Materials

      • 4x6” recipe cards
      • Whiteboard

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • Other PPM stakeholders

      Document the current project intake, approval, and prioritization workflow in a flowchart

      1.2.2 Estimated Time: 60 minutes

      Document the results of the previous table-top exercise (Activity 1.1.1) into a flow chart. Flowcharts provide a bird’s-eye view of process steps that highlight the decision points and deliverables. In addition, swim lanes can be used to indicate process stages, task ownership, or responsibilities (example below).

      An example is shown for activity 1.2.2

      Review and customize section 1.2, “Overall Process Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      "Flowcharts are more effective when you have to explain status and next steps to upper management."

      – Assistant Director-IT Operations, Healthcare Industry

      Browser-based flowchart tool examples

      INPUT

      • Mapped-out project intake process (Activity 1.2.1)

      OUTPUT

      • Flowchart representation of current project intake workflow

      Materials

      • Microsoft Visio, flowchart software, or Microsoft PowerPoint

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Example of a project intake, approval, and prioritization flow chart – without swim lanes

      An example project intake, approval, and prioritization flow chart without swim lanes is shown.

      Example of a project intake, approval, and prioritization flow chart – with swim lanes

      An example project intake, approval, and prioritization flow chart with swim lanes is shown.

      Download Info-Tech’s Project Intake Workflow Template (Visio and PDF)

      Enumerate your key stakeholders for optimizing intake, approval, and prioritization process

      1.2.3 30-45 minutes

      In the previous activity, accountable and responsible stakeholders for each of the steps in the current intake, approval, and prioritization process were identified.

      1. Based on your knowledge and insight of your organization, ensure that all key stakeholders with accountable and responsible stakeholders are accounted for in the mapped-out process. Note any omissions: it may indicate a missing step, or that the stakeholder ought to be, but are not currently, involved.
      2. For each step, identify any stakeholders that are currently consulted or informed. Then, examine the whole map and identify any other stakeholders that ought to be consulted or informed.
      3. Compile a list of stakeholders from steps 1-2, and write each of their names in two sticky notes.
      4. Put both sets of sticky notes on a wall. Use the wisdom-of-the-crowd approach to arrange one set in a descending order of influence. Record their ranked influence from 1 (least) to 10 (most).
      5. Rearrange the other set in a descending order of interest in seeing the project intake process optimized. Record their ranked interest from 1 (least) to 10 (most).

      INPUT

      • Mapped-out project intake process (Activity 1.2.1)
      • Insight on organizational culture

      OUTPUT

      • List of stakeholders in project intake
      • Ranked list in their influence and interest

      Materials

      • Sticky notes
      • Walls

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • Other PPM stakeholders

      Prioritize your stakeholders for project intake, approval, and prioritization process

      There are three dimensions for stakeholder prioritization: influence, interest, and support.

      1. Map your stakeholders in a 2D stakeholder power map (top right) according to their relative influence and interest.
      2. Rate their level of support by asking the following question: how likely is it that your stakeholder would welcome an improved process for project intake?

      These parameters will inform how to prioritize your stakeholders according to the stakeholder priority heatmap (bottom right). This priority should inform how to focus your attention during the subsequent optimization efforts.

      A flowchart is shown to show the relationship between influence and interest.

      Level of Support
      Stakeholder Category Supporter Evangelist Neutral Blocker
      Engage Critical High High Critical
      High Medium Low Low Medium
      Low High Medium Medium High
      Passive Low Irrelevant Irrelevant Low

      Info-Tech Insight

      There may be too many stakeholders to be able to achieve complete satisfaction. Focus your attention on the stakeholders that matter the most.

      Most organizations have low to medium capabilities around intake, approval, and prioritization

      1.2.4 Estimated Time: 15 minutes

      Use Info-Tech’s Intake Capability Framework to help define your current and target states for intake, approval, and prioritization.

      Capability Level Capability Level Description
      Capability Level 5: Optimized Our department has effective intake processes with right-sized administrative overhead. Work is continuously prioritized to keep up with emerging challenges and opportunities.
      Capability Level 4: Aligned Our department has very strong intake processes. Project approvals are based on business cases and aligned with future resource capacity.
      Capability Level 3: Engaged Our department has processes in place to track project requests and follow up on them. Priorities are periodically re-evaluated, based largely on the best judgment of one or several executives.
      Capability Level 2: Defined Our department has some processes in place but no capacity to say no to new projects. There is a formal backlog, but little or no method for grooming it.
      Capability Level 1: Unmanaged Our department has no formal intake processes in place. Most work is done reactively, with little ability to prioritize proactive project work.

      Refer to the subsequent slides for more detail on these capability levels.

      Level 1: Unmanaged

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Projects are requested through personal conversations and emails, with minimal documentation and oversight.
      Approval Projects are approved by default and rarely (if ever) declined. There is no definitive list of projects in the pipeline or backlog.
      Prioritization Most work is done reactively, with little ability to prioritize proactive project work.

      Symptoms

      • Poorly defined – or a complete absence of – PPM processes.
      • No formal approval committee.
      • No processes in place to balance proactive and reactive demands.

      Long Term

      PMOs at this level should work to have all requests funneled through a proper request form within six months. Decision rights for approval should be defined, and a scorecard should be in place within the year.

      Quick Win

      To get a handle on your backlog, start tracking all project requests using the “Project Data” tab in Info-Tech’s Project Intake and Prioritization Tool.

      Level 2: Defined

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Requests are formally documented in a request form before they’re assigned, elaborated, and executed as projects.
      Approval Projects are approved by default and rarely (if ever) declined. There is a formal backlog, but little or no method for grooming it.
      Prioritization There is a list of priorities but no process for updating it more than annually or quarterly.

      Symptoms

      • Organization does not have clear concept of project capacity.
      • There is a lack of discipline enforced on stakeholders.
      • Immature PPM processes in general.

      Long Term

      PMOs at this level should strive for greater visibility into the portfolio to help make the case for declining (or at least deferring) requests. Within the year, have a formal PPM strategy up and running.

      Quick Win

      Something PMOs at this level can accomplish quickly without any formal approval is to spend more time with stakeholders during the ideation phase to better define scope and requirements.

      Level 3: Engaged

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Processes and skills are in place to follow up on requests to clarify project scope before going forward with approval and prioritization.
      Approval Projects are occasionally declined based on exceptionally low feasibility or value.
      Prioritization Priorities are periodically re-evaluated based largely on the best judgment of one or several executives.

      Challenges

      • Senior executives’ “best judgement” is frequently fallible or influenced. Pet projects still enter the portfolio and deplete resources.
      • While approval processes “occasionally” filter out some low-value projects, many still get approved.

      Long Term

      PMOs at this level should advocate for a more formal cadence for prioritization and, within the year, establish a formal steering committee that will be responsible for prioritizing and re-prioritizing quarterly or monthly.

      Quick Win

      At the PMO level, employ Info-Tech’s Project Intake and Prioritization Tool to start re-evaluating projects in the backlog. Make this data available to senior executives when prioritization occurs.

      Level 4: Aligned

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Occurs through a centralized process. Processes and skills are in place for follow-up.
      Approval Project approvals are based on business cases and aligned with future resource capacity.
      Prioritization Project prioritization is visibly aligned with business goals.

      Challenges

      • The process of developing business cases can be too cumbersome, distracting resources from actual project work.
      • “Future” resource capacity predictions are unreliable. Reactive support work and other factors frequently change actual resource availability.

      Long Term

      PMOs at this level can strive for more accurate and frequent resource forecasting, establishing a more accurate picture of project vs. non-project work within the year.

      Quick Win

      PMOs at this level can start using Info-Tech’s Business Case Template (Comprehensive or Fast Track) to help simplify the business case process.

      Level 5: Optimizing

      Use these descriptions to place your organization at the appropriate level of intake capability.

      Intake Occurs through a centralized portal. Processes and skills are in place for thorough follow-up.
      Approval Project approvals are based on business cases and aligned with future resource capacity.
      Prioritization Work is continuously prioritized to keep up with emerging challenges and opportunities.

      Challenges

      • Establishing a reliable forecast for resource capacity remains a concern at this level as well.
      • Organizations at this level may experience an increasing clash between Agile practices and traditional Waterfall methodologies.

      A screenshot of Info-Tech's Manage an Agile Portfolio Blueprint

      PMOs at this level should look at Info-Tech’s Manage an Agile Portfolio for comprehensive tools and guidance on maintaining greater visibility at the portfolio level into work in progress and committed work.

      Establish your current and target states for process intake, approval, and prioritization

      1.2.5 Estimated Time: 20 minutes

      • Having reviewed the intake capability framework, you should be able to quickly identify where you currently reside in the model. Document this in the “Current State” box below.
      • Next, spend some time as a group discussing your target state. Make sure to set a realistic target as well as a realistic timeframe for meeting this target. Level 1s will not be able to become Level 5s overnight and certainly not without passing through the other levels on the way.
        • A realistic goal for a Level 1 to become a Level 2 is within six to eight months.
      Current State:
      Target State:
      Timeline for meeting target

      INPUT

      • Intake, approval, and prioritization capability framework (Activity 1.2.4)

      OUTPUT

      • Current and target state, with stated time goals

      Materials

      • Whiteboard

      Participants

      • CIO
      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Align your intake success with the strategic expectations of overall project portfolio management

      A successful project intake, approval, and prioritization process puts your leadership in a position to best steer the portfolio, like a conductor of an orchestra.

      To frame the discussion on deciding what intake success will look like, review Info-Tech’s PPM strategic expectations:

      • Project Throughput: Maximize throughput of the best projects.
      • Portfolio Visibility: Ensure visibility of current and pending projects.
      • Portfolio Responsiveness: Make the portfolio responsive to executive steering when new projects and changing priorities need rapid action.
      • Resource Utilization: Minimize resource waste and optimize the alignment of skills to assignments.
      • Benefits Realization: Clarify accountability for post-project benefits attainment for each project, and facilitate the process of tracking/reporting those benefits.
      A screenshot of Info-Tech's Develop a Project Portfolio Management Strategy blueprint.

      For a more detailed discussion and insight on PPM strategic expectations see Info-Tech’s blueprint, Develop a Project Portfolio Management Strategy.

      Decide what successful project intake, approval, prioritization process will look like

      1.2.6 Estimated Time: 60 minutes

      While assessing your current state, it is important to discuss and determine as a team how success will be defined.

      • During this process, it is important to consider tentative timelines for success milestones and to ask the question: what will success look like and when should it occur by?
      • Use the below table to help document success factors and timeliness. Follow the lead of our example in row 1.
      Optimization Benefit Objective Timeline Success Factor
      Facilitate project intake, prioritization, and communication with stakeholders to maximize time spent on the most valuable or critical projects. Look at pipeline as part of project intake approach and adjust priorities as required. July 1st Consistently updated portfolio data. Dashboards to show back capacity to customers. SharePoint development resources.

      Review and customize section 1.5, “Process Success Criteria” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      Info-Tech Insight

      Establish realistic short-term goals. Even with optimized intake procedures, you may not be able to eliminate underground project economies immediately. Make your initial goals realistic, leaving room for those walk-up requests that may still appear via informal channels.

      Prepare to optimize project intake and capture the results in the Intake, Approval, and Prioritization SOP

      Standard Operating Procedure (SOP) is the reference document to get all PPM stakeholders on the same page with the new optimized process.

      The current state explored and documented in this step will serve as a starting point for each step of the next phase of the blueprint. The next phase will take a deeper dive into each of the three components of Info-Tech’s project intake methodology, so that they can achieve the success criteria you’ve defined in the previous activity.

      Info-Tech’s Project Intake, Approval, and Prioritization SOP Template is intended to capture the outcome of your process optimization efforts. This blueprint guides you through numerous activities designed for your core project portfolio management team to customize each section.

      To maximize the chances of success, it is important that the team makes a concerted effort to participate. Schedule a series of working sessions over the course of several weeks for your team to work through it – or get through it in one week, with onsite Info-Tech analyst-facilitated workshops.

      Download Info-Tech’s Project Intake, Approval, and Prioritization SOP.

      A screenshot of Info-Tech's Project Intake, Approval, and Prioritization SOP.

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Case study: PMO develops mature intake and prioritization processes by slowly evolving its capability level

      CASE STUDY

      Industry: Not-for-Profit

      Source: Info-Tech Interview

      Challenge

      • A PMO for a large not-for-profit benefits provider had relatively high project management maturity, but the enterprise had low PPM maturity.
      • There were strong intake processes in place for following up on requests. For small projects, project managers would assist as liaisons to help control scope. For corporate initiates, PMs were assigned to work with a sponsor to define scope and write a charter.

      Solution

      Prioritization was a challenge. Initially, the organization had ad hoc prioritization practices, but they had developed a scoring criteria to give more formality and direction to the portfolio. However, the activity of formally prioritizing proved to be too time consuming.

      Off-the-grid projects were a common problem, with initiatives consuming resources with no portfolio oversight.

      Results

      After trying “heavy” prioritization, the PMO loosened up the process. PMO staff now go through and quickly rank projects, with two senior managers making the final decisions. They re-prioritize quarterly to have discussions around resource availability and to make sure stakeholders are in tune to what IT is doing on a daily basis. IT has a monthly meeting to go over projects consuming resources and to catch anything that has fallen between the cracks.

      "Everything isn't a number one, which is what we were dealing with initially. We went through a formal prioritization period, where we painstakingly scored everything. Now we have evolved: a couple of senior managers have stepped up to make decisions, which was a natural evolution from us being able to assign a formal ranking. Now we are able to prioritize more easily and effectively without having to painstakingly score everything."

      – PMO Director, Benefits Provider

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      A photo of an Info-Tech analyst is shown.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.1-2

      A screenshot of activities 1.1.1 and 1.1.2 are shown.

      Pilot Info-Tech’s Project Value Scorecard-driven prioritization method

      Use Info-Tech’s example to prioritize your current project backlog to pilot a project value-driven prioritization, which will be used to guide the entire optimization process.

      1.2.1-3

      A screenshot of activities 1.2.1 and 1.2.3 are shown.

      Map out and document current project intake, approval, and prioritization process, and the involved key stakeholders

      A table-top planning exercise helps you visualize the current process in place and identify opportunities for optimization.

      Phase 2

      Build an Optimized Project Intake, Approval, and Prioritization Process

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Build an Optimized Project Intake, Approval, and Prioritization Process Proposed Time to Completion: 3-6 weeks

      Step 2.1: Streamline Intake

      Start with an analyst kick-off call:

      • Challenges of project intake
      • Opportunities for improving the management of stakeholder expectations by optimizing intake

      Then complete these activities…

      • Perform a process retrospective
      • Optimize your process to receive, triage, and follow up on project requests

      With these tools & templates:

      • Project Request Form.
      • Project Intake Classification Matrix

      Step 2.2: Right-Size Approval

      Start with an analyst call:

      • Challenges of project approval
      • Opportunities for improving strategic alignment of the project portfolio by optimizing project approval

      Then complete these activities…

      • Perform a process retrospective
      • Clarify accountability at each step
      • Decide on deliverables to support decision makers at each step

      With these tools & templates:

      • Benefits Commitment Form
      • Technology Assessment Tool
      • Business Case Templates

      Step 3.3: Prioritize Realistically

      Start with an analyst call:

      • Challenges in project prioritization
    • Opportunities for installing a resource capacity-constrained intake by optimizing prioritization
    • Then complete these activities…

      • Perform a process retrospective
      • Pilot the Intake and Prioritization Tool for prioritization within estimated resource capacity

      With these tools & templates:

      • Project Intake and Prioritization Tool

      Phase 2 Results & Insights:

      • Info-Tech’s methodology systemically fits the project portfolio into its triple constraint of stakeholder needs, strategic objectives, and resource capacity, to effectively address the challenges of establishing organizational discipline for project intake.

      Step 2.1: Streamline intake to manage stakeholder expectations

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Perform a deeper retrospective on current project intake process
      • Optimize your process to receive project requests
      • Revisit the definition of a project for triaging requests
      • Optimize your process to triage project requests
      • Optimize your process to follow up on project requests

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Administrative Staff

      Outcomes of this Step

      • Retrospective of the current project intake process: to continue doing, to start doing, and to stop doing
      • A streamlined, single-funnel intake channel with the right procedural friction to receive project requests
      • A refined definition of what constitutes a project, and project levels that will determine the necessary standard of rigor with which project requests should be scoped and developed into a proposal throughout the process
      • An optimized process for triaging and following up on project requests to prepare them for the steps of project approval
      • Documentation of the optimized process in the SOP document

      Understand the risks of poor intake practices

      Too much red tape could result in your portfolio falling victim to underground economies. Too little intake formality could lead to the Wild West.

      Off-the-grid projects, i.e. projects that circumvent formal intake processes, lead to underground economies that can deplete resource capacity and hijack your portfolio.

      These underground economies are typically the result of too much intake red tape. When the request process is made too complex or cumbersome, project sponsors may unsurprisingly seek alternative means to get their projects done.

      While the most obvious line of defence against the appearance of underground economies is an easy-to-use and access request form, one must be cautious. Too little intake formality could lead to a Wild West of project intake where everyone gets their initiatives approved regardless of their business merit and feasibility.

      Benefits of optimized intake Risks of poor intake
      Alignment of portfolio with business goals Portfolio overrun by off-the-grid projects
      Resources assigned to high-value projects Resources assigned to low-value projects
      Better throughput of projects in the portfolio Ever-growing project backlog
      Strong stakeholder relations Stakeholders lose faith in value of PMO

      Info-Tech Insight

      Intake is intimately bound to stakeholder management. Finding the right balance of friction for your team is the key to successfully walking the line between asking for too much and not asking for enough. If your intake process is strong, stakeholders will no longer have any reason to circumvent formal process.

      An excess number of intake channels is the telltale sign of a low capability level for intake

      Excess intake channels are also a symptom of a portfolio in turmoil.

      If you relate to the graphic below in any way, your first priority needs to be limiting the means by which projects get requested. A single, centralized channel with review and approval done in batches is the goal. Otherwise, with IT’s limited capacity, most requests will simply get added to the backlog.

      A graphic is shown to demonstrate how one may receive project requests. The following icons are in a circle: Phone, Intranet Request Form, In person, anywhere, anytime, SharePoint Request Form, Weekly Scrum, Document, and Email.

      Info-Tech Insight

      The PMO needs to have the authority – and needs to exercise the authority – to enforce discipline on stakeholders. Organizations that solicit in verbal requests (by phone, in person, or during scrum) lack the orderliness required for PPM success. In these cases, it needs to be the mission of the PMO to demand proper documentation and accountability from stakeholders before proceeding with requests.

      "The golden rule for the project documentation is that if anything during the project life cycle is not documented, it is the same as if it does not exist or never happened…since management or clients will never remember their undocumented requests or their consent to do something."

      – Dan Epstein, “Project Initiation Process: Part Two”

      Develop an intake workflow

      Info-Tech recommends following a four-step process for managing intake.

      1. Requestor fills out form and submits the request.

      Project Request Form Templates

      2. Requests are triaged into the proper queue.

      1. Divert non-project request
      2. Quickly assess value and urgency
      3. Assign specialist to follow up on request
      4. Inform the requestor

      Project Intake Classification Matrix

      3. BA or PM prepares to develop requests into a project proposal.

      1. Follow up with requestor and SMEs to refine project scope, benefits, and risks
      2. Estimate size of project and determine the required level of detail for proposal
      3. Prepare for concept approval

      Benefits Commitment Form Template

      4. Requestor is given realistic expectations for approval process.

      Perform a start-stop-continue exercise to help determine what is working and what is not working

      2.1.1 Estimated Time: 45 minutes

      Optimizing project intake may not require a complete overhaul of your existing processes. You may only need to tweak certain templates or policies. Perhaps you started out with a strong process and simply lost resolve over time – in which case you will need to focus on establishing motivation and discipline, rather than rework your entire process.

      Perform a start-stop-continue exercise with your team to help determine what should be salvaged, what should be abandoned, and what should be introduced:

      1. On a whiteboard or equivalent, write “Start,” “Stop,” and “Continue” in three separate columns. 3. As a group, discuss the responses and come to an agreement as to which are most valid.
      2. Equip your team with sticky notes or markers and have them populate the columns with ideas and suggestions surrounding your current processes. 4. Document the responses to help structure your game plan for intake optimization.
      Start Stop Continue
      • Explicitly manage follow-up expectations with project requestor
      • Receiving informal project requests
      • Take too long in proposal development
      • Quarterly approval meetings
      • Approve resources for proposal development

      INPUT

      • Current project intake workflow (Activity 1.2.2)
      • Project intake success criteria (Activity 1.2.6)

      OUTPUT

      • Retrospective review of current intake process

      Materials

      • Whiteboard
      • Sticky notes/markers

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Streamline project requests into a single funnel

      It is important to identify all of the ways through which projects currently get requested and initiated, especially if you have various streams of intake competing with each other for resources and a place in the portfolio. Directing multiple channels into a single, centralized funnel is step number one in optimizing intake.

      To help you identify project sources within your organization, we’ve broken project requests into three archetypes: the good, the bad, and the ugly.

      1. The Good – Proper Requests: written formal requests that come in through one appropriate channel.

      The Bad – Walk-Ups: requests that do not follow the appropriate intake channel(s), but nevertheless make an effort to get into the proper queue. The most common instance of this is a portfolio manager or CIO filling out the proper project request form on behalf of, and under direction from, a senior executive.

      The Ugly – Guerilla Tactics: initiatives that make their way into the portfolio through informal methods or that consume portfolio resources without formal approval, authority, or oversight. This typically involves a key resource getting ambushed to work on a stakeholder’s “side project” without any formal approval from, or knowledge of, the PMO.

      Funnel requests through a single portal to streamline intake

      Decide how you would funnel project requests on a single portal for submitting project requests. Determining the right portal for your organization will depend on your current infrastructure options, as well as your current and target state capability levels.

      Below are examples of a platform for your project request portal.

      Platform Template document, saved in a repository or shared drive Email-based form (Outlook forms) Intranet form (SharePoint, internal CMS) Dedicated intake solution (PPM tool, idea/innovation tool)
      Pros Can be deployed very easily Consolidates requests into a single receiver Users have one place to go from any device All-in-one solution that includes scoring and prioritization
      Cons Manual submission and intake process consumes extra effort Can pose problems in managing requests across multiple people and platforms Requires existing intranet infrastructure and some development effort Solution is costly; requires adoption across all lines of business

      Increasing intake capability and infrastructure availability

      Introduce the right amount of friction into your intake process

      The key to an effective intake process is determining the right amount of friction to include for your organization. In this context, friction comes from the level of granularity within your project request form and the demands or level of accountability your intake processes place on requestors. You will want to have more or less friction on your intake form, depending on your current intake pain points.

      If you are inundated with a high volume of requests:

      • Make your intake form more detailed to deter “half-baked” requests.
      • Have more managerial oversight into the process. Require approval for each request.

      If you want to encourage the use of a formal channel:

      • Make your intake form more concise and lightweight.
      • Have less managerial oversight into the process. Inform managers of each request rather than requiring approval.

      Download Info-Tech’s Detailed Project Request Form.

      Download Info-Tech’s Light Project Request Form.

      A screenshot of Info-Tech's Project Request Form is shown.

      Info-Tech Insight

      Optimizing a process should not automatically mean reducing friction. Blindly reducing friction could generate a tidal wave of poorly thought-out requests, which only drives up unrealistic expectations. Mitigate the risk of unrealistic stakeholder expectations by carefully managing the message: optimize friction.

      Document your process to receive project requests

      2.1.2 Estimated Time: 30-60 minutes

      Review and customize section 2.2, “Receive project requests” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of optimizing this process is to consolidate multiple intake channels into a single funnel with the right amount of friction to improve visibility and manageability of incoming project requests.

      The important decisions to document for this step include:

      1. What data will be collected, and from whom? For example, Info-Tech’s Light Project Request Form Template will be used to collect project requests from everyone.
      2. How will requests be collected, and from where? For example, the template will be available as a fillable form on a SharePoint site.
      3. Who will be informed of the requests? For example, the PMO Director and the BA team will be notified with a hyperlink to the completed request form.
      4. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Retrospective of current process (Activity 2.1.1)

      OUTPUT

      • Customized Project Request Form
      • Method of implementation

      Materials

      • Project Request Form Templates

      Participants

      • PMO Director/ Portfolio Manager
      • Business Analysts

      Info-Tech Best Practice

      Whatever method of request collection you choose, ensure there is no doubt about how requesters can access the intake form.

      Establish a triage process to improve portfolio success

      Once a request has been submitted, it will need to be triaged. Triage begins as soon as the request is received. The end goal of the triage process is to set appropriate expectations for stakeholders and to ensure that all requests going forward for approval are valid requests.

      PPM Triage Process

      1. Divert non-project requests by validating that what is described on the request form qualifies as a “project.” Make sure requests are in the appropriate queue – for example, service desk request queue, change and release management queue, etc.
      2. Quickly assess value and urgency to determine whether the request requires fast-tracking or any other special consideration.
      3. Assign a specialist to follow up on the request. Match the request to the most suitable BA, PM, or equivalent. This person will become the Request Liaison (“RL”) for the request and will work with the requestor to define preliminary requirements.
      4. Inform the requestor that the request has been received and provide clear direction on what will happen with the request next, such as who will follow up on it and when. See the next slide for some examples of this follow-up.

      The PMO Triage Team

      • Portfolio Manager, or equivalent
      • Request Liaisons (business analysts, project managers, or equivalent)

      “Request Liaison” Role

      The BAs and PMs who follow up on requests play an especially important role in the triage process. They serve as the main point of contact to the requestor as the request evolves into a business case. In this capacity they perform a valuable stakeholder management function, helping to increase confidence and enhance trust in IT.

      To properly triage project requests, define exactly what a project is

      Bring color to the grey area that can exist in IT between those initiatives that fall somewhere in between “clearly a service ticket” and “clearly a project.”

      What constitutes a project?

      Another way of asking this question that gets more to the point for this blueprint – for what types of initiatives is project intake, approval, and prioritization rigor required?

      This is especially true in IT where, for some smaller initiatives, there can be uncertainty in many organizations during the intake and initiation phase about what should be included on the formal project list and what should go to help desk’s queue.

      As the definitions in the table below show, formal project management frameworks each have similar definitions of “a project.”

      Source Definition
      PMI A temporary endeavor undertaken to create a unique product, service, or result.” (553)
      COBIT A structured set of activities concerned with delivering a defined capability (that is necessary but not sufficient to achieve a required business outcome) to the enterprise based on an agreed‐on schedule and budget.” (74)
      PRINCE2 A temporary organization that is created for the purpose of delivering one or more business products according to an agreed business case.

      For each, a project is a temporary endeavor planned around producing a specific organizational/business outcome. The challenge of those small initiatives in IT is knowing when those endeavors require a business case, formal resource tracking, and project management rigor, and when they don’t.

      Separating small projects from non-projects requires a consideration of approval rights

      While conventional wisdom says to base your project definition on an estimation of cost, risk, etc., you also need to ask, “does this initiative require formal approval?”

      In the next step, we will define a suggested minimum threshold for a small “level 1” project. While these level thresholds are good and necessary for a number of reasons – including triaging your project requests – you may still often need to exercise some critical judgment in separating the tickets from the projects. In addition to the level criteria that we will develop in this step, use the checklist below to help with your differentiating.

      Service Desk Ticket Small Project
      • Approval seems implicit given the scope of the task.
      • No expectations of needing to report on status.
      • No indications that management will require visibility during execution.
      • The scope of the task suggests formal approval may be required.
      • You may have to report on status.
      • Possibility that management may require visibility during execution.

      Info-Tech Insight

      Guard the value of the portfolio. Because tickets carry with them an implicit approval, you need to be wary at the portfolio level of those that might possess a larger scope than their status of ticket implies. Sponsors that, for whatever reason, resist the formal intake process may use the ticketing process to sneak projects in through the backdoor. When assessing tickets and small projects at the portfolio level, you need to ask: is it possible that someone at an executive level might want to get updates on this because of its duration, scope, risk, cost, etc.? Could someone at the management level get upset that the initiative came in as a ticket and is burning up time and driving costs without any visibility?

      Sample Project/Non-Project Separation Criteria

      Non-Project Small Project
      e.g. Time required e.g. < 40 hours e.g. 40 > hours
      e.g. Complexity e.g. Very low e.g. Moderate – Low Difficulty: Does not require highly developed or specialized skill sets
      e.g. Collaboration e.g. None required e.g. Limited coordination and collaboration between resources and departments
      e.g. Repeatability of work e.g. Fully repeatable e.g. Less predictable
      e.g. Frequency of request type e.g. Hourly to daily e.g. Weekly to monthly

      "If you worked for the help desk, over time you would begin to master your job since there is a certain rhythm and pattern to the work…On the other hand, projects are unique. This characteristic makes them hard to estimate and hard to manage. Even if the project is similar to one you have done before, new events and circumstances will occur. Each project typically holds its own challenges and opportunities"

      – Jeffrey and Thomas Mochal

      Define the minimum-threshold criteria for small projects

      2.1.3 Estimated Time: 30 minutes

      Follow the steps below to define the specifics of a “level 1” project for your organization.

      1. Using your project list and/or ticketing system, identify a handful of small projects, large service desk tickets, and especially those items that fall somewhere in the grey area in between (anywhere between 10 to 20 of each). Then, determine the organizationally appropriate considerations for defining your project levels. Options include:
      • Duration
      • Budget/Cost
      • Technology requirements
      • Customer involvement
      • Integration
      • Organizational impact
      • Complexity
      • Number of cross-functional workgroups and teams involved
    • Using the list of projects established in the previous step, determine the organizationally appropriate considerations for defining your project levels –anywhere from four to six considerations is a good number.
    • Using these criteria and your list of small projects, define the minimum threshold for your level one projects across each of these categories. Record these thresholds in the table on the next slide.
    • INPUT

      • Data concerning small projects and service desk tickets, including size, duration, etc.

      OUTPUT

      • Clarity around how to define your level 1 projects

      Materials

      • Whiteboard

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Remove room for stakeholder doubt and confusion by informing requests forward in a timely manner

      During triaging, requestors should be notified as quickly as possible (a) that their request has been received and (b) what to expect next for the request. Make this forum as productive and informative as possible, providing clear direction and structure for the future of the request. Be sure to include the following:

      • A request ID or ticket number.
      • Some direction on who will be following up on the request –provide an individual’s name when possible.
      • An estimated timeframe of when they can expect to hear from the individual following up.

      The logistic of this follow-up will depend on a number of different factors.

      • The number of requests you receive.
      • Your ability to automate the responses.
      • The amount of detail you would like to, or need to, provide stakeholders with.

      Info-Tech Best Practice

      Assign an official request number or project ID to all requests during this initial response. An official request number anchors the request to a specific and traceable dataset that will accompany the project throughout its lifecycle.

      Sample “request received” emails

      If you receive a high volume of requests or need a quick win for improving stakeholder relations:

      Sample #1: Less detailed, automatic response

      Hello Emma,

      Thank you. Your project request has been received. Requests are reviewed and assigned every Monday. A business analyst will follow up with you in the next 5-10 business days. Should you have any questions in the meantime, please reply to this email.

      Best regards,

      Information Technology Services

      If stakeholder management is a priority, and you want to emphasize the customer-facing focus:

      Sample #2: More detailed, tailored response

      Hi Darren,

      Your project request has been received and reviewed. Your project ID number is #556. Business analyst Alpertti Attar has been assigned to follow up on your request. You can expect to hear from him in the next 5-10 business days to set up a meeting for preliminary requirements gathering.

      If you have any questions in the meantime, please contact Alpertti at aattar@projectco.com. Please include the Project ID provided in this email in all future correspondences regarding this request.

      Thank you for your request. We look forward to helping you bring this initiative to fruition.

      Sincerely,

      Jim Fraser

      PMO Director, Information Technology Services

      Info-Tech Insight

      A simple request response will go a long way in terms of stakeholder management. It will not only help assure stakeholders that their requests are in progress but the request confirmation will also help to set expectations and take some of the mystery out of IT’s processes.

      Document your process to triage project requests

      2.1.4 Estimated Time: 30-60 minutes

      Review and customize section 2.3, “Triage project requests” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of optimizing this process is to divert non-project requests and set an appropriate initial set of stakeholder expectations for next steps. The important decisions to document for this step include:

      1. What defines a project? Record the outcomes of Activities 2.1.3 into the SOP.
      2. Who triages the requests and assign request liaisons? Who are they? For example, a lead BA can assign a set roster of BAs to project requests.
      3. What are the steps to follow for sending the initial response? See the previous slides on automated responses vs. detailed, tailored responses.
      4. How will you account for the consumption of resource capacity? For example, impose a maximum of four hours per week per analyst, and track the hours worked for each request to establish a pattern for capacity consumption.
      5. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Results of activity 2.1.3

      OUTPUT

      • SOP for triaging project requests

      Materials

      • SOP Template

      Participants

      • PMO Director/ Portfolio Manager
      • Business Analysts

      Info-Tech Best Practice

      Whatever method of request collection you choose, ensure there is no doubt about how requesters can access the intake form.

      Follow up on requests to define project scope and set realistic expectations

      The purpose of this follow-up is to foster communication among the requestor, IT, and the sponsor to scope the project at a high level. The follow-up should:

      • Clarify the goals and value of the request.
      • Begin to manage expectations based on initial assessment of feasibility.
      • Ensure the right information is available for evaluating project proposals downstream. Every project should have the below key pieces of scope defined before any further commitments are made.

      Focus on Defining Key Pieces of Scope

      • Budget (funding, source)
      • Business outcome
      • Completion criteria
      • Timeframes (start date and duration)
      • Milestones/deliverables

      Structure the Follow-Up Process to Enhance Alignment Between IT and the Business

      Once a Request Liaison (RL) has been assigned to a request, it is their responsibility to schedule time (if necessary) with the requestor to perform a scoping exercise that will help define preliminary requirements. Ideally, this follow-up should occur no later than a week of the initial request.

      Structure the follow-up for each request based on your preliminary estimates of project size (next slide). Use the “Key Pieces of Scope” to the left as a guide.

      It may also be helpful for RLs and stakeholders to work together to produce a rough diagram or mock-up of the final deliverable. This will ensure that the stakeholder’s idea has been properly communicated, and it could also help refine or broaden this idea based on IT’s capabilities.

      After the scoping exercise, it is the RL’s responsibility to inform the requestor of next steps.

      Info-Tech Insight

      More time spent with stakeholders defining high-level requirements during the ideation phase is key to project success. It will not only improve the throughput of projects, but it will enhance the transparency of IT’s capacity and enable IT to more effectively support business processes.

      Perform a preliminary estimation of project size

      Project estimation is a common pain point felt by many organizations. At this stage, a range-of-magnitude (ROM) estimate is sufficient for the purposes of sizing the effort required for developing project proposals with appropriate detail.

      A way to structure ROM estimates is to define a set of standard project levels. It will help you estimate 80% of projects with sufficient accuracy over time with little effort. The remaining 20% of projects that don’t meet their standard target dates can be managed as exceptions.

      The increased consistency of most projects will enable you to focus more on managing the exceptions.

      Example of standard project sizes:

      Level Primary unit of estimation Target completion date*
      1 Weeks 3 weeks – 3 months
      2 Months 3 months – 6 months
      3 Quarters 2 – 4 quarters
      3+ Years 1 year or more

      * Target completion date is simply that – a target, not a service level agreement (SLA). Some exceptions will far exceed the target date, e.g. projects that depend heavily on external or uncontrollable factors.

      Info-Tech Best Practice

      Project levelling is useful for right-sizing many downstream processes; it sets appropriate levels of detail and scrutiny expected for project approval and prioritization steps, as well as the appropriate extent of requirements gathering, project management, and reporting requirements afterwards.

      Set your thresholds for level 2 and level 3 projects

      2.1.5 Estimated Time: 30 minutes

      Now that the minimum threshold for your smallest projects has been identified, it’s time to identify the maximum threshold in order to better apply project intake, approval, and prioritization rigor where it’s needed.

      1. Looking at your project list (e.g. Activity 1.1.1, or your current project backlog), isolate the medium and large projects. Examine the two categories in turn.
      2. Start with the medium projects. Using the criteria identified in Activity 2.1.3, identify where your level one category ends.
      • What are the commonly recurring thresholds that distinguish medium-sized projects from smaller initiatives?
      • Are there any criteria that would need to take on a greater importance when making the distinction? For instance, will cost or duration take on a greater weighting when determining level thresholds?
      • Once you have reached consensus, record these in the table on the next slide.
    • Now examine your largest projects. Once again relying on the criteria from Activity 2.1.3, determine where your medium-sized projects end and your large projects begin.
      • What are the commonly recurring thresholds that distinguish large and extra-large projects from medium-sized initiatives?
      • Once you have reached consensus, records these in the table on the next slide.

      INPUT

      • Leveling criteria from Activity 2.1.3
      • Project backlog, or list of projects from Activity 1.1.1

      OUTPUT

      • Clarity around how to define your level two and three projects

      Materials

      • Whiteboard
      • The project level table on the next slide

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Sample Project Levels Table

      Project Level Level 1 Level 2 Level 3
      Work Effort 40-100 hours 100-500 hours 500+ hours
      Budget $100,000 and under $100,000 to $500,000 $500,000 and over
      Technology In-house expertise Familiar New or requires system-wide change/training
      Complexity Well-defined solution; no problems expected Solution is known; some problems expected Solution is unknown or not clearly defined
      Cross-Functional Workgroups/Teams 1-2 3-5 > 6

      Apply a computation decision-making method for project levelling

      2.1.5 Project Intake Classification Matrix

      Capture the project levels in Info-Tech’s Project Intake Classification Matrix Tool to benchmark your levelling criteria and to determine project levels for proposed projects.

      Download Info-Tech’s Project Intake Classification Matrix tool.

      A screenshot of Info-Tech's Project Intake Classification Matrix Tool, tab 2 is shown.
      1. Pick a category to define project levels.
      2. Enter the descriptions for each project level.
      3. Assign a relative weight for each category.
      4. A screenshot of Info-Tech's Project Intake Classification Matrix Tool, tab 3 is shown.
      5. Enter a project name.
      6. Choose the description that best fits the project. If unknown, leave it blank.
      7. Suggested project levels are displayed.

      Get tentative buy-in and support from an executive sponsor for project requests

      In most organizations a project requires sponsorship from the executive layer, especially for strategic initiatives. The executive sponsor provides several vital factors for projects:

      • Funding and resources
      • Direct support and oversight of the project leadership
      • Accountability, acting as the ultimate decision maker for the project
      • Ownership of, and commitment to, project benefits

      Sometimes a project request may be made directly by a sponsor; in other times, the Request Liaison may need to connect the project request to a project sponsor.

      In either case, project request has a tentative buy-in and support of an executive sponsor before a project request is developed into a proposal and examined for approval – the subject of this blueprint’s next step.

      PMs and Sponsors: The Disconnect

      A study in project sponsorship revealed a large gap between the perception of the project managers and the perception of sponsors relative to the sponsor capability. The widest gaps appear in the areas of:

      • Motivation: 34% of PMs say sponsors frequently motivate the team, compared to 82% of executive sponsors who say they do so.
      • Active listening: 42% of PMs say that sponsors frequently listen actively, compared to 88% of executive sponsors who say they do so.
      • Effective communication: 47% of PMs say sponsors communicate effectively and frequently, compared to 92% of executive sponsors who say they do so.
      • Managing change: 37% of PMs say sponsors manage change, compared to 82% of executive sponsors who say they do so.

      Source: Boston Consulting Group/PMI, 2014

      Actively engaged executive sponsors continue to be the top driver of whether projects meet their original goals and business intent.

      – PMI Pulse of the Profession, 2017

      76% of respondents [organizations] agree that the role of the executive sponsor has grown in importance over the past five years.

      – Boston Consulting Group/PMI, 2014

      Document your process to follow up on project requests

      2.1.6 45 minutes

      Review and customize section 2.4, “Follow up on project requests” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of optimizing this process is to initiate communication among the requestor, IT, and the sponsor to scope the project requests at a high level. The important decisions to document for this step include:

      1. How will you perform a scoping exercise with the requestor? Leverage existing organizational processes (e.g. high-level requirements gathering). Look to the previous slides for suggested outcomes of the exercise.
      2. How will you determine project levels? Record the outcomes of activities 2.1.5 into the SOP.
      3. How will the RL follow up on the scoped project request with a project sponsor? For example, project requests scoped at a high level will be presented to senior leadership whose lines of business are affected by the proposed project to gauge their initial interest.
      4. How will you account for the consumption of resource capacity? For example, impose a maximum of 8 hours per week per analyst, and track the hours worked for each request to establish a pattern for capacity consumption.
      5. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Activity 2.1.5
      • Existing processes for scoping exercises

      OUTPUT

      • SOP for following up on project requests

      Materials

      • SOP Template

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Examine the new project intake workflow as a whole and document it in a flow chart

      2.1.7 Estimated Time: 30-60 minutes

      Review and customize section 2.1, “Project Intake Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      In Step 1.2 of the blueprint, you mapped out the current project intake, approval, and prioritization workflow and documented it in a flow chart. In this step, take the time to examine the new project intake process as a whole, and document the new workflow in the form of a flow chart.

      1. Requestor fills out form and submits the request.
      2. Requests are triaged into the proper queue.
      3. BA or PM prepares to develop requests into a project proposal.
      4. Requestor is given realistic expectations for approval process.

      Consider the following points:

      1. Are the inputs and outputs of each step clear? Who’s doing the work? How long will each step take, on average?
      2. Is the ownership of each step clear? How will we ensure a smooth handoff between each step and prevent requests from falling through the cracks?

      INPUT

      • New process steps for project intake (Activities 2.1.2-6)

      OUTPUT

      • Flowchart representation of new project intake workflow

      Materials

      • Microsoft Visio, flowchart software, or Microsoft PowerPoint

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Case study: Portfolio manager achieves intake and project success through detailed request follow-up

      Case Study

      Industry: Municipal Government

      Source: Info-Tech Client

      Challenge

      • There is an IT department with a relatively high level of project management maturity.
      • They have approximately 30 projects on the go, ranging from small to large.
      • To help with intake, IT assembled a project initiation team. It was made up of managers from throughout the county. This group “owned the talent” and met once a month to assess requests. As a group, they were able to assemble project teams quickly.

      Solution

      • Project initiation processes kept failing. A lot of time was spent within IT getting estimations precise, only to have sponsors reject business cases because they did not align with what those sponsors had in mind.
      • Off-the-grid projects were a challenge. Directors did not follow intake process and IT talent was torn in multiple directions. There was nothing in place for protecting the talent and enforcing processes on stakeholders.

      Results

      • IT dedicated a group of PMs and BAs to follow up on requests.
      • Working with stakeholders, this group collects specific pieces of information that allows IT to get to work on requests faster. Through this process, requests reach the charter stage more quickly and with greater success.
      • An intake ticketing system was established to protect IT talent. Workers are now better equipped to redirect stakeholders through to the proper channels.

      Step 2.2: Set up steps of project approval to maximize strategic alignment while right-sizing the required effort

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Perform a deeper retrospective on current project approval process
      • Define the approval steps, their accountabilities, and the corresponding terminologies for approval
      • Right-size effort and documentation required for each project level through the approval steps

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Administrative Staff

      Outcomes of this step

      • Retrospective of the current project intake process: to continue doing, to start doing, and to stop doing
      • A series of approval steps are defined, in which their accountabilities, responsibilities, and the nomenclature for what is approved at each steps are clarified and documented
      • A toolbox of deliverables for proposed projects that captures key information developed to inform project approval decisions at each step of the approval process, and the organizational standard for what to use for which project level
      • Documentation of the optimized process in the SOP document

      Set up an incremental series of approval stage-gates to tackle common challenges in project approval

      This section will help you address key challenges IT leaders face around project approval.

      Challenges Info-Tech’s Advice
      Project sponsors receive funding from their business unit or other source (possibly external, such as a grant), and assume this means their project is “approved” without any regard to IT costs or resource constraints. Clearly define a series of approval steps, and communicate requirements for passing them.
      Business case documentation is rarely updated to reflect unforeseen costs, emerging opportunities, and changing priorities. As a result, time and money is spent finishing diminished priority projects while the value of more recent projects erodes in the backlog. Approve projects in smaller pieces, with early test/pilot phases focused on demonstrating the value of later phases.
      Project business cases often focus on implementation and overlook ongoing operating costs imposed on IT after the project is finished. These costs further diminish IT’s capacity for new projects, unless investment in more capacity (such as hiring) is included in business cases. Make ongoing support and maintenance costs a key element in business case templates and evaluations.
      Organizations approve new projects without regard to the availability of resource capacity (or lack thereof). Project lead times grow and stakeholders become more dissatisfied because IT is unable to show how the business is competing with itself for IT’s time. Increase visibility into what IT is already working on and committed to, and for whom.

      Develop a project approval workflow

      Clearly define a series of approval steps, and communicate requirements for passing them. “Approval” can be a dangerous word in project and portfolio management, so it is important to clarify what is required to pass each step, and how long the process will take.

      1 2 3 4
      Approval step Concept Approval Feasibility Approval Business Case Approval Resource Allocation (Prioritization)
      Alignment Focus Business need / Project sponsorship Technology Organization-wide business need Resource capacity
      Possible dispositions at each gate
      • Approve developing project proposal
      • Reject concept
      • Proceed to business case approval
      • Approve a test/pilot project for feasibility
      • Reject proposal
      • Approve project and funding in full
      • Approve a test/pilot project for viability
      • Reject proposal
      • Begin or continue project work
      • Hold project
      • Outsource project
      • Reject project
      Accountability e.g. Project Sponsor e.g. CIO e.g. Steering Committee e.g. CIO
      Deliverable Benefits Commitment Form Template Proposed Project Technology Assessment Tool Business Case (Fast Track, Comprehensive) Intake and Prioritization Tool

      Identify the decision-making paradigm at each step

      In general, there are three different, mutually exclusive decision-making paradigms for approving projects:

      Paradigm Description Benefits Challenges Recommendation
      Unilateral authority One individual makes decisions. Decisions tend to be made efficiently and unambiguously. Consistency of agenda is easier to preserve. Decisions are subject to one person’s biases and unseen areas. Decision maker should solicit and consider input from others and seek objective rigor.
      Ad hoc deliberation Stakeholders informally negotiate and communicate decisions between themselves. Deliberation helps ensure different perspectives are considered to counterbalance individual biases and unseen areas. Ad hoc decisions tend to lack documentation and objective rationale, which can perpetuate disagreement. Use where unilateral decisions are unfeasible (due to complexity, speed of change, culture, etc.), and stakeholders are very well aligned or highly skilled negotiators and communicators.
      Formal steering committee A select group that represent various parts of the organization is formally empowered to make decisions for the organization. Formal committees can ensure oversight into decisions, with levers available to help resolve uncertainty or disagreement. Formal committees introduce administrative overhead and effort that might not be warranted by the risks involved. Formal steering committees are best where formality is warranted by the risks and costs involved, and the organizational culture has an appetite for administrative oversight.

      Info-Tech Insight

      The individual or party who has the authority to make choices, and who is ultimately answerable for those decisions, is said to be accountable. Understanding the needs of the accountable party is critical to the success of the project approval process optimization efforts.

      Perform a start-stop-continue exercise to help determine what is working and what is not working

      2.2.1 Estimated Time: 45 minutes

      Optimizing project approval may not require a complete overhaul of your existing processes. You may only need to tweak certain templates or policies. Perhaps you started out with a strong process and simply lost resolve over time – in which case you will need to focus on establishing motivation and discipline, rather than rework your entire process.

      Perform a start-stop-continue exercise with your team to help determine what should be salvaged, what should be abandoned, and what should be introduced:

      1.On a whiteboard or equivalent, write “Start,” “Stop,” and “Continue” in three separate columns. 3.As a group, discuss the responses and come to an agreement as to which are most valid.
      2.Equip your team with sticky notes or markers and have them populate the columns with ideas and suggestions surrounding your current processes. 4.;Document the responses to help structure your game plan for intake optimization.
      StartStopContinue
      • Inject technical feasibility approval step as an input to final approval
      • Simplify business cases
      • Approve low-value projects
      • Take too long in proposal development
      • Quarterly approval meetings
      • Approve resources for proposal development

      INPUT

      • Current project approval workflow (Activity 1.2.2)
      • Project approval success criteria (Activity 1.2.6)

      OUTPUT

      • Retrospective review of current approval process

      Materials

      • Whiteboard
      • Sticky notes/markers

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Customize the approval steps and describe them at a high level

      2.2.2 Estimated Time: 30-60 minutes

      Review and customize section 3.2, “Project Approval Steps” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of this activity is to customize the definition of the approval steps for your organization, so that it makes sense for the existing organizational governance structure, culture, and need. Use the results of the start-stop-continue to inform what to customize. Consider the following factors:

      1. Order of steps: given the current decision-making paradigm, does it make sense to reorder the steps?
      2. Dispositions at each step: what are the possible dispositions, and who is accountable for making the dispositions?
      3. Project levels: do all projects require three-step approval before they’re up for prioritization? For example, IT steering committee may wish to be involved only for Level 3 projects and Level 2 projects with significant business impact, and not for Level 1 projects and IT-centric Level 2 projects.
      4. Accountability at each step: who makes the decisions?
      5. Who will handle exceptions? Aim to prevent the new process from being circumvented by vocal stakeholders, but also allow for very urgent requests. A quick win to strike this balance is to clarify who will exercise this discretion.

      INPUT

      • Retrospective of current process (Activity 2.2.1)
      • Project level definition
      • Approval steps in the previous slide

      OUTPUT

      • Customized project approval steps for each project level

      Materials

      • Whiteboard

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Specify what “approval” really means to manage expectations for what project work can be done and when

      2.2.3 Estimated Time: 15 minutes

      Review and customize section 3.2, “Project Approval Steps” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      In the old reality, projects were approved and never heard back from again, which effectively gave your stakeholders a blanket default expectation of “declined.” With the new approval process, manage your stakeholder expectations more explicitly by refining your vocabulary around approval.

      Within this, decision makers should view their role in approval as approving that which can and should be done. When a project is approved and slated to backlog, the intention should be to allocate resources to it within the current intake cycle.

      Customize the table to the right with organizationally appropriate definitions, and update your SOP.

      “No” Declined.
      “Not Now” “It’s a good idea, but the time isn’t right. Try resubmitting next intake cycle.”
      “Concept Approval” Approval to add the item to the backlog with the intention of starting it this intake cycle.
      “Preliminary Approval” Approval for consumption of PMO resources to develop a business case.
      “Full Approval” Project is greenlighted and project resources are being allocated to it.

      Info-Tech Insight

      Refine the nomenclature. Add context to “approved” and “declined.” Speak in terms of “not now” or “you can have it when these conditions are met.” With clear expectations of the resources required to support each request, you can place accountability for keeping the request alive back on the sponsors.

      Continuously work out a balance between disciplined decision making and “analysis paralysis"

      A graph is depicted to show the relationship between disciplined decision making and analysis paralysis. The sweet spot for disciplined decisions changes between situations and types of decisions.

      A double bar graph is depicted to show the relative effort spent on management practice. The first bar shows that 20% has a high success of portfolio management. 35% has a low success of portfolio management. A caption on the graph: Spending additional time assessing business cases doesn’t necessarily improve success.

      Info-Tech Insight

      Estimates that form the basis of business cases are often based on flawed assumptions. Use early project phases or sprints to build working prototypes to test the assumptions on which business cases are built, rather than investing time improving precision of estimates without improving accuracy.

      Right-size project approval process with Info-Tech’s toolbox of deliverables

      Don’t paint every project with the same brush. Choose the right set of information needed for each project level to maximize the throughput of project approval process.

      The next several slides will take you through a series of tools and templates that help guide the production of deliverables. Each deliverable wireframes the required analysis of the proposed project for one step of the approval process, and captures that information in a document. This breaks down the overall work for proposal development into digestible chunks.

      As previously discussed, aim to right-size the approval process rigor for project levels. Not all project levels may call for all steps of approval, or the extent of required analysis within an approval step may differ. This section will conclude by customizing the requirement for deliverables for each project level.

      Tools and Templates for the Project Approval Toolbox

      • Benefits Commitment Form Template (.xlsx) Document the project sponsor’s buy-in and commitment to proposed benefits in a lightweight fashion.
      • Proposed Technology Assessment Tool (.xlsx) Determine the proposed project’s readiness for adoption from a technological perspective.
      • Business Case Templates (.docx) Guide the analysis process for the overall project proposal development in varying levels of detail.

      Use Info-Tech’s lightweight Benefits Commitment Form Template to document the sponsor buy-in and support

      2.2.4 Benefits Commitment Form Template

      Project sponsors are accountable for the realization of project benefits. Therefore, for a project to be approved by a project sponsor, they must buy-in and commit to the proposed benefits.

      Defining project benefits and obtaining project sponsor commitment has been demonstrated to improve the project outcome by providing the focal point of the project up-front. This will help reduce wasted efforts to develop parts of the proposals that are not ultimately needed.

      A double bar graph titled: Benefits realization improves project outcome is shown.

      Download Info-Tech’s Benefits Commitment Form Template.

      Contents of a Benefits Commitment Form

      • One-sentence highlight of benefits and risks
      • Primary benefit, hard (quantitative) and soft (qualitative)
      • Proposed measurements for metrics
      • Responsible and accountable parties for benefits
      A screenshot of Info-Tech's Establish the Benefits Realization Process blueprint is shown.

      For further discussion on benefits realization, use Info-Tech’s blueprint, Establish the Benefits Realization Process.

      Use Info-Tech’s Proposed Project Technology Assessment Tool to analyze a technology’s readiness for adoption

      2.2.4 Proposed Project Technology Assessment Tool

      In some projects, there needs to be an initial idea of what the project might look like. Develop a high-level solution for projects that:

      • Are very different from previous projects.
      • Are fairly complex, or not business as usual.
      • Require adoption of new technology or skill set.

      IT should advise and provide subject matter expertise on the technology requirements to those that ultimately approve the proposed projects, so that they can take into account additional costs or risks that may be borne from it.

      Info-Tech’s Proposed Project Technology Assessment Tool has a series of questions to address eight categories of considerations to determine the project’s technological readiness for adoption. Use this tool to ensure that you cover all the bases, and help you devise alternate solutions if necessary – which will factor into the overall business case development.

      Download Info-Tech’s Proposed Project Technology Assessment Tool.

      A screenshot of Info-Tech's Proposed Project Technology Assessment Tool is shown.

      Enable project valuation beyond financial metrics with Info-Tech’s Business Case Templates

      2.2.4 Business Case Template (Comprehensive and Fast Track)

      Traditionally, a business case is centered around financial metrics. While monetary benefits and costs are matters of bottom line and important, financial metrics are only part of a project’s value. As the project approval decisions must be based on the holistic comparison of project value, the business case document must capture all the necessary – and only those that are necessary – information to enable it.

      However, completeness of information does not always require comprehensiveness. Allow for flexibility to speed up the process of developing business plan by making a “fast-track” business case template available. This enables the application of the project valuation criteria with all other projects, with right-sized effort.

      Alarming business case statistics

      • Only one-third of companies always prepare a business case for new projects.
      • Nearly 45% of project managers admit they are unclear on the business objectives of their IT projects.

      (Source: Wrike)

      Download Info-Tech’s Comprehensive Business Case Template.

      A screenshot of Info-Tech's Comprehensive Business Case Template is shown.

      Download Info-Tech’s Fast Track Business Case Template.

      A screenshot of Info-Tech's Fast Track Business Case Template is shown.

      Info-Tech Insight

      Pass on that which is known. Valuable information about projects is lost due to a disconnect between project intake and project initiation, as project managers are typically not brought on board until project is actually approved. This will be discussed more in Phase 3 of this blueprint.

      Document the right-sized effort and documentation required for each project level

      2.2.4 Estimated Time:60-90 minutes

      Review and customize section 3.3, “Project Proposal Deliverables” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of this activity is to customize the requirements for project proposal deliverables, so that it properly informs each of the approval steps discussed in the previous activity. The deliverables will also shape the work effort required for projects of various levels. Consider the following factors:

      1. Project levels: what deliverables should be required, recommended, or suggested for each of the project levels? How will exceptions be handled, and who will be accountable?
      2. Existing project proposal documents: what existing proposal documents, tools and templates can we leverage for the newly optimized approval steps?
      3. Skills availability: do these tools and templates represent a significant departure from the current state? If so, is there capacity (time and skill) to achieve the desired target state?
      4. How will you account for the consumption of resource capacity? Do a rough order of estimate for the resource capacity consumed the new deliverable standard.
      5. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Process steps (Activity 2.2.2)
      • Current approval workflow(Activity 1.2.1)
      • Artifacts introduced in the previous slides

      OUTPUT

      • Requirement for artifacts and effort for each approval step

      Materials

      • Whiteboard

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Examine the new project approval workflow as a whole and document it in a flow chart

      2.2.5 Estimated Time: 30-60 minutes

      Review and customize section 3.1, “Project Approval Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      In Step 1.2 of the blueprint, you mapped out the current project intake, approval, and prioritization workflow and documented it in a flow chart. In this step, take the time to examine the new project intake process as a whole, and document the new workflow in the form of a flow chart.

      1 2 3 4
      Approval Step Concept Approval Feasibility Approval Business Case Approval Resource Allocation (Prioritization)
      Alignment Focus Business need/ Project Sponsorship Technology

      Organization-wide

      Business need

      Resource capacity

      Consider the following points:

      1. Are the inputs and outputs of each step clear? Who’s doing the work? How long will each step take, on average?
      2. Is the ownership of each step clear? How will we ensure a smooth hand-off between each step and prevent requests from falling through the cracks?

      INPUT

      • New process steps for project approval (Activities 2.2.2-4)

      OUTPUT

      • Flowchart representation of new project approval workflow

      Materials

      • Microsoft Visio, flowchart software, or Microsoft PowerPoint

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Step 2.3: Prioritize projects to maximize the value of the project portfolio within the constraint of resource capacity

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Perform a deeper retrospective on current project prioritization process
      • Optimize your process to maintain resource capacity supply and project demand data
      • Optimize your process to formally make disposition recommendations to appropriate decision makers

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Administrative Staff

      Outcomes of this step

      • Retrospective of the current project prioritization process: to continue doing, to start doing, and to stop doing
      • Realistic estimate of available resource capacity, in the absence of a resource management practice
      • Optimized process for presenting the decision makers with recommendations and facilitating capacity-constrained steering of the project portfolio
      • Project Intake and Prioritization Tool for facilitating the prioritization process
      • Documentation of the optimized process in the SOP document

      The availability of staff time is rarely factored into IT project and service delivery commitments

      A lot gets promised and worked on, and staff are always busy, but very little actually gets done – at least not within given timelines or to expected levels of quality.

      Organizations tend to bite off more than they can chew when it comes to project and service delivery commitments involving IT resources.

      While the need for businesses to make an excess of IT commitments is understandable, the impacts of systemically over-allocating IT are clearly negative:

      • Stakeholder relations suffer. Promises are made to the business that can’t be met by IT.
      • IT delivery suffers. Project timelines and quality frequently suffer, and service support regularly lags.
      • Employee engagement suffers. Anxiety and stress levels are consistently high among IT staff, while morale and engagement levels are low.

      76%: 76% of organizations say they have too many projects on the go and an unmanageable and ever-growing backlog of things to get to.

      – Cooper, 2014

      70%: Almost 70% of workers feel as though they have too much work on their plates and not enough time to do it.

      – Reynolds, 2016

      Unconstrained, unmanaged demand leads to prioritization of work based on consequences rather than value

      Problems caused by the organizational tendency to make unrealistic delivery commitments is further complicated by the reality of the matrix environment.

      Today, many IT departments use matrix organization. In this system, demands on a resource’s time come from many directions. While resources are expected to prioritize their work, they lack the authority to formally reject any demand. As a result, unconstrained, unmanaged demand frequently outstrips the supply of work-hours the resource can deliver.

      When this happens, the resource has three options:

      1. Work more hours, typically without compensation.
      2. Choose tasks not to do in a way that minimizes personal consequences.
      3. Diminish work quality to meet quantity demands.

      The result is an unsustainable system for all those involved:

      1. Individual workers cannot meet expectations, leading to frustration and disengagement.
      2. Managers cannot deliver on the projects or services they manage and struggle to retain skilled resources who are looking elsewhere for “greener pastures.”
      3. Executives cannot execute strategic plans as they lose decision-making power over their resources.

      Prioritize project demand by project value to get the most out of constrained project capacity – but practicing it is difficult

      The theory may be simple and intuitive, but the practice is extremely challenging. There are three practical challenges to making project prioritization effective.

      Project Prioritization

      Capacity awareness

      Many IT departments struggle to realistically estimate available project capacity in a credible way. Stakeholders question the validity of your endeavor to install capacity-constrained intake process, and mistake it for unwillingness to cooperate instead.

      Lack of authority

      Many PMOs and IT departments simply lack the ability to decline or defer new projects.

      Many moving parts

      Project intake, approval, and prioritization involve the coordination of various departments. Therefore, they require a great deal of buy-in and compliance from multiple stakeholders and senior executives.

      Project Approval

      Unclear definition of value

      Defining the project value is difficult, because there are so many different and conflicting ways that are all valid in their own right. However, without it, it's impossible to fairly compare among projects to select what's "best."

      Unclear definition of value

      In Step 1.1 of the blueprint, we took the first step toward resolving this challenge by prototyping a project valuation scorecard.

      A screenshot of Step 1.1 of this blueprint is shown.

      "Prioritization is a huge issue for us. We face the simultaneous challenges of not having enough resources but also not having a good way to say no. "

      – CIO, governmental health agency

      Address the challenges of capacity awareness and authority with a project prioritization workflow

      Info-Tech recommends following a four-step process for managing project prioritization.

      1. Collect and update supply and demand data
        1. Re-evaluate project value for all proposed, on-hold and ongoing projects
        2. Estimate available resource capacity for projects
      2. Prioritize project demand by value
        1. Identify highest-value, “slam-dunk” projects
        2. Identify medium-value, “on-the-bubble” projects
        3. Identify lower-value projects that lie beyond the available capacity
      3. Approve projects for initiation or continuation
        1. Submit recommendations for review
        2. Adjust prioritized list with business judgment
        3. Steering committee approves projects to work on
      4. Manage a realistically defined project portfolio
      • Stakeholder Need
      • Strategic Objectives
      • Resource Capacity

      Intake and Prioritization Tool

      Perform a start-stop-continue exercise to help determine what is working and what is not working

      2.3.1 Estimated Time: 60 minutes

      Optimizing project prioritization may not require a complete overhaul of your existing processes. You may only need to tweak certain templates or policies. Perhaps you started out with a strong process and simply lost resolve over time – in which case you will need to focus on establishing motivation and discipline, rather than rework your entire process.

      Perform a start-stop-continue exercise with your team to help determine what should be salvaged, what should be abandoned, and what should be introduced:

      1. On a whiteboard or equivalent, write “Start,” “Stop,” and “Continue” in three separate columns. 3. As a group, discuss the responses and come to an agreement as to which are most valid.
      2. Equip your team with sticky notes or markers and have them populate the columns with ideas and suggestions surrounding your current processes. 4. Document the responses to help structure your game plan for intake optimization.
      Start Stop Continue
      • Periodically review the project value scorecard with business stakeholders
      • “Loud Voices First” prioritization
      • Post-prioritization score changes
      • Updating project value scores for current projects

      INPUT

      • Current project prioritization workflow (Activity 1.2.2)
      • Project prioritization success criteria (Activity 1.2.6)

      OUTPUT

      • Retrospective review of current prioritization process

      Materials

      • Whiteboard
      • Sticky notes/markers

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Use Info-Tech’s lightweight Intake and Prioritization Tool to get started on capacity-constrained project prioritization

      Use Info-Tech’s Project Intake and Prioritization Tool to facilitate the scorecard-driven prioritization and ensure effective flow of data.

      This tool builds on the Project Valuation Scorecard Tool to address the challenges in project prioritization:

      1. Lack of capacity awareness: quickly estimate a realistic supply of available work hours for projects for a given prioritization period, in the absence of a reliable and well-maintained resource utilization and capacity data.
      2. Using standard project sizing, quickly estimate the size of the demand for proposed and ongoing projects and produce a report that recommends the list of projects to greenlight – and highlight the projects within that list that are at risk of being short-charged of resources – that will aim to help you tackle:

      3. Lack of authority to say “no” or “not yet” to projects: save time and effort in presenting the results of project prioritization analysis that will enable the decision makers to make well-informed, high-quality portfolio decisions.
      4. The next several slides will walk you through the tool and present activities to facilitate its use for your organization.

      Download Info-Tech’s Project Intake and Prioritization Tool.

      A screenshot of Info-Tech's Project Intake Prioritization Tool is shown.

      Create a high-level estimate of available project capacity to inform how many projects can be greenlighted

      2.3.2 Project Intake and Prioritization Tool, Tab 2: Project Capacity

      Estimate how many work-hours are at your disposal for projects using Info-Tech’s resource calculator.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool, Tab 2: Project Capacity

      1. Compile a list of each role within your department, the number of staff, and the hours in a typical work week.

      2. Enter the foreseeable out-of-office time (vacation, sick time, etc.). Typically, this value is 12-16% depending on the region.

      3. Enter how much working time is spent on non-projects for each role: administrative duties and “keep the lights on” work.

      4. Select a period of time for breaking down available resource capacity in hours.

      Project Work (%): Percentage of your working time that goes toward project work is calculated as what’s left after your non-project working time allocations have been subtracted.

      Project (h) Total Percentage: Take a note of this percentage as your project capacity. This number will put the estimated project demand in context for the rest of the tool.

      Example for a five-day work week:

      • 2 weeks (10 days) of statutory holidays
      • 3 weeks of vacation
      • 1.4 weeks (7 days) of sick days on average
      • 1 week (5 days) for company holidays

      Result: 7.4/52 weeks’ absence = 14%

      Estimate your available project capacity for the next quarter, half-year, or year

      2.3.2 Estimated Time: 30 minutes

      Discover how many work-hours are at your disposal for project work.

      1. Use the wisdom-of-the-crowd approach or resource utilization data to fill out Tab 2 of the tool. This is intended to be somewhat of a rough estimate; avoid the pitfall of being too granular in role or in time split.
      2. Choose a time period that corresponds to your project prioritization period: monthly, quarterly, 4 months, semi-annually (6 months), or annually.
      3. Examine the pie graph representation of your overall capacity breakdown, like the one shown below.

      Screenshot from Tab 2 of Project Intake and Prioritization Tool

      INPUT

      • Knowledge of organization’s personnel and their distribution of time

      OUTPUT

      • Estimate of available project capacity

      Materials

      • Project Intake and Prioritization Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      On average, only about half of the available project capacity results in productive project work

      Place realistic expectations on your resources’ productivity.

      Info-Tech’s PPM Current State Scorecard diagnostic provides a comprehensive view of your portfolio management strengths and weaknesses, including project portfolio management, project management, customer management, and resource utilization.

      A screenshot of Info-Tech's PPM Current State Scorecard diagnostic

      Use the wisdom of the crowd to estimate resource waste in:

      • Cancelled projects
      • Inefficiency
      • Suboptimal assignment of resources
      • Unassigned resources
      • Analyzing, fixing, and redeploying

      50% of PPM resource is wasted on average, effectively halving your available project capacity.

      Source: Info-Tech PPM Current State Scorecard

      Define project capacity and project t-shirt sizes

      2.3.3 Project Intake and Prioritization Tool, Tab 3: Settings

      The resource capacity calculator in the previous tab yields a likely optimistic estimate for how much project capacity is available. Based on this estimate as a guide, enter your optimistic (maximum) and pessimistic (minimum) estimates of project capacity as a percentage of total capacity:

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 3

      Info-Tech’s data shows that only about 50% of time spent on project work is wasted: cancelled projects, inefficiency, rework, etc. As a general rule, enter half of your maximum estimate of your project capacity.

      Capacity in work hours is shown here from the previous tab, to put the percentages in context. This example shows a quarterly breakdown (Step 4 from the previous slide; cell N5 in Tab 2.).

      Next, estimate the percentage of your maximum estimated project capacity that a single project would typically consume in the given period for prioritization.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 3

      These project sizes might not line up with the standard project levels from Step 2.1 of the blueprint: for example, an urgent mid-sized project that requires all hands on deck may need to consume almost 100% of maximum available project capacity.

      Estimate available project capacity and standard project demand sizes for prioritizing project demand

      2.3.3 Estimated Time: 30 minutes

      Refine your estimates of project capacity supply and demand as it applies to a prioritization period.

      1. The estimated project capacity from Activity 2.3.2 represents a theoretical limit. It is most likely an overestimation (see box below). As a group, discuss and decide on a more realistic available project capacity:
        1. Optimistic estimate, assuming sustained peak productivity from everyone in your organization;
        2. Pessimistic estimate, taking into account the necessary human downtime and the PPM resource waste (see previous slide).
      2. Refine the choices of standard project effort sizes, expressed as percentages of maximum project capacity. As a reminder, this sizing is for the chosen prioritization period, and is independent from the project levels set previously in Activity 2.1.4 and 2.1.5.

      Dedicated work needs dedicated break time

      In a study conducted by the Draugiem Group, the ideal work-to-break ratio for maximizing focus and productivity was 52 minutes of work, followed by 17 minutes of rest (Evans). This translates to 75% of resource capacity yielding productive work, which could inform your optimistic estimate of project capacity.

      INPUT

      • Project capacity (Activity 2.3.2)
      • PPM Current State Scorecard (optional)

      OUTPUT

      • Capacity and demand estimate data for tool use

      Materials

      • Project Intake and Prioritization Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Finish setting up the Project Intake and Prioritization Tool

      2.3.4 Project Intake and Prioritization Tool, Tab 3: Settings

      Enter the scoring criteria, which was worked out from Step 1.1 of the blueprint. This workbook supports up to ten scoring criteria; use of more than ten may make the prioritization step unwieldy.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 3

      Leave unused criteria rows blank.

      Choose “value” or “execution” from a drop-down.

      Score does not need to add up to 100.

      Finally, set up the rest of the drop-downs used in the next tab, Project Data. These can be customized to fit your unique project portfolio needs.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 3

      Enter project data into the Project Intake and Prioritization Tool

      2.3.4 Project Intake and Prioritization Tool, Tab 4: Project Data

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 4

      Ensure that each project has a unique name.

      Completed (or cancelled) projects will not be included in prioritization.

      Choose the standard project size defined in the previous tab.

      Change the heading when you customize the workbook.

      Days in Backlog is calculated from the Date Added column.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 4

      Overall weighted project prioritization score is calculated as a sum of value and execution scores.

      Weighted value and execution scores are calculated according to the scoring criteria table in the 2. Settings tab.

      Enter the raw scores. Weights will be taken into calculation behind the scenes.

      Spaces for unused intake scores will be greyed out. You can enter data, but they will not affect the calculated scores.

      Document your process to maintain resource capacity supply and project demand data

      2.3.4 Estimated Time: 30 minutes

      Review and customize section 4.2, “Maintain Supply and Demand Data” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of this activity is to document the process with which the supply and demand information will be updated for projects. Consider the following factors:

      1. Estimates of resource supply: how often will the resource supply be updated? How are you estimating the range (maximum vs. minimum, optimistic vs. pessimistic)? Leverage your existing organizational process assets for resource management.
      2. Updating project data for proposed projects: when and how often will the project valuation scores be updated? Do you have sufficient inputs? Examine the overall project approval process from Step 2.2 of the blueprint, and ensure that sufficient information is available for project valuation (Activity 2.2.3).
      3. Updating project data for ongoing projects: will you prioritize ongoing projects along with proposed projects? When and how often will the project valuation scores be updated? Do you have sufficient inputs?
      4. How will you account for the consumption of resource capacity? Do a rough order of estimate for the resource capacity consumed in this process.
      5. Who will handle exceptions? For example, PMO will maintain this process and will handle any questions or issues that pertain to this part of the process.

      INPUT

      • Organizational process assets for resource management, strategic planning, etc.
      • Activity 2.3.3
      • Activity 2.2.3

      OUTPUT

      • Process steps for refreshing supply and demand data

      Materials

      • SOP Template
      • Project Intake and Prioritization Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts
      • PMO Admin Staff

      Prioritized list of projects shows what fits under available project capacity for realizing maximum value

      2.3.5 Project Intake and Prioritization Tool, Tab 5: Results

      The output of the Project Intake and Prioritization Tool is a prioritized list of projects with indicators to show that their demand on project capacity will fit within the estimated available project capacity for the prioritization period.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 5

      Status indicates whether the project is proposed or ongoing; completed projects are excluded.

      Disposition indicates the course of recommended action based on prioritization.

      Proposed projects display how long they have been sitting in the backlog.

      Projects highlighted yellow are marked as “deliberate” for their dispositions. These projects pose risks of not getting properly resourced. One must proceed with caution if they are to be initiated or continued.

      Provide better support to decision makers with the prioritized list, and be prepared for their steering

      It is the portfolio manager’s responsibility to provide the project portfolio owners with reliable data and enable them to make well-informed decisions for the portfolio.

      The prioritized list of proposed and ongoing projects, and an approximate indication for how they fill out the estimated available resource capacity, provide a meaningful starting ground for discussion on which projects to continue or initiate, to hold, or to proceed with caution.

      However, it is important to recognize the limitation of the prioritization methodology. There may be legitimate reasons why some projects should be prioritized over another that the project valuation method does not successfully capture. At the end of the day, it’s the prerogative of the portfolio owners who carry on the accountabilities to steer the portfolio.

      The portfolio manager has a responsibility to be prepared for reconciling the said steering with the unchanged available resource capacity for project work. What comes off the list of projects to continue or initiate? Or, will we outsource capacity if we must meet irreconcilable demand? The next slide will show how Info-Tech’s tool helps you with this process.

      Info-Tech Best Practice

      Strive to become the best co-pilot. Constantly iterate on the scoring criteria to better adapt to the portfolio owners’ preference in steering the project portfolio.

      Manipulate the prioritized list with the Force Disposition list

      2.3.5 Project Intake and Prioritization Tool, Tab 5: Results

      The Force Disposition list enables you to inject subjective judgment in project prioritization. Force include and outsource override project prioritization scores and include the projects for approval:

      • Force include counts the project demand against capacity.
      • Outsource, on the other hand, does not count the project demand.
      • Force exclude removes a project from prioritized list altogether, without deleting the row and losing its data.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 5

      Choose a project name and a disposition using a drop-down.

      Use this list to test out various scenarios, useful for what-if analysis.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 5

      Document your process to formally make disposition recommendations to appropriate decision-making party

      2.3.5 Estimated Time: 60 minutes

      Review and customize section 4.3, “Approve projects for initiation or continuation” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      The goal of this activity is to formalize the process of presenting the prioritized list of projects for review, modify the list based on steering decisions, and obtain the portfolio owners’ approval for projects to initiate or continue, hold, or terminate. Consider the following factors:

      1. Existing final approval process: what are the new injections to the current decision-making process for final approval?
      2. Meeting prep, agenda, and follow-up: what are the activities that must be carried out by PMO / portfolio manager to support the portfolio decision makers and obtain final approval?
      3. “Deliberate” projects: what additional information should portfolio owners be presented with, in order to deliberate on the projects at risk of being not properly resourced? For example, consider a value-execution plot (right).

      A screenshot of Info-Tech's Project Intake and Prioritization Tool Tab 5

      INPUT

      • Approval process steps (Activity 2.2.2)
      • Steering Committee process documentation

      OUTPUT

      • Activities for supporting the decision-making body

      Materials

      • SOP Template
      • Project Intake and Prioritization Tool

      Participants

      • CIO
      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Once a project is approved, pass that which is known on to those responsible for downstream processes

      Aim to be responsible stewards of important and costly information developed throughout project intake, approval, and prioritization processes.

      Once the proposed project is given a green light, the project enters an initiation phase.

      No matter what project management methodology is employed, it is absolutely vital to pass on the knowledge gained and insights developed through the intake, approval, and prioritization processes. This ensures that the project managers and team are informed of the project’s purpose, business benefits, rationale for the project approval, etc. and be able to focus their efforts in realizing the project’s business goals.

      Recognize that this does not aim to create any new artifacts. It is simply a procedural safeguard against the loss of important and costly information assets for your organization.

      A flowchart is shown as an example of business documents leading to the development of a project charter.

      Information from the intake process directly feeds into, for example, developing a project charter.

      Source: PMBOK, 6th edition

      "If the project manager can connect strategy to the project they are leading (and therefore the value that the organization desires by sanctioning the project), they can ensure that the project is appropriately planned and managed to realize those benefits."

      – Randall T. Black, P.Eng., PMP; source: PMI Today

      Examine the new project intake workflow as a whole and document it in a flow chart

      2.3.6 Estimated Time: 30-60 minutes

      Review and customize section 4.1, “Project Prioritization Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template.

      In Step 1.2 of the blueprint, you mapped out the current project intake, approval, and prioritization workflow and documented it in a flow chart. In this step, take the time to examine the new project intake process as a whole, and document the new workflow in the form of a flow chart.

      1. Collect and update supply and demand data
      2. Prioritize project demand by value
      3. Approve projects for initiation or continuation
      4. Manage a realistically defined project portfolio

      Consider the following points:

      1. Are the inputs and outputs of each step clear? Who’s doing the work? How long will each step take, on average?
      2. Is the ownership of each step clear? How will we ensure a smooth handoff between each step and prevent requests from falling through the cracks?

      INPUT

      • New process steps for project prioritization (Activities 2.3.x-y)

      OUTPUT

      • Flowchart representation of new project prioritization workflow

      Materials

      • Microsoft Visio, flowchart software, or Microsoft PowerPoint

      Participants

      • CIO
      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Leverage Info-Tech’s other blueprints to complement your project prioritization processes

      The project capacity estimates overlook a critical piece of the resourcing puzzle for the sake of simplicity: skills. You need the right skills at the right time for the right project.

      Use Info-Tech’s Balance Supply and Demand with Realistic Resource Management Practices blueprint to enhance the quality of information on your project supply.

      A screenshot of Info-Tech's Balance Supply and Demand with Realistic Resource Management Practices blueprint.

      There is more to organizing your project portfolio than a strict prioritization by project value. For example, as with a financial investment portfolio, project portfolio must achieve the right investment mix to balance your risks and leverage opportunities.

      Use Info-Tech’s Maintain an Organized Portfolio blueprint to refine the makeup of your project portfolio.

      A screenshot of Info-Tech's Maintain an Organized Portfolio blueprint.

      Continuous prioritization of projects allow organizations to achieve portfolio responsiveness.

      Use Info-Tech’s Manage an Agile Portfolio blueprint to take prioritization of your project portfolio to the next level.

      A screenshot of Info-Tech's Manage an Agile Portfolio blueprint

      46% of organizations use a homegrown PPM solution. Info-Tech’s Grow Your Own PPM Solution blueprint debuts a spreadsheet-based Portfolio Manager tool that provides key functionalities that integrates those of the Intake and Prioritization Tool with resource management, allocation and portfolio reporting capabilities.

      A screenshot of Info-Tech's Grow Your Own PPM Solution blueprint

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      A picture of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.2-6

      A screenshot of activities 2.1.2-6 is shown.

      Optimize your process to receive, triage, and follow up on project requests

      Discussion on decision points and topics of consideration will be facilitated to leverage the diverse viewpoints amongst the workshop participants.

      2.3.2-5

      A screenshot of activities 2.3.2-5 is shown.

      Set up a capacity-informed project prioritization process using Info-Tech’s Project Intake and Prioritization Tool

      A table-top planning exercise helps you visualize the current process in place and identify opportunities for optimization.

      Phase 3

      Integrate the New Optimized Processes into Practice

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Integrate the New Optimized Processes into Practice

      Proposed Time to Completion: 6-12 weeks

      Step 3.1: Pilot your process to refine it prior to rollout

      Start with an analyst kick-off call:

      • Review the proposed intake, approval, and prioritization process

      Then complete these activities…

      • Select receptive stakeholders to work with
      • Define the scope of your pilot and determine logistics
      • Document lessons learned and create an action plan for any changes

      With these tools & templates:

      • Process Pilot Plan
      • Project Backlog Manager Job Description

      Step 3.2: Analyze the impact of organizational change

      Review findings with analyst:

      • Results of the process pilot and the finalized intake SOP
      • Key PPM stakeholders
      • Current organizational climate

      Then complete these activities…

      • Analyze the stakeholder impact and responses to impending organizational change
      • Create message canvases for at-risk change impacts and stakeholders to create an effective communication plan

      With these tools & templates:

      • Intake Process Implementation Impact Analysis Tool

      Phase 3 Results & Insights:

      • Engagement paves the way for smoother adoption. An “engagement” approach (rather than simply “communication”) turns stakeholders into advocates who can help boost your message, sustain the change, and realize benefits without constant intervention or process command-and-control.

      Step 3.1: Pilot your intake, approval, and prioritization process to refine it before rollout

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Select receptive managers to work with during your pilot
      • Define the scope of your pilot and determine logistics
      • Plan to obtain feedback, document lessons learned, and create an action plan for any changes
      • Finalize Project Intake, Approval, and Prioritization SOP

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts

      Outcomes of this step

      • A pilot team
      • A process pilot plan that defines the scope, logistics, and process for retrospection
      • Project Backlog Manager job description
      • Finalized Project Intake, Approval, and Prioritization SOP for rollout

      Pilot your new processes to test feasibility and address issues before a full deployment

      Adopting the right set of practices requires a significant degree of change that necessitates buy-in from varied stakeholders throughout IT and the business.

      Rome wasn’t built in a day. Similarly, benefits of optimized project intake, approval, and prioritization process will not be realized overnight.

      Resist the urge to deploy a big-bang roll out of your new intake practices. The approach is ill advised for two main reasons:

      • It will put more of a strain on the implementation team in the near term, with a larger pool of end users to train and collect data from.
      • Putting untested practices in a department-wide spotlight could lead to mass confusion in the near-term and color the new processes in a negative light, leading to a loss of stakeholder trust and engagement right out-of-the-gate.

      Start with a pilot phase. Identify receptive lines of business and IT resources to work with, and leverage their insights to help iron out the kinks in your process before unveiling your practices to IT and all business users at large.

      This step will help you to:

      • Plan and execute a pilot of the processes we developed in Phase 2.
      • Incorporate the lessons learned from that pilot to strengthen your SOP and ease the communication process.

      Info-Tech Insight

      Engagement paves the way for smoother adoption. An “engagement” approach (rather than simply “communication”) turns stakeholders into advocates who can help boost your message, sustain the change, and realize benefits without constant intervention or process command-and-control.

      Plan your pilot like you would any project to ensure it’s well defined and its goals are clearly articulated

      Use Info-Tech’s Intake Process Pilot Plan Template to help define the scope of your pilot and set appropriate goals for the test-run of your new processes.

      A process pilot is a limited scope of an implementation (constrained by time and resources involved) in order to test the viability and effectiveness of the process as it has been designed.

      • Investing time and energy into a pilot phase can help to lower implementation risk, enhance the details and steps within a process, and improve stakeholder relations prior to a full scale rollout.
      • More than a dry run, however, a pilot should be approached strategically, and planned out to limit the scope of it and achieve specific outcomes.
      • Leverage a planning document to ensure your process pilot is grounded in a common set of definitions, that the pilot is delivering value and insight, and that ultimately the pilot can serve as a starting point for a full-scale process implementation.

      Download Info-Tech’s Process Pilot Plan Template

      A screenshot of Info-Tech's Process Pilot Plan Template is shown.

      "The advantages to a pilot are several. First, risk is constrained. Pilots are closely monitored so if a problem does occur, it can be fixed immediately. Second, the people working in the pilot can become trainers as you roll the process out to the rest of the organization. Third, the pilot is another opportunity for skeptics to visit the pilot process and learn from those working in it. There’s nothing like seeing a new process working for people to change their minds."

      Daniel Madison

      Select receptive stakeholders to work with during your pilot

      3.1.1 Estimated Time: 20-60 minutes

      Info-Tech recommends selecting PPM stakeholders who are aware of your role and some of the challenges in project intake, approval, and prioritization to assist in the implementation process.

      1. If receptive PPM stakeholders are known, schedule a 15-minute meeting with them to inquire if they would be willing to be part of the pilot process.
      2. If receptive project managers are not known, use Info-Tech’s Stakeholder Engagement Workbook to conduct a formal selection process.
        1. Enter a list of potential participants for pilot in tab 3.
        2. Rate project managers in terms of influence, pilot interest, and potential deployment contribution within tab 4.
        3. Review tab 5 in the workbook. Receptive PPM stakeholders will appear in the top quadrants. Ideal PPM stakeholders for the pilot are located in the top right quadrant of the graph.

      A screenshot of Info-Tech's Stakeholder Engagement Workbook Tab 5 is shown.

      INPUT

      • Project portfolio management stakeholders (Activity 1.2.3)

      OUTPUT

      • Pilot project team

      Materials

      • Stakeholder Engagement Workbook
      • Process Pilot Plan Template

      Participants

      • PMO Director/ Portfolio Manager
      • CIO (optional)

      Document the PPM stakeholders involved in your pilot in Section 3 of Info-Tech’s Process Pilot Plan Template.

      Define the scope of your pilot and determine logistics

      3.1.2 Estimated Time: 60-90 minutes

      Use Info-Tech’s Process Pilot Plan Template to design the details of your pilot.

      Investing time into planning your pilot phase strategically will ensure a clear scope, better communications for those piloting the processes, and – overall – better, more actionable results for the pilot phase. The Pilot Plan Template is broken into five sections to assist in these goals:

      • Pilot Overview and Scope
      • Success and Risk Factors
      • Stakeholders Involved and Communications Plan
      • Pilot Retrospective and Feedback Protocol

      The duration of your pilot should go at least one prioritization period, e.g. one to two quarters.

      Estimates of time commitments should be captured for each stakeholder. During the retrospective at the end of the pilot you should capture actuals to help determine the time-cost of the process itself and measure its sustainability.

      Once the Plan Template is completed, schedule time to share and communicate it with the pilot team and executive sponsors of the process.

      While you should invest time in this planning document, continue to lean on the Intake, Approval, and Prioritization SOP throughout the pilot phase.

      INPUT

      • Sections 1 through 4 of the Process Pilot Plan Template

      OUTPUT

      • A process pilot plan

      Materials

      • Process Pilot Plan Template

      Participants

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts
      • CIO (optional)

      Execute your pilot and prepare to make process revisions before the full rollout

      Hit play! Begin the process pilot and get familiar with the work routine and resource management solution.

      Some things to keep in mind during the pilot include:

      • Depending on the solution you are using, you will likely need to spend one day or less to populate the tool. During the pilot, measure the time and effort required to manage the data within the tool. Determine whether time and effort required is viable on an ongoing basis (i.e. can you do it every month or quarter) and has value.
      • Meet with the pilot team and other stakeholders regularly during the pilot, at least biweekly. Allow the team (and yourself) to speak honestly and openly about what isn’t working. The pilot is your chance to make things better.
      • Keep notes about what will need to change in the SOP. For major changes, you may have to tweak the process during the pilot itself. Update the process documents as needed and communicate the changes and why they’re being made. If required, update the scope of the pilot in the Pilot Plan Template.
      An example is shown on how to begin the process pilot and getting familiar with the work routine and resource management solution.

      Obtain feedback from the pilot group to improve your processes before a wider rollout

      3.1.3 Estimated Time: 30 minutes

      Pilot projects allow you to validate your assumptions and leverage lessons learned. During the planning of the pilot, you should have scheduled a retrospective meeting with the pilot team to formally assess strengths and weaknesses in the process you have drafted.

      • Schedule the retrospective shortly after the pilot is completed. Info-Tech recommends performing a Stop/Start/Continue meeting with pilot participants to obtain and capture feedback.
      • Have members of the meeting record any processes/activities on sticky notes that should:
        • Stop: because they are ineffective or not useful
        • Start: because they would be useful for the tool and have not been incorporated into current processes
        • Continue: because they are useful and positively contribute to intended process outcomes.

      An example of how to structure a Stop/Start/Continue activity on a whiteboard using sticky notes.

      An example of stop, start, and continue is activity is shown.

      INPUT

      • What’s working and what isn’t in the process

      OUTPUT

      • Ideas to improve process

      Materials

      • Whiteboard
      • Sticky notes
      • Process Pilot Plan Template

      Participants

      • Process owner (PMO director or portfolio owner)
      • Pilot team

      See the following slide for additional instructions.

      Document lessons learned and create an action plan for any changes to the processes

      3.1.4 Estimated Time: 30 minutes

      An example of stop, start, and continue is activity is shown.

      As a group, discuss everyone’s responses and organize according to top priority (mark with a 1) and lower priority/next steps (mark with a 2). At this point, you can also remove any sticky notes that are repetitive or no longer relevant.

      Once you have organized based on priority, be sure to come to a consensus with the group regarding which actions to take. For example, if the group agrees that they should “stop holding meetings weekly,” come to a consensus regarding how often meetings will be held, i.e. monthly.

      Priority Action Required Who is Responsible Implementation Date
      Stop: Holding meetings weekly Hold meetings monthly Jane Doe, PMO Next Meeting: August 1, 2017
      Start: Discussing backlog during meetings Ensure that backlog data is up to date for discussion on date of next meeting. John Doe, Portfolio Manager August 1, 2017

      Create an action plan for the top priority items that require changes (the Stops and Starts). Record in this slide, or your preferred medium. Be sure to include who is responsible for the action and the date that it will be implemented.

      Document the outcomes of the start/stop/continue and your action plan in Section 6 of Info-Tech’s Process Pilot Plan Template.

      Use Info-Tech’s Backlog Manager Job Description Template to help fill any staffing needs around data maintenance

      3.1 Project Backlog Manager Job Description

      You will need to determine responsibilities and accountabilities for portfolio management functions within your team.

      If you do not have a clearly identifiable portfolio manager at this time, you will need to clarify who will wear which hats in terms of facilitating intake and prioritization, high-level capacity awareness, and portfolio reporting.

      • Use Info-Tech’s Project Backlog Manager job description template to help clarify some of the required responsibilities to support your intake, approval, and prioritization strategy.
        • If you need to bring in an additional staff member to help support the strategy, you can customize the job description template to help advertise the position. Simply edit the text in grey within the template.
      • If you have other PPM tasks that you need to define responsibilities for, you can use the RASCI chart on the final tab of the PPM Strategy Development Tool.

      Download Info-Tech’s Project Backlog Manager job description template.

      A screenshot of Info-Tech's Project Backlog Manager template is shown.

      Finalize the Intake, Approval, and Prioritization SOP and prepare to communicate your processes

      Once you’ve completed the pilot process and made the necessary tweaks, you should finalize your Intake, Approval, and Prioritization SOP and prepare to communicate it.

      Update section 1.2, “Overall Process Workflow” in Info-Tech’s Project Intake, Approval, and Prioritization SOP Template with the new process flow.

      Revisit your SOP from Phase 2 and ensure it has been updated to reflect the process changes that were identified in activity 3.1.4.

      • If during the pilot process the data was too difficult or time consuming to maintain, revisit the dimensions you have chosen and choose dimensions that are easier to accurately maintain. Tweak your process steps in the SOP accordingly.
      • In the long term, if you are not observing any progress toward achieving your success criteria, revisit the impact analysis that we’ll prepare in step 3.2 and address some of these inhibitors to organizational change.

      Download Info-Tech’s Project Intake, Approval, and Prioritization SOP template.

      A screenshot of Info-Tech's Project Intake, Approval, and Prioritization SOP template.

      Info-Tech Best Practice

      Make your SOP high impact. SOPs are often at risk of being left unmaintained and languishing in disuse. Improve the SOP’s succinctness and usability by making it visual; consult Info-Tech’s blueprint, Create Visual SOP Documents that Drive Process Optimization, Not Just Peace of Mind.

      Step 3.2: Analyze the impact of organizational change through the eyes of PPM stakeholders to gain their buy-in

      PHASE 1 PHASE 2 PHASE 3

      1.1

      Define project valuation criteria

      1.2

      Envision process target state

      2.1

      Streamline intake

      2.2

      Right-size approval steps

      2.3

      Prioritize projects to fit resource capacity

      3.1

      Pilot your optimized process

      3.2

      Communicate organizational change

      This step will walk you through the following activities:

      • Analyze the stakeholder impact and responses to impending organizational change
      • Create message canvases for at-risk change impacts and stakeholders
      • Set the course of action for communicating changes to your stakeholders

      This step involves the following participants:

      • PMO Director / Portfolio Manager
      • Project Managers
      • Business Analysts

      Outcomes of this step

      • A thorough organizational change impact analysis, based on Info-Tech’s expertise in organizational change management
      • Message canvases and communication plan for your stakeholders
      • Go-live for the new intake, approval, and prioritization process

      Manage key PPM stakeholders and communicate changes

      • Business units: Projects are undertaken to provide value to the business. Senior management from business units must help define how project will be valued.
      • IT: IT must ensure that technical/practical considerations are taken into account when determining project value.
      • Finance: The CFO or designated representative will ensure that estimated project costs and benefits can be used to manage the budget.
      • PMO: PMO is the administrator of the project portfolio. PMO must provide coordination and support to ensure the process operates smoothly and its goals are realized.
      • Business analysts: BAs carry out the evaluation of project value. Therefore, their understanding of the evaluation criteria and the process as a whole are critical to the success of the process.
      • Project sponsors: Project sponsors are accountable for the realization of benefits for which projects are undertaken.

      Impacts will be felt differently by different stakeholders and stakeholder groups

      As you assess change impacts, keep in mind that no impact will be felt the same across the organization. Depth of impact can vary depending on the frequency (will the impact be felt daily, weekly, monthly?), the actions necessitated by it (e.g. will it change the way the job is done or is it simply a minor process tweak?), and the anticipated response of the stakeholder (support, resistance, indifference?).

      Use the Organizational Change Depth Scale below to help visualize various depths of impact. The deeper the impact, the tougher the job of managing change will be.

      Procedural Behavioral Interpersonal Vocational Cultural
      Procedural change involves changes to explicit procedures, rules, policies, processes, etc. Behavioral change is similar to procedural change, but goes deeper to involve the changing tacit or unconscious habits. Interpersonal change goes beyond behavioral change to involve changing relationships, teams, locations, reporting structures, and other social interactions. Vocational change requires acquiring new knowledge and skills, and accepting the loss or decline in the value or relevance of previously acquired knowledge and skills. Cultural change goes beyond interpersonal and vocational change to involve changing personal values, social norms, and assumptions about the meaning of good vs. bad or right vs. wrong.
      Example: providing sales reps with mobile access to the CRM application to let them update records from the field. Example: requiring sales reps to use tablets equipped with a custom mobile application for placing orders from the field. Example: migrating sales reps to work 100% remotely. Example: migrating technical support staff to field service and sales support roles. Example: changing the operating model to a more service-based value proposition or focus.

      Perform a change impact analysis to maximize the chances of adoption for the new intake process

      Invest time and effort to analyze the impact of change to create an actionable stakeholder communication plan that yields the desirable result: adoption.

      Info-Tech’s Drive Organizational Change from the PMO blueprint offers the OCM Impact Analysis Tool to helps document the change impact across multiple dimensions, enabling the project team to review the analysis with others to ensure that the most important impacts are captured.

      This tool has been customized for optimizing project intake, approval, and prioritization process to deliver the same result in a more streamlined way. The next several slides will take you through the activities to ultimately create an OCM message canvas and a communication plan for your key stakeholders.

      Download Info-Tech’s Intake and Prioritization Impact Analysis Tool.

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool is shown.

      "As a general principle, project teams should always treat every stakeholder initially as a recipient of change. Every stakeholder management plan should have, as an end goal, to change recipients’ habits or behaviors."

      -PMI, 2015

      Set up the Intake Process and Prioritization Impact Analysis Tool

      3.2.1 Intake and Prioritization Impact Analysis Tool, Tab 2-3

      In Tab 2, enter your stakeholders’ names. Represent stakeholders as a group if you expect the impact of change on them to be reasonably uniform, as well as their anticipated responses. Otherwise, consider adding them as individuals or subgroups.

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 2 is shown.

      In Tab 3, enter whether you agree or disagree with each statement that represents an element of organizational change that be introduced as the newly optimized intake process is implemented.

      As a result of the change initiative in question:

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 3 is shown.

      Analyze the impact and the anticipated stakeholder responses of each change

      3.2.1 Intake and Prioritization Impact Analysis Tool, Tab 4: Impact Analysis Inputs

      Each change statement that you agreed with in Tab 3 are listed here in Tab 4 of the Intake and Prioritization Impact Analysis Tool. For each stakeholder, estimate and enter the following data:

      1. Frequency of the Impact: how often will the impact of the change be felt?
      2. Effort Associated with Impact: what is the demand on a stakeholder’s effort to implement the change?
      3. Anticipated Response: rate from enthusiastic response to active subversion. Honest and realistic estimates of anticipated responses are critical to the rest of the impact analysis.
      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 4 is shown.

      Analyze the stakeholder impact and responses to impending organizational change as a group

      3.2.1 Estimated Time: 60-90 minutes

      Divide and conquer. Leverage the group to get through the seemingly daunting amount of work involved with impact analysis.

      1. Divide the activity participants into subgroups and assign a section of the impact analysis. It may be helpful to do one section together as a group to make sure everyone is roughly on the same page for assessing impact.
      2. Suggested ways to divide up the impact analysis include:

      • By change impact. This would be suitable when the process owners (or would-be process owners) are available and participating.
      • By stakeholders. This would be suitable for large organizations where the activity participants know some stakeholders better than others.

      Tip: use a spreadsheet tool that supports multi-user editing (e.g. Google Sheets, Excel Online).

    • Aggregate the completed work and benchmark one another’s analysis by reviewing them with the entire group.
    • INPUT

      • Organizational and stakeholder knowledge
      • Optimized intake process

      OUTPUT

      • Estimates of stakeholder-specific impact and response

      Materials

      • Intake and Prioritization Impact Analysis Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Info-Tech Insight

      Beware of bias. Groups are just as susceptible to producing overly optimistic or pessimistic analysis as individuals, just in different ways. Unrealistic change impact analysis will compromise your chances of arriving at a reasonable, tactful stakeholder communication plan.

      Examine your impact analysis report

      3.2.2 Intake and Prioritization Impact Analysis Tool, Tab 5: Impact Analysis Outputs

      These outputs are based on the impacts you analyzed in Tab 4 of the tool (Activity 3.2.1). They are organized in seven sections:

      1. Top Five Highest Risk Impacts, based on the frequency and effort inputs across all impacts.
      2. Overall Process Adoption Rating (top right), showing the overall difficulty of this change given likelihood/risk that the stakeholders involved will absorb the anticipated change impacts.
      3. Top Five Most Impacted Stakeholders, based on the frequency and effort inputs across all impacts.
      4. Top Five Process Supporters and;
      5. Top Five Process Resistors, based on the anticipated response inputs across all impacts.
      6. Impact Register (bottom right): this list breaks down each change’s likelihood of adoption.
      7. Potential Impacts to Watch Out For: this list compiles all of the "Don't Know" responses from Tab 3.
      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 5 is shown. It shows Section 2. Overall process adoption rating. A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 5 is shown. It shows Section 6. Impact Register.

      Tailor messages for at-risk change impacts and stakeholders with Info-Tech’s Message Canvas

      3.2.2 Intake and Prioritization Impact Analysis Tool, Tab 6: Message Canvas

      Use Info-Tech’s Message Canvas on this tab to help rationalize and elaborate the change vision for each group.

      Elements of a Message Canvas

      • Why is there a need for this process change?
      • What will be new for this audience?
      • What will go away for this audience?
      • What will be meaningfully unchanged for this audience?
      • How will this change benefit this audience?
      • When and how will the benefits be realized for this audience?
      • What does this audience have to do for this change to succeed?
      • What does this audience have to stop doing for this change to succeed?
      • What should this audience continue doing?
      • What support will this audience receive to help manage the transition?
      • What should this audience expect to do/happen next?

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 6 is shown.

      Info-Tech Insight

      Change thy language, change thyself.

      Jargon, acronyms, and technical terms represent deeply entrenched cultural habits and assumptions.

      Continuing to use jargon or acronyms after a transition tends to drag people back to old ways of thinking and working.

      You don’t need to invent a new batch of buzzwords for every change (nor should you), but every change is an opportunity to listen for words and phrases that have lost their meaning through overuse and abuse.

      Create message canvases for at-risk change impacts and stakeholders as a group

      3.2.2 Estimated Time: 90-120 minutes

      1. Decide on the number of message canvases to complete. This will be based on the number of at-risk change impacts and stakeholders.
      2. Divide the activity participants into subgroups and assign a section of the message canvas. It may be helpful to do one section together as a group to make sure everyone is roughly on the same page for assessing impact.
      3. Aggregate the completed work and benchmark the message canvases amongst subgroups.

      Remember these guidelines to help your messages resonate:

      • People are busy and easily distracted. Tell people what they really need to know first, before you lose their attention.
      • Repetition is good. Remember the Aristotelian triptych: “Tell them what you’re going to tell them, then tell them, then tell them what you told them.”
      • Don’t use technical terms, jargon, or acronyms. Different groups in organizations tend to develop specialized vocabularies. Everybody grows so accustomed to using acronyms and jargon every day that it becomes difficult to notice how strange it sounds to outsiders. This is especially important when IT communicates with non-technical audiences. Don’t alienate your audience by talking at them in a strange language.
      • Test your message. Run focus groups or deliver communications to a test audience (which could be as simple as asking 2–3 people to read a draft) before delivering messages more broadly.

      – Info-Tech Blueprint, Drive Organizational Change from the PMO

      INPUT

      • Impact Analysis Outputs
      • Organizational and stakeholder knowledge

      OUTPUT

      • Estimates of stakeholder-specific impact and response

      Materials

      • Intake and Prioritization Impact Analysis Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Distill the message canvases into a comprehensive communication plan

      3.2.3 Intake and Prioritization Impact Analysis Tool, Tab 7: Communication Plan

      The communication plan creates an action plan around the message canvases to coordinate the responsibilities of delivering them, so the risks of “dropping the ball” on your stakeholders are minimized.

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 7: Communication is shown.

      1. Choose a change impact from a drop-down menu.

      2. Choose an intended audience...

      … and the message canvas to reference.

      3. Choose the method of delivery. It will influence how to craft the message for the stakeholder.

      4. Indicate who is responsible for creating and communicating the message.

      A screenshot of Info-Tech's Intake and Prioritization Impact Analysis Tool, Tab 7: Communication is shown.

      5. Briefly indicate goal of the communication and the likelihood of success.

      6. Record the dates to plan and track the communications that take place.

      Set the course of action for communicating changes to your stakeholders

      3.2.2 Estimated Time: 90-120 minutes

      1. Divide the activity participants into subgroups and assign communication topics to each group. There should be one communication topic for each change impact. Based on the message canvas, create a communication plan draft.
      2. Aggregate the completed work and benchmark the communication topic amongst subgroups.
      3. Share the finished communication plan with the rest of the working group. Do not share this file widely, but keep it private within the group.

      Identify critical points in the change curve:

      1. Honeymoon of “Uninformed Optimism”: There is usually tentative support and even enthusiasm for change before people have really felt or understood what it involves.
      2. Backlash of “Informed Pessimism” (leading to “Valley of Despair”): As change approaches or begins, people realize they’ve overestimated the benefits (or the speed at which benefits will be achieved) and underestimated the difficulty of change.
      3. Valley of Despair and beginning of “Hopeful Realism”: Eventually, sentiment bottoms out and people begin to accept the difficulty (or inevitability) of change.
      4. Bounce of “Informed Optimism”: People become more optimistic and supportive when they begin to see bright spots and early successes.
      5. Contentment of “Completion”: Change has been successfully adopted and benefits are being realized.

      Based on Don Kelley and Daryl Conner’s Emotional Cycle of Change.

      INPUT

      • Change impact analysis results
      • Message canvases
      • List of stakeholders

      OUTPUT

      • Communication Plan

      Materials

      • Intake and Prioritization Impact Analysis Tool

      Participants

      • PMO Director/ Portfolio Manager
      • Project Managers
      • Business Analysts

      Roll out the optimized intake, approval, and prioritization process, and continually monitor adoption and success

      As you implement your new project intake process, familiarize yourself with common barriers and challenges.

      There will be challenges to watch for in evaluating the effectiveness of your intake processes. These may include circumvention of process by key stakeholders, re-emergence of off-the-grid projects and low-value initiatives.

      As a quick and easy way to periodically assess your processes, consider the following questions:

      • Are you confident that all work in progress is being tracked via the project list?
      • Are your resources all currently working on high-value initiatives?
      • Since optimizing, have you been able to deliver (or are you on target to deliver) all that has been approved, with no initiatives in states of suspended animation for long periods of time?
      • Thanks to sufficient portfolio visibility and transparency into your capacity, have you been able to successfully decline requests that did not add value or that did not align with resourcing?

      If you answer “no” to any of these questions after a sufficient post-implementation period (approximately six to nine months, depending on the scope of your optimizing), you may need to tweak certain aspects of your processes or seek to align your optimization with a lower capability level in the short term.

      Small IT department struggles to optimize intake and to communicate new processes to stakeholders

      CASE STUDY

      Industry: Government

      Source: Info-Tech Client

      Challenge

      There is an IT department for a large municipal government. Possessing a relatively low level of PPM maturity, IT is in the process of establishing more formal intake practices in order to better track, and respond to, project requests. New processes include a minimalist request form (sent via email) coupled with more thorough follow-up from BAs and PMs to determine business value, ROI, and timeframes.

      Solution

      Even with new user-friendly processes in place, IT struggles to get stakeholders to adopt, especially with smaller initiatives. These smaller requests frequently continue to come in outside of the formal process and, because of this, are often executed outside of portfolio oversight. Without good, reliable data around where staff time is spent, IT lacks the authority to decline new requests.

      Results

      IT is seeking further optimization through better communication. They are enforcing discipline on stakeholders and reiterating that all initiatives, regardless of size, need to be directed through the process. IT is also training its staff to be more critical. “Don’t just start working on an initiative because a stakeholder asks.” With staff being more critical and directing requests through the proper queues, IT is getting better at tracking and prioritizing requests.

      "The biggest challenge when implementing the intake process was change management. We needed to shift our focus from responding to requests to strategically thinking about how requests should be managed. The intake process allows the IT Department to be transparent to customers and enables decision makers."

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      A picture of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.1

      A screenshot of activity 3.1.1 is shown

      Select receptive stakeholders to work with during your pilot

      Identify the right team of supportive PPM stakeholders to carry out the process pilot. Strategies to recruit the right people outside the workshop will be discussed if appropriate.

      3.2.1

      A screenshot of activity 3.2.1 is shown.

      Analyze the stakeholder impact and responses to impending organizational change

      Carry out a thorough analysis of change impact in order to maximize the effectiveness of the communication strategy in support of the implementation of the optimized process.

      Insight breakdown

      Insight 1

      • The overarching goal of optimizing project intake, approval, and prioritization process is to maximize the throughput of the best projects. To achieve this goal, one must have a clear way to determine what are “the best” projects.

      Insight 2

      • Info-Tech’s methodology systemically fits the project portfolio into its triple constraint of stakeholder needs, strategic objectives, and resource capacity to effectively address the challenges of establishing organizational discipline for project intake.

      Insight 3

      • Engagement paves the way for smoother adoption. An “engagement” approach (rather than simply “communication”) turns stakeholders into advocates who can help boost your message, sustain the change, and realize benefits without constant intervention or process command-and-control.

      Summary of accomplishment

      Knowledge Gained

      • Triple constraint model of project portfolio: stakeholder needs, strategic objectives, and resource capacity
      • Benefits of optimizing project intake, approval, and prioritization for managing a well-behaved project portfolio
      • Challenges of installing well-run project intake
      • Importance of piloting the process and communicating impacts to stakeholders

      Processes Optimized

      • Project valuation process: scorecard, weights
      • Project intake process: reception, triaging, follow-up
      • Project approval process: steps, accountabilities, deliverables
      • Project prioritization process: estimation of resource capacity for projects, project demand
      • Communication for organizational change

      Deliverables Completed

      • Optimized Project Intake, Approval, and Prioritization Process
      • Documentation of the optimized process in the form of a Standard Operating Procedure
      • Project valuation criteria, developed with Project Value Scorecard Development Tool and implemented through the Project Intake and Prioritization Tool
      • Standardized project request form with right-sized procedural friction
      • Standard for project level classification, implemented through the Project Intake Classification Matrix
      • Toolbox of deliverables for capturing information developed to inform decision makers for approval: Benefits Commitment Form, Technology Assessment Tool, Business Case Templates
      • Process pilot plan
      • Communication plan for organizational change, driven by a thorough analysis of change impacts on key stakeholders using the Intake and Prioritization Impact Analysis Tool

      Research contributors and experts

      Picture of Kiron D. Bondale

      Kiron D. Bondale, PMP, PMI - RMP

      Senior Project Portfolio & Change Management Professional

      A placeholder photo is shown here.

      Scot Ganshert, Portfolio Group Manager

      Larimer County, CO

      Picture of Garrett McDaniel

      Garrett McDaniel, Business Analyst II – Information Technology

      City of Boulder, CO

      A placeholder photo is shown here.

      Joanne Pandya, IT Project Manager

      New York Property Insurance Underwriters

      Picture of Jim Tom.

      Jim Tom, CIO

      Public Health Ontario

      Related Info-Tech research

      A screenshot of Info-Tech's Develop a Project Portfolio Management Strategy blueprint

      Develop a Project Portfolio Management Strategy blueprint"

      A screenshot of Info-Tech's Grow Your Own PPM Solution blueprint is shown.

      Grow Your Own PPM Solution

      A screenshot of Info-Tech's Balance Supply and Demand with Realistic Resource Management Practices blueprint is shown.

      Balance Supply and Demand with Realistic Resource Management Practices

      A screenshot of Info-Tech's Maintain an Organized Portfolio blueprint is shown.

      Maintain an Organized Portfolio

      A screenshot of Info-Tech's Manage a Minimum Viable PMO blueprint is shown.

      Manage a Minimum Viable PMO

      A screenshot of Info-Tech's Establish the Benefits Realization Process blueprint is shown.

      Establish the Benefits Realization Process

      A screenshot of Info-Tech's Manage an Agile Portfolio blueprint is shown.

      Manage an Agile Portfolio

      A screenshot of Info-Tech's Tailor Project Management Processes to Fit Your Projects blueprint is shown.

      Tailor Project Management Processes to Fit Your Projects

      A screenshot of Info-Tech's Project Portfolio Management Diagnostic Program blueprint is shown.

      Project Portfolio Management Diagnostic Program

      The Project Portfolio Management Diagnostic Program is a low-effort, high-impact program designed to help project owners assess and improve their PPM practices. Gather and report on all aspects of your PPM environment to understand where you stand and how you can improve.

      Bibliography

      Boston Consulting Group. “Executive Sponsor Engagement: Top Driver of Project and Program Success.” PMI, 2014. Web.

      Boston Consulting Group. “Winning Through Project Portfolio Management: the Practitioners’ Perspective.” PMI, 2015. Web.

      Bradberry, Travis. “Why The 8-Hour workday Doesn’t Work.” Forbes, 7 Jun 2016. Web.

      Cook, Scott. Playbook: Best Practices. Business Week

      Cooper, Robert, G. “Effective Gating: Make product innovation more productive by using gates with teeth.” Stage-Gate International and Product Development Institute. March/April 2009. Web.

      Epstein, Dan. “Project Initiation Process: Part Two.” PM World Journal. Vol. IV, Issue III. March 2015. Web.

      Evans, Lisa. “The Exact Amount of Time You Should Work Every Day.” Fast Company, 15 Sep. 2014. Web.

      Madison, Daniel. “The Five Implementation Options to Manage the Risk in a New Process.” BPMInstitute.org. n.d. Web.

      Merkhofer, Lee. “Improve the Prioritization Process.” Priority Systems, n.d. Web.

      Miller, David, and Mike Oliver. “Engaging Stakeholder for Project Success.” PMI, 2015. Web.

      Mind Tools. “Kelley and Conner’s Emotional Cycle of Change.” Mind Tools, n.d. Web.

      Mochal, Jeffrey and Thomas Mochal. Lessons in Project Management. Appress: September 2011. Page 6.

      Newcomer, Eric. “Getting Decisions to Stick.” Standish Group PM2go, 20 Oct 2017. Web.

      “PMI Today.” Newtown Square, PA: PMI, Oct 2017. Web.

      Project Management Institute. “Standard for Portfolio Management, 3rd ed.” Newtown Square, PA: PMI, 2013.

      Project Management Institute. “Pulse of the Profession 2017: Success Rates Rise.” PMI, 2017. Web.

      Transparent Choice. “Criteria for Project Prioritization.” n.p., n.d. Web.

      University of New Hampshire (UNH) Project Management Office. “University of New Hampshire IT Intake and Selection Process Map.” UNH, n.d. Web.

      Ward, John. “Delivering Value from Information Systems and Technology Investments: Learning from Success.” Information Systems Research Centre. August 2006. Web.

      Master the Secrets of Adobe’s Creative Cloud Contracts to Right-Size Your Adobe Spend

      • Buy Link or Shortcode: {j2store}139|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $63,667 Average $ Saved
      • member rating average days saved: 110 Average Days Saved
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • Adobe operates in its own niche in the creative space, and Adobe users have grown accustomed to their products, making switching very difficult.
      • With Adobe’s transition to a cloud-based subscription model, it’s important for organizations to actively manage licenses, software provisioning, and consumption.
      • Without a detailed understanding of Adobe’s various purchasing models, overspending often occurs.
      • Organizations have experienced issues in identifying commercial licensed packages with their install files, making it difficult to track and assign licenses.

      Our Advice

      Critical Insight

      • Focus on user needs first. Examine which products are truly needed versus nice to have to prevent overspending on the Creative Cloud suite.
      • Examine what has been deployed. Knowing what has been deployed and what is being used will greatly aid in completing your true-up.
      • Compliance is not automatic with products that are in the cloud. Shared logins or computers that have desktop installs that can be access by multiple users can cause noncompliance.

      Impact and Result

      • Visibility into license deployments and needs
      • Compliance with internal audits

      Master the Secrets of Adobe’s Creative Cloud Contracts to Right-Size Your Adobe Spend Research & Tools

      Start here – read the Executive Brief

      Procuring Adobe software is not the same game as it was just a few years ago. Adopt a comprehensive approach to understanding Adobe licensing to avoid overspending and to maximize negotiation leverage.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Manage your Adobe agreements

      Use Info-Tech’s licensing best practices to avoid overspending on Adobe licensing and to remain compliant in case of audit.

      • Adobe ETLA vs. VIP Pricing Table
      • Adobe ETLA Forecasted Costs and Benefits
      • Adobe ETLA Deployment Forecast
      [infographic]

      Further reading

      Master the Secrets of Adobe’s Creative Cloud Contracts to Right-Size Your Adobe Spend

      Learn the essential steps to avoid overspending and to maximize negotiation leverage with Adobe.

      ANALYST PERSPECTIVE

      Only 18% of Adobe licenses are genuine copies: are yours?

      "Adobe has designed and executed the most comprehensive evolution to the subscription model of pre-cloud software publishers with Creative Cloud. Adobe's release of Document Cloud (replacement for the Acrobat series of software) is the final nail in the coffin for legacy licensing for Adobe. Technology procurement functions have run out of time in which to act while they still retain leverage, with the exception of some late adopter organizations that were able to run on legacy versions (e.g. CS6) for the past five years. Procuring Adobe software is not the same game as it was just a few years ago. Adopt a comprehensive approach to understanding Adobe licensing, contract, and delivery models in order to accurately forecast your software needs, transact against the optimal purchase plan, and maximize negotiation leverage. "

      Scott Bickley

      Research Lead, Vendor Practice

      Info-Tech Research Group

      Our understanding of the problem

      This Research is Designed For:

      • IT managers scoping their Adobe licensing requirements and compliance position.
      • CIOs, CTOs, CPOs, and IT directors negotiating licensing agreements in search of cost savings.
      • ITAM/Software asset managers responsible for tracking and managing Adobe licensing.
      • IT and business leaders seeking to better understand Adobe licensing options (Creative Cloud).
      • Vendor management offices in the process of a contract renewal.

      This Research Will Help You:

      • Understand and simplify licensing per product to help optimize spend.
      • Ensure agreement type is aligned to needs.
      • Navigate the purchase process to negotiate from a position of strength.
      • Manage licenses more effectively to avoid compliance issues, audits, and unnecessary purchases.

      This Research Will Also Assist:

      • CFOs and the finance department
      • Enterprise architects
      • ITAM/SAM team
      • Network and IT architects
      • Legal
      • Procurement and sourcing

      This Research Will Help Them:

      • Understand licensing methods in order to make educated and informed decisions.
      • Understand the future of the cloud in your Adobe licensing roadmap.

      Executive summary

      Situation

      • Adobe’s dominant market position and ownership of the creative software market is forcing customers to refocus the software acquisition process to ensure a positive ROI on every license.
      • In early 2017, Adobe announced it would stop selling perpetual Creative Suite 6 products, forcing future purchases to be transitioned to the cloud.

      Complication

      • Adobe operates in its own niche in the creative space, and Adobe users have grown accustomed to their products, making switching very difficult.
      • With transition to a cloud-based subscription model, organizations need to actively manage licenses, software provisioning, and consumption.
      • Without a detailed understanding of Adobe’s various purchasing models, overspending often occurs.
      • Organizations have experienced issues in identifying commercial licensed packages with their install files, making it difficult to track and assign licenses.

      Resolution

      • Gain visibility into license deployments and needs with a strong SAM program/tool; this will go a long way toward optimizing spend.
        • Number of users versus number of installs are not the same, and confusing the two can result in overspending. Device-based licensing historically would have required two licenses, but now only one may be required.
      • Ensure compliance with internal audits. Adobe has a very high rate of piracy stemming from issues such as license overuse, misunderstanding of contract language, using cracks/keygens, virtualized environments, indirect access, and sharing of accounts.
      • A handful of products are still sold as perpetual – Acrobat Standard/Pro, Captivate, ColdFusion, Photoshop, and Premiere Elements – but be aware of what is being purchased and used in the organization.
        • Beware of products deployed on server, where the number of users accessing that product cannot easily be counted.

      Info-Tech Insight

      1. Your user-need analysis has shifted in the new subscription-based model. Determine which products are needed versus nice to have to prevent overspending on the Creative Cloud suite.
      2. Examine what you need, not what you have. You can no longer mix and match applications.
      3. Compliance is not automatic with products that are in the cloud. Shared logins or computers with desktop installs that can be accessed by multiple users can cause noncompliance.

      The aim of this blueprint is to provide a foundational understanding of Adobe

      Why Adobe

      In 2011 Adobe took the strategic but radical move toward converting its legacy on-premises licensing to a cloud-based subscription model, in spite of material pushback from its customer base. While revenues initially dipped, Adobe’s resolve paid off; the transition is mostly complete and revenues have doubled. This was the first enterprise software offering to effect the transition to the cloud in a holistic manner. It now serves as a case study for those following suit, such as Microsoft, Autodesk, and Oracle.

      What to know

      Adobe elected to make this market pivot in a dramatic fashion, foregoing a gradual transition process. Enterprise clients were temporarily allowed to survive on legacy on-premises editions of Adobe software; however, as the Adobe Creative Cloud functionality was quickly enhanced and new applications were launched, customer capitulation to the new subscription model was assured.

      The Future

      Adobe is now leveraging the power of connected customers, the availability of massive data streams, and the ongoing digitalization trend globally to supplement the core Creative Cloud products with online services and analytics in the areas of Creative Cloud for content, Marketing Cloud for marketers, and Document Cloud for document management and workflows. This blueprint focuses on Adobe's Creative Cloud and Document Cloud solutions and the enterprise term license agreement (ETLA).

      Info-Tech Insight

      Beware of your contract being auto-renewed and getting locked into the quantities and product subset that you have in your current agreement. Determining the number of licenses you need is critical. If you overestimate, you're locked in for three years. If you underestimate, you have to pay a big premium in the true-up process.

      Learn the “Adobe way,” whether you are reviewing existing spend or considering the purchase of new products

      1. Legacy on-premises Adobe Creative Suite products used to be available in multiple package configurations, enabling right-sized spend with functionality. Adobe’s support for legacy Creative Suites CS6 products ended in May 2017.
      2. While early ETLAs allowed customer application packaging at a lower price than the full Creative Cloud suite, this practice has been discontinued. Now, the only purchasing options are the full suite or single-application subscriptions.
      3. Buyers must now assess alternative Adobe products as an option for non-power users. For example, QuarkXPress, Corel PaintShop Pro, CorelDRAW, Bloom, and Affinity Designer are possible replacements for some Creative Cloud applications.
      4. Document Cloud, Adobe’s latest step in creating an Acrobat-focused subscription model, limits the ability to reduce costs with an extended upgrade cycle. These changes go beyond the licensing model.
      5. Organizations need to perform a cost-benefit analysis of single app purchases vs. the full suite to right-size spend with functionality.

      As Adobe’s dominance continues to grow, organizations must find new ways to maintain a value-added relationship

      Adobe estimates the total addressable market for creative and document cloud to be $21 billion. With no sign of growth slowing down, Adobe customers must learn how to work within the current design monopoly.

      The image contains two pie graphs. The first is labelled FY2014 Revenue Mix, and the second graph is titled FY2017E Revenue Mix.

      Source: Adobe, 2017

      "Adobe is not only witnessing a steady increase in Creative Cloud subscriptions, but it also gained more visibility into customers’ product usage, which enables it to consistently push out software updates relevant to user needs. The company also successfully transformed its sales organization to support the recurring revenue model."

      – Omid Razavi, Global Head of Success, ServiceNow

      Consider your route forward

      Consider your route forward, as ETLA contract commitments, scope, and mechanisms differ in structure to the perpetual models previously utilized. The new model shortchanges technology procurement leaders in their expectations of cost-usage alignment and opex flexibility (White, 2016).

      ☑ Implement a user profile to assign licenses by version and limit expenditures. Alternatives can include existing legacy perpetual and Acrobat classic versions that may already be owned by the organization.

      ☑ Examine the suitability and/or dependency on Document Cloud functions, such as existing business workflows and e-signature integration.

      ☑ Involve stakeholders in the evaluation of alternate products for use cases where dependency on Acrobat-specific functionality is limited.

      ☑ Identify not just the installs and active use of the applications but also the depth and breadth of use across the various features so that the appropriate products can be selected.

      The image contains a screenshot of a diagram listing the adobe toolkit. The toolkit includes: Adobe ETLA Deployment Forecast Tool, Adobe ETLA Forecasted Cost and Benefits, Adobe ETLA vs. VIP Pricing Table.

      Use Info-Tech’s Adobe toolkit to prepare for your new purchases or contract renewal

      Info-Tech Insight

      IT asset management (ITAM) and software asset management (SAM) are critical! An error made in a true-up can cost the organization for the remaining years of the ETLA. Info-Tech worked with one client that incurred a $600k error in the true-up that they were not able to recoup from Adobe.

      Apply licensing best practices and examine the potential for cost savings through an unbiased third-party perspective

      Establish Licensing Requirements

      • Understand Adobe’s product landscape and transition to cloud.
      • Analyze users and match to correct Adobe SKU.
      • Conduct an internal software assessment.
      • Build an effective licensing position.

      Evaluate Licensing Options

      • Value Incentive Plan (VIP)
      • Cumulative Licensing Program (CLP)
      • Transactional Licensing Program (TLP)
      • Enterprise Term License Agreement (ETLA)

      Evaluate Agreement Options

      • Price
      • Discounts
      • Price protection
      • Terms and conditions

      Purchase and Manage Licenses

      • Learn negotiation tactics to enhance your current strategy.
      • Control the flow of communication.
      • Assign the right people to manage the environment.

      Preventive practices can help find measured value ($)

      Time and resource disruption to business if audited

      Lost estimated synergies in M&A

      Cost of new licensing

      Cost of software audit, penalties, and back support

      Lost resource allocation and time

      Third party, legal/SAM partners

      Cost of poor negotiation tactics

      Lost discount percentage

      Terms and conditions improved

      Explore Adobe licensing and optimize spend – project overview

      Establish Licensing Requirements

      Evaluate Licensing Options

      Evaluate Agreement Options

      Purchase and Manage Licenses

      Best-Practice Toolkit

      • Assess current state and align goals; review business feedback.
      • Interview key stakeholders to define business objectives and drivers.
      • Review licensing options.
      • Review licensing rules.
      • Determine the ideal contract type.
      • Review final contract.
      • Discuss negotiation points.
      • License management.
      • Future licensing strategy.

      Guided Implementations

      • Engage in a scoping call.
      • Assess the current state.
      • Determine licensing position.
      • Review product options.
      • Review licensing rules.
      • Review contract option types.
      • Determine negotiation points.
      • Finalize the contract.
      • Discuss license management.
      • Evaluate and develop a roadmap for future licensing.

      PHASE 1

      Manage Your Adobe Agreements

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Managing Adobe Contracts

      Proposed Time to Completion: 3-6 weeks

      Step 1.1: Establish Licensing Requirements

      Start with a kick-off call:

      • Assess the current state.
      • Determine licensing position.

      Then complete these activities…

      • Complete a deployment count, needs analysis, and internal audit.

      With these tools & templates:

      Adobe ETLA Deployment Forecast

      Step 1.2: Determine Licensing Options

      Review findings with analyst:

      • Review licensing options.
      • Review licensing rules.
      • Review contract option types.

      Then complete these activities…

      • Select licensing option.
      • Document forecasted costs and benefits.

      With these tools & templates:

      Adobe ETLA vs. VIP Pricing Table

      Adobe ETLA Forecasted Costs and Benefits

      Step 1.3: Purchase and Manage Licenses

      Review findings with analyst:

      • Review final contract.
      • Discuss negotiation points.
      • Plan a roadmap for SAM.

      Then complete these activities…

      • Negotiate final contract.
      • Evaluate and develop a roadmap for SAM.

      With these tools & templates:

      Adobe ETLA Deployment Forecast

      Adobe’s Cloud – Snapshot of what has changed

      1. Since Adobe has limited the procurement and licensing options with the introduction of Creative Cloud, there are three main choices:
        1. Direct online purchase at Adobe.com
        2. Value Incentive Plan (VIP): Creative Cloud for teams–based purchase with a volume discount (minimal, usually ~10%); may have some incentives or promotional pricing
        3. Enterprise Term License Agreement (ETLA): Creative Cloud for Enterprise (CCE)
      2. Adobe has discontinued support for legacy perpetual licenses, with the latest version being CS6, which is steering organizations to prioritize their options for products in the creative and document management space.
      3. Document Cloud (DC) is the cloud product replacing the Acrobat perpetual licensing model. DC extends the subscription-based model further and limits options to extend the lifespan of legacy on-premises licenses through a protracted upgrade process.
      4. The subscription model, coupled with limited discount options on transactional purchases, forces enterprises to consider the ETLA option. The ETLA brings with it unique term commitments, new pricing structures, and true-up mechanisms and inserts the "land and expand" model vs. license reassignment.

      Info-Tech Insight

      Adobe’s move from a perpetual license to a per-user subscription model can be positive in some scenarios for organizations that experienced challenges with deployment, management of named users vs. devices, and license tracking.

      Core concepts of Adobe agreements: Discounting, pricing, and bundling

      ETLA

      Adobe has been systematically reducing discounts on ETLAs as they enter the second renewal cycle of the original three-year terms.

      Adobe Cloud Bundling

      Adobe cloud services are being bundled with ETLAs with a mandate that companies that do not accept the services at the proposed cost have Adobe management’s approval to unbundle the deal, generally with no price relief.

      Custom Bundling

      The option for custom bundling of legacy Creative Suite component applications has been removed, effectively raising the price across the board for licensees that require more than two Adobe applications who must now purchase the full Creative Cloud suite.

      Higher and Public Education

      Higher education/public education agreements have been revamped over the past couple of years, increasing prices for campus-wide agreements by double-digit percentages (~10-30%+). While they still receive an 80% discount over list price, IT departments in this industry are not prepared to absorb the budget increase.

      Info-Tech Insight

      Adobe has moved to an all-or-one bundle model. If you need more than two application products, you will likely need to purchase the full Creative Cloud suite. Therefore, it is important to focus on creating accurate user profiles to identify usage needs.

      Use Info-Tech’s Adobe deployment tool for SAM: Track deployment and needs

      The image contains a screenshot of Info-Tech's Adobe deployment tool for SAM: Track deployment and needs.

      Use Info-Tech’s Adobe deployment tool for SAM: Audit

      The image contains a screenshot of the Adobe Deployment Tool for SAM, specifically the Audit tab.

      Use Info-Tech’s Adobe deployment tool for SAM: Cost

      The image contains a screenshot of the Adobe Deployment Tool for SAM, specifically the Cost tab.

      Use Info-Tech’s tools to compare ETLA vs. VIP and to document forecasted costs and benefits

      Is the ETLA or VIP option better for your organization?

      Use Info-Tech’s Adobe ETLA vs. VIP Pricing Table tool to compare ETLA costs against VIP costs.

      The image contains a screenshot of Info-Tech's Adobe ETLA vs. VIP Pricing Table.

      Your ETLA contains multiple products and is a multi-year agreement.

      Use Info-Tech’s ETLA Forecasted Costs and Benefits tool to forecast your ETLA costs and document benefits.

      The image contains a screenshot of Info-Tech's ETLA Forecasted Costs and Benefits.

      Adobe’s Creative Cloud Complete offering provides access to all Adobe creative products and ongoing upgrades

      Why subscription model?

      The subscription model forces customers to an annuity-based pricing model, so Adobe has recurring revenue from a subscription-based product. This increases customer lifetime value (CLTV) for Adobe while providing ongoing functionality updates that are not version/edition dependent.

      Key Characteristics:

      • Available as a month-to-month or annual subscription license
      • Can be purchased for one user, for a team, or for an enterprise
      • Subject to annual payment and true-up of license fees
      • Can only true-up during lifespan of contract; quantities cannot be reduced until renewal
      • May contain auto-renewal clauses – beware!

      Key things to know:

      1. Applications can be purchased individually if users require only one specific product. A few products continue to have on-premises licensing options, but most are offered by per-user subscriptions.
      2. At the end of the subscription period, the organization no longer has any rights to the software and would have to return to a previously owned version.
      3. True-downs are not possible (in contrast to Microsoft’s Office 365).
      4. Downgrade rights are not included or are limited by default.

      Which products are in the Creative Cloud bundle?

      Adobe Acrobat® XI Pro

      Adobe After Effects® CC

      Adobe Audition® CC

      Adobe Digital Publishing Suite, Single Edition

      Adobe InDesign® CC

      Adobe Dreamweaver® CC

      Adobe Edge Animate

      Adobe Edge Code preview

      Adobe Edge Inspect

      Adobe Photoshop CC

      Adobe Edge Reflow preview

      Adobe Edge Web Fonts

      Adobe Extension Manager

      ExtendScript Toolkit

      Adobe Fireworks® CS6

      Adobe Flash® Builder® 4.7 Premium Edition

      Adobe Flash Professional CC

      Adobe Illustrator® CC

      Adobe Prelude® CC

      Adobe Premiere® Pro CC

      Adobe Scout

      Adobe SpeedGrade® CC

      Adobe Muse CC

      Adobe Photoshop Lightroom 6

      Adobe offers different solutions for teams vs. enterprise licensing

      Evaluate the various options for Creative Cloud, as they can be purchased individually, for teams, or for enterprise.

      Bundle Name

      Target Customer

      Included Applications

      Features

      CC (for Individuals)

      Individual users

      The individual chooses

      • Sync, store, and share assets
      • Adobe Portfolio website
      • Adobe Typekit font collection
      • Microsoft Teams integration
      • Can only be purchased through credit card

      CC for Teams (CCT)

      Small to midsize organizations with a small number of Adobe users who are all within the same team

      Depends on your team’s requirements. You can select all applications or specific applications.

      Everything that CC (for individuals) does, plus

      • One license per user; can reassign CC licenses
      • Web-based admin console
      • Centralized deployment
      • Usage tracking and reporting
      • 100GB of storage per user
      • Volume discounts for 10+ seats

      CC for Enterprise (CCE)

      Large organizations with users who regularly use multiple Adobe products on multiple machines

      All applications including Adobe Stock for images and Adobe Enterprise Dashboard for managing user accounts

      Everything that CCT does, plus

      • Employees can activate a second copy of software on another device (e.g. home computer) as long as they share the same Adobe ID and are not used simultaneously
      • Ability to reassign licenses from old users to new users
      • Custom storage options
      • Greater integration with other Adobe products
      • Larger volume discounts with more seats

      For further information on specific functionality differences, reference Adobe’s comparison table.

      A Cloud-ish solution: Considerations and implications for IT organizations

      ☑ True cloud products are typically service-based, scalable and elastic, shared resources, have usage metering, and rely upon internet technologies. Currently, Adobe’s Creative Cloud and Document Cloud products lack these characteristics. In fact, the core products are still downloaded and physically installed on endpoint devices, then anchored to the cloud provisioning system, where the software can be automatically updated and continuously verified for compliance by ensuring the subscription is active.

      ☑ Adobe Cloud allows Adobe to increase end-user productivity by releasing new features and products to market faster, but the customer will increase lock-in to the Adobe product suite. The fast-release approach poses a different challenge for IT departments, as they must prepare to test and support new functionality and ensure compatibility with endpoint devices.

      ☑ There are options at the enterprise level that enable IT to exert more granular control over new feature releases, but these are tied to the ETLA and the provided enterprise portal and are not available on other subscription plans. This is another mechanism by which Adobe has been able to spur ETLA adoption.

      Not all CIOs consider SaaS/subscription applications their first choice, but the Adobe’s dominant position in the content and document management marketplace is forcing the shift regardless. It is significant that Adobe bypassed the typical hybrid transition model by effectively disrupting the ability to continue with perpetual licensing without falling behind the functionality curve.

      VIP plans do allow for annual terms and payment, but you lose the price elasticity that comes with multi-year terms.

      Download Info-Tech’s Adobe ETLA vs. VIP Pricing Table tool to compare ETLA costs against VIP costs.

      When moving to Adobe cloud, validate that license requirements meet organizational needs, not a sales quota

      Follow these steps in your transition to Creative Cloud.

      Step 1: Make sure you have a software asset management (SAM) tool to determine Adobe installs and usage within your environment.

      Step 2: Look at the current Adobe install base and usage. We recommend reviewing three months’ worth of reliable usage data to decide which users should have which licenses going forward.

      Step 3: Understand the changes in Adobe packages for Creative Cloud (CC). Also, take into account that the license types are based on users, not devices.

      Step 4: Identify those users who only need a single license for a single application (e.g. Photoshop, InDesign, Muse).

      Step 5: Identify the users who require CC suites. Look at their usage of previous Adobe suites to get an idea of which CC suite they require. Did they have Design Suite Standard installed but only use one or two elements? This is a good way to ensure you do not overspend on Adobe licenses.

      Source: The ITAM Review

      Download Info-Tech’s Adobe ETLA Deployment Forecast tool to track Adobe installs within your environment and to determine usage needs.

      Acquiring Adobe Software

      Adobe offers four common licensing methods, which are reviewed in detail in the following slides.

      Most common purchasing models

      Points for consideration

      • Value Incentive Plan (VIP)
      • Cumulative Licensing Program (CLP)
      • Transactional Licensing Program (TLP)
      • Enterprise Term License Agreement (ETLA)
      • Adobe, as with many other large software providers, includes special benefits and rights when its products are purchased through volume licensing channels.
      • Businesses should typically refrain from purchasing individual OEM (shrink wrap) licenses or those meant for personal use.
      • Purchase record history is available online, making it easier for your organization to manage entitlements in the case of an audit.

      "Customers are not even obliged to manage all the licenses themselves. The reseller partners have access to the cloud console and can manage licenses on behalf of their customers. Even better, they can seize cross and upsell opportunities and provide good insight into the environment. Additionally, Adobe itself provides optimization services."

      B-lay

      CLP and TLP

      The CLP and TLP are transactional agreements generally used for the purchase of perpetual licenses. For example, they could be used for making Acrobat purchases if Creative Suite products are purchased on the ETLA.

      The image contains a screenshot of a table comparing CLP and TLP.

      Source: “Adobe Buying Programs Comparison Guide for Commercial and Government Organizations”

      VIP and ETLA

      The Value Incentive Plan is aimed at small- to medium-sized organizations with no minimum quantity required. However, there is limited flexibility to reduce licenses and limited price protection for future purchases. The ETLA is aimed at large organizations who wish to have new functionality as it comes out, license management portal, services, and security/IT control aspects.

      The image contains a screenshot of a table comparing VIP and ETLA.

      Source: “Adobe Buying Programs Comparison Guide for Commercial and Government Organizations”

      ETLA commitments risk creating “shelfware-as-a-service”

      The Adobe ETLA’s rigid contract parameters, true-up process, and unique deployment/provisioning mechanisms give technology/IT procurement leaders fewer options to maximize cost-usage alignment and to streamline opex costs.

      ☑ No ETLA price book is publicly published; pricing is controlled by the Adobe enterprise sales team.

      ☑ Adobe's retail pricing is a good starting point for negotiating discounted pricing.

      ☑ ETLA commitments are usually for three years, and the lack of a true-down option increases the risk involved in overbuying licenses should the organization encounter a business downturn or adverse event.

      ☑ Pricing discounts are the highest at the initial ETLA signing for the upfront volume commitment. The true-up pricing is discounted from retail but still higher than the signing cost per license.

      ☑ Technical support is included in the ETLA.

      ☑ While purchases typically go through value-added resellers (VARs), procurement can negotiate directly with Adobe.

      "For cloud products, it is less complex when it comes to purchasing and pricing. If larger quantities are purchased on a longer term, the discount may reach up to 15%. As soon as you enroll in the VIP program, you can control all your licenses from an ‘admin console’. Any updates or new functionalities are included in the original price. When the licenses expire, you may choose to renew your subscriptions or remove them. Partial renewal is also accepted. Of course, you can also re-negotiate your price if more subscriptions are added to your console."

      B-lay

      ETLA recommendations

      1. Assess the end-user requirements with a high degree of scrutiny. Perform an analysis that matches the licensee with the correct Adobe product SKU to reduce the risk of overspending.
      • Leverage metering data that identifies actual usage and lack thereof, match to user profile functional requirements, and then determine end users’ actual license requirements.
    • Build in time to evaluate alternative products where possible and position the organization to leverage a Plan B vendor to replace or mitigate growth on the Adobe platform. Re-evaluate options well in advance of the ETLA renewal.
    • Secure price protection through negotiating a price cap or an extended ETLA term beyond the standard three-year term. Short of obtaining an escalation cap, which Adobe is strongly resisting, build in price increases for the ETLA renewal years.
      • Demand price transparency and granularity in the proposal process.
      • Validate that volume discounts are appropriate and show through to the true-up line item pricing.
    • Negotiate a true-down mechanism upfront with Adobe if usage decline is inevitable or expected due to a merger or acquisition, divestiture, or material restructuring event.
    • INFO-TECH TIP: For further guidance on ETLAs and pricing, contact your Info-Tech representative to set up a call with an analyst.

      Use Info-Tech’s Adobe ETLA Deployment Forecast tool to match licensees with Adobe product SKUs.

      Prepare for Adobe’s true-up process

      How the true-up process works

      When adding a license, the true-up price will be prorated to 50% of the license cost for previous year’s usage plus 100% of the license cost for the next year. This back-charging adds up to 150% of the overall true-up license cost. In some rare cases, Adobe has provided an “unlimited” quantity for certain SKUs; these Unlimited ETLAs generally align with FTE counts and limit FTE increases to about 5%. Procurement must monitor and work with SAM/ITAM and stakeholder groups to restrain unnecessary growth during the term of an Unlimited ETLA to avoid the risk of cost escalation at renewal time.

      Higher-education specific

      Higher-education clients can license under the ETLA based on a prescribed number of user and classroom/lab devices and/or on a FTE basis. In these cases, the combination of Creative Cloud and Acrobat Pro volume must equal the FTE total, creating an enterprise footprint. FTE calculations establish the full-time faculty plus one-third of part-time faculty plus one-half of part-time staff.

      Info-Tech Insight

      Compliance takes a different form in terms of the ETLA true-up process. The completion of Adobe's transition to cloud-based licensing and verification has improved compliance rates via phone home telemetry such that pirated software is less available and more easily detected. Adobe has actually decommissioned its audit arm in the Americas and EMEA.

      Audits and software asset management with Adobe

      Watch out for:

      • Virtual desktops, freeware, and test and trial licenses
      • Adobe products that may be bundled into a suite; a manual check will be needed to ensure the suite isn’t recognized as a standalone license
      • Pirated licenses with a “crack” built into the software

      Simplify your process – from start to finish – with these steps:

      Determine License Entitlements

      Obtain documentation from internal records and Adobe to track licenses and upgrades to determine what licenses you own and have the right to use.

      Gather Deployment Information

      Leverage a software asset management tool or process to determine what software is deployed and what is/is not being used.

      Determine Effective License Position

      Compare license entitlements with deployment data to uncover surpluses and deficits in licensing. Look for opportunities.

      Plan Changes to License Position

      Meet with IT stakeholders to discuss the enterprise license program (ELP), short- and long-term project plans, and budget allocation. Plan and document licensing requirements.

      Adobe Genuine Software Integrity Service

      • This service was started in 2014 to combat non-genuine software sold by non-authorized resellers.
      • The service works hand in hand with the cloud movement to reduce piracy.
      • Every Adobe product now contains an executable file that will scan your machine for non-genuine software.
      • If non-genuine software is detected, the user will be notified and directed to the official Adobe website for next steps.

      Detailed list of Adobe licensing contract types

      The table below describes Adobe contract types beyond the four typical purchasing models explained in the previous slides:

      Option

      What is it?

      What’s included?

      For

      Term

      CLP (Cumulative Licensing Program)

      10,000 plus points, support and maintenance optional

      Select Adobe perpetual desktop products

      Business

      2 years

      EA (Adobe Enterprise Agreement)

      100 licenses plus maintenance and support for eligible Adobe products

      All applications

      100+ users requirement

      3 years

      EEA (Adobe Enterprise Education Agreement)

      Creative Cloud enterprise agreement for education establishments

      Creative Cloud applications without services

      Education

      1 or 2 years

      ETLA (Enterprise Term License Agreement)

      Licensing program designed for Adobe’s top commercial, government, and education customers

      All Creative Cloud applications

      Large enterprise companies

      3 years

      K-12 – Enterprise Agreement

      Enterprise agreement for primary and secondary schools

      Creative Cloud applications without services

      Education

      1 year

      K-12 – School Site License

      Allows a school to install a Creative Cloud on up to 500 school-owned computers regardless of school size

      Creative Cloud applications without services

      Education

      1 year

      TLP (Transactional Licensing Program)

      Agreement for SMBs that want volume licensing bonuses

      Perpetual desktop products only

      Aimed at SMBs, but Enterprise customers can use the TLP for smaller requirements

      N/A

      Upgrade Plan

      Insurance program for software purchased under a perpetual license program such as CLP or TLP for Creative Cloud upgrade

      Dependent on the existing perpetual estate

      Anyone

      N/A

      VIP (Value Incentive Plan)

      VIP allows customers to purchase, deploy, and manage software through a term-based subscription license model

      Creative Cloud of teams

      Business, government, and education

      Insight breakdown

      Insight 1

      Adobe operates in its own niche in the creative space, and Adobe users have grown accustomed to their products, making switching very difficult.

      Insight 2

      Adobe has transitioned the vast majority of its software offerings to the cloud-based subscription model. Active management of licenses, software provisioning, and consumption of cloud services is now an ongoing job.

      Insight 3

      With the vendor lock-in process nearly complete via the transition to a SaaS subscription model, Adobe is raising prices on an annual basis. Advance planning and strategic use of the ETLA is key to avoid budget-breaking surprises.

      Summary of accomplishment

      Knowledge Gained

      • The key pieces of licensing information that should be gathered about the current state of your own organization.
      • An in-depth understanding of the required licenses across all of your products.
      • Clear methodology for selecting the most effective contract type.
      • Development of measurable, relevant metrics to help track future project success and identify areas of strength and weakness within your licensing program.

      Processes Optimized

      • Understanding of the importance of licensing in relation to business objectives.
      • Understanding of the various licensing considerations that need to be made.
      • Contract negotiation.

      Deliverables Completed

      • Adobe ETLA Deployment Forecast
      • Adobe ETLA Forecasted Cost and Benefits
      • Adobe ETLA vs. VIP Pricing Table

      Related Info-Tech Research

      Take Control of Microsoft Licensing and Optimize Spend

      Create an Effective Plan to Implement IT Asset Management

      Establish an Effective System of Internal IT Controls to Mitigate Risks

      Optimize Software Asset Management

      Take Control of Compliance Improvement to Conquer Every Audit

      Cut PCI Compliance and Audit Costs in Half

      Bibliography

      “Adobe Buying Programs: At-a-glance comparison guide for Commercial and government organizations.” Adobe Systems Incorporated, 2014. Web. 1 Feb. 2018.

      “Adobe Buying Programs Comparison Guide for Commercial and Government Organizations.” Adobe Systems Incorporated, 2018. Web.

      “Adobe Buying Programs Comparison Guide for Education.” Adobe Systems Incorporated, 2018. Web. 1 Feb 2018.

      “Adobe Education Enterprise Agreement: Give your school access to the latest industry-leading creative tools.” Adobe Systems Incorporated, 2014. Web. 1 Feb. 2018.

      “Adobe Enterprise Term License Agreement for commercial and government organizations.” Adobe Systems Incorporated, 2016. Web. 1 Feb. 2018.

      Adobe Investor Presentation – October 2017. Adobe Systems Incorporated, 2017. Web. 1 Feb. 2018.

      Cabral, Amanda. “Students react to end of UConn-Adobe contract.” The Daily Campus (Uconn), 5 April 2017. Web. 1 Feb. 2018.

      de Veer, Patrick and Alecsandra Vintilescu. “Quick Guide to Adobe Licensing.” B-lay, Web. 1 Feb. 2018.

      “Find the best program for your organization.” Adobe, Web. 1 Feb 2018.

      Foxen, David. “Adobe Upgrade Simplified.” Snow Software, 7 Oct. 2016. Web.

      Frazer, Bryant. “Adobe Stops Reporting Subscription Figures for Creative Cloud.” Studio Daily. Access Intelligence, LLC. 17 March 2016. Web.

      “Give your students the power to create bright futures.” Adobe, Web. 1 Feb 2018.

      Jones, Noah. “Adobe changes subscription prices, colleges forced to pay more.” BG Falcon Media. Bowling Green State University, 18 Feb. 2015. Web. 1 Feb. 2018.

      Mansfield, Adam. “Is Your Organization Prepared for Adobe’s Enterprise Term License Agreements (ETLA)?” UpperEdge,30 April 2013. Web. 1 Feb. 2018.

      Murray, Corey. “6 Things Every School Should Know About Adobe’s Move to Creative Cloud.” EdTech: Focus on K-12. CDW LLC, 10 June 2013. Web.

      “Navigating an Adobe Software Audit: Tips for Emerging Unscathed.” Nitro, Web. 1 Feb. 2018.

      Razavi, Omid. “Challenges of Traditional Software Companies Transitioning to SaaS.” Sand Hill, 12 May 2015. Web. 1 Feb. 2018.

      Rivard, Ry. “Confusion in the Cloud.” Inside Higher Ed. 22 May 2013. Web. 1 Feb. 2018.

      Sharwood, Simon. “Adobe stops software licence audits in Americas, Europe.” The Register. Situation Publishing. 12 Aug. 2016. Web. 1 Feb. 2018.

      “Software Licensing Challenges Faced In The Cloud: How Can The Cloud Benefit You?” The ITAM Review. Enterprise Opinions Limited. 20 Nov. 2015. Web.

      White, Stephen. “Understanding the Impacts of Adobe’s Cloud Strategy and Subscriptions Before Negotiating an ETLA.” Gartner, 22 Feb. 2016. Web.

      Improve Service Desk Ticket Queue Management

      • Buy Link or Shortcode: {j2store}492|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Service Desk
      • Parent Category Link: /service-desk
      • Service desk tickets pile up in the queue, get lost or buried, jump between queues without progress, leading to slow response and resolution times, a seemingly insurmountable backlog and breached SLAs.
      • There are no defined rules or processes for how tickets should be assigned and routed and technicians don’t know how to prioritize their assigned work, meaning tickets take too long to get to the right place and aren’t always resolved in the correct or most efficient order.
      • Nobody has authority or accountability for queue management, meaning everyone has eyes only on their own tickets while others fall through the cracks.

      Our Advice

      Critical Insight

      If everybody is managing the queue, then nobody is. Without clear ownership and accountability over each and every queue, then it becomes too easy for everyone to assume someone else is handling or monitoring a ticket when in fact nobody is. Assign a Queue Manager to each queue and ensure someone is responsible for monitoring ticket movement across all the queues.

      Impact and Result

      • Clearly define your queue structure, organize the queues by content, then assign resources to relevant queues depending on their role and expertise.
      • Define and document queue management processes, from initial triage to how to prioritize work on assigned tickets. Once processes have been defined, identify opportunities to build in automation to improve efficiency.
      • Ensure everyone who handles tickets is clear on their responsibilities and establish clear ownership and accountability for queue management.

      Improve Service Desk Ticket Queue Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Ticket Queue Management Deck – A guide to service desk ticket queue management best practices and advice

      This storyboard reviews the top ten pieces of advice for improving ticket queue management at the service desk.

      • Improve Service Desk Ticket Queue Management Storyboard

      2. Service Desk Queue Structure Template – A template to help you map out and optimize your service desk ticket queues

      This template includes several examples of service desk queue structures, followed by space to build your own model of your optimal service desk queue structure and document who is assigned to each queue and responsible for managing each queue.

      • Service Desk Queue Structure Template
      [infographic]

      Further reading

      Improve Service Desk Ticket Queue Management

      Strong queue management is the foundation to good customer service

      Analyst Perspective

      Secure your foundation before you start renovating.

      Service Desk and IT leaders who are struggling with low efficiency, high backlogs, missed SLAs, and poor service desk metrics often think they need to hire more resources or get a new ITSM tool with better automation and AI capabilities. However, more often than not, the root cause of their challenges goes back to the fundamentals.

      Strong ticket queue management processes are critical to the success of all other service desk processes. You can’t resolve incidents and fulfill service requests in time to meet SLAs without first getting the ticket to the right place efficiently and then managing all tickets in the queue effectively. It sounds simple, but we see a lot of struggles around queue management, from new tickets sitting too long before being assigned, to in-progress tickets getting buried in favor of easier or higher-priority tickets, to tickets jumping from queue to queue without progress, to a seemingly insurmountable backlog.

      Once you have taken the time to clearly structure your queues, assign resources, and define your processes for routing tickets to and from queues and resolving tickets in the queue, you will start to see response and resolution time decrease along with the ticket backlog. However, accountability for queue management is often overlooked and is really key to success.
      This is an image of Dr. Natalie Sansone, Senior Research Analyst at Info-Tech Research Group

      Natalie Sansone, PhD
      Senior Research Analyst, Infrastructure & Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      • Tickets come into the service desk via multiple channels (email, phone, chat, portal) and aren’t consolidated into a single queue, making it difficult to know what to prioritize.
      • New tickets sit in the queue for too long before being assigned while assigned tickets sit for too long without progress or in the wrong queue, leading to slow response and resolution times.
      • Tickets quickly pile up in the queues, get lost or buried, or jump between queues without finding the right home, leading to a seemingly insurmountable backlog and breached SLAs.

      Common Obstacles

      • All tickets pile into the same queue, making it difficult to view, manage, or know who’s working on what.
      • There are no defined rules or processes for how tickets should be assigned and routed, meaning they often take too long to get to the right place.
      • Technicians have no guidelines as to how to prioritize their work, and no easy way to organize their tickets or queue to know what to work on next.
      • Nobody has authority or accountability for queue management, meaning everyone has eyes only on their own tickets while others fall through the cracks.

      Info-Tech’s Approach

      • Clearly define your queue structure, organize the queues by content, then assign resources to relevant queues depending on their role and expertise.
      • Define and document queue management processes, from initial triage to how to prioritize work on assigned tickets. Ensure everyone who handles tickets is clear on their responsibilities.
      • Establish clear ownership and accountability for queue management.
      • Once processes have been defined, identify opportunities to build in automation to improve efficiency.

      Info-Tech Insight

      If everybody is managing the queue, then nobody is. Without clear ownership and accountability over each and every queue it becomes too easy for everyone to assume someone else is handling or monitoring a ticket when in fact nobody is. Assign a Queue Manager to each queue and ensure someone is responsible for monitoring ticket movement across all the queues.

      Timeliness is essential to customer satisfaction

      And timeliness can’t be achieved without good queue management practices.

      As soon as that ticket comes in, the clock starts ticking…

      A host of different factors influence service desk response time and resolution time, including process optimization and documentation, workflow automation, clearly defined prioritization and escalation rules, and a comprehensive and easily accessible knowledgebase.

      However, the root cause of poor response and resolution time often comes down to the basics like ticket queue management. Without clearly defined processes and ownership for assigning and actioning tickets from the queue in the most effective order and manner, customer satisfaction will suffer.

      For every 12-hour delay in response time*, CSAT drops by 9.6%.

      *to email and web support tickets
      Source: Freshdesk, 2021

      A Freshworks analysis of 107 million service desk interactions found the relationship between CSAT and response time is stronger than resolution time - when customers receive prompt responses and regular updates, they place less value on actual resolution time.

      A queue is simply a line of people (or tickets) waiting to be helped

      When customers reach out to the service desk for help, their messages are converted into tickets that are stored in a queue, waiting to be actioned appropriately.

      Ticket Queue

      Email/web
      Ideally, the majority of tickets come into the ticket queue through email or a self-service portal, allowing for appropriate categorization, prioritization, and assignment.

      Phone
      For IT teams with a high volume of support requests coming in through the phone, reducing wait time in queue may be a priority.

      Chat
      Live chat is growing in popularity as an intake method and may require routing and distribution rules to prevent long or multiple queues.

      Queue Management

      Queue management is a set of processes and tools to direct and monitor tickets or manage ticket flow. It involves the following activities:

      • Review incoming tickets
      • Categorize and prioritize tickets
      • Route or assign appropriately
      • View or update ticket status
      • Monitor resource workload
      • Ensure tickets are being actioned in time
      • Proactively identify SLA breaches

      Ineffective queue management can bury you in backlog

      Ticket backlog with poor queue management

      Without a clear and efficient process or accountability for moving incoming tickets to the right place, tickets will be worked on randomly, older tickets will get buried, the backlog will grow, and SLAs will be missed.

      Ticket backlog with good queue management

      With effective queue management and ownership, tickets are quickly assigned to the right resource, worked on within the appropriate SLO/SLA, and actively monitored, leading to a more manageable backlog and good response and resolution times.

      A growing backlog will quickly lead to dissatisfied end users and staff

      Failing to efficiently move tickets from the queue or monitor tickets in the queue can quickly lead to tickets being buried and support staff feeling buried in tickets.

      Common challenges with queue management include:

      • Tickets come in through multiple channels and aren’t consolidated into a single queue
      • New tickets sit unassigned for too long, resulting in long response times
      • Tickets move around between multiple queues with no clear ownership
      • Assigned tickets sit too long in a queue without progress and breach SLA
      • No accountability for queue ownership and monitoring
      • Technicians cherry pick the easiest tickets from the queue
      • Technicians have no easy way to organize their queue to know what to work on next

      This leads to:

      • Long response times
      • Long resolution times
      • Poor workload distribution and efficiency
      • High backlog
      • Disengaged, frustrated staff
      • Dissatisfied end users

      Info-Tech Insight

      A growing backlog will quickly lead to frustrated and dissatisfied customers, causing them to avoid the service desk and seek alternate methods to get what they need, whether going directly to their favorite technician or their peers (otherwise known as shadow IT).

      Dig yourself out with strong queue management

      Strong queue management is the foundation to good customer service.

      Build a mature ticket queue management process that allows your team to properly prioritize, assign, and work on tickets to maximize response and resolution times.

      A mature queue management process will:

      • Reduce response time to address tickets.
      • Effectively prioritize tickets and ensure everyone knows what to work on next.
      • Ensure tickets get assigned and routed to the right queue and/or resource efficiently.
      • Reduce overall resolution time to resolve tickets.
      • Enable greater accountability for queue management and monitoring of tickets.
      • Improve customer and employee satisfaction.

      As queue management maturity increases:
      Response time decreases
      Resolution time decreases
      Backlog decreases
      End-user satisfaction increases

      Ten Tips to Effectively Manage Your Queue

      The remaining slides in this deck will review these ten pieces of advice for designing and managing your ticket queues effectively and efficiently.

      1. Define your optimal queue structure
      2. Design and assign resources to relevant queues
      3. Define and document queue management processes
      4. Clearly define queue management responsibilities for every team member
      5. Establish clear ownership & accountability over all queues
      6. Always keep ticket status and documentation up to date
      7. Shift left to reduce queue volume
      8. Build-in automation to improve efficiency
      9. Configure your ITSM tool to support and optimize queue management processes
      10. Don’t lose visibility of the backlog

      #1: Define your optimal queue structure

      There is no one right way to do queue management; choose the approach that will result in the highest value for your customers and IT staff.

      Sample queue structures

      This is an image of a sample Queue structure, where Incoming Tickets from all channels pass through auto or manual Queue assignment, to a numbered queue position.

      *Queues may be defined by skillset, role, ticket category, priority, or a hybrid.

      Triage and Assign

      • All incoming tickets are assigned to an appropriate queue based on predefined criteria.
      • Queue assignment may be done through automated workflows based on specific fields within the ticket, or manually by a
      • Queue Manager, dedicated coordinator, or Tier 1 staff.
      • Queues may be defined based on:
        • Skillset/team (e.g. Infrastructure, Security, Apps, etc.)
        • Ticket category (e.g. Network, Office365, Hardware, etc.)
        • Priority (e.g. P1, P2, P3, P4, P5)
      • Resources may be assigned to multiple queues.

      Define your optimal queue structure (cont.)

      Tiered generalist model

      • All incidents and service requests are routed to Tier 1 first, who prioritize and, if appropriate, conduct initial triage, troubleshooting, and resolution on a wide range of issues.
      • More complex or high-priority tickets are escalated to resources at Tier 2 and/or Tier 3, who are specialists working on projects in addition to support tickets.
      This is an image of the Tiered Generalist Model

      Unassigned queue

      • Very small teams may work from an unassigned queue if there are processes in place to monitor tickets and workload balance.
      • Typically, these teams work by resolving the oldest tickets first regardless of complexity (also known as First In, First Out or FIFO). However, this doesn’t allow for much flexibility in terms of priority of the request or customer.
      This is an image of an unassigned queue model

      #2: Design and assign resources to relevant queues

      Once you’ve defined your overall structure, define the content of each queue.

      This image depicts a sample queue organization structure. The bin titles are: Workgroup; Customer Group; Problem Type; and Hybrid

      Info-Tech Insight

      Start small; don’t create a queue for every possible ticket type. Remember that someone needs to be accountable for each of these queues, so only build what you can monitor.

      #3 Define and document queue management processes

      A clear, comprehensive, easily digestible SOP or workflow outlining the steps for handling new tickets and working tickets from the queue will help agents deliver a consistent experience.

      PROCESS INCLUDES:

      DEFINE THE FOLLOWING:

      TRIAGING INCOMING TICKETS

      • Ensure a ticket is created for every issue coming from every channel (e.g. phone, email, chat, walk-in, portal).
      • Assign a priority to each ticket.
      • Categorize ticket and add any necessary documentation
      • Update ticket status.
      • Delete spam, merge duplicate tickets, clean up inbox.
      • Assign tickets to appropriate queue or resource, escalate when necessary.
      • How should tickets be prioritized?
      • How should tickets from each channel be prioritized and routed? (e.g. are phone calls resolved right away? Are chats responded to immediately?)
      • Criteria that determine where a ticket should be sent or assigned (i.e. ticket category, priority, customer type).
      • How should VIP tickets be handled?
      • When should tickets be automatically escalated?
      • Which tickets require hierarchical escalation (i.e. to management)?

      WORKING ON ASSIGNED TICKETS

      • Continually update ticket status and documentation.
      • Assess which tickets should be worked on or completed ahead of others.
      • Troubleshoot, resolve, or escalate tickets.
      • In what order should tickets be worked on (e.g. by priority, by age, by effort, by time to breach)?
      • How long should a ticket be worked on without progress before it should be escalated to a different tier or queue?
      • Exceptions to the rule (e.g. in which circumstances should a lower priority ticket be worked on over a higher priority ticket).

      Process recommendations

      As you define queue management processes, keep the following advice in mind:

      Rotate triage role

      The triage role is critical but difficult. Consider rotating your Tier 1 resources through this role, or your service desk team if you’re a very small group.

      Limit and prioritize channels

      You decide which channels to enable and prioritize, not your users. Phone and chat are very interrupt-driven and should be reserved for high-priority issues if used. Your users may not understand that but can learn over time with training and reinforcement.

      Prioritize first

      Priority matrixes are necessary for consistency but there are always circumstances that require judgment calls. Think about risk and expected outcome rather than simply type of issue alone. And if the impact is bigger than the initial classification, change it.

      Define VIP treatment

      In some organizations, the same issue can be more critical if it happens to a certain user role (e.g. client facing, c-suite). Identify and flag VIP users and clearly define how their tickets should be prioritized.

      Consider time zone

      If users are in different time zones, take their current business hours into account when choosing which ticket to work on.

      Info-Tech Insight

      Think of your service desk as an emergency room. Patients come in with different symptoms, and the triage nurse must quickly assess these symptoms to decide who the patient should see and how soon. Some urgent cases will need to see the doctor immediately, while others can wait in another queue (the waiting room) for a while before being dealt with. Some cases who come in through a priority channel (e.g. ambulance) may jump the queue. Checklists and criteria can help with this decision making, but some degree of judgement is also required and that comes with experience. The triage role is sometimes seen as a junior-level role, but it actually requires expertise to be done well.

      For more detailed process guidance, see Standardize the Service Desk

      Info-Tech’s blueprint Standardize the Service Desk will help you standardize and document core service desk processes and functions, including:

      • Service desk structure, roles, and responsibilities
      • Metrics and reporting
      • Ticket handling and ticket quality
      • Incident and critical incident management
      • Ticket categorization
      • Prioritization and escalation
      • Service request fulfillment
      • Self-service considerations
      • Building a knowledgebase
      this image contains three screenshots from Info-Tech's Standardize the Service Desk Blueprint

      #4 Clearly define queue management responsibilities for every team member

      This may be one of the most critical yet overlooked keys to queue management success. Define the following:

      Who will have overall accountability?

      Someone must be responsible for monitoring all incoming and open tickets as well as assigned tickets in every queue to ensure they are routed and fulfilled appropriately. This person must have authority to view and coordinate all queues and Queue Managers.

      Who will manage each queue?

      Someone must be responsible for managing each queue, including assigning resources, balancing workload, and ensuring SLOs are met for the tickets within their queue. For example, the Apps Manager may be the Queue Manager for all tickets assigned to the Apps team queue.

      Who is responsible for assigning tickets?

      Will you have a triage team who monitors and assigns all incoming tickets? What are their specific responsibilities (e.g. prioritize, categorize, attempt troubleshooting, assign or escalate)? If not, who is responsible for assigning new tickets and how is this done? Will the triage role be a rotating role, and if so, what will the schedule be?

      What are everyone’s responsibilities?

      Everyone who is assigned tickets should understand the ticket handling process and their specific responsibilities when it comes to queue management.

      #5 Establish clear ownership & accountability over all queues

      If everyone is accountable, then no one is accountable. Ownership for each queue and all queues must be clearly designated.

      You may have multiple queue manager roles: one for each queue, and one who has visibility over all the queues. Typically, these roles make up only part of an individual’s job. Clearly define the responsibilities of the Queue Manager role; sample responsibilities are on the right.

      Info-Tech Insight

      Lack of authority over queues – especially those outside Tier 1 of the service desk – is one of the biggest pitfalls we see causing aging tickets and missed SLAs. Every queue needs clear ownership and accountability with everyone committed to meeting the same SLOs.

      The Queue Manager or Coordinator is accountable for ensuring tickets are routed to the correct resources service level objectives or agreements are met.

      Specific responsibilities may include:

      • Monitors queues daily
      • Ensures new tickets are assigned to appropriate resources for resolution
      • Verifies tickets have been routed and assigned correctly and reroutes if necessary
      • Reallocates tickets if assigned resource is suddenly unavailable or away
      • Ensures ticket handling process is met, ticket status is up to date and correct, and ticket documentation is complete
      • Escalates tickets that are aging or about to breach
      • Ensures service level objectives or agreements are met
      • Facilitates resource allocation based on workload
      • Coordinates tickets that require collaboration across workgroups to ensure resolution is achieved within SLA
      • Associates child and parent tickets
      • Prepares reports on ticket status and volume by queues
      • Regularly reviews reports to identify and act on issues and make improvements or changes where needed
      • Identifies opportunities for improvement

      #6 Always keep ticket status and documentation up to date

      Anyone should be able to quickly understand the status and progress on a ticket without needing to ask the technician working on it. This means both the ticket status and documentation must be continually and accurately updated.

      Ticket Documentation
      Ticket descriptions and documentation must be kept accurate and up to date. This ensures that if the ticket is escalated or assigned to a new person, or the Queue Manager or Service Desk Manager needs to know what progress has been made on a ticket, that person doesn’t need to waste time with back-and-forth communication with the technician or end user.

      Ticket Status
      The ticket status field should change as the ticket moves toward resolution, and must be updated every time the status changes. This ensures that anyone looking at the ticket queue can quickly learn and communicate the status of a ticket, tickets don’t get lost or neglected, metrics are accurate (such as time to resolve), and SLAs are not impacted if a ticket is on hold.

      Common ticket statuses include:

      • New/open
      • Assigned
      • In progress
      • Declined
      • Canceled
      • Pending/on hold
      • Resolved
      • Closed
      • Reopened

      For more guidance on ticket handling and documentation, download Info-Tech’s blueprint: Standardize the Service Desk.

      • For ticket handling and documentation, see Step 1.4
      • For ticket status fields, see Step 2.2.

      #7 Shift left to reduce queue volume

      Enable processes such as knowledge management, self-service, and problem management to prevent tickets from even coming into the queue.

      Shift left means enabling fulfilment of repeatable tasks and requests via faster, lower-cost delivery channels, self-help tools, and automation.

      This image contains a graph, where the Y axis is labeled Cost, and the X axis is labeled Time to Resolve.  On the graph are depicted service desk levels 0, 1, 2, and 3.

      Shift to Level 1

      • Identify tickets that are often escalated beyond Tier 1 but could be resolved by Level 1 if they were given the tools, training, resources, or access they need to do so.
      • Provide tools to succeed at resolving those defined tasks (e.g. knowledge article, documentation, remote tools).
      • Embed knowledge management in resolution workflows.

      Shift to End User

      • Build a centralized, easily accessible self-service portal where users can search for solutions to resolve their issues without having to submit a ticket.
      • Communicate and train users on how to use the portal regularly update and improve it.

      Automate & Eliminate

      • Identify processes or tasks that could be automated to eliminate work.
      • Invest in problem management and event management to fix the root problem of recurring issues and prevent a problem from occurring in the first place, thereby preventing future tickets.

      #8 Build in automation to improve efficiency

      Manually routing every ticket can be time-consuming and prone to errors. Once you’ve established the process, automate wherever possible.

      Automation rules can be used to ensure tickets are assigned to the right person or queue, to alert necessary parties when a ticket is about to breach or has breached SLA, or to remind technicians when a ticket has sat in a queue or at a particular status for too long.

      This can improve efficiency, reduce error, and bring greater visibility to both high-priority tickets and aging tickets in the backlog.

      However, your processes, queues, and responsibilities must be clearly defined before you can build in automation.

      For more guidance on implementing automation and AI within your service desk, see these blueprints:

      https://tymansgrpup.com/research/ss/accelerate-your-automation-processes https://tymansgrpup.com/research/ss/improve-it-operations-with-ai-and-ml

      For examples of rules, triggers, and fields you can automate to improve the efficiency of your queue management processes, see the next slide.

      Sample automation rules

      Criteria or triggers you can automate actions based on:

      • Ticket type
      • Specific field in a ticket web form
      • Ticket form that was used (e.g. specific service request form from the portal)
      • Ticket category
      • Ticket priority
      • Keyword in an email subject line
      • Keywords or string in a chat
      • Requester name or email
      • Requester location
      • Requester/ticket language
      • Requester VIP status
      • Channel ticket was received through
      • SLAs or time-based automations
      • Agent skill
      • Agent status or capacity

      Fields or actions those triggers can automate

      • Priority
      • Category
      • Ticket routing
      • Assigned agent
      • Assigned queue
      • SLA/due date
      • Notifications/communication

      Sample Automation Rules

      • When ticket is about to breach, send alert to Queue Manager and Service Desk Manager.
      • When ticket comes from VIP user, set urgency to high.
      • When ticket status has been set to “open” for ten hours, send an alert to Queue Manager.
      • When ticket status has been set to “on hold” for five days, send a reminder to assignee.
      • When ticket is categorized as “Software-ERP,” send to ERP queue.
      • When ticket is prioritized as P1/critical, send alert to emergency response team.
      • When ticket is prioritized as P1 and hasn’t been updated for one hour, send an alert to Incident Manager.
      • When an in-progress ticket is reassigned to a new queue, alert Queue Manager.
      • When ticket has not been resolved within seven days, flag as aging ticket.

      #9 Configure your ITSM tool to support and optimize queue management processes

      Configure your tool to support your needs; don’t adjust your processes to match the tool.

      • Most ITSM tools have default queues out of the box and the option to create as many custom queues, filters, and views as you need. Custom queues should allow you to name the queue, decide which tickets will be sent to the queue, and what columns or information are displayed in the queue.
      • Before you configure your queues and dashboards, sit down with your team to decide what you need and what will best enable each agent to manage their workload.
      • Decide which queues each role should have access to – most should only need to see their own queue and their team’s queue.
      • Configure which queues or views new tickets will be sent to.
      • Configure automation rules defined earlier (e.g. automate sending certain tickets to specific queues or sending notifications to specific parties when certain conditions are met).
      • Configure dashboards and reports on queue volume and ticket status data relevant to each team to help them manage their workload, increase visibility, and identify issues or actions.

      Info-Tech Insight

      It can be overwhelming to support agents when their view is a long and never-ending queue. Set the default dashboard view to show only those tickets assigned to the viewer to make it appear more manageable and easier to organize.

      Configure queues to maximize productivity

      Info-Tech Insight

      The queue should quickly give your team all the information they need to prioritize their work, including ticket status, priority, category, due date, and updated timestamps. Configuration is important - if it’s confusing, clunky, or difficult to filter or sort, it will impact response and resolution times and can lead to missed tickets. Give your team input into configuration and use visuals such as color coding to help agents prioritize their work – for example, VIP tickets may be clearly flagged, critical or high priority tickets may be highlighted, tickets about to breach may be red.

      this image contains a sample queue organization which demonstrates how to maximize productivity

      #10 Don’t lose visibility of the backlog

      Be careful not to focus so much on assigning new tickets that you forget to update aging tickets, leading to an overwhelming backlog and dissatisfied users.

      Track metrics that give visibility into how quickly tickets are being resolved and how many aging tickets you have. Metrics may include:

      • Ticket resolution time by priority, by workgroup
      • Ticket volume by status (i.e. open, in progress, on hold, resolved)
      • Ticket volume by age
      • Ticket volume by queue and assignee

      Regularly review reports on these metrics with the team.

      Make it an agenda item to review aging tickets, on hold tickets, and tickets about to breach or past breach with the team.

      Take action on aging tickets to ensure progress is being made.

      Set rules to close tickets after a certain number of attempts to reach unresponsive users (and change ticket status appropriately).

      Schedule times for your team to tackle aged tickets or tickets in the backlog.

      Info-Tech Insight

      It can be easy for high priority work to constantly push down low priority work, leaving the lower priority tickets to constantly be ignored and users to be frustrated. If you’re struggling with aging tickets, backlog, and tickets breaching SLA, experiment with your team and queue structure to figure out the best resource distribution to handle your workload. This could mean rotating people through the triage role to allow them time to work through the backlog, reducing the number of people doing triage during slower volume periods, or giving technicians dedicated time to work through tickets. For help with forecasting demand and optimizing resources, see Staff the Service Desk to Meet Demand.

      Activity 1.1: Define ticket queues

      1 hour

      Map out your optimal ticket queue structure using the Service Desk Queue Structure Template. Follow the instructions in the template to complete it as a team.

      The template includes several examples of service desk queue structures followed by space to build your own model of an optimal service desk queue structure and to document who is assigned to each queue and responsible for managing each queue.

      Note:

      The template is not meant to map out your entire service desk structure (e.g. tiers, escalation paths) or ticket resolution process, but simply the ticket queues and how a ticket moves between queues. For help documenting more detailed process workflows or service desk structure, see the blueprint Standardize the Service Desk.

      this image contains screenshot from Info-Tech's blueprint: Service Desk Queue structure Template

      Input

      • Current queue structure and roles

      Output

      • Defined service desk ticket queues and assigned responsibilities

      Materials

      • Org chart
      • ITSM tool for reference, if needed

      Participants

      • Service Desk Manager
      • IT Director
      • Queue Managers

      Document in the Service Desk Queue Structure Template.

      Related Info-Tech Research

      Standardize the Service Desk

      This project will help you build and improve essential service desk processes including incident management, request fulfillment, and knowledge management to create a sustainable service desk.

      Optimize the Service Desk With a Shift-Left Strategy

      This project will help you build a strategy to shift service support left to optimize your service desk operations and increase end-user satisfaction.

      Improve Service Desk Ticket Intake

      This project will help you streamline your ticket intake process and identify improvements to your intake channels.

      Staff the Service Desk to Meet Demand

      This project will help you determine your optimal service desk structure and staffing levels based on your unique environment, workload, and trends.

      Works Cited

      “What your Customers Really Want.” Freshdesk, 31 May 2021. Accessed May 2022.

      Build a Strong Technology Foundation for Customer Experience Management

      • Buy Link or Shortcode: {j2store}526|cart{/j2store}
      • member rating overall impact: 8.6/10 Overall Impact
      • member rating average dollars saved: $340,152 Average $ Saved
      • member rating average days saved: 26 Average Days Saved
      • Parent Category Name: Customer Relationship Management
      • Parent Category Link: /customer-relationship-management
      • Technology is a fundamental enabler of an organization’s customer experience management (CXM) strategy. However, many IT departments fail to take a systematic approach when building a portfolio of applications for supporting marketing, sales, and customer service functions.
      • The result is a costly, ineffective, and piecemeal approach to CXM application deployment (including high-profile applications like CRM).

      Our Advice

      Critical Insight

      • IT must work in lockstep with their counterparts in marketing, sales, and customer service to define a unified vision and strategic requirements for enabling a strong CXM program.
      • To deploy applications that specifically align with the needs of the organization’s customers, IT leaders must work with the business to define and understand customer personas and common interaction scenarios. CXM applications are mission critical and failing to link them to customer needs can have a detrimental effect on customer satisfaction and ultimately, revenue.
      • IT must act as a valued partner to the business in creating a portfolio of CXM applications that are cost effective.
      • Organizations should create a repeatable framework for CXM application deployment that addresses critical issues, including the integration ecosystem, customer data quality, dashboards and analytics, and end-user adoption.

      Impact and Result

      • Establish strong application alignment to strategic requirements for CXM that is based on concrete customer personas.
      • Improve underlying business metrics across marketing, sales, and service, including customer acquisition, retention, and satisfaction metrics.
      • Better align IT with customer experience needs.

      Build a Strong Technology Foundation for Customer Experience Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a strong technology foundation for CXM, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Drive value with CXM

      Understand the benefits of a robust CXM strategy.

      • Build a Strong Technology Foundation for Customer Experience Management – Phase 1: Drive Value with CXM
      • CXM Strategy Stakeholder Presentation Template
      • CXM Strategy Project Charter Template

      2. Create the framework

      Identify drivers and objectives for CXM using a persona-driven approach and deploy the right applications to meet those objectives.

      • Build a Strong Technology Foundation for Customer Experience Management – Phase 2: Create the Framework
      • CXM Business Process Shortlisting Tool
      • CXM Portfolio Designer

      3. Finalize the framework

      Complete the initiatives roadmap for CXM.

      • Build a Strong Technology Foundation for Customer Experience Management – Phase 3: Finalize the Framework
      [infographic]

      Workshop: Build a Strong Technology Foundation for Customer Experience Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Create the Vision for CXM Technology Enablement

      The Purpose

      Establish a consistent vision across IT, marketing, sales, and customer service for CXM technology enablement.

      Key Benefits Achieved

      A clear understanding of key business and technology drivers for CXM.

      Activities

      1.1 CXM fireside chat

      1.2 CXM business drivers

      1.3 CXM vision statement

      1.4 Project structure

      Outputs

      CXM vision statement

      CXM project charter

      2 Conduct the Environmental Scan and Internal Review

      The Purpose

      Create a set of strategic requirements for CXM based on a thorough external market scan and internal capabilities assessment.

      Key Benefits Achieved

      Well-defined technology requirements based on rigorous, multi-faceted analysis.

      Activities

      2.1 PEST analysis

      2.2 Competitive analysis

      2.3 Market and trend analysis

      2.4 SWOT analysis

      2.5 VRIO analysis

      2.6 Channel map

      Outputs

      Completed external analysis

      Strategic requirements (from external analysis)

      Completed internal review

      Channel interaction map

      3 Build Customer Personas and Scenarios

      The Purpose

      Augment strategic requirements through customer persona and scenario development.

      Key Benefits Achieved

      Functional requirements aligned to supporting steps in customer interaction scenarios.

      Activities

      3.1 Persona development

      3.2 Scenario development

      3.3 Requirements definition for CXM

      Outputs

      Personas and scenarios

      Strategic requirements (based on personas)

      4 Create the CXM Application Portfolio

      The Purpose

      Using the requirements identified in the preceding modules, build a future-state application inventory for CXM.

      Key Benefits Achieved

      A cohesive, rationalized portfolio of customer interaction applications that aligns with identified requirements and allows investment (or rationalization) decisions to be made.

      Activities

      4.1 Build business process maps

      4.2 Review application satisfaction

      4.3 Create the CXM application portfolio

      4.4 Prioritize applications

      Outputs

      Business process maps

      Application satisfaction diagnostic

      Prioritized CXM application portfolio

      5 Review Best Practices and Confirm Initiatives

      The Purpose

      Establish repeatable best practices for CXM applications in areas such as data management and end-user adoption.

      Key Benefits Achieved

      Best practices for rollout of new CXM applications.

      A prioritized initiatives roadmap.

      Activities

      5.1 Create data integration map

      5.2 Define adoption best practices

      5.3 Build initiatives roadmap

      5.4 Confirm initiatives roadmap

      Outputs

      Integration map for CXM

      End-user adoption plan

      Initiatives roadmap

      Further reading

      Build a Strong Technology Foundation for Customer Experience Management

      Design an end-to-end technology strategy to enhance marketing effectiveness, drive sales, and create compelling customer service experiences.

      ANALYST PERSPECTIVE

      Technology is the catalyst to create – and keep! – your customers.

      "Customers want to interact with your organization on their own terms, and in the channels of their choice (including social media, mobile applications, and connected devices). Regardless of your industry, your customers expect a frictionless experience across the customer lifecycle. They desire personalized and well-targeted marketing messages, straightforward transactions, and effortless service. Research shows that customers value – and will pay more for! – well-designed experiences.

      Strong technology enablement is critical for creating customer experiences that drive revenue. However, most organizations struggle with creating a cohesive technology strategy for customer experience management (CXM). IT leaders need to take a proactive approach to developing a strong portfolio of customer interaction applications that are in lockstep with the needs of their marketing, sales, and customer service teams. It is critical to incorporate the voice of the customer into this strategy.

      When developing a technology strategy for CXM, don’t just “pave the cow path,” but instead move the needle forward by providing capabilities for customer intelligence, omnichannel interactions, and predictive analytics. This blueprint will help you build an integrated CXM technology roadmap that drives top-line revenue while rationalizing application spend."

      Ben Dickie

      Research Director, Customer Experience Strategy

      Info-Tech Research Group

      Framing the CXM project

      This Research Is Designed For:

      • IT leaders who are responsible for crafting a technology strategy for customer experience management (CXM).
      • Applications managers who are involved with the selection and implementation of critical customer-centric applications, such as CRM platforms, marketing automation tools, customer intelligence suites, and customer service solutions.

      This Research Will Help You:

      • Clearly link your technology-enablement strategy for CXM to strategic business requirements and customer personas.
      • Build a rationalized portfolio of enterprise applications that will support customer interaction objectives.
      • Adopt standard operating procedures for CXM application deployment that address issues such as end-user adoption and data quality.

      This Research Will Also Assist:

      • Business leaders in marketing, sales, and customer service who want to deepen their understanding of CXM technologies, and apply best practices for using these technologies to drive competitive advantage.
      • Marketing, sales, and customer service managers involved with defining requirements and rolling out CXM applications.

      This Research Will Help Them:

      • Work hand-in-hand with counterparts in IT to deploy high-value business applications that will improve core customer-facing metrics.
      • Understand the changing CXM landscape and use the art of the possible to transform the internal technology ecosystem and drive meaningful customer experiences.

      Executive summary

      Situation

      • Customer expectations for personalization, channel preferences, and speed-to-resolution are at an all-time high.
      • Your customers are willing to pay more for high-value experiences, and having a strong customer CXM strategy is a proven path to creating sustainable value for the organization.

      Complication

      • Technology is a fundamental enabler of an organization’s CXM strategy. However, many IT departments fail to take a systematic approach to building a portfolio of applications to support Marketing, Sales, and Customer Service.
      • The result is a costly, ineffective, and piecemeal approach to CXM application deployment (including high profile applications like CRM).

      Resolution

      • IT must work in lockstep with their counterparts in marketing, sales, and customer service to define a unified vision, strategic requirements and roadmap for enabling strong customer experience capabilities.
      • In order to deploy applications that don’t simply follow previously established patterns but are aligned with the specific needs of the organization’s customers, IT leaders must work with the business to define and understand customer personas and common interaction scenarios. CXM applications are mission critical and failing to link them to customer needs can have a detrimental effect on customer satisfaction – and ultimately revenue.
      • IT must act as a valued partner to the business in creating a portfolio of CXM applications that are cost effective.
      • Organizations should create a repeatable framework for CXM application deployment that addresses critical issues, including the integration ecosystem, customer data quality, dashboards and analytics, and end-user adoption.

      Info-Tech Insight

      1. IT can’t hide behind the firewall. IT must understand the organization’s customers to properly support marketing, sales, and service efforts.
      2. IT – or Marketing – must not build the CXM strategy in a vacuum if they want to achieve a holistic, consistent, and seamless customer experience.
      3. IT must get ahead of shadow IT. To be seen as an innovator within the business, IT must be a leading enabler in building a rationalized and integrated CXM application portfolio.

      Guide to frequently used acronyms

      CXM - Customer Experience Management

      CX - Customer Experience

      CRM - Customer Relationship Management

      CSM - Customer Service Management

      MMS - Marketing Management System

      SMMP - Social Media Management Platform

      RFP - Request for Proposal

      SaaS - Software as a Service

      Customers’ expectations are on the rise: meet them!

      Today’s consumers expect speed, convenience, and tailored experiences at every stage of the customer lifecycle. Successful organizations strive to support these expectations.

      67% of end consumers will pay more for a world-class customer experience. 74% of business buyers will pay more for strong B2B experiences. (Salesforce, 2018)

      5 CORE CUSTOMER EXPECTATIONS

      1. More personalization
      2. More product options
      3. Constant contact
      4. Listen closely, respond quickly
      5. Give front-liners more control

      (Customer Experience Insight, 2016)

      Customers expect to interact with organizations through the channels of their choice. Now more than ever, you must enable your organization to provide tailored customer experiences.

      Realize measurable value by enabling CXM

      Providing a seamless customer experience increases the likelihood of cross-sell and up-sell opportunities and boosts customer loyalty and retention. IT can contribute to driving revenue and decreasing costs by providing the business with the right set of tools, applications, and technical support.

      Contribute to the bottom line

      Cross-sell, up-sell, and drive customer acquisition.

      67% of consumers are willing to pay more for an upgraded experience. (Salesforce, 2018)

      80%: The margin by which CX leaders outperformer laggards in the S&P 500.(Qualtrics, 2017)

      59% of customers say tailored engagement based on past interactions is very important to winning their business. (Salesforce, 2018)

      Enable cost savings

      Focus on customer retention as well as acquisition.

      It is 6-7x more costly to attract a new customer than it is to retain an existing customer. (Salesforce Blog, 2019)

      A 5% increase in customer retention has been found to increase profits by 25% to 95%. (Bain & Company, n.d.)

      Strategic CXM is gaining traction with your competition

      Organizations are prioritizing CXM capabilities (and associated technologies) as a strategic investment. Keep pace with the competition and gain a competitive advantage by creating a cohesive strategy that uses best practices to integrate marketing, sales, and customer support functions.

      87% of customers share great experiences they’ve had with a company. (Zendesk, n.d.)

      61% of organizations are investing in CXM. (CX Network, 2015)

      53% of organizations believe CXM provides a competitive advantage. (Harvard Business Review, 2014)

      Top Investment Priorities for Customer Experience

      1. Voice of the Customer
      2. Customer Insight Generation
      3. Customer Experience Governance
      4. Customer Journey Mapping
      5. Online Customer Experience
      6. Experience Personalization
      7. Emotional Engagement
      8. Multi-Channel Integration/Omnichannel
      9. Quality & Customer Satisfaction Management
      10. Customer/Channel Loyalty & Rewards Programs

      (CX Network 2015)

      Omnichannel is the way of the future: don’t be left behind

      Get ahead of the competition by doing omnichannel right. Devise a CXM strategy that allows you to create and maintain a consistent, seamless customer experience by optimizing operations within an omnichannel framework. Customers want to interact with you on their own terms, and it falls to IT to ensure that applications are in place to support and manage a wide range of interaction channels.

      Omnichannel is a “multi-channel approach to sales that seeks to provide the customer with a seamless transactional experience whether the customer is shopping online from a desktop or mobile device, by telephone, or in a bricks and mortar store.” (TechTarget, 2014)

      97% of companies say that they are investing in omnichannel. (Huffington Post, 2015)

      23% of companies are doing omnichannel well.

      CXM applications drive effective multi-channel customer interactions across marketing, sales, and customer service

      The success of your CXM strategy depends on the effective interaction of various marketing, sales, and customer support functions. To deliver on customer experience, organizations need to take a customer-centric approach to operations.

      From an application perspective, a CRM platform generally serves as the unifying repository of customer information, supported by adjacent solutions as warranted by your CXM objectives.

      CXM ECOSYSTEM

      Customer Relationship Management Platform

      • Web Experience Management Platform
      • E-Commerce & Point of Sale Solutions
      • Social Media Management Platform
      • Customer Intelligence Platform
      • Customer Service Management Tools
      • Marketing Management Suite

      Application spotlight: Customer experience platforms

      Description

      CXM solutions are a broad range of tools that provide comprehensive feature sets for supporting customer interaction processes. These suites supplant more basic applications for customer interaction management. Popular solutions that fall under the umbrella of CXM include CRM suites, marketing automation tools, and customer service applications.

      Features and Capabilities

      • Manage sales pipelines, provide quotes, and track client deliverables.
      • View all opportunities organized by their current stage in the sales process.
      • View all interactions that have occurred between employees and the customer, including purchase order history.
      • Manage outbound marketing campaigns via multiple channels (email, phone, social, mobile).
      • Build visual workflows with automated trigger points and business rules engine.
      • Generate in-depth customer insights, audience segmentation, predictive analytics, and contextual analytics.
      • Provide case management, ticketing, and escalation capabilities for customer service.

      Highlighted Vendors

      Microsoft Dynamics

      Adobe

      Marketo

      sprinklr

      Salesforce

      SugarCRM

      Application spotlight: Customer experience platforms

      Key Trends

      • CXM applications have decreased their focus on departmental silos to make it easier to share information across the organization as departments demand more data.
      • Vendors are developing deeper support of newer channels for customer interaction. This includes providing support for social media channels, native mobile applications, and SMS or text-based services like WhatsApp and Facebook Messenger.
      • Predictive campaigns and channel blending are becoming more feasible as vendors integrate machine learning and artificial intelligence into their applications.
      • Content blocks are being placed on top of scripting languages to allow for user-friendly interfaces. There is a focus on alleviating bottlenecks where content would have previously needed to go through a specialist.
      • Many vendors of CXM applications are placing increased emphasis on strong application integration both within and beyond their portfolios, with systems like ERP and order fulfillment.

      Link to Digital Strategy

      • For many organizations that are building out a digital strategy, improving customer experience is often a driving factor: CXM apps enable this goal.
      • As part of a digital strategy, create a comprehensive CXM application portfolio by leveraging both core CRM suites and point solutions.
      • Ensure that a point solution aligns with the digital strategy’s technology drivers and user personas.

      CXM KPIs

      Strong CXM applications can improve:

      • Lead Intake Volume
      • Lead Conversion Rate
      • Average Time to Resolution
      • First-Contact Resolution Rate
      • Customer Satisfaction Rate
      • Share-of-Mind
      • Share-of-Wallet
      • Customer Lifetime Value
      • Aggregate Reach/Impressions

      IT is critical to the success of your CXM strategy

      Technology is the key enabler of building strong customer experiences: IT must stand shoulder-to-shoulder with the business to develop a technology framework for CXM.

      Top 5 Challenges with CXM for Marketing

      1. Maximizing customer experience ROI
      2. Achieving a single view of the customer
      3. Building new customer experiences
      4. Cultivating a customer-focused culture
      5. Measuring CX investments to business outcomes

      Top 5 Obstacles to Enabling CXM for IT

      1. Systems integration
      2. Multichannel complexity
      3. Organizational structure
      4. Data-related issues
      5. Lack of strategy

      (Harvard Business Review, 2014)

      Only 19% of organizations have a customer experience team tasked with bridging gaps between departments. (Genesys, 2018)

      IT and Marketing can only tackle CXM with the full support of each other. The cooperation of the departments is crucial when trying to improve CXM technology capabilities and customer interaction and drive a strong revenue mandate.

      CXM failure: Blockbuster

      CASE STUDY

      Industry Entertainment

      Source Forbes, 2014

      Blockbuster

      As the leader of the video retail industry, Blockbuster had thousands of retail locations internationally and millions of customers. Blockbuster’s massive marketing budget and efficient operations allowed it to dominate the competition for years.

      Situation

      Trends in Blockbuster’s consumer market changed in terms of distribution channels and customer experience. As the digital age emerged and developed, consumers were looking for immediacy and convenience. This threatened Blockbuster’s traditional, brick-and-mortar B2C operating model.

      The Competition

      Netflix entered the video retail market, making itself accessible through non-traditional channels (direct mail, and eventually, the internet).

      Results

      Despite long-term relationships with customers and competitive standing in the market, Blockbuster’s inability to understand and respond to changing technology trends and customer demands led to its demise. The organization did not effectively leverage internal or external networks or technology to adapt to customer demands. Blockbuster went bankrupt in 2010.

      Customer Relationship Management

      • Web Experience Management Platform
      • E-Commerce & Point of Sale Solutions
      • Social Media Management
      • Customer Intelligence
      • Customer Service
      • Marketing Management

      Blockbuster did not leverage emerging technologies to effectively respond to trends in its consumer network. It did not optimize organizational effectiveness around customer experience.

      CXM success: Netflix

      CASE STUDY

      Industry Entertainment

      Source Forbes, 2014

      Netflix

      Beginning as a mail-out service, Netflix offered subscribers a catalog of videos to select from and have mailed to them directly. Customers no longer had to go to a retail store to rent a video. However, the lack of immediacy of direct mail as the distribution channel resulted in slow adoption.

      The Situation

      In response to the increasing presence of tech-savvy consumers on the internet, Netflix invested in developing its online platform as its primary distribution channel. The benefit of doing so was two-fold: passive brand advertising (by being present on the internet) and meeting customer demands for immediacy and convenience. Netflix also recognized the rising demand for personalized service and created an unprecedented, tailored customer experience.

      The Competition

      Blockbuster was the industry leader in video retail but was lagging in its response to industry, consumer, and technology trends around customer experience.

      Results

      Netflix’s disruptive innovation is built on the foundation of great CXM. Netflix is now a $28 billion company, which is tenfold what Blockbuster was worth.

      Customer Relationship Management Platform

      • Web Experience Management Platform
      • E-Commerce & Point of Sale Solutions
      • Social Media Management Platform
      • Customer Intelligence Platform
      • Customer Service Management Tools
      • Marketing Management Suite

      Netflix used disruptive technologies to innovatively build a customer experience that put it ahead of the long-time, video rental industry leader, Blockbuster.

      Leverage Info-Tech’s approach to succeed with CXM

      Creating an end-to-end technology-enablement strategy for CXM requires a concerted, dedicated effort: Info-Tech can help with our proven approach.

      Build the CXM Project Charter

      Conduct a Thorough Environmental Scan

      Build Customer Personas and Scenarios

      Draft Strategic CXM Requirements

      Build the CXM Application Portfolio

      Implement Operational Best Practices

      Why Info-Tech’s Approach?

      Info-Tech draws on best-practice research and the experiences of our global member base to develop a methodology for CXM that is driven by rigorous customer-centric analysis.

      Our approach uses a unique combination of techniques to ensure that your team has done its due diligence in crafting a forward-thinking technology-enablement strategy for CXM that creates measurable value.

      A global professional services firm drives measurable value for CXM by using persona design and scenario development

      CASE STUDY

      Industry Professionals Services

      Source Info-Tech Workshop

      The Situation

      A global professional services firm in the B2B space was experiencing a fragmented approach to customer engagement, particularly in the pre-sales funnel. Legacy applications weren’t keeping pace with an increased demand for lead evaluation and routing technology. Web experience management was also an area of significant concern, with a lack of ongoing customer engagement through the existing web portal.

      The Approach

      Working with a team of Info-Tech facilitators, the company was able to develop several internal and external customer personas. These personas formed the basis of strategic requirements for a new CXM application stack, which involved dedicated platforms for core CRM, lead automation, web content management, and site analytics.

      Results

      Customer “stickiness” metrics increased, and Sales reported significantly higher turnaround times in lead evaluations, resulting in improved rep productivity and faster cycle times.

      Components of a persona
      Name Name personas to reflect a key attribute such as the persona’s primary role or motivation.
      Demographic Include basic descriptors of the persona (e.g. age, geographic location, preferred language, education, job, employer, household income, etc.)
      Wants, needs, pain points Identify surface-level motivations for buying habits.
      Psychographic/behavioral traits Observe persona traits that are representative of the customers’ behaviors (e.g. attitudes, buying patterns, etc.).

      Follow Info-Tech’s approach to build your CXM foundation

      Create the Project Vision

      • Identify business and IT drivers
      • Outputs:
        • CXM Strategy Guiding Principles

      Structure the Project

      • Identify goals and objectives for CXM project
      • Form Project Team
      • Establish timeline
      • Obtain project sponsorship
      • Outputs:
        • CXM Strategy Project Charter

      Scan the External Environment

      • Create CXM operating model
      • Conduct external analysis
      • Create customer personas
      • Outputs:
        • CXM Operating Model
      • Conduct PEST analysis
      • Create persona scenarios
      • Outputs:
        • CXM Strategic Requirements

      Assess the Current State of CXM

      • Conduct SWOT analysis
      • Assess application usage and satisfaction
      • Conduct VRIO analysis
      • Outputs:
        • CXM Strategic Requirements

      Create an Application Portfolio

      • Map current processes
      • Assign business process owners
      • Create channel map
      • Build CXM application portfolio
      • Outputs:
        • CXM Application Portfolio Map

      Develop Deployment Best Practices

      • Develop CXM integration map
      • Create mitigation plan for poor data quality
      • Outputs:
        • Data Quality Preservation Map

      Create an Initiative Rollout Plan

      • Create risk management plan
      • Identify work initiative dependencies
      • Create roadmap
      • Outputs:
        • CXM Initiative Roadmap

      Confirm and Finalize the CXM Blueprint

      • Identify success metrics
      • Create stakeholder communication plan
      • Present CXM strategy to stakeholders
      • Outputs:
        • Stakeholder Presentation

      Info-Tech offers various levels of support to suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Build a Strong Technology Foundation for CXM – project overview

      1. Drive Value With CXM 2. Create the Framework 3. Finalize the Framework
      Best-Practice Toolkit

      1.1 Create the Project Vision

      1.2 Structure the CXM Project

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Guided Implementations
      • Determine project vision for CXM.
      • Review CXM project charter.
      • Review environmental scan.
      • Review application portfolio for CXM.
      • Confirm deployment best practices.
      • Review initiatives rollout plan.
      • Confirm CXM roadmap.
      Onsite Workshop Module 1: Drive Measurable Value with a World-Class CXM Program Module 2: Create the Strategic Framework for CXM Module 3: Finalize the CXM Framework

      Phase 1 Outcome:

      • Completed drivers
      • Completed project charter

      Phase 2 Outcome:

      • Completed personas and scenarios
      • CXM application portfolio

      Phase 3 Outcome:

      • Strategic summary blueprint

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities

      Create the Vision for CXM Enablement

      1.1 CXM Fireside Chat

      1.2 CXM Business Drivers

      1.3 CXM Vision Statement

      1.4 Project Structure

      Conduct the Environmental Scan and Internal Review

      2.1 PEST Analysis

      2.2 Competitive Analysis

      2.3 Market and Trend Analysis

      2.4 SWOT Analysis

      2.5 VRIO Analysis

      2.6 Channel Mapping

      Build Personas and Scenarios

      3.1 Persona Development

      3.2 Scenario Development

      3.3 Requirements Definition for CXM

      Create the CXM Application Portfolio

      4.1 Build Business Process Maps

      4.2 Review Application Satisfaction

      4.3 Create the CXM Application Portfolio

      4.4 Prioritize Applications

      Review Best Practices and Confirm Initiatives

      5.1 Create Data Integration Map

      5.2 Define Adoption Best Practices

      5.3 Build Initiatives Roadmap

      5.4 Confirm Initiatives Roadmap

      Deliverables
      1. CXM Vision Statement
      2. CXM Project Charter
      1. Completed External Analysis
      2. Completed Internal Review
      3. Channel Interaction Map
      4. Strategic Requirements (from External Analysis)
      1. Personas and Scenarios
      2. Strategic Requirements (based on personas)
      1. Business Process Maps
      2. Application Satisfaction Diagnostic
      3. Prioritized CXM Application Portfolio
      1. Integration Map for CXM
      2. End-User Adoption Plan
      3. Initiatives Roadmap

      Phase 1

      Drive Measurable Value With a World-Class CXM Program

      Build a Strong Technology Foundation for Customer Experience Management

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Drive Measurable Value With a World-Class CXM Program

      Proposed Time to Completion: 2 weeks

      Step 1.1: Create the Project Vision

      Start with an analyst kick-off call:

      • Review key drivers from a technology and business perspective for CXM
      • Discuss benefits of strong technology enablement for CXM

      Then complete these activities…

      • CXM Fireside Chat
      • CXM Business and Technology Driver Assessment
      • CXM Vision Statement

      With these tools & templates:

      • CXM Strategy Stakeholder Presentation Template

      Step 1.2: Structure the Project

      Review findings with analyst:

      • Assess the CXM vision statement for competitive differentiators
      • Determine current alignment disposition of IT with different business units

      Then complete these activities…

      • Team Composition and Responsibilities
      • Metrics Definition

      With these tools & templates:

      • CXM Strategy Project Charter Template

      Phase 1 Results & Insights:

      • Defined value of strong technology enablement for CXM
      • Completed CXM project charter

      Step 1.1: Create the Project Vision

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Fireside Chat: Discuss past challenges and successes with CXM
      • Identify business and IT drivers to establish guiding principles for CXM

      Outcomes:

      • Business benefits of a rationalized technology strategy to support CXM
      • Shared lessons learned
      • Guiding principles for providing technology enablement for CXM

      Building a technology strategy to support customer experience isn’t an option – it’s a mission-critical activity

      • Customer-facing departments supply the lifeblood of a company: revenue. In today’s fast-paced and interconnected world, it’s becoming increasingly imperative to enable customer experience processes with a wide range of technologies, from lead automation to social relationship management. CXM is the holistic management of customer interaction processes across marketing, sales, and customer service to create valuable, mutually beneficial customer experiences. Technology is a critical building block for enabling CXM.
      • The parallel progress of technology and process improvement is essential to an efficient and effective CXM program. While many executives prefer to remain at the status quo, new technologies have caused major shifts in the CXM environment. If you stay with the status quo, you will fall behind the competition.
      • However, many IT departments are struggling to keep up with the pace of change and find themselves more of a firefighter than a strategic partner to marketing, sales, and service teams. This not only hurts the business, but it also tarnishes IT’s reputation.

      An aligned, optimized CX strategy is:

      Rapid: to intentionally and strategically respond to quickly-changing opportunities and issues.

      Outcome-based: to make key decisions based on strong business cases, data, and analytics in addition to intuition and judgment.

      Rigorous: to bring discipline and science to bear; to improve operations and results.

      Collaborative: to conduct activities in a broader ecosystem of partners, suppliers, vendors, co-developers, and even competitors.

      (The Wall Street Journal, 2013)

      Info-Tech Insight

      If IT fails to adequately support marketing, sales, and customer service teams, the organization’s revenue will be in direct jeopardy. As a result, CIOs and Applications Directors must work with their counterparts in these departments to craft a cohesive and comprehensive strategy for using technology to create meaningful (and profitable) customer experiences.

      Fireside Chat, Part 1: When was technology an impediment to customer experience at your organization?

      1.1.1 30 minutes

      Input

      • Past experiences of the team

      Output

      • Lessons learned

      Materials

      • Whiteboard
      • Markers

      Participants

      • Core Team

      Instructions

      1. Think about a time when technology was an impediment to a positive customer experience at your organization. Reflect on the following:
        • What frustrations did the application or the technology cause to your customers? What was their reaction?
        • How did IT (and the business) identify the challenge in the first place?
        • What steps were taken to mitigate the impact of the problem? Were these steps successful?
        • What were the key lessons learned as part of the challenge?

      Fireside Chat, Part 2: What customer success stories has your organization created by using new technologies?

      1.1.2 30 minutes

      Input

      • Past experiences of the team

      Output

      • Lessons learned

      Materials

      • Whiteboard
      • Markers

      Participants

      • Core Team

      Instructions

      1. Think about a time when your organization successfully leveraged a new application or new technology to enhance the experience it provided to customers. Reflect on this experience and consider:
        • What were the organizational drivers for rolling out the new application or solution?
        • What obstacles had to be overcome in order to successfully deploy the solution?
        • How did the application positively impact the customer experience? What metrics improved?
        • What were the key lessons learned as part of the deployment? If you had to do it all over again, what would you do differently?

      Develop a cohesive, consistent, and forward-looking roadmap that supports each stage of the customer lifecycle

      When creating your roadmap, consider the pitfalls you’ll likely encounter in building the IT strategy to provide technology enablement for customer experience.

      There’s no silver bullet for developing a strategy. You can encounter pitfalls at a myriad of different points including not involving the right stakeholders from the business, not staying abreast of recent trends in the external environment, and not aligning sales, marketing, and support initiatives with a focus on the delivery of value to prospects and customers.

      Common Pitfalls When Creating a Technology-Enablement Strategy for CXM

      Senior management is not involved in strategy development.

      Not paying attention to the “art of the possible.”

      “Paving the cow path” rather than focusing on revising core processes.

      Misalignment between objectives and financial/personnel resources.

      Inexperienced team on either the business or IT side.

      Not paying attention to the actions of competitors.

      Entrenched management preferences for legacy systems.

      Sales culture that downplays the potential value of technology or new applications.

      IT is only one or two degrees of separation from the end customer: so take a customer-centric approach

      IT →Marketing, Sales, and Service →External Customers

      Internal-Facing Applications

      • IT enables, supports, and maintains the applications used by the organization to market to, sell to, and service customers. IT provides the infrastructural and technical foundation to operate the function.

      Customer-Facing Applications

      • IT supports customer-facing interfaces and channels for customer interaction.
      • Channel examples include web pages, mobile device applications and optimization, and interactive voice response for callers.

      Info-Tech Insight

      IT often overlooks direct customer considerations when devising a technology strategy for CXM. Instead, IT leaders rely on other business stakeholders to simply pass on requirements. By sitting down with their counterparts in marketing and sales, and fully understanding business drivers and customer personas, IT will be much better positioned to roll out supporting applications that drive customer engagement.

      A well-aligned CXM strategy recognizes a clear delineation of responsibilities between IT, sales, marketing, and service

      • When thinking about CXM, IT must recognize that it is responsible for being a trusted partner for technology enablement. This means that IT has a duty to:
        • Develop an in-depth understanding of strategic business requirements for CXM. Base your understanding of these business requirements on a clear conception of the internal and external environment, customer personas, and business processes in marketing, sales, and customer service.
        • Assist with shortlisting and supporting different channels for customer interaction (including email, telephony, web presence, and social media).
        • Create a rationalized, cohesive application portfolio for CXM that blends different enabling technologies together to support strategic business requirements.
        • Provide support for vendor shortlisting, selection, and implementation of CXM applications.
        • Assist with end-user adoption of CXM applications (i.e. training and ongoing support).
        • Provide initiatives that assist with technical excellence for CXM (such as data quality, integration, analytics, and application maintenance).
      • The business (marketing, sales, customer service) owns the business requirements and must be responsible for setting top-level objectives for customer interaction (e.g. product and pricing decisions, marketing collateral, territory management, etc.). IT should not take over decisions on customer experience strategy. However, IT should be working in lockstep with its counterparts in the business to assist with understanding business requirements through a customer-facing lens. For example, persona development is best done in cross-functional teams between IT and Marketing.

      Activity: Identify the business drivers for CXM to establish the strategy’s guiding principles

      1.1.3 30 minutes

      Input

      • Business drivers for CXM

      Output

      • Guiding principles for CXM strategy

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Define the assumptions and business drivers that have an impact on technology enablement for CXM. What is driving the current marketing, sales, and service strategy on the business side?
      Business Driver Name Driver Assumptions, Capabilities, and Constraints Impact on CXM Strategy
      High degree of customer-centric solution selling A technically complex product means that solution selling approaches are employed – sales cycles are long. There is a strong need for applications and data quality processes that support longer-term customer relationships rather than transactional selling.
      High desire to increase scalability of sales processes Although sales cycles are long, the organization wishes to increase the effectiveness of rep time via marketing automation where possible. Sales is always looking for new ways to leverage their reps for face-to-face solution selling while leaving low-level tasks to automation. Marketing wants to support these tasks.
      Highly remote sales team and unusual hours are the norm Not based around core hours – significant overtime or remote working occurs frequently. Misalignment between IT working only core hours and after-hours teams leads to lag times that can delay work. Scheduling of preventative sales maintenance must typically be done on weekends rather than weekday evenings.

      Activity: Identify the IT drivers for CXM to establish the strategy’s guiding principles

      1.1.4 30 minutes

      Input

      • IT drivers for CXM

      Output

      • Guiding principles for CXM strategy

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Define the assumptions and IT drivers that have an impact on technology enablement for CXM. What is driving the current IT strategy for supporting marketing, sales, and service initiatives?
      IT Driver Name Driver Assumptions, Capabilities, and Constraints Impact on CXM Strategy
      Sales Application Procurement Methodology Strong preference for on-premise COTS deployments over homebrewed applications. IT may not be able to support cloud-based sales applications due to security requirements for on premise.
      Vendor Relations Minimal vendor relationships; SLAs not drafted internally but used as part of standard agreement. IT may want to investigate tightening up SLAs with vendors to ensure more timely support is available for their sales teams.
      Development Methodology Agile methodology employed, some pockets of Waterfall employed for large-scale deployments. Agile development means more perfective maintenance requests come in, but it leads to greater responsiveness for making urgent corrective changes to non-COTS products.
      Data Quality Approach IT sees as Sales’ responsibility IT is not standing as a strategic partner for helping to keep data clean, causing dissatisfaction from customer-facing departments.
      Staffing Availability Limited to 9–5 Execution of sales support takes place during core hours only, limiting response times and access for on-the-road sales personnel.

      Activity: Use IT and business drivers to create guiding principles for your CXM technology-enablement project

      1.1.5 30 minutes

      Input

      • Business drivers and IT drivers from 1.1.3 and 1.1.4

      Output

      • CXM mission statement

      Materials

      • Whiteboard
      • Markers

      Participants

      • Core Team

      Instructions

      1. Based on the IT and business drivers identified, craft guiding principles for CXM technology enablement. Keep guiding principles in mind throughout the project and ensure they support (or reconcile) the business and IT drivers.

      Guiding Principle Description
      Sales processes must be scalable. Our sales processes must be able to reach a high number of target customers in a short time without straining systems or personnel.
      Marketing processes must be high touch. Processes must be oriented to support technically sophisticated, solution-selling methodologies.

      2. Summarize the guiding principles above by creating a CXM mission statement. See below for an example.

      Example: CXM Mission Statement

      To ensure our marketing, sales and service team is equipped with tools that will allow them to reach out to a large volume of contacts while still providing a solution-selling approach. This will be done with secure, on-premise systems to safeguard customer data.

      Ensure that now is the right time to take a step back and develop the CXM strategy

      Determine if now is the right time to move forward with building (or overhauling) your technology-enablement strategy for CXM.

      Not all organizations will be able to proceed immediately to optimize their CXM technology enablement. Determine if the organizational willingness, backbone, and resources are present to commit to overhauling the existing strategy. If you’re not ready to proceed, consider waiting to begin this project until you can procure the right resources.

      Do not proceed if:

      • Your current strategy for supporting marketing, sales, and service is working well and IT is already viewed as a strategic partner by these groups. Your current strategy is well aligned with customer preferences.
      • The current strategy is not working well, but there is no consensus or support from senior management for improving it.
      • You cannot secure the resources or time to devote to thoroughly examining the current state and selecting improvement initiatives.
      • The strategy has been approved, but there is no budget in place to support it at this time.

      Proceed if:

      • Senior management has agreed that technology support for CXM should be improved.
      • Sub-divisions within IT, sales, marketing, and service are on the same page about the need to improve alignment.
      • You have an approximate budget to work with for the project and believe you can secure additional funding to execute at least some improvement initiatives.
      • You understand how improving CXM alignment will fit into the broader customer interaction ecosystem in your organization.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.3; 1.1.4; 1.1.5 - Identify business and IT drivers to create CXM guiding principles

      The facilitator will work with stakeholders from both the business and IT to identify implicit or explicit strategic drivers that will support (or pose constraints on) the technology-enablement framework for the CXM strategy. In doing so, guiding principles will be established for the project.

      Step 1.2: Structure the Project

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Define the project purpose, objectives, and business metrics
      • Define the scope of the CXM strategy
      • Create the project team
      • Build a RACI chart
      • Develop a timeline with project milestones
      • Identify risks and create mitigation strategies
      • Complete the strategy project charter and obtain approval

      Outcomes:

      CXM Strategy Project Charter Template

      • Purpose, objectives, metrics
      • Scope
      • Project team & RACI
      • Timeline
      • Risks & mitigation strategies
      • Project sponsorship

      Use Info-Tech’s CXM Strategy Project Charter Template to outline critical components of the CXM project

      1.2.1 CXM Strategy Project Charter Template

      Having a project charter is the first step for any project: it specifies how the project will be resourced from a people, process, and technology perspective, and it clearly outlines major project milestones and timelines for strategy development. CXM technology enablement crosses many organizational boundaries, so a project charter is a very useful tool for ensuring everyone is on the same page.

      Sections of the document:

      1. Project Drivers, Rationale, and Context
      2. Project Objectives, Metrics, and Purpose
      3. Project Scope Definition
      4. Project Team Roles and Responsibilities (RACI)
      5. Project Timeline
      6. Risk Mitigation Strategy
      7. Project Metrics
      8. Project Review & Approvals

      INFO-TECH DELIVERABLE

      CXM Strategy Project Charter Template

      Populate the relevant sections of your project charter as you complete activities 1.2.2-1.2.8.

      Understand the roles necessary to complete your CXM technology-enablement strategy

      Understand the role of each player within your project structure. Look for listed participants on the activities slides to determine when each player should be involved.

      Title Role Within Project Structure
      Project Sponsor
      • Owns the project at the management/C-suite level
      • Responsible for breaking down barriers and ensuring alignment with organizational strategy
      • CIO, CMO, VP of Sales, VP of Customer Care, or similar
      Project Manager
      • The IT individual(s) that will oversee day-to-day project operations
      • Responsible for preparing and managing the project plan and monitoring the project team’s progress
      • Applications or other IT Manager, Business Analyst, Business Process Owner, or similar
      Business Lead
      • Works alongside the IT PM to ensure that the strategy is aligned with business needs
      • In this case, likely to be a marketing, sales, or customer service lead
      • Sales Director, Marketing Director, Customer Care Director, or similar
      Project Team
      • Comprised of individuals whose knowledge and skills are crucial to project success
      • Responsible for driving day-to-day activities, coordinating communication, and making process and design decisions. Can assist with persona and scenario development for CXM.
      • Project Manager, Business Lead, CRM Manager, Integration Manager, Application SMEs, Developers, Business Process Architects, and/or similar SMEs
      Steering Committee
      • Comprised of C-suite/management level individuals that act as the project’s decision makers
      • Responsible for validating goals and priorities, defining the project scope, enabling adequate resourcing, and managing change
      • Project Sponsor, Project Manager, Business Lead, CFO, Business Unit SMEs and similar

      Info-Tech Insight

      Do not limit project input or participation to the aforementioned roles. Include subject matter experts and internal stakeholders at particular stages within the project. Such inputs can be solicited on a one-off basis as needed. This ensures you take a holistic approach to creating your CXM technology-enablement strategy.

      Activity: Kick-off the CXM project by defining the project purpose, project objectives, and business metrics

      1.2.2 30 minutes

      Input

      • Activities 1.1.1 to 1.1.5

      Output

      • Drivers & rationale
      • Purpose statement
      • Business goals
      • Business metrics
      • CXM Strategy Project Charter Template, sections 1.0, 2.0, and 2.1

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Sponsor
      • Project Manager
      • Business Lead
      • Steering Committee

      Instructions

      Hold a meeting with IT, Marketing, Sales, Service, Operations, and any other impacted business stakeholders that have input into CXM to accomplish the following:

      1. Discuss the drivers and rationale behind embarking on a CXM strategy.
      2. Develop and concede on objectives for the CXM project, metrics that will gauge its success, and goals for each metric.
      3. Create a project purpose statement that is informed by decided-upon objectives and metrics from the steps above. When establishing a project purpose, ask the question, “what are we trying to accomplish?”
      • Example: Project Purpose Statement
        • The organization is creating a CXM strategy to gather high-level requirements from the business, IT, and Marketing, Sales, and Service, to ensure that the selection and deployment of the CXM meets the needs of the broader organization and provides the greatest return on investment.
    • Document your project drivers and rationale, purpose statement, project objectives, and business metrics in Info-Tech’s CXM Strategy Project Charter Template in sections 1.0 and 2.0.
    • Info-Tech Insight

      Going forward, set up a quarterly review process to understand changing needs. It is rare that organizations never change their marketing and sales strategy. This will change the way the CXM will be utilized.

      Establish baseline metrics for customer engagement

      In order to gauge the effectiveness of CXM technology enablement, establish core metrics:

      1. Marketing Metrics: pertaining to share of voice, share of wallet, market share, lead generation, etc.
      2. Sales Metrics: pertaining to overall revenue, average deal size, number of accounts, MCV, lead warmth, etc.
      3. Customer Service Metrics: pertaining to call volumes, average time to resolution, first contact resolution, customer satisfaction, etc.
      4. IT Metrics: pertaining to end-user satisfaction with CXM applications, number of tickets, contract value, etc.
      Metric Description Current Metric Future Goal
      Market Share 25% 35%
      Share of Voice (All Channels) 40% 50%
      Average Deal Size $10,500 $12,000
      Account Volume 1,400 1,800
      Average Time to Resolution 32 min 25 min
      First Contact Resolution 15% 35%
      Web Traffic per Month (Unique Visitors) 10,000 15,000
      End-User Satisfaction 62% 85%+
      Other metric
      Other metric
      Other metric

      Understand the importance of setting project expectations with a scope statement

      Be sure to understand what is in scope for a CXM strategy project. Prevent too wide of a scope to avoid scope creep – for example, we aren’t tackling ERP or BI under CXM.

      In Scope

      Establishing the parameters of the project in a scope statement helps define expectations and provides a baseline for resource allocation and planning. Future decisions about the strategic direction of CXM will be based on the scope statement.

      Scope Creep

      Well-executed requirements gathering will help you avoid expanding project parameters, drawing on your resources, and contributing to cost overruns and project delays. Avoid scope creep by gathering high-level requirements that lead to the selection of category-level application solutions (e.g. CRM, MMS, SMMP, etc.), rather than granular requirements that would lead to vendor application selection (e.g. Salesforce, Marketo, Hootsuite, etc.).

      Out of Scope

      Out-of-scope items should also be defined to alleviate ambiguity, reduce assumptions, and further clarify expectations for stakeholders. Out-of-scope items can be placed in a backlog for later consideration. For example, fulfilment and logistics management is out of scope as it pertains to CXM.

      In Scope
      Strategy
      High-Level CXM Application Requirements CXM Strategic Direction Category Level Application Solutions (e.g. CRM, MMS, etc.)
      Out of Scope
      Software Selection
      Vendor Application Review Vendor Application Selection Granular Application System Requirements

      Activity: Define the scope of the CXM strategy

      1.2.3 30 minutes

      Input

      • N/A

      Output

      • Project scope and parameters
      • CXM Strategy Project Charter Template, section 3.0

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Sponsor
      • Project Manager
      • Business Lead

      Instructions

      1. Formulate a scope statement. Decide which people, processes, and functions the CXM strategy will address. Generally, the aim of this project is to develop strategic requirements for the CXM application portfolio – not to select individual vendors.
      2. Document your scope statement in Info-Tech’s CXM Strategy Project Charter Template in section 3.0.

      To form your scope statement, ask the following questions:

      • What are the major coverage points?
      • Who will be using the systems?
      • How will different users interact with the systems?
      • What are the objectives that need to be addressed?
      • Where do we start?
      • Where do we draw the line?

      Identify the right stakeholders to include on your project team

      Consider the core team functions when composing the project team. Form a cross-functional team (i.e. across IT, Marketing, Sales, Service, Operations) to create a well-aligned CXM strategy.

      Required Skills/Knowledge Suggested Project Team Members
      IT
      • Application development
      • Enterprise integration
      • Business processes
      • Data management
      • CRM Application Manager
      • Business Process Manager
      • Integration Manager
      • Application Developer
      • Data Stewards
      Business
      • Understanding of the customer
      • Departmental processes
      • Sales Manager
      • Marketing Manager
      • Customer Service Manager
      Other
      • Operations
      • Administrative
      • Change management
      • Operations Manager
      • CFO
      • Change Management Manager

      Info-Tech Insight

      Don’t let your project team become too large when trying to include all relevant stakeholders. Carefully limiting the size of the project team will enable effective decision making while still including functional business units such as marketing, sales, service, and finance, as well as IT.

      Activity: Create the project team

      1.2.4 45 minutes

      Input

      • Scope Statement (output of Activity 1.2.3).

      Output

      • Project Team
      • CXM Strategy Project Charter Template, section 4.0

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Manager
      • Business Lead

      Instructions

      1. Review your scope statement. Have a discussion to generate a complete list of key stakeholders that are needed to achieve the scope of work.
      2. Using the previously generated list, identify a candidate for each role and determine their responsibilities and expected time commitment for the CXM strategy project.
      3. Document the project team in Info-Tech’s CXM Strategy Project Charter Template in section 4.0.

      Define project roles and responsibilities to improve progress tracking

      Build a list of the core CXM strategy team members, and then structure a RACI chart with the relevant categories and roles for the overall project.

      Responsible - Conducts work to achieve the task

      Accountable - Answerable for completeness of task

      Consulted - Provides input for the task

      Informed - Receives updates on the task

      Info-Tech Insight

      Avoid missed tasks between inter-functional communications by defining roles and responsibilities for the project as early as possible.

      Benefits of Assigning RACI Early:

      • Improve project quality by assigning the right people to the right tasks.
      • Improve chances of project task completion by assigning clear accountabilities.
      • Improve project buy-in by ensuring that stakeholders are kept informed of project progress, risks, and successes.

      Activity: Build a RACI chart

      1.2.5 30 minutes

      Input

      • Project Team (output of Activity 1.2.4)

      Output

      • RACI chart
      • CXM Strategy Project Charter Template, section 4.2

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Manager
      • Business Lead

      Instructions

      1. Identify the key stakeholder teams that should be involved in the CXM strategy project. You should have a cross-functional team that encompasses both IT (various units) and the business.
      2. Determine whether each stakeholder should be responsible, accountable, consulted, and/or informed with respect to each overarching project step.
      3. Confirm and communicate the results to relevant stakeholders and obtain their approval.
      4. Document the RACI chart in Info-Tech’s CXM Strategy Project Charter Template in section 4.2.
      Example: RACI Chart Project Sponsor (e.g. CMO) Project Manager (e.g. Applications Manager) Business Lead (e.g. Marketing Director) Steering Committee (e.g. PM, CMO, CFO…) Project Team (e.g. PM, BL, SMEs…)
      Assess Project Value I C A R C
      Conduct a Current State Assessment I I A C R
      Design Application Portfolio I C A R I
      Create CXM Roadmap R R A I I
      ... ... ... ... ... ...

      Activity: Develop a timeline in order to specify concrete project milestones

      1.2.6 30 minutes

      Input

      • N/A

      Output

      • Project timeline
      • CXM Strategy Project Charter Template, section 5.0

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Manager
      • Business Lead

      Instructions

      1. Assign responsibilities, accountabilities, and other project involvement to each project team role using a RACI chart. Remember to consider dependencies when creating the schedule and identifying appropriate subtasks.
      2. Document the timeline in Info-Tech’s CXM Strategy Project Charter Template in section 5.0.
      Key Activities Start Date End Date Target Status Resource(s)
      Structure the Project and Build the Project Team
      Articulate Business Objectives and Define Vision for Future State
      Document Current State and Assess Gaps
      Identify CXM Technology Solutions
      Build the Strategy for CXM
      Implement the Strategy

      Assess project-associated risk by understanding common barriers and enablers

      Common Internal Risk Factors

      Management Support Change Management IT Readiness
      Definition The degree of understanding and acceptance of CXM as a concept and necessary portfolio of technologies. The degree to which employees are ready to accept change and the organization is ready to manage it. The degree to which the organization is equipped with IT resources to handle new systems and processes.
      Assessment Outcomes
      • Is CXM enablement recognized as a top priority?
      • Will management commit time to the project?
      • Are employees resistant to change?
      • Is there an organizational awareness of the importance of customer experience?
      • Who are the owners of process and content?
      • Is there strong technical expertise?
      • Is there strong infrastructure?
      • What are the important integration points throughout the business?
      Risk
      • Low management buy-in
      • Lack of funding
      • Lack of resources
      • Low employee motivation
      • Lack of ownership
      • Low user adoption
      • Poor implementation
      • Reliance on consultants

      Activity: Identify the risks and create mitigation strategies

      1.2.7 45 minutes

      Input

      • N/A

      Output

      • Risk mitigation strategy
      • CXM Strategy Project Charter Template, section 6.0

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Manager
      • Business Lead
      • Project Team

      Instructions

      1. Brainstorm a list of possible risks that may impede the progress of your CXM project.
      2. Classify risks as strategy based (related to planning) or systems based (related to technology).
      3. Brainstorm mitigation strategies to overcome each risk.
      4. On a scale of 1 to 3, determine the impact of each risk on project success and the likelihood of each risk occurring.
      5. Document your findings in Info-Tech’s CXM Strategy Project Charter Template in section 6.0.

      Likelihood:

      1 - High/Needs Focus

      2 - Can Be Mitigated

      3 - Unlikely

      Impact

      1 - High Impact

      2 - Moderate Impact

      3 - Minimal Impact

      Example: Risk Register and Mitigation Tactics

      Risk Impact Likelihood Mitigation Effort
      Cost of time and implementation: designing a robust portfolio of CXM applications can be a time consuming task, representing a heavy investment for the organization 1 1
      • Have a clear strategic plan and a defined time frame
      • Know your end-user requirements
      • Put together an effective and diverse strategy project team
      Availability of resources: lack of in-house resources (e.g. infrastructure, CXM application developers) may result in the need to insource or outsource resources 1 2
      • Prepare a plan to insource talent by hiring or transferring talent from other departments – e.g. marketing and customer service

      Activity: Complete the project charter and obtain approval

      1.2.8 45 minutes

      Input

      • N/A

      Output

      • Project approval
      • CXM Strategy Project Charter Template, section 8.0

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Manager
      • Business Lead
      • Project Team

      Instructions

      Before beginning to develop the CXM strategy, validate the project charter and metrics with senior sponsors or stakeholders and receive their approval to proceed.

      1. Schedule a 30-60 minute meeting with senior stakeholders and conduct a live review of your CXM strategy project charter.
      2. Obtain stakeholder approval to ensure there are no miscommunications or misunderstandings around the scope of the work that needs to be done to reach a successful project outcome. Final sign-off should only take place when mutual consensus has been reached.
        • Obtaining approval should be an iterative process; if senior management has concerns over certain aspects of the plan, revise and review again.

      Info-Tech Insight

      In most circumstances, you should have your CXM strategy project charter validated with the following stakeholders:

      • Chief Information Officer
      • IT Applications Director
      • CFO or Comptroller (for budget approval)
      • Chief Marketing Office or Head of Marketing
      • Chief Revenue Officer or VP of Sales
      • VP Customer Service

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      1.2.2 Define project purpose, objectives, and business metrics

      Through an in-depth discussion, an analyst will help you prioritize corporate objectives and organizational drivers to establish a distinct project purpose.

      1.2.3 Define the scope of the CXM strategy

      An analyst will facilitate a discussion to address critical questions to understand your distinct business needs. These questions include: What are the major coverage points? Who will be using the system?

      1.2.4; 1.2.5; 1.2.6 Create the CXM project team, build a RACI chart, and establish a timeline

      Our analysts will guide you through how to create a designated project team to ensure the success of your CXM strategy and suite selection initiative, including project milestones and team composition, as well as designated duties and responsibilities.

      Phase 2

      Create a Strategic Framework for CXM Technology Enablement

      Build a Strong Technology Foundation for Customer Experience Management

      Phase 2 outline: Steps 2.1 and 2.2

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Create a Strategic Framework for CXM Technology Enablement

      Proposed Time to Completion: 4 weeks

      Step 2.1: Scan the External Environment

      Start with an analyst kick-off call:

      • Discuss external drivers
      • Assess competitive environment
      • Review persona development
      • Review scenarios

      Then complete these activities…

      • Build the CXM operating model
      • Conduct a competitive analysis
      • Conduct a PEST analysis
      • Build personas and scenarios

      With these tools & templates:

      CXM Strategy Stakeholder Presentation Template

      Step 2.2: Assess the Current State for CRM

      Review findings with analyst:

      • Review SWOT analysis
      • Review VRIO analysis
      • Discuss strategic requirements for CXM

      Then complete these activities…

      • Conduct a SWOT analysis
      • Conduct a VRIO analysis
      • Inventory existing applications

      With these tools & templates:

      CXM Strategy Stakeholder Presentation Template

      Phase 2 outline: Steps 2.3 and 2.4

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Create a Strategic Framework for CXM Technology Enablement

      Proposed Time to Completion: 4 weeks

      Step 2.3: Create an Application Portfolio

      Start with an analyst kick-off call:

      • Discuss possible business process maps
      • Discuss strategic requirements
      • Review application portfolio results

      Then complete these activities…

      • Build business maps
      • Execute application mapping

      With these tools & templates:

      CXM Portfolio Designer

      CXM Strategy Stakeholder Presentation Template

      CXM Business Process Shortlisting Tool

      Step 2.4: Develop Deployment Best Practices

      Review findings with analyst:

      • Review possible integration maps
      • Discuss best practices for end-user adoption
      • Discuss best practices for customer data quality

      Then complete these activities…

      • Create CXM integration ecosystem
      • Develop adoption game plan
      • Create data quality standards

      With these tools & templates:

      CXM Strategy Stakeholder Presentation Template

      Phase 2 Results & Insights:

      • Application portfolio for CXM
      • Deployment best practices for areas such as integration, data quality, and end-user adoption

      Step 2.1: Scan the External Environment

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Inventory CXM drivers and organizational objectives
      • Identify CXM challenges and pain points
      • Discuss opportunities and benefits
      • Align corporate and CXM strategies
      • Conduct a competitive analysis
      • Conduct a PEST analysis and extract strategic requirements
      • Build customer personas and extract strategic requirements

      Outcomes:

      • CXM operating model
        • Organizational drivers
        • Environmental factors
        • Barriers
        • Enablers
      • PEST analysis
      • External customer personas
      • Customer journey scenarios
      • Strategic requirements for CXM

      Develop a CXM technology operating model that takes stock of needs, drivers, barriers, and enablers

      Establish the drivers, enablers, and barriers to developing a CXM technology enablement strategy. In doing so, consider needs, environmental factors, organizational drivers, and technology drivers as inputs.

      CXM Strategy

      • Barriers
        • Lack of Resources
        • Cultural Mindset
        • Resistance to Change
        • Poor End-User Adoption
      • Enablers
        • Senior Management Support
        • Customer Data Quality
        • Current Technology Portfolio
      • Business Needs (What are your business drivers? What are current marketing, sales, and customer service pains?)
        • Acquisition Pipeline Management
        • Live Chat for Support
        • Social Media Analytics
        • Etc.
      • Organizational Goals
        • Increase Profitability
        • Enhance Customer Experience Consistency
        • Reduce Time-to-Resolution
        • Increase First Contact Resolution
        • Boost Share of Voice
      • Environmental Factors (What factors that affect your strategy are out of your control?)
        • Customer Buying Habits
        • Changing Technology Trends
        • Competitive Landscape
        • Regulatory Requirements
      • Technology Drivers (Why do you need a new system? What is the purpose for becoming an integrated organization?)
        • System Integration
        • Reporting Capabilities
        • Deployment Model

      Understand your needs, drivers, and organizational objectives for creating a CXM strategy

      Business Needs Organizational Drivers Technology Drivers Environmental Factors
      Definition A business need is a requirement associated with a particular business process (for example, Marketing needs customer insights from the website – the business need would therefore be web analytics capabilities). Organizational drivers can be thought of as business-level goals. These are tangible benefits the business can measure such as customer retention, operation excellence, and financial performance. Technology drivers are technological changes that have created the need for a new CXM enablement strategy. Many organizations turn to technology systems to help them obtain a competitive edge. External considerations are factors taking place outside of the organization that are impacting the way business is conducted inside the organization. These are often outside the control of the business.
      Examples
      • Web analytics
      • Live chat capabilities
      • Mobile self-service
      • Social media listening
      • Data quality
      • Customer satisfaction
      • Branding
      • Time-to-resolution
      • Deployment model (i.e. SaaS)
      • Integration
      • Reporting capabilities
      • Fragmented technologies
      • Economic factors
      • Customer preferences
      • Competitive influencers
      • Compliance regulations

      Info-Tech Insight

      A common organizational driver is to provide adequate technology enablement across multiple channels, resulting in a consistent customer experience. This driver is a result of external considerations. Many industries today are highly competitive and rapidly changing. To succeed under these pressures, you must have a rationalized portfolio of enterprise applications for customer interaction.

      Activity: Inventory and discuss CXM drivers and organizational objectives

      2.1.1 30 minutes

      Input

      • Business needs
      • Exercise 1.1.3
      • Exercise 1.1.4
      • Environmental factors

      Output

      • CXM operating model inputs
      • CXM Strategy Stakeholder Presentation

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Brainstorm the business needs, organizational drivers, technology drivers, and environmental factors that will inform the CXM strategy. Draw from exercises 1.1.3-1.1.5.
      2. Document your findings in the CXM operating model template. This can be found in the CXM Strategy Stakeholder Presentation Template.

      The image is a graphic, with a rectangle split into three sections in the centre. The three sections are: Barriers; CXM Strategy; Enablers. Around the centre are 4 more rectangles, labelled: Business Needs; Organizational Drivers; Technology Drivers; Environmental Factors. The outer rectangles are a slightly darker shade of grey than the others, highlighting them.

      Understand challenges and barriers to creating and executing the CXM technology-enablement strategy

      Take stock of internal challenges and barriers to effective CXM strategy execution.

      Example: Internal Challenges & Potential Barriers

      Understanding the Customer Change Management IT Readiness
      Definition The degree to which a holistic understanding of the customer can be created, including customer demographic and psychographics. The degree to which employees are ready to accept operational and cultural changes and the degree to which the organization is ready to manage it. The degree to which IT is ready to support new technologies and processes associated with a portfolio of CXM applications.
      Questions to Ask
      • As an organization, do we have a true understanding of our customers?
      • How might we achieve a complete understanding of the customer throughout different phases of the customer lifecycle?
      • Are employees resistant to change?
      • Are there enough resources to drive an CXM strategy?
      • To what degree is the existing organizational culture customer-centric?
      • Is there strong technical expertise?
      • Is there strong infrastructure?
      Implications
      • Uninformed creation of CXM strategic requirements
      • Inadequate understanding of customer needs and wants
      • User acceptance
      • Lack of ownership
      • Lack of accountability
      • Lack of sustainability
      • Poor implementation
      • Reliance on expensive external consultants
      • Lack of sustainability

      Activity: Identify CXM challenges and pain points

      2.1.2 30 minutes

      Input

      • Challenges
      • Pain points

      Output

      • CXM operating model barriers
      • CXM Strategy Stakeholder Presentation

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Brainstorm the challenges and pain points that may act as barriers to the successful planning and execution of a CXM strategy.
      2. Document your findings in the CXM operating model template. This can be found in the CXM Strategy Stakeholder Presentation Template.

      The image is the same graphic from a previous section. In this instance, the Barriers sections is highlighted.

      Identify opportunities that can enable CXM strategy execution

      Existing internal conditions, capabilities, and resources can create opportunities to enable the CXM strategy. These opportunities are critical to overcoming challenges and barriers.

      Example: Opportunities to Leverage for Strategy Enablement

      Management Buy-In Customer Data Quality Current Technology Portfolio
      Definition The degree to which upper management understands and is willing to enable a CXM project, complete with sponsorship, funding, and resource allocation. The degree to which customer data is accurate, consistent, complete, and reliable. Strong customer data quality is an opportunity – poor data quality is a barrier. The degree to which the existing portfolio of CXM-supporting enterprise applications can be leveraged to enable the CXM strategy.
      Questions to Ask
      • Is management informed of changing technology trends and the subsequent need for CXM?
      • Are adequate funding and resourcing available to support a CXM project, from strategy creation to implementation?
      • Are there any data quality issues?
      • Is there one source of truth for customer data?
      • Are there duplicate or incomplete sets of data?
      • Does a strong CRM backbone exist?
      • What marketing, sales, and customer service applications exist?
      • Are CXM-enabling applications rated highly on usage and performance?
      Implications
      • Need for CXM clearly demonstrated
      • Financial and logistical feasibility
      • Consolidated data quality governance initiatives
      • Informed decision making
      • Foundation for CXM technology enablement largely in place
      • Reduced investment of time and money needed

      Activity: Discuss opportunities and benefits

      2.1.3 30 minutes

      Input

      • Opportunities
      • Benefits

      Output

      • Completed CXM operating model
      • CXM Strategy Stakeholder Presentation

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Brainstorm opportunities that should be leveraged or benefits that should be realized to enable the successful planning and execution of a CXM strategy.
      2. Document your findings in the CXM operating model template. This can be found in the CXM Strategy Stakeholder Presentation Template.

      The image is the same graphic from earlier sections, this time with the Enablers section highlighted.

      Ensure that you align your CXM technology strategy to the broader corporate strategy

      A successful CXM strategy requires a comprehensive understanding of an organization’s overall corporate strategy and its effects on the interrelated departments of marketing, sales, and service, including subsequent technology implications. For example, a CXM strategy that emphasizes tools for omnichannel management and is at odds with a corporate strategy that focuses on only one or two channels will fail.

      Corporate Strategy

      • Conveys the current state of the organization and the path it wants to take.
      • Identifies future goals and business aspirations.
      • Communicates the initiatives that are critical for getting the organization from its current state to the future state.

      CXM Strategy

      • Communicates the company’s budget and spending on CXM applications and initiatives.
      • Identifies IT initiatives that will support the business and key CXM objectives, specific to marketing, sales, and service.
      • Outlines staffing and resourcing for CXM initiatives.

      Unified Strategy

      • The CXM implementation can be linked, with metrics, to the corporate strategy and ultimate business objectives.

      Info-Tech Insight

      Your organization’s corporate strategy is especially important in dictating the direction of the CXM strategy. Corporate strategies are often focused on customer-facing activity and will heavily influence the direction of marketing, sales, customer service, and consequentially, CXM. Corporate strategies will often dictate market targeting, sales tactics, service models, and more.

      Review sample organizational objectives to decipher how CXM technologies can support such objectives

      Identifying organizational objectives of high priority will assist in breaking down CXM objectives to better align with the overall corporate strategy and achieve buy-in from key stakeholders.

      Corporate Objectives Aligned CXM Technology Objectives
      Increase Revenue Enable lead scoring Deploy sales collateral management tools Improve average cost per lead via a marketing automation tool
      Enhance Market Share Enhance targeting effectiveness with a CRM Increase social media presence via an SMMP Architect customer intelligence analysis
      Improve Customer Satisfaction Reduce time-to-resolution via better routing Increase accessibility to customer service with live chat Improve first contact resolution with customer KB
      Increase Customer Retention Use a loyalty management application Improve channel options for existing customers Use customer analytics to drive targeted offers
      Create Customer-Centric Culture Ensure strong training and user adoption programs Use CRM to provide 360-degree view of all customer interaction Incorporate the voice of the customer into product development

      Activity: Review your corporate strategy and validate its alignment with the CXM operating model

      2.1.4 30 minutes

      Input

      • Corporate strategy
      • CXM operating model (completed in Activity 2.1.3)

      Output

      • Strategic alignment between the business and CXM strategies

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Brainstorm and create a list of organizational objectives at the corporate strategy level.
      2. Break down each organizational objective to identify how CXM may support it.
      3. Validate CXM goals and organizational objectives with your CXM operating model. Be sure to address the validity of each with the business needs, organizational drivers, technology drivers, and environmental factors identified as inputs to the operating model.

      Amazon leverages customer data to drive decision making around targeted offers and customer experience

      CASE STUDY

      Industry E-Commerce

      Source Pardot, 2012

      Situation

      Amazon.com, Inc. is an American electronic commerce and cloud computing company. It is the largest e-commerce retailer in the US.

      Amazon originated as an online book store, later diversifying to sell various forms of media, software, games, electronics, apparel, furniture, food, toys, and more.

      By taking a data-driven approach to marketing and sales, Amazon was able to understand its customers’ needs and wants, penetrate different product markets, and create a consistently personalized online-shopping customer experience that keeps customers coming back.

      Technology Strategy

      Use Browsing Data Effectively

      Amazon leverages marketing automation suites to view recent activities of prospects on its website. In doing so, a more complete view of the customer is achieved, including insights into purchasing interests and site navigation behaviors.

      Optimize Based on Interactions

      Using customer intelligence, Amazon surveys and studies standard engagement metrics like open rate, click-through rate, and unsubscribes to ensure the optimal degree of marketing is being targeted to existing and prospective customers, depending on level of engagement.

      Results

      Insights gained from having a complete understanding of the customer (from basic demographic characteristics provided in customer account profiles to observed psychographic behaviors captured by customer intelligence applications) are used to personalize Amazon’s sales and marketing approaches. This is represented through targeted suggestions in the “recommended for you” section of the browsing experience and tailored email marketing.

      It is this capability, partnered with the technological ability to observe and measure customer engagement, that allows Amazon to create individual customer experiences.

      Scan the external environment to understand your customers, competitors, and macroenvironmental trends

      Do not develop your CXM technology strategy in isolation. Work with Marketing to understand your STP strategy (segmentation, targeting, positioning): this will inform persona development and technology requirements downstream.

      Market Segmentation

      • Segment target market by demographic, geographic, psychographic, and behavioral characteristics
      • What does the competitive market look like?
      • Who are the key customer segments?
      • What segments are you going to target?

      Market Targeting

      • Evaluate potential and commercial attractiveness of each segment, considering the dynamics of the competition
      • How do you target your customers?
      • How should you target them in the future?
      • How do your products/services differ from the competition?

      Product Positioning

      • Develop detailed product positioning and marketing mixes for selected segments
      • What is the value of the product/service to each segment of the market?
      • How are you positioning your product/service in the market?

      Info-Tech Insight

      It is at this point that you should consider the need for and viability of an omnichannel approach to CXM. Through which channels do you target your customers? Are your customers present and active on a wide variety of channels? Consider how you can position your products, services, and brand through the use of omnichannel methodologies.

      Activity: Conduct a competitive analysis to understand where your market is going

      2.1.5 1 hour

      Input

      • Scan of competitive market
      • Existing customer STP strategy

      Output

      • Strategic CXM requirements
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team
      • Marketing SME

      Instructions

      1. Scan the market for direct and indirect competitors.
      2. Evaluate current and/or future segmentation, targeting, and positioning strategies by answering the following questions:
      • What does the competitive market look like?
      • Who are the key customer segments?
      • What segments are you going to target?
      • How do you target your customers?
      • How should you target them in the future?
      • How do your products/services differ from the competition?
      • What is the value of the product/service to each segment of the market?
      • How are you positioning your product/service in the market?
      • Other helpful questions include:
        • How formally do you target customers? (e.g. through direct contact vs. through passive brand marketing)
        • Does your organization use the shotgun or rifle approach to marketing?
          • Shotgun marketing: targets a broad segment of people, indirectly
          • Rifle marketing: targets smaller and more niche market segments using customer intelligence
    • For each point, identify CXM requirements.
    • Document your outputs in the CXM Strategy Stakeholder Presentation Template.
    • Activity: Conduct a competitive analysis (cont’d)

      2.1.5 30 minutes

      Input

      • Scan of competitive market

      Output

      • Competitive analysis
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team
      • Marketing SME (e.g. Market Research Stakeholders)

      Instructions

      1. List recent marketing technology and customer experience-related initiatives that your closest competitors have implemented.
      2. For each identified initiative, elaborate on what the competitive implications are for your organization.
      3. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Competitive Implications

      Competitor Organization Recent Initiative Associated Technology Direction of Impact Competitive Implication
      Organization X Multichannel E-Commerce Integration WEM – hybrid integration Positive
      • Up-to-date e-commerce capabilities
      • Automatic product updates via PCM
      Organization Y Web Social Analytics WEM Positive
      • Real-time analytics and customer insights
      • Allows for more targeted content toward the visitor or customer

      Conduct a PEST analysis to determine salient political, economic, social, and technological impacts for CXM

      A PEST analysis is a structured planning method that identifies external environmental factors that could influence the corporate and IT strategy.

      Political - Examine political factors, such as relevant data protection laws and government regulations.

      Economic - Examine economic factors, such as funding, cost of web access, and labor shortages for maintaining the site(s).

      Technological - Examine technological factors, such as new channels, networks, software and software frameworks, database technologies, wireless capabilities, and availability of software as a service.

      Social - Examine social factors, such as gender, race, age, income, and religion.

      Info-Tech Insight

      When looking at opportunities and threats, PEST analysis can help to ensure that you do not overlook external factors, such as technological changes in your industry. When conducting your PEST analysis specifically for CXM, pay particular attention to the rapid rate of change in the technology bucket. New channels and applications are constantly emerging and evolving, and seeing differential adoption by potential customers.

      Activity: Conduct and review the PEST analysis

      2.1.6 30 minutes

      Input

      • Political, economic, social, and technological factors related to CXM

      Output

      • Completed PEST analysis

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Identify your current strengths and weaknesses in managing the customer experience.
      2. Identify any opportunities to take advantage of and threats to mitigate.

      Example: PEST Analysis

      Political

      • Data privacy for PII
      • ADA legislation for accessible design

      Economic

      • Spending via online increasing
      • Focus on share of wallet

      Technological

      • Rise in mobile
      • Geo-location based services
      • Internet of Things
      • Omnichannel

      Social

      • Increased spending power by millennials
      • Changing channel preferences
      • Self-service models

      Activity: Translate your PEST analysis into a list of strategic CXM technology requirements to be addressed

      2.1.7 30 minutes

      Input

      • PEST Analysis conducted in Activity 2.1.6.

      Output

      • Strategic CXM requirements
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      For each PEST quadrant:

      1. Document the point and relate it to a goal.
      2. For each point, identify CXM requirements.
      3. Sort goals and requirements to eliminate duplicates.
      4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Parsing Requirements from PEST Analysis

      Technological Trend: There has been a sharp increase in popularity of mobile self-service models for buying habits and customer service access.

      Goal: Streamline mobile application to be compatible with all mobile devices. Create consistent branding across all service delivery applications (e.g. website, etc.).

      Strategic Requirement: Develop a native mobile application while also ensuring that resources through our web presence are built with responsive design interface.

      IT must fully understand the voice of the customer: work with Marketing to develop customer personas

      Creating a customer-centric CXM technology strategy requires archetypal customer personas. Creating customer personas will enable you to talk concretely about them as consumers of your customer experience and allow you to build buyer scenarios around them.

      A persona (or archetypal user) is an invented person that represents a type of user in a particular use-case scenario. In this case, personas can be based on real customers.

      Components of a persona Example – Organization: Grocery Store
      Name Name personas to reflect a key attribute such as the persona’s primary role or motivation Brand Loyal Linda: A stay-at-home mother dedicated to maintaining and caring for a household of 5 people
      Demographic Include basic descriptors of the persona (e.g. age, geographic location, preferred language, education, job, employer, household income, etc.) Age: 42 years old Geographic location: London Suburbia Language: English Education: Post-secondary Job: Stay-at-home mother Annual Household Income: $100,000+
      Wants, needs, pain points Identify surface-level motivations for buying habits

      Wants: Local products Needs: Health products; child-safe products

      Pain points: Fragmented shopping experience

      Psychographic/behavioral traits Observe persona traits that are representative of the customers’ behaviors (e.g. attitudes, buying patterns, etc.)

      Psychographic: Detail-oriented, creature of habit

      Behavioral: Shops at large grocery store twice a week, visits farmers market on Saturdays, buys organic products online

      Activity: Build personas for your customers

      2.1.8 2 hours

      Input

      • Customer demographics and psychographics

      Output

      • List of prioritized customer personas
      • CXM Strategy Stakeholder Presentation

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      Project Team

      Instructions

      1. In 2-4 groups, list all the customer personas that need to be built. In doing so, consider the people who interact with your organization most often.
      2. Build a demographic profile for each customer persona. Include information such as age, geographic location, occupation, annual income, etc.
      3. Augment the persona with a psychographic profile of each customer. Consider the goals and objectives of each customer persona and how these might inform buyer behaviors.
      4. Introduce your group’s personas to the entire group, in a round-robin fashion, as if you are introducing your persona at a party.
      5. Summarize the personas in a persona map. Rank your personas according to importance and remove any duplicates.

      Info-Tech Insight

      For CXM, persona building is typically used for understanding the external customer; however, if you need to gain a better understanding of the organization’s internal customers (those who will be interacting with CXM applications), personas can also be built for this purpose. Examples of useful internal personas are sales managers, brand managers, customer service directors, etc.

      Sample Persona Templates

      Fred, 40

      The Family Man

      Post-secondary educated, white-collar professional, three children

      Goals & Objectives

      • Maintain a stable secure lifestyle
      • Progress his career
      • Obtain a good future for his children

      Behaviors

      • Manages household and finances
      • Stays actively involved in children’s activities and education
      • Seeks potential career development
      • Uses a cellphone and email frequently
      • Sometimes follows friends Facebook pages

      Services of Interest

      • SFA, career counselling, job boards, day care, SHHS
      • Access to information via in-person, phone, online

      Traits

      General Literacy - High

      Digital Literacy - Mid-High

      Detail-Oriented - High

      Willing to Try New Things - Mid-High

      Motivated and Persistent - Mid-High

      Time Flexible - Mid-High

      Familiar With [Red.] - Mid

      Access to [Red.] Offices - High

      Access to Internet - High

      Ashley, 35

      The Tourist

      Single, college educated, planning vacation in [redacted], interested in [redacted] job opportunities

      Goals & Objectives

      • Relax after finishing a stressful job
      • Have adventures and try new things
      • Find a new job somewhere in Canada

      Behaviors

      • Collects information about things to do in [redacted]
      • Collects information about life in [redacted]
      • Investigates and follows up on potential job opportunities
      • Uses multiple social media to keep in touch with friends
      • Shops online frequently

      Services of Interest

      • SFA, job search, road conditions, ferry schedules, hospital, police station, DL requirements, vehicle rental
      • Access to information via in-person, phone, website, SMS, email, social media

      Traits

      General Literacy - Mid

      Digital Literacy - High

      Detail-Oriented - Mid

      Willing to Try New Things - High

      Motivated and Persistent - Mid

      Time Flexible - Mid-High

      Familiar With [Red.] - Low

      Access to [Red.] Offices - Low

      Access to Internet - High

      Bill, 25

      The Single Parent

      15-year resident of [redacted], high school education, waiter, recently divorced, two children

      Goals & Objectives

      • Improve his career options so he can support his family
      • Find an affordable place to live
      • Be a good parent
      • Work through remaining divorce issues

      Behaviors

      • Tries to get training or experience to improve his career
      • Stays actively involved in his children’s activities
      • Looks for resources and supports to resolve divorce issues
      • Has a cellphone and uses the internet occasionally

      Services of Interest

      • Child care, housing authority, legal aid, parenting resources
      • Access to information via in person, word-of mouth, online, phone, email

      Traits

      General Literacy - Mid

      Digital Literacy - Mid-Low

      Detail-Oriented - Mid-Low

      Willing to Try New Things - Mid

      Motivated and Persistent - High

      Time Flexible - Mid

      Familiar With [Red.] - Mid-High

      Access to [Red.] Offices - High

      Access to Internet - High

      Marie, 19

      The Regional Youth

      Single, [redacted] resident, high school graduate

      Goals & Objectives

      • Get a good job
      • Maintain ties to family and community

      Behaviors

      • Looking for work
      • Gathering information about long-term career choices
      • Trying to get the training or experience that can help her develop a career
      • Staying with her parents until she can get established
      • Has a new cellphone and is learning how to use it
      • Plays videogames and uses the internet at least weekly

      Services of Interest

      • Job search, career counselling
      • Access to information via in-person, online, phone, email, web applications

      Traits

      General Literacy - Mid

      Digital Literacy - Mid

      Detail-Oriented - Mid-Low

      Willing to Try New Things - Mid-High

      Motivated and Persistent - Mid-Low

      Time Flexible - High

      Familiar With [Red.] - Mid-Low

      Access to [Red.] Offices - Mid-Low

      Access to Internet - Mid

      Build key scenarios for each persona to extract strategic requirements for your CXM application portfolio

      A scenario is a story or narrative that helps explore the set of interactions that a customer has with an organization. Scenario mapping will help parse requirements used to design the CXM application portfolio.

      A Good Scenario…

      • Describes specific task(s) that need to be accomplished
      • Describes user goals and motivations
      • Describes interactions with a compelling but not overwhelming amount of detail
      • Can be rough, as long as it provokes ideas and discussion

      Scenarios Are Used To…

      • Provide a shared understanding about what a user might want to do, and how they might want to do it
      • Help construct the sequence of events that are necessary to address in your user interface(s)

      To Create Good Scenarios…

      • Keep scenarios high level, not granular in nature
      • Identify as many scenarios as possible. If you’re time constrained, try to develop 2-3 key scenarios per persona
      • Sketch each scenario out so that stakeholders understand the goal of the scenario

      Activity: Build scenarios for each persona and extract strategic requirements for the CXM strategy

      2.1.9 1.5 hours

      Input

      • Customer personas (output of Activity 2.1.5)

      Output

      • CX scenario maps
      • Strategic CXM requirements
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. For each customer persona created in Activity 2.1.5, build a scenario. Choose and differentiate scenarios based on the customer goal of each scenario (e.g. make online purchase, seek customer support, etc.).
      2. Think through the narrative of how a customer interacts with your organization, at all points throughout the scenario. List each step in the interaction in a sequential order to form a scenario journey.
      3. Examine each step in the scenario and brainstorm strategic requirements that will be needed to support the customer’s use of technology throughout the scenario.
      4. Repeat steps 1-3 for each persona. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Scenario Map

      Persona Name: Brand Loyal Linda

      Scenario Goal: File a complaint about in-store customer service

      Look up “[Store Name] customer service” on public web. →Reach customer support landing page. →Receive proactive notification prompt for online chat with CSR. →Initiate conversation: provide order #. →CSR receives order context and information. →Customer articulates problem, CSR consults knowledgebase. →Discount on next purchase offered. →Send email with discount code to Brand Loyal Linda.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1.1; 2.1.2; 2.1.3; 2.1.4 - Create a CXM operating model

      An analyst will facilitate a discussion to identify what impacts your CXM strategy and how to align it to your corporate strategy. The discussion will take different perspectives into consideration and look at organizational drivers, external environmental factors, as well as internal barriers and enablers.

      2.1.5 Conduct a competitive analysis

      Calling on their depth of expertise in working with a broad spectrum of organizations, our facilitator will help you work through a structured, systematic evaluation of competitors’ actions when it comes to CXM.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      2.1.6; 2.1.7 - Conduct a PEST analysis

      The facilitator will use guided conversation to target each quadrant of the PEST analysis and help your organization fully enumerate political, economic, social, and technological trends that will influence your CXM strategy. Our analysts are deeply familiar with macroenvironmental trends and can provide expert advice in identifying areas of concern in the PEST and drawing strategic requirements as implications.

      2.1.8; 2.1.9 - Build customer personas and subsequent persona scenarios

      Drawing on the preceding exercises as inputs, the facilitator will help the team create and refine personas, create respective customer interaction scenarios, and parse strategic requirements to support your technology portfolio for CXM.

      Step 2.2: Assess the Current State of CXM

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Conduct a SWOT analysis and extract strategic requirements
      • Inventory existing CXM applications and assess end-user usage and satisfaction
      • Conduct a VRIO analysis and extract strategic requirements

      Outcomes:

      • SWOT analysis
      • VRIO analysis
      • Current state application portfolio
      • Strategic requirements

      Conduct a SWOT analysis to prepare for creating your CXM strategy

      A SWOT analysis is a structured planning method that evaluates the strengths, weaknesses, opportunities, and threats involved in a project.

      Strengths - Strengths describe the positive attributes that are within your control and internal to your organization (i.e. what do you do better than anyone else?)

      Weaknesses - Weaknesses are internal aspects of your business that place you at a competitive disadvantage; think of what you need to enhance to compete with your top competitor.

      Opportunities - Opportunities are external factors the project can capitalize on. Think of them as factors that represent reasons your business is likely to prosper.

      Threats - Threats are external factors that could jeopardize the project. While you may not have control over these, you will benefit from having contingency plans to address them if they occur.

      Info-Tech Insight

      When evaluating weaknesses of your current CXM strategy, ensure that you’re taking into account not just existing applications and business processes, but also potential deficits in your organization’s channel strategy and go-to-market messaging.

      Activity: Conduct a SWOT analysis

      2.2.1 30 minutes

      Input

      • CXM strengths, weaknesses, opportunities, and threats

      Output

      • Completed SWOT analysis

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Identify your current strengths and weaknesses in managing the customer experience. Consider marketing, sales, and customer service aspects of the CX.
      2. Identify any opportunities to take advantage of and threats to mitigate.

      Example: SWOT Analysis

      Strengths

      • Strong customer service model via telephony

      Weaknesses

      • Customer service inaccessible in real-time through website or mobile application

      Opportunities

      • Leverage customer intelligence to measure ongoing customer satisfaction

      Threats

      • Lack of understanding of customer interaction platforms by staff could hinder adoption

      Activity: Translate your SWOT analysis into a list of requirements to be addressed

      2.2.2 30 minutes

      Input

      • SWOT Analysis conducted in Activity 2.2.1.

      Output

      • Strategic CXM requirements
      • CXM Stakeholder Presentation Template

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      For each SWOT quadrant:

      1. Document the point and relate it to a goal.
      2. For each point, identify CXM requirements.
      3. Sort goals and requirements to eliminate duplicates.
      4. Document your outputs in the CXM Stakeholder Presentation Template.

      Example: Parsing Requirements from SWOT Analysis

      Weakness: Customer service inaccessible in real-time through website or mobile application.

      Goal: Increase the ubiquity of access to customer service knowledgebase and agents through a web portal or mobile application.

      Strategic Requirement: Provide a live chat portal that matches the customer with the next available and qualified agent.

      Inventory your current CXM application portfolio

      Applications are the bedrock of technology enablement for CXM. Review your current application portfolio to identify what is working well and what isn’t.

      Understand Your CXM Application Portfolio With a Four-Step Approach

      Build the CXM Application Inventory →Assess Usage and Satisfaction →Map to Business Processes and Determine Dependencies →Determine Grow/Maintain/ Retire for Each Application

      When assessing the CXM applications portfolio, do not cast your net too narrowly; while CRM and MMS applications are often top of mind, applications for digital asset management and social media management are also instrumental for ensuring a well-integrated CX.

      Identify dependencies (either technical or licensing) between applications. This dependency tracing will come into play when deciding which applications should be grown (invested in), which applications should be maintained (held static), and which applications should be retired (divested).

      Info-Tech Insight

      Shadow IT is prominent here! When building your application inventory, ensure you involve Marketing, Sales, and Service to identify any “unofficial” SaaS applications that are being used for CXM. Many organizations fail to take a systematic view of their CXM application portfolio beyond maintaining a rough inventory. To assess the current state of alignment, you must build the application inventory and assess satisfaction metrics.

      Understand which of your organization’s existing enterprise applications enable CXM

      Review the major enterprise applications in your organization that enable CXM and align your requirements to these applications (net-new or existing). Identify points of integration to capture the big picture.

      The image shows a graphic titled Example: Integration of CRM, SMMP, and ERP. It is a flow chart, with icons defined by a legend on the right side of the image

      Info-Tech Insight

      When assessing the current application portfolio that supports CXM, the tendency will be to focus on the applications under the CXM umbrella, relating mostly to marketing, sales, and customer service. Be sure to include systems that act as input to, or benefit due to outputs from, CRM or similar applications. Examples of these systems are ERP systems, ECM (e.g. SharePoint) applications, and more.

      Assess CXM application usage and satisfaction

      Having a portfolio but no contextual data will not give you a full understanding of the current state. The next step is to thoroughly assess usage patterns as well as IT, management, and end-user satisfaction with each application.

      Example: Application Usage & Satisfaction Assessment

      Application Name Level of Usage IT Satisfaction Management Satisfaction End-User Satisfaction Potential Business Impact
      CRM (e.g. Salesforce) Medium High Medium Medium High
      CRM (e.g. Salesforce) Low Medium Medium High Medium
      ... ... ... ... ... ...

      Info-Tech Insight

      When evaluating satisfaction with any application, be sure to consult all stakeholders who come into contact with the application or depend on its output. Consider criteria such as ease of use, completeness of information, operational efficiency, data accuracy, etc.

      Use Info-Tech’s Application Portfolio Assessment to gather end-user feedback on existing CXM applications

      2.2.3 Application Portfolio Assessment: End-User Feedback

      Info-Tech’s Application Portfolio Assessment: End-User Feedback diagnostic is a low-effort, high-impact program that will give you detailed report cards on end-user satisfaction with an application. Use these insights to identify problems, develop action plans for improvement, and determine key participants.

      Application Portfolio Assessment: End-User Feedback is an 18-question survey that provides valuable insights on user satisfaction with an application by:

      • Performing a general assessment of the application portfolio that provides a full view of the effectiveness, criticality, and prevalence of all relevant applications.
      • Measuring individual application performance with open-ended user feedback surveys about the application, organized by department to simplify problem resolution.
      • Providing targeted department feedback to identify end-user satisfaction and focus improvements on the right group or line of business.

      INFO-TECH DIAGNOSTIC

      Activity: Inventory your CXM applications, and assess application usage and satisfaction

      2.2.4 1 hour

      Input

      • List of CXM applications

      Output

      • Complete inventory of CXM applications
      • CXM Stakeholder Presentation Template

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. List all existing applications that support the creation, management, and delivery of your customer experience.
      2. Identify which processes each application supports (e.g. content deployment, analytics, service delivery, etc.).
      3. Identify technical or licensing dependencies (e.g. data models).
      4. Assess the level of application usage by IT, management, and internal users (high/medium/low).
      5. Assess the satisfaction with and performance of each application according to IT, management, and internal users (high/medium/low). Use the Info-Tech Diagnostic to assist.

      Example: CXM Application Inventory

      Application Name Deployed Date Processes Supported Technical and Licensing Dependencies
      Salesforce June 2018 Customer relationship management XXX
      Hootsuite April 2019 Social media listening XXX
      ... ... ... ...

      Conduct a VRIO analysis to identify core competencies for CXM applications

      A VRIO analysis evaluates the ability of internal resources and capabilities to sustain a competitive advantage by evaluating dimensions of value, rarity, imitability, and organization. For critical applications like your CRM platform, use a VRIO analysis to determine their value.

      Is the resource or capability valuable in exploiting an opportunity or neutralizing a threat? Is the resource or capability rare in the sense that few of your competitors have a similar capability? Is the resource or capability costly to imitate or replicate? Is the organization organized enough to leverage and capture value from the resource or capability?
      NO COMPETITIVE DISADVANTAGE
      YES NO→ COMPETITIVE EQUALITY/PARITY
      YES YES NO→ TEMPORARY COMPETITIVE ADVANTAGE
      YES YES YES NO→ UNUSED COMPETITIVE ADVANTAGE
      YES YES YES YES LONG-TERM COMPETITIVE ADVANTAGE

      (Strategic Management Insight, 2013)

      Activity: Conduct a VRIO analysis on your existing application portfolio

      2.2.5 30 minutes

      Input

      • Inventory of existing CXM applications (output of Activity 2.2.4)

      Output

      • Completed VRIO analysis
      • Strategic CXM requirements
      • CXM Stakeholder Presentation Template

      Materials

      • VRIO Analysis model
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Evaluate each CXM application inventoried in Activity 2.2.4 by answering the four VRIO questions in sequential order. Do not proceed to the following question if “no” is answered at any point.
      2. Record the results. The state of your organization’s competitive advantage, based on each resource/capability, will be determined based on the number of questions with a “yes” answer. For example, if all four questions are answered positively, then your organization is considered to have a long-term competitive advantage.
      3. Document your outputs in the CXM Stakeholder Presentation Template.

      If you want additional support, have our analysts guide your through this phase as part of an Info-Tech workshop

      2.2.1; 2.2.2 Conduct a SWOT Analysis

      Our facilitator will use a small-team approach to delve deeply into each area, identifying enablers (strengths and opportunities) and challenges (weaknesses and threats) relating to the CXM strategy.

      2.2.3; 2.2.4 Inventory your CXM applications, and assess usage and satisfaction

      Working with your core team, the facilitator will assist with building a comprehensive inventory of CXM applications that are currently in use and with identifying adjacent systems that need to be identified for integration purposes. The facilitator will work to identify high and low performing applications and analyze this data with the team during the workshop exercise.

      2.2.5 Conduct a VRIO analysis

      The facilitator will take you through a VRIO analysis to identify which of your internal technological competencies ensure, or can be leveraged to ensure, your competitiveness in the CXM market.

      Step 2.3: Create an Application Portfolio

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities

      • Shortlist and prioritize business processes for improvement and reengineering
      • Map current CXM processes
      • Identify business process owners and assign job responsibilities
      • Identify user interaction channels to extract strategic requirements
      • Aggregate and develop strategic requirements
      • Determine gaps in current and future state processes
      • Build the CXM application portfolio

      Outcomes

      CXM application portfolio map

      • Shortlist of relevant business processes
      • Current state map
      • Business process ownership assignment
      • Channel map
      • Complete list of strategic requirements

      Understand business process mapping to draft strategy requirements for marketing, sales, and customer service

      The interaction between sales, marketing, and customer service is very process-centric. Rethink sales and customer-centric workflows and map the desired workflow, imbedding the improved/reengineered process into the requirements.

      Using BPM to Capture Strategic Requirements

      Business process modeling facilitates the collaboration between the business and IT, recording the sequence of events, tasks performed, who performed them, and the levels of interaction with the various supporting applications.

      By identifying the events and decision points in the process and overlaying the people that perform the functions, the data being interacted with, and the technologies that support them, organizations are better positioned to identify gaps that need to be bridged.

      Encourage the analysis by compiling an inventory of business processes that support customer-facing operations that are relevant to achieving the overall organizational strategies.

      Outcomes

      • Operational effectiveness
      • Identification, implementation, and maintenance of reusable enterprise applications
      • Identification of gaps that can be addressed by acquisition of additional applications or process improvement/ reengineering

      INFO-TECH OPPORTUNITY

      Refer to Info-Tech’s Create a Comprehensive BPM Strategy for Successful Process Automation blueprint for further assistance in taking a BPM approach to your sales-IT alignment.

      Leverage the APQC framework to help define your inventory of sales, marketing, and service processes

      APQC’s Process Classification Framework is a taxonomy of cross-functional business processes intended to allow the objective comparison of organizational performance within and among organizations.

      OPERATING PROCESSES
      1.0 Develop Vision and Strategy 2.0 Develop and Manage Products and Services 3.0 Market and Sell Products and Services 4.0 Deliver Products and Services 5.0 Manage Customer Service
      MANAGEMENT AND SUPPORT SERVICES
      6.0 Develop and Manage Human Capital
      7.0 Manage Information Technology
      8.0 Manage Financial Resources
      9.0 Acquire, Construct, and Manage Assets
      10.0 Manage Enterprise Risk, Compliance, and Resiliency
      11.0 Manage External Relationships
      12.0 Develop and Manage Business Capabilities

      (APQC, 2011)

      MORE ABOUT APQC

      • APQC serves as a high-level, industry-neutral enterprise model that allows organizations to see activities from a cross-industry process perspective.
      • Sales processes have been provided up to Level 3 of the APQC framework.
      • The APQC Framework can be accessed through APQC’s Process Classification Framework.
      • Note: The framework does not list all processes within a specific organization, nor are the processes that are listed in the framework present in every organization.

      Understand APQC’s “Market and Sell Products and Services” framework

      3.0 Market and Sell Products

      3.1 Understand markets, customers, and capabilities

      • 3.1.1 Perform customer and market intelligence analysis
      • 3.1.2 Evaluate and prioritize market opportunities

      3.2 Develop marketing strategy

      • 3.2.1 Define offering and customer value proposition
      • 3.2.2 Define pricing strategy to align to value proposition
      • 3.2.3 Define and manage channel strategy

      3.3 Develop sales strategy

      • 3.3.1 Develop sales forecast
      • 3.3.2 Develop sales partner/alliance relationships
      • 3.3.3 Establish overall sales budgets
      • 3.3.4 Establish sales goals and measures
      • 3.3.5 Establish customer management measures

      3.4 Develop and manage marketing plans

      • 3.4.1 Establish goals, objectives, and metrics by products by channels/segments
      • 3.4.2 Establish marketing budgets
      • 3.4.3 Develop and manage media
      • 3.4.4 Develop and manage pricing
      • 3.4.5 Develop and manage promotional activities
      • 3.4.6 Track customer management measures
      • 3.4.7 Develop and manage packaging strategy

      3.5 Develop and manage sales plans

      • 3.5.1 Generate leads
      • 3.5.2 Manage customers and accounts
      • 3.5.3 Manage customer sales
      • 3.5.4 Manage sales orders
      • 3.5.5 Manage sales force
      • 3.5.6 Manage sales partners and alliances

      Understand APQC’s “Manage Customer Service” framework

      5.0 Manage Customer Service

      5.1 Develop customer care/customer service strategy

      • 5.1.1 Develop customer service segmentation
        • 5.1.1.1 Analyze existing customers
        • 5.1.1.2 Analyze feedback of customer needs
      • 5.1.2 Define customer service policies and procedures
      • 5.1.3 Establish service levels for customers

      5.2 Plan and manage customer service operations

      • 5.2.1 Plan and manage customer service work force
        • 5.2.1.1 Forecast volume of customer service contacts
        • 5.2.1.2 Schedule customer service work force
        • 5.2.1.3 Track work force utilization
        • 5.2.1.4 Monitor and evaluate quality of customer interactions with customer service representatives

      5.2 Plan and 5.2.3.1 Receive customer complaints 5.2.3.2 Route customer complaints 5.2.3.3 Resolve customer complaints 5.2.3.4 Respond to customer complaints manage customer service operations

      • 5.2.2 Manage customer service requests/inquiries
        • 5.2.2.1 Receive customer requests/inquiries
        • 5.2.2.2 Route customer requests/inquiries
        • 5.2.2.3 Respond to customer requests/inquiries
      • 5.2.3 Manage customer complaints
        • 5.2.3.1 Receive customer complaints
        • 5.2.3.2 Route customer complaints
        • 5.2.3.3 Resolve customer complaints
        • 5.2.3.4 Respond to customer complaints

      Leverage the APQC framework to inventory processes

      The APQC framework provides levels 1 through 3 for the “Market and Sell Products and Services” framework. Level 4 processes and beyond will need to be defined by your organization as they are more granular (represent the task level) and are often industry-specific.

      Level 1 – Category - 1.0 Develop vision and strategy (10002)

      Represents the highest level of process in the enterprise, such as manage customer service, supply chain, financial organization, and human resources.

      Level 2 – Process Group - 1.1 Define the business concept and long-term vision (10014)

      Indicates the next level of processes and represents a group of processes. Examples include perform after sales repairs, procurement, accounts payable, recruit/source, and develop sales strategy.

      Level 3 – Process - 1.1.1 Assess the external environment (10017)

      A series of interrelated activities that convert input into results (outputs); processes consume resources and require standards for repeatable performance; and processes respond to control systems that direct quality, rate, and cost of performance.

      Level 4 – Activity - 1.1.1.1 Analyze and evaluate competition (10021)

      Indicates key events performed when executing a process. Examples of activities include receive customer requests, resolve customer complaints, and negotiate purchasing contracts.

      Level 5 – Task - 12.2.3.1.1 Identify project requirements and objectives (11117)

      Tasks represent the next level of hierarchical decomposition after activities. Tasks are generally much more fine grained and may vary widely across industries. Examples include create business case and obtain funding, and design recognition and reward approaches.

      Info-Tech Insight

      Define the Level 3 processes in the context of your organization. When creating a CXM strategy, concern yourself with the interrelatedness of processes across existing departmental silos (e.g. marketing, sales, customer service). Reserve the analysis of activities (Level 4) and tasks (Level 3) for granular work initiatives involved in the implementation of applications.

      Use Info-Tech’s CXM Business Process Shortlisting Tool to prioritize processes for improvement

      2.3.1 CXM Business Process Shortlisting Tool

      The CXM Business Process Shortlisting Tool can help you define which marketing, sales, and service processes you should focus on.

      Working in concert with stakeholders from the appropriate departments, complete the short questionnaire.

      Based on validated responses, the tool will highlight processes of strategic importance to your organization.

      These processes can then be mapped, with requirements extracted and used to build the CXM application portfolio.

      INFO-TECH DELIVERABLE

      The image shows a screenshot of the Prioritize Your Business Processes for Customer Experience Management document, with sample information filled in.

      Activity: Define your organization’s top-level processes for reengineering and improvement

      2.3.2 1 hour

      Input

      • Shortlist business processes relating to customer experience (output of Tool 2.3.1)

      Output

      • Prioritized list of top-level business processes by department

      Materials

      • APQC Framework
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Inventory all business processes relating to customer experience.
      2. Customize the impacted business units and factor weightings on the scorecard below to reflect the structure and priorities of your organization.
      3. Using the scorecard, identify all processes essential to your customer experience. The scorecard is designed to determine which processes to focus on and to help you understand the impact of the scrutinized process on the different customer-centric groups across the organization.

      The image shows a chart with the headings Factor, Check If Yes, repeated. The chart lists various factors, and the Check if Yes columns are left blank.

      This image shows a chart with the headings Factor, Weights, and Scores. It lists factors, and the rest of the chart is blank.

      Current legend for Weights and Scores

      F – Finance

      H – Human Resources

      I – IT

      L – Legal

      M – Marketing

      BU1 – Business Unit 1

      BU2 – Business Unit 2

      Activity: Map top-level business processes to extract strategic requirements for the CXM application portfolio

      2.3.3 45 minutes

      Input

      • Prioritized list of top-level business processes (output of Activity 2.3.2)

      Output

      • Current state process maps
      • CXM Strategy Stakeholder Presentation

      Materials

      • APQC Framework
      • Whiteboard
      • Markers
      • Sticky notes

      Participants

      • Project Team

      Instructions

      1. List all prioritized business processes, as identified in Activity 2.3.2. Map your processes in enough detail to capture all relevant activities and system touchpoints, using the legend included in the example. Focus on Level 3 processes, as explained in the APQC framework.
      2. Record all of the major process steps on sticky notes. Arrange the sticky notes in sequential order.
      3. On a set of different colored sticky notes, record all of the systems that enable the process. Map these system touchpoints to the process steps.
      4. Draw arrows in between the steps to represent manual entry or automation.
      5. Identify effectiveness and gaps in existing processes to determine process technology requirements.
      6. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      INFO-TECH OPPORTUNITY

      Refer to Info-Tech’s Create a Comprehensive BPM Strategy for Successful Process Automation blueprint for further assistance in taking a BPM approach to your sales-IT alignment.

      Info-Tech Insight

      Analysis of the current state is important in the context of gap analysis. It aids in understanding the discrepancies between your baseline and the future state vision, and ensures that these gaps are documented as part of the overall requirements.

      Example: map your current CXM processes to parse strategic requirements (customer acquisition)

      The image shows an example of a CXM process map, which is formatted as a flow chart, with a legend at the bottom.

      Activity: Extract requirements from your top-level business processes

      2.3.4 30 minutes

      Input

      • Current state process maps (output of Activity 2.3.3)

      Output

      • Requirements for future state mapping

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Discuss the current state of priority business processes, as mapped in Activity 2.3.3.
      2. Extract process requirements for business process improvement by asking the following questions:
      • What is the input?
      • What is the output?
      • What are the underlying risks and how can they be mitigated?
      • What conditions should be met to mitigate or eliminate each risk?
      • What are the improvement opportunities?
      • What conditions should be met to enable these opportunities?
      1. Break business requirements into functional and non-functional requirements, as outlined on this slide.

      Info-Tech Insight

      The business and IT should work together to evaluate the current state of business processes and the business requirements necessary to support these processes. Develop a full view of organizational needs while still obtaining the level of detail required to make informed decisions about technology.

      Establish process owners for each top-level process

      Identify the owners of the business processes being evaluated to extract requirements. Process owners will be able to inform business process improvement and assume accountability for reengineered or net-new processes going forward.

      Process Owner Responsibilities

      Process ownership ensures support, accountability, and governance for CXM and its supporting processes. Process owners must be able to negotiate with business users and other key stakeholders to drive efficiencies within their own process. The process owner must execute tactical process changes and continually optimize the process.

      Responsibilities include the following:

      • Inform business process improvement
      • Introduce KPIs and metrics
      • Monitor the success of the process
      • Present process findings to key stakeholders within the organization
      • Develop policies and procedures for the process
      • Implement new methods to manage the process

      Info-Tech Insight

      Identify the owners of existing processes early so you understand who needs to be involved in process improvement and reengineering. Once implemented, CXM applications are likely to undergo a series of changes. Unstructured data will multiply, the number of users may increase, administrators may change, and functionality could become obsolete. Should business processes be merged or drastically changed, process ownership can be reallocated during CXM implementation. Make sure you have the right roles in place to avoid inefficient processes and poor data quality.

      Use Info-Tech’s Process Owner Assignment Guide to aid you in choosing the right candidates

      2.3.5 Process Owner Assignment Guide

      The Process Owner Assignment Guide will ensure you are taking the appropriate steps to identify process owners for existing and net-new processes created within the scope of the CXM strategy.

      The steps in the document will help with important considerations such as key requirements and responsibilities.

      Sections of the document:

      1. Define responsibilities and level of commitment
      2. Define job requirements
      3. Receive referrals
      4. Hold formal interviews
      5. Determine performance metrics

      INFO-TECH DELIVERABLE

      Activity: Assign business process owners and identify job responsibilities

      2.3.6 30 minutes

      Input

      • Current state map (output of Activity 2.3.3)

      Output

      • Process owners assigned
      • CXM Strategy Stakeholder Presentation

      Materials

      Participants

      • Project Team

      Instructions

      1. Using Info-Tech’s Process Owner Assignment Guide, assign process owners for each process mapped out in Activity 2.3.3. To assist in doing so, answer the following questions
      • What is the level of commitment expected from each process owner?
      • How will the process owner role be tied to a formal performance appraisal?
      • What metrics can be assigned?
      • How much work will be required to train process owners?
      • Is there support staff available to assist process owners?
    • Document your outputs in the CXM Strategy Stakeholder Presentation Template.
    • Choose the channels that will make your target customers happy – and ensure they’re supported by CXM applications

      Traditional Channels

      Face-to-Face is efficient and has a positive personalized aspect that many customers desire, be it for sales or customer service.

      Telephony (or IVR) has been a mainstay of customer interaction for decades. While not fading, it must be used alongside newer channels.

      Postal used to be employed extensively for all domains, but is now used predominantly for e-commerce order fulfillment.

      Web 1.0 Channels

      Email is an asynchronous interaction channel still preferred by many customers. Email gives organizations flexibility with queuing.

      Live Chat is a way for clients to avoid long call center wait times and receive a solution from a quick chat with a service rep.

      Web Portals permit transactions for sales and customer service from a central interface. They are a must-have for any large company.

      Web 2.0 Channels

      Social Media consists of many individual services (like Facebook or Twitter). Social channels are exploding in consumer popularity.

      HTML5 Mobile Access allows customers to access resources from their personal device through its integrated web browser.

      Dedicated Mobile Apps allow customers to access resources through a dedicated mobile application (e.g. iOS, Android).

      Info-Tech Insight

      Your channel selections should be driven by customer personas and scenarios. For example, social media may be extensively employed by some persona types (i.e. Millennials) but see limited adoption in other demographics or use cases (i.e. B2B).

      Activity: Extract requirements from your channel map

      2.3.7 30 minutes

      Input

      • Current state process maps (output of Activity 2.3.3)

      Output

      • Channel map
      • CXM Strategy Stakeholder Presentation

      Materials

      • Info-Tech examples
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Inventory which customer channels are currently used by each department.
      2. Speak with the department heads for Marketing, Sales, and Customer Service and discuss future channel usage. Identify any channels that will be eliminated or added.
      3. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Business Unit Channel Use Survey

      Marketing Sales Customer Service
      Current Used? Future Use? Current Used? Future Use? Current Used? Future Use?
      Email Yes Yes No No No No
      Direct Mail Yes No No No No No
      Phone No No Yes Yes Yes Yes
      In-Person No No Yes Yes Yes No
      Website Yes Yes Yes Yes Yes Yes
      Social Channels No Yes Yes Yes No Yes

      Bring it together: amalgamate your strategic requirements for CXM technology enablement

      Discovering your organizational requirements is vital for choosing the right business-enabling initiative, technology, and success metrics. Sorting the requirements by marketing, sales, and service is a prudent mechanism for clarification.

      Strategic Requirements: Marketing

      Definition: High-level requirements that will support marketing functions within CXM.

      Examples

      • Develop a native mobile application while also ensuring that resources for your web presence are built with responsive design interface.
      • Consolidate workflows related to content creation to publish all brand marketing from one source of truth.
      • Augment traditional web content delivery by providing additional functionality such as omnichannel engagement, e-commerce, dynamic personalization, and social media functionality.

      Strategic Requirements: Sales

      Definition: High-level requirements that will support sales functions within CXM.

      Examples

      • Implement a system that reduces data errors and increases sales force efficiency by automating lead management workflows.
      • Achieve end-to-end visibility of the sales process by integrating the CRM, inventory, and order processing and shipping system.
      • Track sales force success by incorporating sales KPIs with real-time business intelligence feeds.

      Strategic Requirements: Customer Service

      Definition: High-level requirements that will support customer service functions within CXM.

      Examples

      • Provide a live chat portal that connects the customer, in real time, with the next available and qualified agent.
      • Bridge the gap between the source of truth for sales with customer service suites to ensure a consistent, end-to-end customer experience from acquisition to customer engagement and retention.
      • Use customer intelligence to track customer journeys in order to best understand and resolve customer complaints.

      Activity: Consolidate your strategic requirements for the CXM application portfolio

      2.3.8 30 minutes

      Input

      • Strategic CXM requirements (outputs of Activities 2.1.5, 2.1.6, and 2.2.2)

      Output

      • Aggregated strategic CXM requirements
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Aggregate strategic CXM requirements that have been gathered thus far in Activities 2.1.5, 2.1.6, and 2.2.2, 2.3.5, and 2.3.7.
      2. Identify and rectify any obvious gaps in the existing set of strategic CXM requirements. To do so, consider the overall corporate and CXM strategy: are there any objectives that have not been addressed in the requirements gathering process?
      3. De-duplicate the list. Prioritize the aggregated/augmented list of CXM requirements as “high/critical,” “medium/important,” or “low/desirable.” This will help manage the relative importance and urgency of different requirements to itemize respective initiatives, resources, and the time in which they need to be addressed. In completing the prioritization of requirements, consider the following:
      • Requirements prioritization must be completed in collaboration with all key stakeholders (across the business and IT). Stakeholders must ask themselves:
        • What are the consequences to the business objectives if this requirement is omitted?
        • Is there an existing system or manual process/workaround that could compensate for it?
        • What business risk is being introduced if a particular requirement cannot be implemented right away?
    • Document your outputs in the CXM Strategic Stakeholder Presentation Template.
    • Info-Tech Insight

      Strategic CXM requirements will be used to prioritize specific initiatives for CXM technology enablement and application rollout. Ensure that IT, the business, and executive management are all aligned on a consistent and agreed upon set of initiatives.

      Burberry digitizes the retail CX with real-time computing to bring consumers back to the physical storefront

      CASE STUDY

      Industry Consumer Goods, Clothing

      Source Retail Congress, 2017

      Burberry London

      Situation

      Internally, Burberry invested in organizational alignment and sales force brand engagement. The more the sales associate knew about the brand engagement and technology-enabled strategy, the better the store’s performance. Before the efforts went to building relationships with customers, Burberry built engagement with employees.

      Burberry embraced “omnichannel,” the hottest buzzword in retailing to provide consumers the most immersive and intuitive brand experience within the store.

      Technology Strategy

      RFID tags were attached to products to trigger interactive videos on the store’s screens in the common areas or in a fitting room. Consumers are to have instant access to relevant product combinations, ranging from craftsmanship information to catwalk looks. This is equivalent to the rich, immediate information consumers have grown to expect from the online shopping experience.

      Another layer of Burberry’s added capabilities includes in-memory-based analytics to gather and analyze data in real-time to better understand customers’ desires. Burberry builds customer profiles based on what items the shoppers try on from the RFID-tagged garments. Although this requires customer privacy consent, customers are willing to provide personal information to trusted brands.

      This program, called “Customer 360,” assisted sales associates in providing data-driven shopping experiences that invite customers to digitally share their buying history and preferences via their tablet devices. As the data is stored in Burberry’s customer data warehouse and accessed through an application such as CRM, it is able to arm sales associates with personal fashion advice on the spot.

      Lastly, the customer data warehouse/CRM application is linked to Burberry’s ERP system and other custom applications in a cloud environment to achieve real-time inventory visibility and fulfillment.

      Burberry digitizes the retail CX with real-time computing to bring consumers back to the physical storefront (cont'd)

      CASE STUDY

      Industry Consumer Goods, Clothing

      Source Retail Congress, 2017

      Burberry London

      Situation

      Internally, Burberry invested in organizational alignment and sales force brand engagement. The more the sales associate knew about the brand engagement and technology-enabled strategy, the better the store’s performance. Before the efforts went to building relationships with customers, Burberry built engagement with employees.

      Burberry embraced “omnichannel,” the hottest buzzword in retailing to provide consumers the most immersive and intuitive brand experience within the store.

      The Results

      Burberry achieved one of the most personalized retail shopping experiences. Immediate personal fashion advice using customer data is only one component of the experience. Not only are historic purchases and preference data analyzed, a customer’s social media posts and fashion industry trend data is proactively incorporated into the interactions between the sales associate and the customer.

      Burberry achieved CEO Angela Ahrendts’ vision of “Burberry World,” in which the brand experience is seamlessly integrated across channels, devices, retail locations, products, and services.

      The organizational alignment between Sales, Marketing, and IT empowered employees to bring the Burberry brand to life in unique ways that customers appreciated and were willing to advocate.

      Burberry is now one of the most beloved and valuable luxury brands in the world. The brand tripled sales in five years, became one of the leading voices on trends, fashion, music, and beauty while redefining what top-tier customer experience should be both digitally and physically.

      Leverage both core CRM suites and point solutions to create a comprehensive CXM application portfolio

      The debate between best-of-breed point solutions versus comprehensive CRM suites is ongoing. There is no single best answer. In most cases, an effective portfolio will include both types of solutions.

      • When the CRM market first evolved, vendors took a heavy “module-centric” approach – offering basic suites with the option to add a number of individual modules. Over time, vendors began to offer suites with a high degree of out-of-the-box functionality. The market has now witnessed the rise of powerful point solutions for the individual business domains.
      • Point solutions augment, rather than supplant, the functionality of a CRM suite in the mid-market to large enterprise context. Point solutions do not offer the necessary spectrum of functionality to take the place of a unified CRM suite.
      • Point solutions enhance aspects of CRM. For example, most CRM vendors have yet to provide truly impressive social media capabilities. An organization seeking to dominate the social space should consider purchasing a social media management platform to address this deficit in their CRM ecosystem.

      Customer Relationship Management (CRM)

      Social Media Management Platform (SMMP)

      Field Sales/Service Automation (FSA)

      Marketing Management Suites

      Sales Force Automation

      Email Marketing Tools

      Lead Management Automation (LMA)

      Customer Service Management Suites

      Customer Intelligence Systems

      Don’t adopt multiple point solutions without a genuine need: choose domains most in need of more functionality

      Some may find that the capabilities of a CRM suite are not enough to meet their specific requirements: supplementing a CRM suite with a targeted point solution can get the job done. A variety of CXM point solutions are designed to enhance your business processes and improve productivity.

      Sales

      Sales Force Automation: Automatically generates, qualifies, tracks, and contacts leads for sales representatives, minimizing time wasted on administrative duties.

      Field Sales: Allows field reps to go through the entire sales cycle (from quote to invoice) while offsite.

      Sales Compensation Management: Models, analyzes, and dispenses payouts to sales representatives.

      Marketing

      Social Media Management Platforms (SMMP): Manage and track multiple social media services, with extensive social data analysis and insight capabilities.

      Email Marketing Bureaus: Conduct email marketing campaigns and mine results to effectively target customers.

      Marketing Intelligence Systems: Perform in-depth searches on various data sources to create predictive models.

      Service

      Customer Service Management (CSM): Manages the customer support lifecycle with a comprehensive array of tools, usually above and beyond what’s in a CRM suite.

      Customer Service Knowledge Management (CSKM): Advanced knowledgebase and resolution tools.

      Field Service Automation (FSA): Manages customer support tickets, schedules work orders, tracks inventory and fleets, all on the go.

      Info-Tech Insight

      CRM and point solution integration is critical. A best-of-breed product that poorly integrates with your CRM suite compromises the value generated by the combined solution, such as a 360-degree customer view. Challenge point solution vendors to demonstrate integration capabilities with CRM packages.

      Refer to your use cases to decide whether to add a dedicated point solution alongside your CRM suite

      Know your end state and what kind of tool will get you there. Refer to your strategic requirements to evaluate CRM and point solution feature sets.

      Standalone CRM Suite

      Sales Conditions: Need selling and lead management capabilities for agents to perform the sales process, along with sales dashboards and statistics.

      Marketing or Communication Conditions: Need basic campaign management and ability to refresh contact records with information from social networks.

      Member Service Conditions: Need to keep basic customer records with multiple fields per record and basic channels such as email and telephony.

      Add a Best-of-Breed or Point Solution

      Environmental Conditions: An extensive customer base with many different interactions per customer along with industry specific or “niche” needs. Point solutions will benefit firms with deep needs in specific feature areas (e.g. social media or field service).

      Sales Conditions: Lengthy sales process and account management requirements for assessing and managing opportunities – in a technically complex sales process.

      Marketing Conditions: Need social media functionality for monitoring and social property management.

      Customer Service Conditions: Need complex multi-channel service processes and/or need for best-of-breed knowledgebase and service content management.

      Info-Tech Insight

      The volume and complexity of both customers and interactions have a direct effect on when to employ just a CRM suite and when to supplement with a point solution. Check to see if your CRM suite can perform a specific business requirement before deciding to evaluate potential point solutions.

      Use Info-Tech’s CXM Portfolio Designer to create an inventory of high-value customer interaction applications

      2.3.9 CXM Portfolio Designer

      The CXM Portfolio Designer features a set of questions geared toward understanding your needs for marketing, sales, and customer service enablement.

      These results are scored and used to suggest a comprehensive solution-level set of enterprise applications for CXM that can drive your application portfolio and help you make investment decisions in different areas such as CRM, marketing management, and customer intelligence.

      Sections of the tool:

      1. Introduction
      2. Customer Experience Management Questionnaire
      3. Business Unit Recommendations
      4. Enterprise-Level Recommendations

      INFO-TECH DELIVERABLE

      Understand the art of the possible and how emerging trends will affect your application portfolio (1)

      Cloud

      • The emergence and maturation of cloud technologies has broken down the barriers of software adoption.
      • Cloud has enabled easy-to-implement distributed sales centers for enterprises with global or highly fragmented workforces.
      • Cloud offers the agility, scalability, and flexibility needed to accommodate dynamic, evolving customer requirements while minimizing resourcing strain on IT and sales organizations.
      • It is now easier for small to medium enterprises to acquire and implement advanced sales capabilities to compete against larger competitors in a business environment where the need for business agility is key.
      • Although cost and resource reduction is a prominent view of the impact of cloud computing, it is also seen as an agile way to innovate and deliver a product/service experience that customers are looking for – the key to competitive differentiation.

      Mobile

      • Smartphones and other mobile devices were adopted faster than the worldwide web in the late 1990s, and the business and sales implications of widespread adoption cannot be ignored – mobile is changing how businesses operate.
        • Accenture’s Mobility Research Report states that 87% of companies in the study have been guided by a formal mobility strategy – either one that spans the enterprise or for specific business functions.
      • Mobile is now the first point of interaction with businesses. With this trend, gaining visibility into customer insights with mobile analytics is a top priority for organizations.
      • Enterprises need to develop and optimize mobile experiences for internal salespeople and customers alike as part of their sales strategy – use mobile to enable a competitive, differentiated sales force.
      • The use of mobile platforms by sales managers is becoming a norm. Sales enablement suites should support real-time performance metrics on mobile dashboards.

      Understand the art of the possible and how emerging trends will affect your application portfolio (2)

      Social

      • The rise of social networking brought customers together. Customers are now conversing with each other over a wide range of community channels that businesses neither own nor control.
        • The Power Shift: The use of social channels empowered customers to engage in real-time, unstructured conversations for the purpose of product/service evaluations. Those who are active in social environments come to wield considerable influence over the buying decisions of other prospects and customers.
      • Organizations need to identify the influencers and strategically engage them as well as developing an active presence in social communities that lead to sales.
      • Social media does have an impact on sales, both B2C and B2B. A study conducted in 2012 by Social Centered Selling states that 72.6% of sales people using social media as part of their sales process outperformed their peers and exceeded their quota 23% more often (see charts at right).

      The image shows two bar graphs, the one on top titled Achieving Quota: 2010-2012 and the one below titled Exceeding Quota: 2010-2012.

      (Social Centered Learning, n.d.)

      Understand the art of the possible and how emerging trends will affect your application portfolio (3)

      Internet of Things

      • Definition: The Internet of Things (IoT) is the network of physical objects accessed through the internet. These objects contain embedded technology to interact with internal states or the external environment.
      • Why is this interesting?
        • IoT will make it possible for everybody and everything to be connected at all times, processing information in real time. The result will be new ways of making business and sales decisions supported by the availability of information.
        • With ubiquitous connectivity, the current product design-centric view of consumers is changing to one of experience design that aims to characterize the customer relationship with a series of integrated interaction touchpoints.
        • The above change contributes to the shift in focus from experience and will mean further acceleration of the convergence of customer-centric business functions. IoT will blur the lines between marketing, sales, and customer service.
        • Products or systems linked to products are capable of self-operating, learning, updating, and correcting by analyzing real-time data.
        • Take for example, an inventory scale in a large warehouse connected to the company’s supply chain management (SCM) system. When a certain inventory weight threshold is reached due to outgoing shipments, the scale automatically sends out a purchase requisition to restock inventory levels to meet upcoming demand.
      • The IoT will eventually begin to transform existing business processes and force organizations to fundamentally rethink how they produce, operate, and service their customers.

      The image shows a graphic titled The Connected Life by 2020, and shows a number of statistics on use of connected devices over time.

      For categories covered by existing applications, determine the disposition for each app: grow it or cut it loose

      Use the two-by-two matrix below to structure your optimal CXM application portfolio. For more help, refer to Info-Tech’s blueprint, Use Agile Application Rationalization Instead of Going Big Bang.

      1

      0

      Richness of Functionality

      INTEGRATE RETAIN
      1
      REPLACE REPLACE OR ENHANCE

      0

      Degree of Integration

      Integrate: The application is functionally rich, so spend time and effort integrating it with other modules by building or enhancing interfaces.

      Retain: The application satisfies both functionality and integration requirements, so it should be considered for retention.

      Replace/Enhance: The module offers poor functionality but is well integrated with other modules. If enhancing for functionality is easy (e.g. through configuration or custom development), consider enhancement or replace it.

      Replace: The application neither offers the functionality sought nor is it integrated with other modules, and thus should be considered for replacement.

      Activity: Brainstorm the art of the possible, and build and finalize the CXM application portfolio

      2.3.10 1-2 hours

      Input

      • Process gaps identified (output of Activity 2.3.9)

      Output

      • CXM application portfolio
      • CXM Strategy Stakeholder Presentation

      Materials

      Participants

      • Project Team

      Instructions

      1. Review the complete list of strategic requirements identified in the preceding exercises, as well as business process maps.
      2. Identify which application would link to which process (e.g. customer acquisition, customer service resolution, etc.).
      3. Use Info-Tech’s CXM Portfolio Designer to create an inventory of high-value customer interaction applications.
      4. Define rationalization and investment areas.
      5. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Brainstorming the Art of the Possible

      Application Gap Satisfied Related Process Number of Linked Requirements Do we have the system? Priority
      LMA
      • Lead Generation
      • Social Lead Management
      • CRM Integration
      Sales 8 No Business Critical
      Customer Intelligence
      • Web Analytics
      • Customer Journey Tracking
      Customer Service 6 Yes Business Enabling
      ... ... ... ... ... ...

      Use Info-Tech’s comprehensive reports to make granular vendor selection decisions

      Now that you have developed the CXM application portfolio and identified areas of new investment, you’re well positioned to execute specific vendor selection projects. After you have built out your initiatives roadmap in phase 3, the following reports provide in-depth vendor reviews, feature guides, and tools and templates to assist with selection and implementation.

      Info-Tech Insight

      Not all applications are created equally well for each use case. The vendor reports help you make informed procurement decisions by segmenting vendor capabilities among major use cases. The strategic requirements identified as part of this project should be used to select the use case that best fits your needs.

      If you want additional support, have our analyst guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      2.3.2; 2.3.3 Shortlist and map the key top-level business processes

      Based on experience working with organizations in similar verticals, the facilitator will help your team map out key sample workflows for marketing, sales, and customer service.

      2.3.6 Create your strategic requirements for CXM

      Drawing on the preceding exercises, the facilitator will work with the team to create a comprehensive list of strategic requirements that will be used to drive technology decisions and roadmap initiatives.

      2.3.10 Create and finalize the CXM application portfolio

      Using the strategic requirements gathered through internal, external, and technology analysis up to this point, a facilitator will assist you in assembling a categorical technology application portfolio to support CXM.

      Step 2.4: Develop Deployment Best Practices

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Develop a CXM integration map
      • Develop a mitigation plan for poor quality customer data
      • Create a framework for end-user adoption of CXM applications

      Outcomes:

      • CXM application portfolio integration map
      • Data quality preservation plan
      • End-user adoption plan

      Develop an integration map to specify which applications will interface with each other

      Integration is paramount: your CXM application portfolio must work as a unified face to the customer. Create an integration map to reflect a system of record and the exchange of data.

      • CRM
        • ERP
        • Telephony Systems (IVR, CTI)
        • Directory Services
        • Email
        • Content Management
        • Point Solutions (SMMP, MMS)

      The points of integration that you’ll need to establish must be based on the objectives and requirements that have informed the creation of the CXM application portfolio. For instance, achieving improved customer insights would necessitate a well-integrated portfolio with customer interaction point solutions, business intelligence tools, and customer data warehouses in order to draw the information necessary to build insight. To increase customer engagement, channel integration is a must (i.e. with robust links to unified communications solutions, email, and VoIP telephony systems).

      Info-Tech Insight

      If the CXM application portfolio is fragmented, it will be nearly impossible to build a cohesive view of the customer and deliver a consistent customer experience. Points of integration (POIs) are the junctions between the applications that make up the CXM portfolio. They are essential to creating value, particularly in customer insight-focused and omnichannel-focused deployments. Be sure to include enterprise applications that are not included in the CXM application portfolio. Popular systems to consider for POIs include billing, directory services, content management, and collaboration tools.

      After identifying points of integration, profile them by business significance, complexity, and investment required

      • After enumerating points of integration between the CRM platform and other CXM applications and data sources, profile them by business significance and complexity required to determine a rank-ordering of priorities.
      • Points of integration that are of high business significance with low complexity are your must do’s – these are your quick wins that deliver maximum value without too much cost. This is typically the case when integrating a vendor-to-vendor solution with available native connectors.
      • On the opposite end of the spectrum are your POIs that will require extensive work to deliver but offer negligible value. These are your should not do’s – typically, these are niche requests for integration that will only benefit the workflows of a small (and low priority) group of end users. Only accommodate them if you have slack time and budget built into your implementation timeline.

      The image shows a square matrix with Point of Integration Value Matrix in the centre. On the X-axis is Business Significance, and on the Y-axis is POI complexity. In the upper left quadrant is Should Not Do, upper right is Should Do, lower left is Could Do, and lower right is Must do.

      "Find the absolute minimum number of ‘quick wins’ – the POIs you need from day one that are necessary to keep end users happy and deliver value." – Maria Cindric, Australian Catholic University Source: Interview

      Activity: Develop a CXM application integration map

      2.4.1 1 hour

      Input

      • CXM application portfolio (output of Activity 2.3.10)

      Output

      • CXM application portfolio integration map
      • CXM Strategy Stakeholder Presentation

      Materials

      • Sticky notes
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. On sticky notes, record the list of applications that comprise the CXM application portfolio (built in Activity 2.3.10) and all other relevant applications. Post the sticky notes on a whiteboard so you can visualize the portfolio.
      2. Discuss the key objectives and requirements that will drive the integration design of the CXM application portfolio.
      3. As deemed necessary by step 2, rearrange the sticky notes and draw connecting arrows between applications to reflect their integration. Allow the point of the arrow to indicate direction of data exchanges.
      4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Mapping the Integration of CXM Applications

      The image shows several yellow rectangles with text in them, connected by arrows.

      Plug the hole and bail the boat – plan to be preventative and corrective with customer data quality initiatives

      Data quality is king: if your customer data is garbage in, it will be garbage out. Enable strategic CXM decision making with effective planning of data quality initiatives.

      Identify and Eliminate Dead Weight

      Poor data can originate in the firm’s system of record, which is typically the CRM system. Custom queries, stored procedures, or profiling tools can be used to assess the key problem areas.

      Loose rules in the CRM system lead to records of no significant value in the database. Those rules need to be fixed, but if changes are made before the data is fixed, users could encounter database or application errors, which will reduce user confidence in the system.

      • Conduct a data flow analysis: map the path that data takes through the organization.
      • Use a mass cleanup to identify and destroy dead weight data. Merge duplicates either manually or with the aid of software tools. Delete incomplete data, taking care to reassign related data.
      • COTS packages typically allow power users to merge records without creating orphaned records in related tables, but custom-built applications typically require IT expertise.

      Create and Enforce Standards & Policies

      Now that the data has been cleaned, protect the system from relapsing.

      Work with business users to find out what types of data require validation and which fields should have changes audited. Whenever possible, implement drop-down lists to standardize values and make programming changes to ensure that truncation ceases.

      • Truncated data is usually caused by mismatches in data structures during either one-time data loads or ongoing data integrations.
      • Don’t go overboard on assigning required fields – users will just put key data in note fields.
      • Discourage the use of unstructured note fields: the data is effectively lost unless it gets subpoenaed.
      • To specify policies, use Info-Tech’s Master Data Record Tool.

      Profile your customer and sales-related data

      Applications are a critical component of how IT supports Sales, but IT also needs to help Sales keep its data current and accurate. Conducting a sales data audit is critical to ensure Sales has the right information at the right time.

      Info-Tech Insight

      Data is king. More than ever, having accurate data is essential for your organization to win in hyper-competitive marketplaces. Prudent current state analysis looks at both the overall data model and data architecture, as well as assessing data quality within critical sales-related repositories. As the amount of customer data grows exponentially due to the rise of mobility and the Internet of Things, you must have a forward-looking data model and data marts/customer data warehouse to support sales-relevant decisions.

      • A current state analysis for sales data follows a multi-step process:
        • Determine the location of all sales-relevant and customer data – the sales data inventory. Data can reside in applications, warehouses, and documents (e.g. Excel and Access files) – be sure to take a holistic approach.
      • For each data source, assess data quality across the following categories:
        • Completeness
        • Currency (Relevancy)
        • Correctness
        • Duplication
      • After assessing data quality, determine which repositories need the most attention by IT and Sales. We will look at opportunities for data consolidation later in the blueprint.

      INFO-TECH OPPORTUNITY

      Refer to Info-Tech’s Develop a Master Data Management Strategy and Roadmap blueprint for further reference and assistance in data management for your sales-IT alignment.

      Activity: Develop a mitigation plan for poor quality customer data

      2.4.2 30 minutes

      Input

      • List of departments involved in maintenance of CXM data

      Output

      • Data quality preservation plan
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Inventory a list of departments that will be interacting directly with CXM data.
      2. Identify data quality cleansing and preservation initiatives, such as those in previous examples.
      3. Assign accountability to an individual in the department as a data steward. When deciding on a data steward, consider the following:
      • Data stewards are designated full-time employees who serve as the go-to resource for all issues pertaining to data quality, including keeping a particular data silo clean and free of errors.
      • Data stewards are typically mid-level managers in the business (not IT), preferably with an interest in improving data quality and a relatively high degree of tech-savviness.
      • Data stewards can sometimes be created as a new role with a dedicated FTE, but this is not usually cost effective for small and mid-sized firms.
      • Instead, diffuse the steward role across several existing positions, including one for CRM and other marketing, sales, and service applications.
    • Document your outputs in the CXM Strategy Stakeholder Presentation Template.
    • Example: Data Steward Structure

      Department A

      • Data Steward (CRM)
      • Data Steward (ERP)

      Department B

      • Data Steward (All)

      Department C

      • Data Steward (All)

      Determine if a customer data warehouse will add value to your CXM technology-enablement strategy

      A customer data warehouse (CDW) “is a subject-oriented, integrated, time-variant, non-volatile collection of data used to support the strategic decision-making process across marketing, sales, and service. It is the central point of data integration for customer intelligence and is the source of data for the data marts, delivering a common view of customer data” (Corporate Information Factory, n.d.).

      Analogy

      CDWs are like a buffet. All the food items are in the buffet. Likewise, your corporate data sources are centralized into one repository. There are so many food items in a buffet that you may need to organize them into separate food stations (data marts) for easier access.

      Examples/Use Cases

      • Time series analyses with historical data
      • Enterprise level, common view analyses
      • Integrated, comprehensive customer profiles
      • One-stop repository of all corporate information

      Pros

      • Top-down architectural planning
      • Subject areas are integrated
      • Time-variant, changes to the data are tracked
      • Non-volatile, data is never over-written or deleted

      Cons

      • A massive amount of corporate information
      • Slower delivery
      • Changes are harder to make
      • Data format is not very business friendly

      Activity: Assess the need for a customer data warehouse

      2.4.3. 30 minutes

      Input

      • List of data sources
      • Data inflows and outflows

      Output

      • Data quality preservation plan
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Create a shortlist of customer data sources.
      2. Profile the integration points that are necessary to support inflows and outflows of customer data.
      3. Ask the following questions around the need for a CDW based on these data sources and points of integration:
      • What is the volume of customer information that needs to be stored? The greater the capacity, the more likely that you should build a dedicated CDW.
      • How complex is the data? The more complex the data, the greater the need for a CDW.
      • How often will data interchange happen between various applications and data sources? The greater and more frequent the interchange, the greater the need for a CDW.
      • What are your organizational capabilities for building a CDW? Do you have the resources in-house to create a CDW at this time?
    • Document your outputs in the CXM Strategy Stakeholder Presentation Template.
    • INFO-TECH OPPORTUNITY

      Refer to Info-Tech’s Build an Agile Data Warehouse blueprint for more information on building a centralized and integrated data warehouse.

      Create a plan for end-user training on new (or refocused) CXM applications and data quality processes

      All training modules will be different, but some will have overlapping areas of interest.

      – Assign Project Evangelists – Analytics Training – Mobile Training

      Application Training

      • Customer Service - Assign Project Evangelists – Analytics Training – Mobile Training
        • Focus training on:
          • What to do with inbound tickets.
          • Routing and escalation features.
          • How to use knowledge management features effectively.
          • Call center capabilities.
      • Sales – Assign Project Evangelists – Analytics Training – Mobile Training
        • Focus training on:
          • Recording of opportunities, leads, and deals.
          • How to maximize sales with sales support decision tree.
      • Marketing - Assign Project Evangelists – Analytics Training
        • Focus training on:
          • Campaign management features.
          • Social media monitoring and engagement capabilities.
      • IT
        • Focus training on:
          • Familiarization with the software.
          • Software integration with other enterprise applications.
          • The technical support needed to maintain the system in the future.

      Info-Tech Insight

      Train customers too. Keep the customer-facing sales portals simple and intuitive, have clear explanations/instructions under important functions (e.g. brief directions on how to initiate service inquiries), and provide examples of proper uses (e.g. effective searches). Make sure customers are aware of escalation options available to them if self-service falls short.

      Ensure adoption with a formal communication process to keep departments apprised of new application rollouts

      The team leading the rollout of new initiatives (be they applications, new governance structures, or data quality procedures) should establish a communication process to ensure management and users are well informed.

      CXM-related department groups or designated trainers should take the lead and implement a process for:

      • Scheduling application platform/process rollout/kick-off meetings.
      • Soliciting preliminary input from the attending groups to develop further training plans.
      • Establishing communication paths and the key communication agents from each department who are responsible for keeping lines open moving forward.

      The overall objective for inter-departmental kick-off meetings is to confirm that all parties agree on certain key points and understand alignment rationale and new sales app or process functionality.

      The kick-off process will significantly improve internal communications by inviting all affected internal IT groups, including business units, to work together to address significant issues before the application process is formally activated.

      The kick-off meeting(s) should encompass:

      • Target business-user requirements
      • The high-level application overview
      • Tangible business benefits of alignment
      • Special consideration needs
      • Other IT department needs
      • Target quality of service (QoS) metrics

      Info-Tech Insight

      Determine who in each department will send out a message about initiative implementation, the tone of the message, the medium, and the delivery date.

      Construct a formal communication plan to engage stakeholders through structured channels

      Tangible Elements of a Communications Plan

      • Stakeholder Group Name
      • Stakeholder Description
      • Message
      • Concerns Relative to Application Maintenance
      • Communication Medium
      • Role Responsible for Communication
      • Frequency
      • Start and End Date

      Intangible Elements of a Communications Plan

      • Establish biweekly meetings with representatives from sales functional groups, who are tasked with reporting on:
        • Benefits of revised processes
        • Metrics of success
        • Resource restructuring
      • Establish a monthly interdepartmental meeting, where all representatives from sales and IT leadership discuss pressing bug fixes and minor process improvements.
      • Create a webinar series, complete with Q&A, so that stakeholders can reference these changes at their leisure.

      Info-Tech Insight

      Every piece of information that you give to a stakeholder that is not directly relevant to their interests is a distraction from your core message. Always remember to tailor the message, medium, and timing accordingly.

      Carry the CXM value forward with linkage and relationships between sales, marketing, service, and IT

      Once the sales-IT alignment committees have been formed, create organizational cadence through a variety of formal and informal gatherings between the two business functions.

      • Organizations typically fall in one of three maturity stages: isolation, collaboration, or synergy. Strive to achieve business-technology synergy at the operational level.
      • Although collaboration cannot be mandated, it can be facilitated. Start with a simple gauge of the two functions’ satisfaction with each other, and determine where and how inter-functional communication and synergy can be constructed.

      Isolation

      The image shows four shapes, with the words IT, Sales, Customer Service, and Marketing in them.

      • Point solutions are implemented on an ad-hoc basis by individual departments for specific projects.
      • Internal IT is rarely involved in these projects from beginning to end.

      Collaboration

      The image features that same four shapes and text from the previous image, but this time they are connected by dotted lines.

      • There is a formal cross-departmental effort to integrate some point solutions.
      • Internal IT gets involved to integrate systems and then support system interactions.

      Synergy

      The image features the same shapes and text from previous instances, except the shapes are now connect by solid lines and the entire image is surrounded by dotted lines.

      • Cross-functional, business technology teams are established to work on IT-enabled revenue generation initiatives.
      • Team members are collocated if possible.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      2.4.1 Develop a CXM application integration map

      Using the inventory of existing CXM-supporting applications and the newly formed CXM application portfolio as inputs, your facilitator will assist you in creating an integration map of applications to establish a system of record and flow of data.

      2.4.2 Develop a mitigation plan for poor quality customer data

      Our facilitator will educate your stakeholders on the importance of quality data and guide you through the creation of a mitigation plan for data preservation.

      2.4.3 Assess the need for a customer data warehouse

      Addressing important factors such as data volume, complexity, and flow, a facilitator will help you assess whether or not a customer data warehouse for CXM is the right fit for your organization.

      Phase 3

      Finalize the CXM Framework

      Build a Strong Technology Foundation for Customer Experience Management

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Finalize the CXM Framework

      Proposed Time to Completion: 1 week

      Step 3.1: Create an Initiative Rollout Plan

      Start with an analyst kick-off call:

      • Discuss strategic requirements and the associated application portfolio that has been proposed.

      Then complete these activities…

      • Initiatives prioritization

      With these tools & templates:

      • CXM Strategy Stakeholder Presentation Template

      Step 3.2: Confirm and Finalize the CXM Blueprint

      Review findings with analyst:

      • Discuss roadmap and next steps in terms of rationalizing and implementing specific technology-centric initiatives or rollouts.

      Then complete these activities…

      • Confirm stakeholder strategy presentation

      With these tools & templates:

      • CXM Strategy Stakeholder Presentation Template

      Phase 3 Results & Insights:

      • Initiatives roadmap

      Step 3.1: Create an Initiative Rollout Plan

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Create a risk management plan
      • Brainstorm initiatives for CXM roadmap
      • Identify dependencies and enabling projects for your CXM roadmap
      • Complete the CXM roadmap

      Outcomes:

      • Risk management plan
      • CXM roadmap
        • Quick-win initiatives

      A CXM technology-enablement roadmap will provide smooth and timely implementation of your apps/initiatives

      Creating a comprehensive CXM strategy roadmap reduces the risk of rework, misallocation of resources, and project delays or abandonment.

      • People
      • Processes
      • Technology
      • Timeline
      • Tasks
      • Budget

      Benefits of a Roadmap

      1. Prioritize execution of initiatives in alignment with business, IT, and needs.
      2. Create clearly defined roles and responsibilities for IT and business stakeholders.
      3. Establish clear timelines for rollout of initiatives.
      4. Identify key functional areas and processes.
      5. Highlight dependencies and prerequisites for successful deployment.
      6. Reduce the risk of rework due to poor execution.

      Implement planning and controls for project execution

      Risk Management

      • Track risks associated with your CXM project.
      • Assign owners and create plans for resolving open risks.
      • Identify risks associated with related projects.
      • Create a plan for effectively communicating project risks.

      Change Management

      • Brainstorm a high-level training plan for various users of the CXM.
      • Create a communication plan to notify stakeholders and impacted users about the tool and how it will alter their workday and performance of role activities.
      • Establish a formal change management process that is flexible enough to meet the demands for change.

      Project Management

      • Conduct a post-mortem to evaluate the completion of the CXM strategy.
      • Design the project management process to be adaptive in nature.
      • Communication is key to project success, whether it is to external stakeholders or internal project team members..
      • Review the project’s performance against metrics and expectations.

      INFO-TECH OPPORTUNITIES

      Optimize the Change Management Process

      You need to design a process that is flexible enough to meet demand for change and strict enough to protect the live environment from change-related incidents.

      Create Project Management Success

      Investing time up front to plan the project and implementing best practices during project execution to ensure the project is delivered with the planned outcome and quality is critical to project success.

      Activity: Create a risk management plan

      3.1.1 45 minutes

      Input

      • Inventory of risks

      Output

      • Risk management plan
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Create a list of possible risks that may hamper the progress of your CXM project.
      2. Classify risks as strategy-based, related to planning, or systems-based, related to technology.
      3. Brainstorm mitigation strategies to overcome each listed risk.
      4. On a score of 1 to 3, determine the impact of each risk on the success of the project.
      5. On a score of 1 to 3, determine the likelihood of the occurrence for each risk.
      6. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Constructing a Risk Management Plan

      Risk Impact Likelihood Mitigation Effort
      Strategy Risks Project over budget
      • Detailed project plan
      • Pricing guarantees
      Inadequate content governance
      System Risks Integration with additional systems
      • Develop integration plan and begin testing integration methods early in the project
      .... ... ... ...

      Likelihood

      1 – High/ Needs Focus

      2 – Can Be Mitigated

      3 - Unlikely

      Impact

      1 - High Risk

      2 - Moderate Risk

      3 - Minimal Risk

      Prepare contingency plans to minimize time spent handling unexpected risks

      Understanding technical and strategic risks can help you establish contingency measures to reduce the likelihood that risks will occur. Devise mitigation strategies to help offset the impact of risks if contingency measures are not enough.

      Remember

      The biggest sources of risk in a CXM strategy are lack of planning, poorly defined requirements, and lack of governance.

      Apply the following mitigation tips to avoid pitfalls and delays.

      Risk Mitigation Tips

      • Upfront planning
      • Realistic timelines
      • Resource support
      • Change management
      • Executive sponsorship
      • Sufficient funding
      • Expectation setting
      1. Project Starts
      • Expectations are high
    • Project Workload Increases
      • Expectations are high
    • Pit of Despair
      • Why are we doing this?
    • Project Nears Close
      • Benefits are being realized
    • Implementation is Completed
      • Learning curve dip
    • Standardization & Optimization
      • Benefits are high
    • Identify factors to complete your CXM initiatives roadmap

      Completion of initiatives for your CXM project will be contingent upon multiple variables.

      Defining Dependencies

      Initiative complexity will define the need for enabling projects. Create a process to define dependencies:

      1. Enabling projects: complex prerequisites.
      2. Preceding tasks: direct and simplified assignments.

      Establishing a Timeline

      • Assign realistic timelines for each initiative to ensure smooth progress.
      • Use milestones and stage gates to track the progress of your initiatives and tasks.

      Defining Importance

      • Based on requirements gathering, identify the importance of each initiative to your marketing department.
      • Each initiative can be ranked high, medium, or low.

      Assigning Ownership

      • Owners are responsible for on-time completion of their assigned initiatives.
      • Populate a RACI chart to ensure coverage of all initiatives.

      Complex....Initiative

      • Enabling Project
        • Preceding Task
        • Preceding Task
      • Enabling Project
        • Preceding Task
        • Preceding Task

      Simple....Initiative

      • Preceding Task
      • Preceding Task
      • Preceding Task

      Activity: Brainstorm CXM application initiatives for implementation in alignment with business needs

      3.1.2 45 minutes

      Input

      • Inventory of CXM initiatives

      Output

      • Prioritized and quick-win initiatives
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. As a team, identify and list CXM initiatives that need to be addressed.
      2. Plot the initiatives on the complexity-value matrix to determine priority.
      3. Identify quick wins: initiatives that can realize quick benefits with little effort.
      4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Importance-Capability Matrix

      The image shows a matrix, with Initiative Complexity on the X-axis, and Business Value on the Y-axis. There are circle of different sizes in the matrix.

      Pinpoint quick wins: high importance, low effort initiatives.

      The size of each plotted initiative must indicate the effort or the complexity and time required to complete.
      Top Right Quadrant Strategic Projects
      Top Left Quadrant Quick Wins
      Bottom Right Quadrant Risky Bets
      Bottom Left Quadrant Discretionary Projects

      Activity: Identify any dependencies or enabling projects for your CXM roadmap

      3.1.3 1 hour

      Input

      • Implementation initiatives
      • Dependencies

      Output

      • CXM project dependencies

      Materials

      • Sticky notes
      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Using sticky notes and a whiteboard, have each team member rank the compiled initiatives in terms of priority.
      2. Determine preceding tasks or enabling projects that each initiative is dependent upon.
      3. Determine realistic timelines to complete each quick win, enabling project, and long-term initiative.
      4. Assign an owner for each initiative.

      Example: Project Dependencies

      Initiative: Omnichannel E-Commerce

      Dependency: WEM Suite Deployment; CRM Suite Deployment; Order Fulfillment Capabilities

      Activity: Complete the implementation roadmap

      3.1.4 30 minutes

      Input

      • Implementation initiatives
      • Dependencies

      Output

      • CXM Roadmap
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Establish time frames to highlight enabling projects, quick wins, and long-term initiatives.
      2. Indicate the importance of each initiative as high, medium, or low based on the output in Activity 3.1.2.
      3. Assign each initiative to a member of the project team. Each owner will be responsible for the execution of a given initiative as planned.
      4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Example: Importance-Capability Matrix

      Importance Initiative Owner Completion Date
      Example Projects High Gather business requirements. Project Manager MM/DD/YYYY
      Quick Wins
      Long Term Medium Implement e-commerce across all sites. CFO & Web Manager MM/DD/YYYY

      Importance

      • High
      • Medium
      • Low

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1.1 Create a risk management plan

      Based on the workshop exercises, the facilitator will work with the core team to design a priority-based risk mitigation plan that enumerates the most salient risks to the CXM project and addresses them.

      3.1.2; 3.1.3; 3.1.4 Identify initiative dependencies and create the CXM roadmap

      After identifying dependencies, our facilitators will work with your IT SMEs and business stakeholders to create a comprehensive roadmap, outlining the initiatives needed to carry out your CXM strategy roadmap.

      Step 3.2: Confirm and Finalize the CXM Blueprint

      Phase 1

      1.1 Create the Project Vision

      1.2 Structure the Project

      Phase 2

      2.1 Scan the External Environment

      2.2 Assess the Current State of CXM

      2.3 Create an Application Portfolio

      2.4 Develop Deployment Best Practices

      Phase 3

      3.1 Create an Initiative Rollout Plan

      3.2 Confirm and Finalize the CXM Blueprint

      Activities:

      • Identify success metrics
      • Create a stakeholder power map
      • Create a stakeholder communication plan
      • Complete and present CXM strategy stakeholder presentation

      Outcomes:

      • Stakeholder communication plan
      • CXM strategy stakeholder presentation

      Ensure that your CXM applications are improving the performance of targeted processes by establishing metrics

      Key Performance Indicators (KPIs)

      Key performance indicators (KPIs) are quantifiable measures that demonstrate the effectiveness of a process and its ability to meet business objectives.

      Questions to Ask

      1. What outputs of the process can be used to measure success?
      2. How do you measure process efficiency and effectiveness?

      Creating KPIs

      Specific

      Measurable

      Achievable

      Realistic

      Time-bound

      Follow the SMART methodology when developing KPIs for each process.

      Adhering to this methodology is a key component of the Lean management methodology. This framework will help you avoid establishing general metrics that aren’t relevant.

      Info-Tech Insight

      Metrics are essential to your ability to measure and communicate the success of the CXM strategy to the business. Speak the same language as the business and choose metrics that relate to marketing, sales, and customer service objectives.

      Activity: Identify metrics to communicate process success

      3.2.1 1 hour

      Input

      • Key organizational objectives

      Output

      • Strategic business metrics
      • CXM Strategy Stakeholder Presentation

      Materials

      • Whiteboard
      • Markers

      Participants

      • Project Team

      Instructions

      1. Recap the major functions that CXM will focus on (e.g. marketing, sales, customer service, web experience management, social media management, etc.)
      2. Identify business metrics that reflect organizational objectives for each function.
      3. Establish goals for each metric (as exemplified below).
      4. Document your outputs in the CXM Strategy Stakeholder Presentation Template.
      5. Communicate the chosen metrics and the respective goals to stakeholders.

      Example: Metrics for Marketing, Sales, and Customer Service Functions

      Metric Example
      Marketing Customer acquisition cost X% decrease in costs relating to advertising spend
      Ratio of lifetime customer value X% decrease in customer churn
      Marketing originated customer % X% increase in % of customer acquisition driven by marketing
      Sales Conversion rate X% increase conversion of lead to sale
      Lead response time X% decrease in response time per lead
      Opportunity-to-win ratio X% increase in monthly/annual opportunity-to-win ratio
      Customer Service First response time X% decreased time it takes for customer to receive first response
      Time-to-resolution X% decrease of average time-to-resolution
      Customer satisfaction X% improvement of customer satisfaction ratings on immediate feedback survey

      Use Info-Tech’s Stakeholder Power Map Template to identify stakeholders crucial to CXM application rollouts

      3.2.2 Stakeholder Power Map Template

      Use this template and its power map to help visualize the importance of various stakeholders and their concerns. Prioritize your time according to the most powerful and most impacted stakeholders.

      Answer questions about each stakeholder:

      • Power: How much influence does the stakeholder have? Enough to drive the project forward or into the ground?
      • Involvement: How interested is the stakeholder? How involved is the stakeholder in the project already?
      • Impact: To what degree will the stakeholder be impacted? Will this significantly change how they do their job?
      • Support: Is the stakeholder a supporter of the project? Neutral? A resistor?

      Focus on key players: relevant stakeholders who have high power, should have high involvement, and are highly impacted.

      INFO-TECH DELIVERABLE

      Stakeholder Power Map Template

      Use Info-Tech’s Stakeholder Communication Planning Template to document initiatives and track communication

      3.2.3 Stakeholder Communication Planning Template

      Use the Stakeholder Communication Planning Template to document your list of initiative stakeholders so you can track them and plan communication throughout the initiative.

      Track the communication methods needed to convey information regarding CXM initiatives. Communicate how a specific initiative will impact the way employees work and the work they do.

      Sections of the document:

      1. Document the Stakeholder Power Map (output of Tool 3.2.2).
      2. Complete the Communicate Management Plan to aid in the planning and tracking of communication and training.

      INFO-TECH DELIVERABLE

      Activity: Create a stakeholder power map and communication plan

      3.2.4 1 hour

      Input

      • Stakeholder power map

      Output

      • Stakeholder communication plan
      • CXM Strategy Stakeholder Presentation

      Materials

      • Info-Tech’s Stakeholder Communication Planning Template
      • Info-Tech’s Stakeholder Power Map Template

      Participants

      • Project Team

      Instructions

      1. Using Info-Tech’s Stakeholder Power Map Template, identify key stakeholders for ensuring the success of the CXM strategy (Tool 3.2.2).
      2. Using Info-Tech’s Stakeholder Communication Plan Template, construct a communication plan to communicate and track CXM initiatives with all CXM stakeholders (Tool 3.2.3).
      3. Document your outputs in the CXM Strategy Stakeholder Presentation Template.

      Use Info-Tech’s CXM Strategy Stakeholder Presentation Template to sell your CXM strategy to the business

      3.2.5 CXM Strategy Stakeholder Presentation Template

      Complete the presentation template as indicated when you see the green icon throughout this deck. Include the outputs of all activities that are marked with this icon.

      Info-Tech has designed the CXM Strategy Stakeholder Presentation Template to capture the most critical aspects of the CXM strategy. Customize it to best convey your message to project stakeholders and to suit your organization.

      The presentation should be no longer than one hour. However, additional slides can be added at the discretion of the presenter. Make sure there is adequate time for a question and answer period.

      INFO-TECH DELIVERABLE

      After the presentation, email the deck to stakeholders to ensure they have it available for their own reference.

      Activity: Determine the measured value received from the project

      3.2.6 30 minutes

      Input

      • Project Metrics

      Output

      • Measured Value Calculation

      Materials

      • Workbook

      Participants

      • Project Team

      Instructions

      1. Review project metrics identified in phase 1 and associated benchmarks.
      2. After executing the CXM project, compare metrics that were identified in the benchmarks with the revised and assess the delta.
      3. Calculate the percentage change and quantify dollar impact (i.e. as a result of increased customer acquisition or retention).

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.2.4 Create a stakeholder power map and communication plan

      An analyst will walk the project team through the creation of a communication plan, inclusive of project metrics and their respective goals. If you are planning a variety of CXM initiatives, track how the change will be communicated and to whom. Determine the employees who will be impacted by the change.

      Insight breakdown

      Insight 1

      • IT must work in lockstep with Marketing, Sales, and Customer Service to develop a comprehensive technology-enablement strategy for CXM.
      • As IT works with its stakeholders in the business, it must endeavor to capture and use the voice of the customer in driving strategic requirements for CXM portfolio design.
      • IT must consider the external environment, customer personas, and internal processes as it designs strategic requirements to build the CXM application portfolio.

      Insight 2

      • The cloud is bringing significant disruption to the CXM space: to maintain relevancy, IT must become deeply involved in ensuring alignment between vendor capabilities and strategic requirements.
      • IT must serve as a trusted advisor on technical implementation challenges related to CXM, such as data quality, integration, and end-user training and adoption.
      • IT is responsible for technology enablement and is an indispensable partner in this regard; however, the business must ultimately own the objectives and communication strategy for customer engagement.

      Insight 3

      • When crafting a portfolio for CXM, be aware of the art of the possible: capabilities are rapidly merging and evolving to support new interaction channels. Social, mobile, and IoT are disrupting the customer experience landscape.
      • Big data and analytics-driven decision making is another significant area of value. IT must allow for true customer intelligence by providing an integration framework across customer-facing applications.

      Summary of accomplishment

      Knowledge Gained

      • Voice of the Customer for CXM Portfolio Design
      • Understanding of Strategic Requirements for CXM
      • Customer Personas and Scenarios
      • Environmental Scan
      • Deployment Considerations
      • Initiatives Roadmap Considerations

      Processes Optimized

      • CXM Technology Portfolio Design
      • Customer Data Quality Processes
      • CXM Integrations

      Deliverables Completed

      • Strategic Summary for CXM
      • CXM Project Charter
      • Customer Personas
      • External and Competitive Analysis
      • CXM Application Portfolio

      Bibliography

      Accenture Digital. “Growing the Digital Business: Accenture Mobility Research 2015.” Accenture. 2015. Web.

      Afshar, Vala. “50 Important Customer Experience Stats for Business Leaders.” Huffington Post. 15 Oct. 2015. Web.

      APQC. “Marketing and Sales Definitions and Key Measures.” APQC’s Process Classification Framework, Version 1.0.0. APQC. Mar. 2011. Web.

      CX Network. “The Evolution of Customer Experience in 2015.” Customer Experience Network. 2015. Web.

      Genesys. “State of Customer Experience Research”. Genesys. 2018. Web.

      Harvard Business Review and SAS. “Lessons From the Leading Edge of Customer Experience Management.” Harvard Business School Publishing. 2014. Web.

      Help Scout. “75 Customer Service Facts, Quotes & Statistics.” Help Scout. n.d. Web.

      Inmon Consulting Services. “Corporate Information Factory (CIF) Overview.” Corporate Information Factory. n.d. Web

      Jurevicius, Ovidijus. “VRIO Framework.” Strategic Management Insight. 21 Oct. 2013. Web.

      Keenan, Jim, and Barbara Giamanco. “Social Media and Sales Quota.” A Sales Guy Consulting and Social Centered Selling. n.d. Web.

      Malik, Om. “Internet of Things Will Have 24 Billion Devices by 2020.” Gigaom. 13 Oct. 2011. Web.

      McGovern, Michele. “Customers Want More: 5 New Expectations You Must Meet Now.” Customer Experience Insight. 30 July 2015. Web.

      McGinnis, Devon. “40 Customer Service Statistics to Move Your Business Forward.” Salesforce Blog. 1 May 2019. Web.

      Bibliography

      Reichheld, Fred. “Prescription for Cutting Costs”. Bain & Company. n.d. Web.

      Retail Congress Asia Pacific. “SAP – Burberry Makes Shopping Personal.” Retail Congress Asia Pacific. 2017. Web.

      Rouse, Margaret. “Omnichannel Definition.” TechTarget. Feb. 2014. Web.

      Salesforce Research. “Customer Expectations Hit All-Time High.” Salesforce Research. 2018. Web.

      Satell, Greg. “A Look Back at Why Blockbuster Really Failed and Why It Didn’t Have To.” Forbes. 5 Sept. 2014. Web.

      Social Centered Learning. “Social Media and Sales Quota: The Impact of Social Media on Sales Quota and Corporate Review.” Social Centered Learning. n.d. Web.

      Varner, Scott. “Economic Impact of Experience Management”. Qualtrics/Forrester. 16 Aug. 2017. Web.

      Wesson, Matt. “How to Use Your Customer Data Like Amazon.” Salesforce Pardot Blog. 27 Aug. 2012. Web.

      Winterberry Group. “Taking Cues From the Customer: ‘Omnichannel’ and the Drive For Audience Engagement.” Winterberry Group LLC. June 2013. Web.

      Wollan, Robert, and Saideep Raj. “How CIOs Can Support a More Agile Sales Organization.” The Wall Street Journal: The CIO Report. 25 July 2013. Web.

      Zendesk. “The Impact of Customer Service on Customer Lifetime Value 2013.” Z Library. n.d. Web.

      TY Advisory Services

      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      What is our TY advisory service?

      The TY advisory service is tailored to your needs. It combines the best of traditional IT consulting expertise with the analysis and remedial solutions of an expert bureau.

      When you observe specific symptoms, TY analyses the exact areas that contribute to these symptoms.

      TY specializes in IT Operations and goes really deep in that area.  We define IT Operations as the core service you deliver to your clients:

      When you see your operation running smoothly, it looks obvious and simple, but it is not. IT Operations is a concerto, under the leadership of a competent IT Ops Conductor-Manager. IT Ops keeps the lights on and ensures your reputation with your clients and the market as a whole as a predictable and dependable business partner. And we help you achieve this, based on more than 30 years of IT Ops experience.

      As most companies' business services are linked at the hip with IT, your IT Operations, in other words, are your key to a successful business.

      Value Consulting

      That is why we work via a simple value-based proposition. We discuss your wants and together discover your needs. Once we all agree, only then do we make our proposal. Anything you learned on the way, is yours to keep and use. 

      This means a fixed agreement to deliver the value we promise. No time and material, no extensions, no unforeseen charges.

      How can we deliver this?

      Gert has advised clients on what to do before issues happen. We have also worked to bring companies back from the brink after serious events. TY has brought services back after big incidents.

      You need to get it done, not in theory, but via actionable advice and if required, via our actions and implementation prowess. It's really elementary. Anyone can create a spreadsheet with to-do lists and talk about how resilience laws like DORA and NIS2 need to be implemented.

      It's not the talk that counts, it's the walk. Service delivery is in our DNA. Resilience is our life.

      Efficient policies, procedures and guidelines

      Good governance directly ensures happy clients because staff knows what to do when and allows them leeway in improving the service. And this governance will satisfy auditors.

      • Incident management

        Incidents erode client confidence in your service and company. You must get them fixed in accordance with their importance,  

      • Problem management

        You don't want repeat incidents! Tackle the root causes and fix issues permanently. Save money by doing this right. 

      • Change management

        You must update your services to stay the best in your field. Do it in a controlled yet efficient way. Lose overhead where you can, add the right controls where you must.

      • Configuration management

        The base for most of your processes. You gotta know what you have and how it works together to provide the services to your clients.

      • Monitoring

        IT monitoring delivers business value by catching issues before they become problems. With real-time insights into system performance and security, you can minimize downtime, improve efficiency, and make better decisions that keep your operations strong and your customers happy.

      • Service management

        Bring all the IT Operations services together and measure how they perform versus set business relevant KPI's 

      • Disaster Recovery

        Disaster recovery is your company's safety net for getting critical systems and data back up and running after a major disruption, focusing on fast IT recovery and minimizing financial and operational losses, whereas business continuity ensures the entire business keeps functioning during and after the crisis.

      • Business Continuity

        Business continuity is keeping your company running smoothly during disruptions by having the right plans, processes, and backups in place to minimize downtime and protect your operations, customers, and reputation. We go beyond disaster recovery and make sure your critical processes can continue to function. 

      • Exit Plans

        Hope for the best, but plan for the worst. When you embark on a new venture, know how to get out of it. Planning to exit is best done in the very beginning, but better late than when it is too late.

        Get up to speed

      Your biggest asset, the people who execute your business services

      We base our analysis on over 30 years experience in corporate and large volume dynamic services.  Unique to our service is that we take your company culture into account, while we adjust the mindset of the experts working in these areas.

      Your people are what will make these processes work efficiently. We take their ideas, hard capabilities and leadership capabilities into account and improve upon where needed. That helps your company and the people themselves. 

      We look at the existing governance and analyse where they are best in class or how we can make them more efficient. We identify the gaps and propose remedial updates. Our updates are verified through earlier work, vetted by first and second line and sometimes even regulators 

      Next we decide with you on how to implement the updates to the areas that need them. 

      How does the TY advisory service work?

      • 1. Contact TY

        Please schedule your complimentary 30-minute discovery call below.

      • 2. Discovery call

        There is no financial commitment required from you. During this meeting we discus further in detail the issue at hand and the direction of the ideal solution and the way of working.

      • 3. TY consolidates and prepares roadmap

        We take in the information of our talks and prepare the the roadmap to the individualized solution for you.

      • 4. Second meeting to finalize roadmap

        By now, TY has a good idea of how we can help you, and we have prepared a roadmap to solving the issue. In this meeting we present the way forward our way of working and what it will require from you.

        If you decide this is not what you expected, you are free to take the information provided so far and work with it yourself. 

      • 5. We get to work

        After the previous meeting and agreement in principle, you will have by now received our offer.

        When you decide to work together, we start our partnership and solve the issue. We work to ensure you are fully satisfied with the result.

      Let's get started

      Continue reading

      Optimize IT Change Management

      • Buy Link or Shortcode: {j2store}409|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $33,585 Average $ Saved
      • member rating average days saved: 27 Average Days Saved
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • Infrastructure managers and change managers need to re-evaluate their change management processes due to slow change turnaround time, too many unauthorized changes, too many incidents and outages because of poorly managed changes, or difficulty evaluating and prioritizing changes.
      • IT system owners often resist change management because they see it as slow and bureaucratic.
      • Infrastructure changes are often seen as different from application changes, and two (or more) processes may exist.

      Our Advice

      Critical Insight

      • ITIL provides a usable framework for change management, but full process rigor is not appropriate for every change request.
      • You need to design a process that is flexible enough to meet the demand for change, and strict enough to protect the live environment from change-related incidents.
      • A mature change management process will minimize review and approval activity. Counterintuitively, with experience in implementing changes, risk levels decline to a point where most changes are “pre-approved.”

      Impact and Result

      • Create a unified change management process that reduces risk. The process should be balanced in its approach toward deploying changes while also maintaining throughput of innovation and enhancements.
      • Categorize changes based on an industry-standard risk model with objective measures of impact and likelihood.
      • Establish and empower a change manager and change advisory board with the authority to manage, approve, and prioritize changes.
      • Integrate a configuration management database with the change management process to identify dependencies.

      Optimize IT Change Management Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should optimize change management, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Optimize IT Change Management – Phases 1-4

      1. Define change management

      Assess the maturity of your existing change management practice and define the scope of change management for your organization.

      • Change Management Maturity Assessment Tool
      • Change Management Risk Assessment Tool

      2. Establish roles and workflows

      Build your change management team and standardized process workflows for each change type.

      • Change Manager
      • Change Management Process Library – Visio
      • Change Management Process Library – PDF
      • Change Management Standard Operating Procedure

      3. Define the RFC and post-implementation activities

      Bookend your change management practice by standardizing change intake, implementation, and post-implementation activities.

      • Request for Change Form Template
      • Change Management Pre-Implementation Checklist
      • Change Management Post-Implementation Checklist

      4. Measure, manage, and maintain

      Form an implementation plan for the project, including a metrics evaluation, change calendar inputs, communications plan, and roadmap.

      • Change Management Metrics Tool
      • Change Management Communications Plan
      • Change Management Roadmap Tool
      • Optimize IT Change Management Improvement Initiative: Project Summary Template

      [infographic]

      Workshop: Optimize IT Change Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define Change Management

      The Purpose

      Discuss the existing challenges and maturity of your change management practice.

      Build definitions of change categories and the scope of change management.

      Key Benefits Achieved

      Understand the starting point and scope of change management.

      Understand the context of change request versus other requests such as service requests, projects, and operational tasks.

      Activities

      1.1 Outline strengths and challenges

      1.2 Conduct a maturity assessment

      1.3 Build a categorization scheme

      1.4 Build a risk assessment matrix

      Outputs

      Change Management Maturity Assessment Tool

      Change Management Risk Assessment Tool

      2 Establish Roles and Workflows

      The Purpose

      Define roles and responsibilities for the change management team.

      Develop a standardized change management practice for approved changes, including process workflows.

      Key Benefits Achieved

      Built the team to support your new change management practice.

      Develop a formalized and right-sized change management practice for each change category. This will ensure all changes follow the correct process and core activities to confirm changes are completed successfully.

      Activities

      2.1 Define the change manager role

      2.2 Outline the membership and protocol for the Change Advisory Board (CAB)

      2.3 Build workflows for normal, emergency, and pre-approved changes

      Outputs

      Change Manager Job Description

      Change Management Standard Operating Procedure (SOP)

      Change Management Process Library

      3 Define the RFC and Post-Implementation Activities

      The Purpose

      Create a new change intake process, including a new request for change (RFC) form.

      Develop post-implementation review activities to be completed for every IT change.

      Key Benefits Achieved

      Bookend your change management practice by standardizing change intake, implementation, and post-implementation activities.

      Activities

      3.1 Define the RFC template

      3.2 Determine post-implementation activities

      3.3 Build your change calendar protocol

      Outputs

      Request for Change Form Template

      Change Management Post-Implementation Checklist

      Project Summary Template

      4 Measure, Manage, and Maintain

      The Purpose

      Develop a plan and project roadmap for reaching your target for your change management program maturity.

      Develop a communications plan to ensure the successful adoption of the new program.

      Key Benefits Achieved

      A plan and project roadmap for reaching target change management program maturity.

      A communications plan ready for implementation.

      Activities

      4.1 Identify metrics and reports

      4.2 Build a communications plan

      4.3 Build your implementation roadmap

      Outputs

      Change Management Metrics Tool

      Change Management Communications Plan

      Change Management Roadmap Tool

      Further reading

      Optimize IT Change Management

      Right-size IT change management practice to protect the live environment.

      EXECUTIVE BRIEF

      Analyst Perspective

      Balance risk and efficiency to optimize IT change management.

      Change management (change enablement, change control) is a balance of efficiency and risk. That is, pushing changes out in a timely manner while minimizing the risk of deployment. On the one hand, organizations can attempt to avoid all risk and drown the process in rubber stamps, red tape, and bureaucracy. On the other hand, organizations can ignore process and push out changes as quickly as possible, which will likely lead to change related incidents and debilitating outages.

      Right-sizing the process does not mean adopting every recommendation from best-practice frameworks. It means balancing the efficiency of change request fulfillment with minimizing risk to your organization. Furthermore, creating a process that encourages adherence is key to avoid change implementers from skirting your process altogether.

      Benedict Chang, Research Analyst, Infrastructure and Operations, Info-Tech Research Group

      Executive Summary

      Your Challenge

      Infrastructure and application change occurs constantly and is driven by changing business needs, requests for new functionality, operational releases and patches, and resolution of incidents or problems detected by the service desk.

      IT managers need to follow a standard change management process to ensure that rogue changes are never deployed while the organization remains responsive to demand.

      Common Obstacles

      IT system owners often resist change management because they see it as slow and bureaucratic.

      At the same time, an increasingly interlinked technical environment may cause issues to appear in unexpected places. Configuration management systems are often not kept up-to-date and do not catch the potential linkages.

      Infrastructure changes are often seen as “different” from application changes and two (or more) processes may exist.

      Info-Tech’s Approach

      Info-Tech’s approach will help you:

      • Create a unified change management practice that balances risk and throughput of innovation.
      • Categorize changes based on an industry-standard risk model with objective measures of impact and likelihood.
      • Establish and empower a Change Manager and Change Advisory Board (CAB) with the authority to manage, approve, and prioritize changes.

      Balance Risk and Efficiency to Optimize IT Change Management

      Two goals of change management are to protect the live environment and deploying changes in a timely manner. These two may seem to sometimes be at odds against each other, but assessing risk at multiple points of a change’s lifecycle can help you achieve both.

      Your challenge

      This research is designed to help organizations who need to:

      • Build a right-sized change management practice that encourages adherence and balances efficiency and risk.
      • Integrate the change management practice with project management, service desk processes, configuration management, and other areas of IT and the business.
      • Communicate the benefits and impact of change management to all the stakeholders affected by the process.

      Change management is heavily reliant on organizational culture

      Having a right-sized process is not enough. You need to build and communicate the process to gather adherence. The process is useless if stakeholders are not aware of it or do not follow it.

      Increase the Effectiveness of Change Management in Your Organization

      The image is a bar graph, with the segments labelled 1 and 2. The y-axis lists numbers 1-10. Segment 1 is at 6.2, and segment 2 is at 8.6.

      Of the eight infrastructure & operations processes measured in Info-Tech’s IT Management and Governance Diagnostic (MGD) program, change management has the second largest gap between importance and effectiveness of these processes.

      Source: Info-Tech 2020; n=5,108 IT professionals from 620 organizations

      Common obstacles

      These barriers make this challenge difficult to address for many organizations:

      • Gaining buy-in can be a challenge no matter how well the process is built.
      • The complexity of the IT environment and culture of tacit knowledge for configuration makes it difficult to assess cross-dependencies of changes.
      • Each silo or department may have their own change management workflows that they follow internally. This can make it difficult to create a unified process that works well for everyone.

      “Why should I fill out an RFC when it only takes five minutes to push through my change?”

      “We’ve been doing this for years. Why do we need more bureaucracy?”

      “We don’t need change management if we’re Agile.”

      “We don’t have the right tools to even start change management.”

      “Why do I have to attend a CAB meeting when I don’t care what other departments are doing?”

      Info-Tech’s approach

      Build change management by implementing assessments and stage gates around appropriate levels of the change lifecycle.

      The image is a circle, comprised of arrows, with each arrow pointing to the next, forming a cycle. Each arrow is labelled, as follows: Improve; Request; Assess; Plan; Approve; Implement

      The Info-Tech difference:

      1. Create a unified change management process that balances risk and throughput of innovation.
      2. Categorize changes based on an industry-standard risk model with objective measures of impact and likelihood.
      3. Establish and empower a Change Manager and Change Advisory Board (CAB) with the authority to manage, approve, and prioritize changes.

      IT change is constant and is driven by:

      Change Management:

      1. Operations - Operational releases, maintenance, vendor-driven updates, and security updates can all be key drivers of change. Example: ITSM version update
        • Major Release
        • Maintenance Release
        • Security Patch
      2. Business - Business-driven changes may include requests from other business departments that require IT’s support. Examples: New ERP or HRIS implementation
        • New Application
        • New Version
      3. Service desk → Incident & Problem - Some incident and problem tickets require a change to facilitate resolution of the incident. Examples: Outage necessitating update of an app (emergency change), a user request for new functionality to be added to an existing app
        • Workaround
        • Fix
      4. Configuration Management Database (CMDB) ↔ Asset Management - In addition to software and hardware asset dependencies, a configuration management database (CMDB) is used to keep a record of changes and is queried to assess change requests.
        • Hardware
        • Software

      Insight summary

      “The scope of change management is defined by each organization…the purpose of change management is to maximize the number of successful service and product changes by ensuring that the risk have been properly assessed, authorizing changes to process, and managing the change schedule.” – ALEXOS Limited, ITIL 4

      Build a unified change management process balancing risk and change throughput.

      Building a unified process that oversees all changes to the technical environment doesn’t have to be burdensome to be effective. However, the process is a necessary starting point to identifying cross dependencies and avoiding change collisions and change-related incidents.

      Use an objective framework for estimating risk

      Simply asking, “What is the risk?” will result in subjective responses that will likely minimize the perceived risk. The level of due diligence should align to the criticality of the systems or departments potentially impacted by the proposed changes.

      Integrate your change process with your IT service management system

      Change management in isolation will provide some stability, but maturing the process through service integrations will enable data-driven decisions, decrease bureaucracy, and enable faster and more stable throughput.

      Change management and DevOps can work together effectively

      Change and DevOps tend to be at odds, but the framework does not have to change. Lower risk changes in DevOps are prime candidates for the pre-approved category. Much of the responsibility traditionally assigned to the CAB can be diffused throughout the software development lifecycle.

      Change management and DevOps can coexist

      Shift the responsibility and rigor to earlier in the process.

      • If you are implementing change management in a DevOps environment, ensure you have a strong DevOps lifecycle. You may wish to refer to Info-Tech’s research Implementing DevOps Practices That Work.
      • Consider starting in this blueprint by visiting Appendix II to frame your approach to change management. Follow the blueprint while paying attention to the DevOps Callouts.

      DEVOPS CALLOUTS

      Look for these DevOps callouts throughout this storyboard to guide you along the implementation.

      The image is a horizontal figure eight, with 7 arrows, each pointing into the next. They are labelled are follows: Plan; Create; Verify; Package; Release; Configure; Monitor. At the centre of the circles are the words Dev and Ops.

      Successful change management will provide benefits to both the business and IT

      Respond to business requests faster while reducing the number of change-related disruptions.

      IT Benefits

      • Fewer change-related incidents and outages
      • Faster change turnaround time
      • Higher rate of change success
      • Less change rework
      • Fewer service desk calls related to poorly communicated changes

      Business Benefits

      • Fewer service disruptions
      • Faster response to requests for new and enhanced functionalities
      • Higher rate of benefits realization when changes are implemented
      • Lower cost per change
      • Fewer “surprise” changes disrupting productivity

      IT satisfaction with change management will drive business satisfaction with IT. Once the process is working efficiently, staff will be more motivated to adhere to the process, reducing the number of unauthorized changes. As fewer changes bypass proper evaluation and testing, service disruptions will decrease and business satisfaction will increase.

      Change management improves core benefits to the business: the four Cs

      Most organizations have at least some form of change control in place, but formalizing change management leads to the four Cs of business benefits:

      Control

      Change management brings daily control over the IT environment, allowing you to review every relatively new change, eliminate changes that would have likely failed, and review all changes to improve the IT environment.

      Collaboration

      Change management planning brings increased communication and collaboration across groups by coordinating changes with business activities. The CAB brings a more formalized and centralized communication method for IT.

      Consistency

      Request for change templates and a structured process result in implementation, test, and backout plans being more consistent. Implementing processes for pre-approved changes also ensures these frequent changes are executed consistently and efficiently.

      Confidence

      Change management processes will give your organization more confidence through more accurate planning, improved execution of changes, less failure, and more control over the IT environment. This also leads to greater protection against audits.

      You likely need to improve change management more than any other infrastructure & operations process

      The image shows a vertical bar graph. Each segment of the graph is labelled for an infrastructure/operations process. Each segment has two bars one for effectiveness, and another for importance. The first segment, Change Management, is highlighted, with its Effectiveness at a 6.2 and Importance at 8.6

      Source: Info-Tech 2020; n=5,108 IT Professionals from 620 organizations

      Of the eight infrastructure and operations processes measured in Info-Tech’s IT Management and Governance Diagnostic (MGD) program, change management consistently has the second largest gap between importance and effectiveness of these processes.

      Executives and directors recognize the importance of change management but feel theirs is currently ineffective

      Info-Tech’s IT Management and Governance Diagnostic (MGD) program assesses the importance and effectiveness of core IT processes. Since its inception, the MGD has consistently identified change management as an area for immediate improvement.

      The image is a vertical bar graph, with four segments, each having 2 bars, one for Effectiveness and the other for Importance. The four segments are (with Effectiveness and Importance ratings in brackets, respectively): Frontline (6.5/8.6); Manager (6.6/8.9); Director (6.4/8.8); and Executive (6.1/8.8)

      Source: Info-Tech 2020; n=5,108 IT Professionals from 620 organizations

      Importance Scores

      No importance: 1.0-6.9

      Limited importance: 7.0-7.9

      Significant importance: 8.0-8.9

      Critical importance: 9.0-10.0

      Effectiveness Scores

      Not in place: n/a

      Not effective: 0.0-4.9

      Somewhat Ineffective: 5.0-5.9

      Somewhat effective: 6.0-6.9

      Very effective: 7.0-10.0

      There are several common misconceptions about change management

      Which of these have you heard in your organization?

       Reality
      “It’s just a small change; this will only take five minutes to do.” Even a small change can cause a business outage. That small fix could impact a large system connected to the one being fixed.
      “Ad hoc is faster; too many processes slow things down.” Ad hoc might be faster in some cases, but it carries far greater risk. Following defined processes keeps systems stable and risk-averse.
      “Change management is all about speed.” Change management is about managing risk. It gives the illusion of speed by reducing downtime and unplanned work.
      “Change management will limit our capacity to change.” Change management allows for a better alignment of process (release management) with governance (change management).

      Overcome perceived challenges to implementing change management to reap measurable reward

      Before: Informal Change Management

      Change Approval:

      • Changes do not pass through a formal review process before implementation.
      • 10% of released changes are approved.
      • Implementation challenge: Staff will resist having to submit formal change requests and assessments, frustrated at the prospect of having to wait longer to have changes approved.

      Change Prioritization

      • Changes are not prioritized according to urgency, risk, and impact.
      • 60% of changes are urgent.
      • Implementation challenge: Influential stakeholders accustomed to having changes approved and deployed might resist having to submit changes to a standard cost-benefit analysis.

      Change Deployment

      • Changes often negatively impact user productivity.
      • 25% of changes are realized as planned.
      • Implementation challenge: Engaging the business so that formal change freeze periods and regular maintenance windows can be established.

      After: Right-Sized Change Management

      Change Approval

      • All changes pass through a formal review process. Once a change is repeatable and well-tested, it can be pre-approved to save time. Almost no unauthorized changes are deployed.
      • 95% of changes are approved.
      • KPI: Decrease in change-related incidents

      Change Prioritization

      • The CAB prioritizes changes so that the business is satisfied with the speed of change deployment.
      • 35% of changes are urgent.
      • KPI: Decrease in change turnaround time.

      Change deployment

      • Users are always aware of impending changes and changes don’t interrupt critical business activities.
      • Over 80% of changes are realized as planned
      • KPI: Decrease in the number of failed deployments.

      Info-Tech’s methodology for change management optimization focuses on building standardized processes

       1. Define Change Management2. Establish Roles and Workflows3. Define the RFC and Post-Implementation Activities4. Measure, Manage, and Maintain
      Phase Steps

      1.1 Assess Maturity

      1.2 Categorize Changes and Build Your Risk Assessment

      2.1 Determine Roles and Responsibilities

      2.2 Build Core Workflows

      3.1 Design the RFC

      3.2 Establish Post-Implementation Activities

      4.1 Identify Metrics and Build the Change Calendar

      4.2 Implement the Project

        Change Management Standard Operating Procedure (SOP) Change Management Project Summary Template
      Phase Deliverables
      • Change Management Maturity Assessment Tool
      • Change Management Risk Assessment Tool
      • Change Manager Job Description
      • Change Management Process Library
      • Request for Change (RFC) Form Template
      • Change Management Pre-Implementation Checklist
      • Change Management Post-Implementation Checklist
      • Change Management Metrics Tool
      • Change Management
      • Communications Plan
      • Change Management Roadmap Tool

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Change Management Process Library

      Document your normal, pre-approved, and emergency change lifecycles with the core process workflows .

      Change Management Risk Assessment Tool

      Test Drive your impact and likelihood assessment questionnaires with the Change Management Risk Assessment Tool.

      Project Summary Template

      Summarize your efforts in the Optimize IT Change Management Improvement Initiative: Project Summary Template.

      Change Management Roadmap Tool

      Record your action items and roadmap your steps to a mature change management process.

      Key Deliverable:

      Change Management SOP

      Document and formalize your process starting with the change management standard operating procedure (SOP).

      These case studies illustrate the value of various phases of this project

      Define Change Management

      Establish Roles and Workflows

      Define RFC and Post-Implementation Activities

      Measure, Manage, and Maintain

      A major technology company implemented change management to improve productivity by 40%. This case study illustrates the full scope of the project.

      A large technology firm experienced a critical outage due to poor change management practices. This case study illustrates the scope of change management definition and strategy.

      Ignorance of change management process led to a technology giant experiencing a critical cloud outage. This case study illustrates the scope of the process phase.

      A manufacturing company created a makeshift CMDB in the absence of a CMDB to implement change management. This case study illustrates the scope of change intake.

      A financial institution tracked and recorded metrics to aid in the success of their change management program. This case study illustrates the scope of the implementation phase.

      Working through this project with Info-Tech can save you time and money

      Engaging in a Guided Implementation doesn’t just offer valuable project advice, it also results in significant cost savings.

      Guided ImplementationMeasured Vale
      Phase 1: Define Change Management
      • We estimate Phase 1 activities will take 2 FTEs 10 days to complete on their own, but the time saved by using Info-Tech’s methodology will cut that time in half, thereby saving $3,100 (2 FTEs * 5 days * $80,000/year).

      Phase 2: Establish Roles and Workflows

      • We estimate Phase 2 will take 2 FTEs 10 days to complete on their own, but the time saved by using Info-Tech’s methodology will cut that time in half, thereby saving $3,100 (2 FTEs * 5 days * $80,000/year).
      Phase 3: Define the RFC and Post-Implementation Activities
      • We estimate Phase 3 will take 2 FTEs 10 days to complete on their own, but the time saved by using Info-Tech’s methodology will cut that time in half, thereby saving $3,100 (2 FTEs * 5 days * $80,000/year).

      Phase 4: Measure, Manage, and Maintain

      • We estimate Phase 4 will take 2 FTEs 5 days to complete on their own, but the time saved by using Info-Tech’s methodology will cut that time in half, thereby saving $1,500 (2 FTEs * 2.5 days * $80,000/year).
      Total Savings $10,800

      Case Study

      Industry: Technology

      Source: Daniel Grove, Intel

      Intel implemented a robust change management program and experienced a 40% improvement in change efficiency.

      Founded in 1968, the world’s largest microchip and semiconductor company employs over 100,000 people. Intel manufactures processors for major players in the PC market including Apple, Lenovo, HP, and Dell.

      ITIL Change Management Implementation

      With close to 4,000 changes occurring each week, managing Intel’s environment is a formidable task. Before implementing change management within the organization, over 35% of all unscheduled downtime was due to errors resulting from change and release management. Processes were ad hoc or scattered across the organization and no standards were in place.

      Results

      After a robust implementation of change management, Intel experienced a number of improvements including automated approvals, the implementation of a formal change calendar, and an automated RFC form. As a result, Intel improved change productivity by 40% within the first year of the program’s implementation.

      Define Change Management

      Establish Roles and Workflows

      Define RFC and Post-Implementation Activities

      Measure, Manage, and Maintain

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      A Guided Implementation (GI) is series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

      Define Change Management

      • Call #1: Introduce change concepts.
      • Call #2: Assess current maturity.
      • Call #3: Identify target-state capabilities.

      Establish Roles and Workflows

      • Call #4: Review roles and responsibilities.
      • Call #5: Review core change processes.

      Define RFC and Post- Implementation Activities

      • Call #6: Define change intake process.
      • Call #7: Create pre-implementation and post-implementation checklists.

      Measure, Manage, and Maintain

      • Call #8: Review metrics.
      • Call #9: Create roadmap.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

       Day 1Day 2Day 3Day 4Day 5
      Activities

      Define Change Management

      1.1 Outline Strengths and Challenges

      1.2 Conduct a Maturity Assessment

      1.3 Build a Change Categorization Scheme

      1.4 Build Your Risk Assessment

      Establish Roles and Workflows

      2.1 Define the Change Manager Role

      2.2 Outline CAB Protocol and membership

      2.3 Build Normal Change Process

      2.4 Build Emergency Change Process

      2.5 Build Pre-Approved Change Process

      Define the RFC and Post-Implementation Activities

      3.1 Create an RFC Template

      3.2 Determine Post-Implementation Activities

      3.3 Build a Change Calendar Protocol

      Measure, Manage, and Maintain

      4.1 Identify Metrics and Reports

      4.2 Create Communications Plan

      4.3 Build an Implementation Roadmap

      Next Steps and Wrap-Up (offsite)

      5.1 Complete in-progress deliverables from previous four days

      5.2 Set up review time for workshop deliverables and to discuss next steps

      Deliverables
      1. Maturity Assessment
      2. Risk Assessment
      1. Change Manager Job Description
      2. Change Management Process Library
      1. Request for Change (RFC) Form Template
      2. Pre-Implementation Checklist
      3. Post-Implementation Checklist
      1. Metrics Tool
      2. Communications Plan
      3. Project Roadmap
      1. Change Management Standard Operating Procedure (SOP)
      2. Workshop Summary Deck

      Phase 1

      Define Change Management

      Define Change Management

      1.1 Assess Maturity

      1.2 Categorize Changes and Build Your Risk Assessment

      Establish Roles and Workflows

      2.1 Determine Roles and Responsibilities

      2.2 Build Core Workflows

      Define the RFC and Post-Implementation Activities

      3.1 Design the RFC

      3.2 Establish Post-Implementation Activities

      Measure, Manage, and Maintain

      4.1 Identify Metrics and Build the Change Calendar

      4.2 Implement the Project

      This phase will guide you through the following steps:

      • Assess Maturity
      • Categorize Changes and Build Your Risk Assessment

      This phase involves the following participants:

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board

      Step 1.1

      Assess Maturity

      Activities

      1.1.1 Outline the Organization’s Strengths and Challenges

      1.1.2 Complete a Maturity Assessment

      This step involves the following participants:

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board

      Outcomes of this step

      • An understanding of maturity change management processes and frameworks
      • Identification of existing change management challenges and potential causes
      • A framework for assessing change management maturity and an assessment of your existing change management processes

      Define Change Management

      Step 1.1: Assess Maturity → Step 1.2: Categorize Changes and Build Your Risk Assessment

      Change management is often confused with release management, but they are distinct processes

      Change

      • Change management looks at software changes as well as hardware, database, integration, and network changes, with the focus on stability of the entire IT ecosystem for business continuity.
      • Change management provides a holistic view of the IT environment, including dependencies, to ensure nothing is negatively affected by changes.
      • Change documentation is more focused on process, ensuring dependencies are mapped, rollout plans exist, and the business is not at risk.

      Release

      • Release and deployment are the detailed plans that bundle patches, upgrades, and new features into deployment packages, with the intent to change them flawlessly into a production environment.
      • Release management is one of many actions performed under change management’s governance.
      • Release documentation includes technical specifications such as change schedule, package details, change checklist, configuration details, test plan, and rollout and rollback plans.

      Info-Tech Insight

      Ensure the Release Manager is present as part of your CAB. They can explain any change content or dependencies, communicate business approval, and advise the service desk of any defects.

      Integrate change management with other IT processes

      As seen in the context diagram, change management interacts closely with many other IT processes including release management and configuration management (seen below). Ensure you delineate when these interactions occur (e.g. RFC updates and CMDB queries) and which process owns each task.

      The image is a chart mapping the interactions between Change Management and Configuration Management (CMDB).

      Avoid the challenges of poor change management

      1. Deployments
        • Too frequent: The need for frequent deployments results in reduced availability of critical business applications.
        • Failed deployments or rework is required: Deployments are not successful and have to be backed out of and then reworked to resolve issues with the installation.
        • High manual effort: A lack of automation results in high resource costs for deployments. Human error is likely, which adds to the risk of a failed deployment.
      2. Incidents
        • Too many unauthorized changes: If the process is perceived as cumbersome and ineffective, people will bypass it or abuse the emergency designation to get their changes deployed faster.
        • Changes cause incidents: When new releases are deployed, they create problems with related systems or applications.
      3. End Users
        • Low user satisfaction: Poor communication and training result in surprised and unhappy users and support staff.

      “With no controls in place, IT gets the blame for embarrassing outages. Too much control, and IT is seen as a roadblock to innovation.” – Anonymous, VP IT of a federal credit union

      1.1.1 Outline the Organization’s Strengths and Challenges

      Input

      • Current change documentation (workflows, SOP, change policy, etc.)
      • Organizational chart(s)

      Output

      • List of strengths and challenges for change management

      Materials

      Participants

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board
      1. As group, discuss and outline the change management challenges facing the organization. These may be challenges caused by poor change management processes or by a lack of process.
      2. Use the pain points found on the previous slide to help guide the discussion.
      3. As a group, also outline the strengths of change management and the strengths of the current organization. Use these strengths as a guide to know what practices to continue and what strengths you can leverage to improve the change management process.
      4. Record the activity results in the Project Summary Template.

      Download the Optimize IT Change Management Improvement Initiative: Project Summary Template

      Assess current change management maturity to create a plan for improvement

       ChaosReactiveControlled

      Proactive

      Optimized
      Change Requests No defined processes for submitting changes Low process adherence and no RFC form RFC form is centralized and a point of contact for changes exists RFCs are reviewed for scope and completion RFCs trend analysis and proactive change exists
      Change Review Little to no change risk assessment Risk assessment exists for each RFC RFC form is centralized and a point of contact for changes exists Change calendar exists and is maintained System and component dependencies exist (CMDB)
      Change Approval No formal approval process exists Approval process exists but is not widely followed Unauthorized changes are minimal or nonexistent Change advisory board (CAB) is established and formalized Trend analysis exists increasing pre-approved changes
      Post-Deployment No post-deployment change review exists Process exists but is not widely followed Reduction of change-related incidents Stakeholder satisfaction is gathered and reviewed Lessons learned are propagated and actioned
      Process Governance Roles & responsibilities are ad hoc Roles, policies & procedures are defined & documented Roles, policies & procedures are defined & documented KPIs are tracked, reported on, and reviewed KPIs are proactively managed for improvement

      Info-Tech Insight

      Reaching an optimized level is not feasible for every organization. You may be able to run a very good change management process at the Proactive or even Controlled stage. Pay special attention to keeping your goals attainable.

      1.1.2 Complete a Maturity Assessment

      Input

      • Current change documentation (workflows, SOP, change policy, etc.)

      Output

      • Assessment of current maturity level and goals to improve change management

      Materials

      Participants

      • Change Manager
      • Service Desk Manager
      • Operations (optional)
      1. Use Info-Tech’s Change Management Maturity Assessment Tool to assess the maturity and completeness of your change process.
      2. Significant gaps revealed in this assessment should be the focal points of your discussion when investigating root causes and brainstorming remediation activities:
        1. For each activity of each process area of change management, determine the degree of completeness of your current process.
        2. Review your maturity assessment results and discuss as a group potential reasons why you arrived at your maturity level. Identify areas where you should focus your initial attention for improvement.
        3. Regularly review the maturity of your change management practices by completing this maturity assessment tool periodically to identify other areas to optimize.

      Download the Change Management Maturity Assessment Tool

      Case Study

      Even Google isn’t immune to change-related outages. Plan ahead and communicate to help avoid change-related incidents

      Industry: Technology

      Source: The Register

      As part of a routine maintenance procedure, Google engineers moved App Engine applications between data centers in the Central US to balance out traffic.

      Unfortunately, at the same time that applications were being rerouted, a software update was in progress on the traffic routers, which triggered a restart. This temporarily diminished router capacity, knocking out a sizeable portion of Google Cloud.

      The server drain resulted in a huge spike in startup requests, and the routers simply couldn’t handle the traffic.

      As a result, 21% of Google App Engine applications hosted in the Central US experienced error rates in excess of 10%, while an additional 16% of applications experienced latency, albeit at a lower rate.

      Solution

      Thankfully, engineers were actively monitoring the implementation of the change and were able to spring into action to halt the problem.

      The change was rolled back after 11 minutes, but the configuration error still needed to be fixed. After about two hours, the change failure was resolved and the Google Cloud was fully functional.

      One takeaway for the engineering team was to closely monitor how changes are scheduled. Ultimately, this was the result of miscommunication and a lack of transparency between change teams.

      Step 1.2

      Categorize Changes and Build Your Risk Assessment

      Activities

      1.2.1 Define What Constitutes a Change

      1.2.2 Build a Change Categorization Scheme

      1.2.3 Build a Classification Scheme to Assess Impact

      1.2.4 Build a Classification Scheme to Define Likelihood

      1.2.5 Evaluate and Adjust Your Risk Assessment Scheme

      Define Change Management

      Step 1.1: Assess Maturity → Step 1.2: Categorize Changes and Build Your Risk Assessment

      This step involves the following participants:

      • Infrastructure/Applications Manager
      • Change Manager
      • Members of the Change Advisory Board

      Outcomes of this step

      • A clear definition of what constitutes a change in your organization
      • A defined categorization scheme to classify types of changes
      • A risk assessment matrix and tool for evaluating and prioritizing change requests according to impact and likelihood of risk

      Change must be managed to mitigate risk to the infrastructure

      Change management is the gatekeeper protecting your live environment.

      Successfully managed changes will optimize risk exposure, severity of impact, and disruption. This will result in the bottom-line business benefits of removal of risk, early realization of benefits, and savings of money and time.

      • IT change is constant; change requests will be made both proactively and reactively to upgrade systems, acquire new functionality, and to prevent or resolve incidents.
      • Every change to the infrastructure must pass through the change management process before being deployed to ensure that it has been properly assessed and tested, and to check that a backout /rollback plan is in place.
      • It will be less expensive to invest in a rigorous change management process than to resolve incidents, service disruptions, and outages caused by the deployment of a bad change.
      • Change management is what gives you control and visibility regarding what is introduced to the live environment, preventing incidents that threaten business continuity.

      80%

      In organizations without formal change management processes, about 80% (The Visible Ops Handbook) of IT service outage problems are caused by updates and changes to systems, applications, and infrastructure. It’s crucial to track and systematically manage change to fully understand and predict the risks and potential impact of the change.

      Attributes of a change

      Differentiate changes from other IT requests

      Is this in the production environment of a business process?

      The core business of the enterprise or supporting functions may be affected.

      Does the task affect an enterprise managed system?

      If it’s for a local application, it’s a service request

      How many users are impacted?

      It should usually impact more than a single user (in most cases).

      Is there a configuration, or code, or workflow, or UI/UX change?

      Any impact on a business process is a change; adding a user or a recipient to a report or mailing list is not a change.

      Does the underlying service currently exist?

      If it’s a new service, then it’s better described as a project.

      Is this done/requested by IT?

      It needs to be within the scope of IT for the change management process to apply.

      Will this take longer than one week?

      As a general rule, if it takes longer than 40 hours of work to complete, it’s likely a project.

      Defining what constitutes a change

      Every change request will initiate the change management process; don’t waste time reviewing requests that are out of scope.

      ChangeService Request (User)Operational Task (Backend)
      • Fixing defects in code
      • Changing configuration of an enterprise system
      • Adding new software or hardware components
      • Switching an application to another VM
      • Standardized request
      • New PC
      • Permissions request
      • Change password
      • Add user
      • Purchases
      • Change the backup tape
      • Delete temporary files
      • Maintain database (one that is well defined, repeatable, and predictable)
      • Run utilities to repair a database

      Do not treat every IT request as a change!

      • Many organizations make the mistake of calling a standard service request or operational task a “change.”
      • Every change request will initiate the change management process; don’t waste time reviewing requests that are out of scope.
      • While the overuse of RFCs for out-of-scope requests is better than a lack of process, this will slow the process and delay the approval of more critical changes.
      • Requiring an RFC for something that should be considered day-to-day work will also discourage people from adhering to the process, because the RFC will be seen as meaningless paperwork.

       

      1.2.1 Define What Constitutes a Change

      Input

      • List of examples of each category of the chart

      Output

      • Definitions for each category to be used at change intake

      Materials

      • Whiteboard/flip charts (or shared screen if working remotely)
      • Service catalog (if applicable)
      • Sticky notes
      • Markers/pens
      • Change Management SOP

      Participants

      • Infrastructure Manager
      • Change Manager
      • Members of the Change Advisory Board
      1. As a group, brainstorm examples of changes, projects, service requests (user), operational tasks (backend), and releases. You may add additional categories as needed (e.g. incidents).
      2. Have each participant write the examples on sticky notes and populate the following chart on the whiteboard/flip chart.
      3. Use the examples to draw lines and define what defines each category.
        • What makes a change distinct from a project?
        • What makes a change distinct from a service request?
        • What makes a change distinct from an operational task?
        • When do the category workflows cross over with other categories? (For example, when does a project interact with change management?)
      4. Record the definitions of requests and results in section 2.3 of the Change Management Standard Operating Procedure (SOP).
      ChangeProjectService Request (User)Operational Task (Backend)Release
      Changing Configuration ERP upgrade Add new user Delete temp files Software release

      Download the Change Management Standard Operating Procedure (SOP).

      Each RFC should define resources needed to effect the change

      In addition to assigning a category to each RFC based on risk assessment, each RFC should also be assigned a priority based on the impact of the change on the IT organization, in terms of the resources needed to effect the change.

      Categories include

      Normal

      Emergency

      Pre-Approved

      The majority of changes will be pre-approved or normal changes. Definitions of each category are provided on the next slide.

      Info-Tech uses the term pre-approved rather than the ITIL terminology of standard to more accurately define the type of change represented by this category.

      A potential fourth change category of expedited may be employed if you are having issues with process adherence or if you experience changes driven from outside change management’s control (e.g. from the CIO, director, judiciary, etc.) See Appendix I for more details.

      Info-Tech Best Practice

      Do not rush to designate changes as pre-approved. You may have a good idea of which changes may be considered pre-approved, but make sure they are in fact low-risk and well-documented before moving them over from the normal category.

      The category of the change determines the process it follows

       Pre-ApprovedNormalEmergency
      Definition
      • Tasks are well-known, documented, and proven
      • Budgetary approval is preordained or within control of change requester
      • Risk is low and understood
      • There’s a low probability of failure
      • All changes that are not pre-approved or emergency will be classified as normal
      • Further categorized by priority/risk
      • The change is being requested to resolve a current or imminent critical/severity-1 incident that threatens business continuity
      • Associated with a critical incident or problem ticket
      Trigger
      • The same change is built and changed repeatedly using the same install procedures and resulting in the same low-risk outcome
      • Upgrade or new functionality that will capture a business benefit
      • A fix to a current problem
      • A current or imminent critical incident that will impact business continuity
      • Urgency to implement the change must be established, as well as lack of any alternative or workaround
      Workflow
      • Pre-established
      • Repeatable with same sequence of actions, with minimal judgment or decision points
      • Dependent on the change
      • Different workflows depending on prioritization
      • Dependent on the change
      Approval
      • Change Manager (does not need to be reviewed by CAB)
      • CAB
      • Approval from the Emergency Change Advisory Board (E-CAB) is sufficient to proceed with the change
      • A retroactive RFC must be created and approved by the CAB

      Pay close attention to defining your pre-approved changes. They are going to be critical for running a smooth change management practice in a DevOps Environment

      1.2.2 Build a Change Categorization Scheme

      Input

      • List of examples of each change category

      Output

      • Definitions for each change category

      Materials

      • Whiteboard/flip charts (or shared screen if working remotely)
      • Service catalog (if applicable)
      • Sticky notes
      • Markers
      • Change Management SOP

      Participants

      • Infrastructure Manager
      • Change Manager
      • Members of the Change Advisory Board
      1. Discuss the change categories on the previous slide and modify the types of descriptions to suit your organization.
      2. Once the change categories or types are defined, identify several examples of change requests that would fall under each category.
      3. Types of normal changes will be further defined in the next activity and can be left blank for now.
      4. Examples are provided below. Capture your definitions in section 4 of your Change Management SOP.
      Pre-Approved (AKA Standard)NormalEmergency
      • Microsoft patch management/deployment
      • Windows update
      • Minor form changes
      • Service pack updates on non-critical systems
      • Advance label status on orders
      • Change log retention period/storage
      • Change backup frequency

      Major

      • Active directory server upgrade
      • New ERP

      Medium

      • Network upgrade
      • High availability implementation

      Minor

      • Ticket system go-live
      • UPS replacement
      • Cognos update
      • Any change other than a pre-approved change
      • Needed to resolve a major outage in a Tier 1 system

      Assess the risk for each normal change based on impact (severity) and likelihood (probability)

      Create a change assessment risk matrix to standardize risk assessment for new changes. Formalizing this assessment should be one of the first priorities of change management.

      The following slides guide you through the steps of formalizing a risk assessment according to impact and likelihood:

      1. Define a risk matrix: Risk matrices can either be a 3x3 matrix (Minor, Medium, or High Risk as shown on the next slide) or a 4x4 matrix (Minor, Medium, High, or Critical Risk).
      2. Build an impact assessment: Enable consistent measurement of impact for each change by incorporating a standardized questionnaire for each RFC.
      3. Build a likelihood assessment: Enable the consistent measurement of impact for each change by incorporating a standardized questionnaire for each RFC.
      4. Test drive your risk assessment and make necessary adjustments: Measure your newly formed risk assessment questionnaires against historical changes to test its accuracy.

      Consider risk

      1. Risk should be the primary consideration in classifying a normal change as Low, Medium, High. The extent of governance required, as well as minimum timeline to implement the change, will follow from the risk assessment.
      2. The business benefit often matches the impact level of the risk – a change that will provide a significant benefit to a large number of users may likely carry an equally major downside if deviations occur.

      Info-Tech Insight

      All changes entail an additional level of risk. Risk is a function of impact and likelihood. Risk may be reduced, accepted, or neutralized through following best practices around training, testing, backout planning, redundancy, timing and sequencing of changes, etc.

      Create a risk matrix to assign a risk rating to each RFC

      Every normal RFC should be assigned a risk rating.

      How is risk rating determined?

      • Priority should be based on the business consequences of implementing or denying the change.
      • Risk rating is assigned using the impact of the risk and likelihood/probability that the event may occur.

      Who determines priority?

      • Priority should be decided with the change requester and with the CAB, if necessary.
      • Don’t let the change requester decide priority alone, as they will usually assign it a higher priority than is justified. Use a repeatable, standardized framework to assess each request.

      How is risk rating used?

      • Risk rating is used to determine which changes should be discussed and assessed first.
      • Time frames and escalation processes should be defined for each risk level.

      RFCs need to clearly identify the risk level of the proposed change. This can be done through statement of impact and likelihood (low/medium/high) or through pertinent questions linked with business rules to assess the risk.

      Risk always has a negative impact, but the size of the impact can vary considerably in terms of cost, number of people or sites affected, and severity of the impact. Impact questions tend to be more objective and quantifiable than likelihood questions.

      Risk Matrix

      Risk Matrix. Impact vs. Likelihood. Low impact, Low Likelihood and Medium Impact, Medium Likelihood are minor risks. High Likelihood, Low Impact; Medium Likelihood, Medium Impact; and Low Likelihood, High Impact are Medium Risk. High Impact, High Likelihood; High Impact, Medium Likelihood; and Medium Impact, High Likelihood are Major risk.

      1.2.3 Build a Classification Scheme to Assess Impact

      Input

      • Current risk assessment (if available)

      Output

      • Tailored impact assessment

      Materials

      Participants

      • CIO
      • Infrastructure Manager
      • Change Manager
      • Members of the Change Advisory Board
      1. Define a set of questions to measure risk impact.
      2. For each question, assign a weight that should be placed on that factor.
      3. Define criteria for each question that would categorize the risk as high, medium, or low.
      4. Capture your results in section 4.3.1 of your Change Management SOP.
      Impact
      Weight Question High Medium Low
      15% # of people affected 36+ 11-35 <10
      20% # of sites affected 4+ 2-3 1
      15% Duration of recovery (minutes of business time) 180+ 30-18 <3
      20% Systems affected Mission critical Important Informational
      30% External customer impact Loss of customer Service interruption None

      1.2.4 Build a Classification Scheme to Define Likelihood

      Input

      • Current risk assessment (if available)

      Output

      • Tailored likelihood assessment

      Materials

      Participants

      • CIO
      • Infrastructure Manager
      • Change Manager
      • Members of the Change Advisory Board
      1. Define a set of questions to measure risk likelihood.
      2. For each question, assign a weight that should be placed on that factor.
      3. Define criteria for each question that would categorize the risk as high, medium, or low.
      4. Capture your results in section 4.3.2 of your Change Management SOP.
      LIKELIHOOD
      Weight Question High Medium Low
      25% Has this change been tested? No   Yes
      10% Have all the relevant groups (companies, departments, executives) vetted the change? No Partial Yes
      5% Has this change been documented? No   Yes
      15% How long is the change window? When can we implement? Specified day/time Partial Per IT choice
      20% Do we have trained and experienced staff available to implement this change? If only external consultants are available, the rating will be “medium” at best. No   Yes
      25% Has an implementation plan been developed? No   Yes

      1.2.5 Evaluate and Adjust Your Risk Assessment Scheme

      Input

      • Impact and likelihood assessments from previous two activities

      Output

      • Vetted risk assessment

      Materials

      Participants

      • CIO
      • Infrastructure Manager
      • Change Manager
      • Members of the Change Advisory Board
      1. Draw your risk matrix on a whiteboard or flip chart.
      2. As a group, identify up to 10 examples of requests for changes that would apply within your organization. Depending on the number of people participating, each person could identify one or two changes and write them on sticky notes.
      3. Take turns bringing your sticky notes up to the risk matrix and placing each where it belongs, according to the assessment criteria you defined.
      4. After each participant has taken a turn, discuss each change as a group and adjust the placement of any changes, if needed. Update the risk assessment weightings or questions, if needed.

      Download the Change Management Rick Assessment Tool.

      #

      Change Example

      Impact

      Likelihood

      Risk

      1

      ERP change

      High

      Medium

      Major

      2

      Ticket system go-live

      Medium

      Low

      Minor

      3

      UPS replacement

      Medium

      Low

      Minor

      4

      Network upgrade

      Medium

      Medium

      Medium

      5

      AD upgrade

      Medium

      Low

      Minor

      6

      High availability implementation

      Low

      Medium

      Minor

      7

      Key-card implementation

      Low

      High

      Medium

      8

      Anti-virus update

      Low

      Low

      Minor

      9

      Website

      Low

      Medium

      Minor

       

      Case Study

      A CMDB is not a prerequisite of change management. Don’t let the absence of a configuration management database (CMDB) prevent you from implementing change management.

      Industry: Manufacturing

      Source: Anonymous Info-Tech member

      Challenge

      The company was planning to implement a CMDB; however, full implementation was still one year away and subject to budget constraints.

      Without a CMDB, it would be difficult to understand the interdependencies between systems and therefore be able to provide notifications to potentially affected user groups prior to implementing technical changes.

      This could have derailed the change management project.

      Solution

      An Excel template was set up as a stopgap measure until the full implementation of the CMDB. The template included all identified dependencies between systems, along with a “dependency tier” for each IT service.

      Tier 1: The dependent system would not operate if the upstream system change resulted in an outage.

      Tier 2: The dependent system would suffer severe degradation of performance and/or features.

      Tier 3: The dependent system would see minor performance degradation or minor feature unavailability.

      Results

      As a stopgap measure, the solution worked well. When changes ran the risk of degrading downstream dependent systems, the impacted business system owner’s authorization was sought and end users were informed in advance.

      The primary takeaway was that a system to manage configuration linkages and system dependencies was key.

      While a CMDB is ideal for this use case, IT organizations shouldn’t let the lack of such a system stop progress on change management.

      Case Study (part 1 of 4)

      Intel used a maturity assessment to kick-start its new change management program.

      Industry: Technology

      Source: Daniel Grove, Intel

      Challenge

      Founded in 1968, the world’s largest microchip and semiconductor company employs over 100,000 people. Intel manufactures processors for major players in the PC market including Apple, Lenovo, HP, and Dell.

      Intel IT supports over 65,000 servers, 3.2 petabytes of data, over 70,000 PCs, and 2.6 million emails per day.

      Intel’s change management program is responsible for over 4,000 changes each week.

      Solution

      Due to the sheer volume of change management activities present at Intel, over 35% of unscheduled outages were the result of changes.

      Ineffective change management was identified as the top contributor of incidents with unscheduled downtime.

      One of the major issues highlighted was a lack of process ownership. The change management process at Intel was very fragmented, and that needed to change.

      Results

      Daniel Grove, Senior Release & Change Manager at Intel, identified that clarifying tasks for the Change Manager and the CAB would improve process efficiency by reducing decision lag time. Roles and responsibilities were reworked and clarified.

      Intel conducted a maturity assessment of the overall change management process to identify key areas for improvement.

      Phase 2

      Establish Roles and Workflows

      For running change management in DevOps environment, see Appendix II.

      Define Change Management

      1.1 Assess Maturity

      1.2 Categorize Changes and Build Your Risk Assessment

      Establish Roles and Workflows

      2.1 Determine Roles and Responsibilities

      2.2 Build Core Workflows

      Define RFC and Post-Implementation Activities

      3.1 Design the RFC

      3.2 Establish Post-Implementation Activities

      Measure, Manage, and Maintain

      4.1 Identify Metrics and Build the Change Calendar

      4.2 Implement the Project

      This phase will guide you through the following steps:

      • Determine Roles and Responsibilities
      • Build Core Workflows

      This phase involves the following participants:

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board

      Step 2.1

      Determine Roles and Responsibilities

      Activities

      2.1.1 Capture Roles and Responsibilities Using a RACI Chart

      2.1.2 Determine Your Change Manager’s Responsibilities

      2.1.3 Define the Authority and Responsibilities of Your CAB

      2.1.4 Determine an E-CAB Protocol for Your Organization

      Establish Roles and Workflows

      Step 2.1: Determine Roles and Responsibilities → Step 2.2: Build Core Workflows

      This step involves the following participants:

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board

      Outcomes of this step

      • Clearly defined responsibilities to form the job description for a Change Manager
      • Clearly defined roles and responsibilities for the change management team, including the business system owner, technical SME, and CAB members
      • Defined responsibilities and authority of the CAB
      • Protocol for an emergency CAB (E-CAB) meeting

      Identify roles and responsibilities for your change management team

      Business System Owner

      • Provides downtime window(s)
      • Advises on need for change (prior to creation of RFC)
      • Validates change (through UAT or other validation as necessary)
      • Provides approval for expedited changes (needs to be at executive level)

      Technical Subject Matter Expert (SME)

      • Advises on proposed changes prior to RFC submission
      • Reviews draft RFC for technical soundness
      • Assesses backout/rollback plan
      • Checks if knowledgebase has been consulted for prior lessons learned
      • Participates in the PIR, if necessary
      • Ensures that the service desk is trained on the change

      CAB

      • Approves/rejects RFCs for normal changes
      • Reviews lessons learned from PIRs
      • Decides on the scope of change management
      • Reviews metrics and decides on remedial actions
      • Considers changes to be added to list of pre-approved changes
      • Communicates to organization about upcoming changes

      Change Manager

      • Reviews RFCs for completeness
      • Ensures RFCs brought to the CAB have a high chance of approval
      • Chairs CAB meetings, including scheduling, agenda preparation, reporting, and follow-ups
      • Manages post-implementation reviews and reporting
      • Organizes internal communications (within IT)

      2.1.1 Capture Roles and Responsibilities Using a RACI Chart

      Input

      • Current SOP

      Output

      • Documented roles and responsibilities in change management in a RACI chart

      Materials

      Participants

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board
      1. As a group, work through developing a RACI chart to determine the roles and responsibilities of individuals involved in the change management practice based on the following criteria:
        • Responsible (performs the work)
        • Accountable (ensures the work is done)
        • Consulted (two-way communication)
        • Informed (one-way communication)
      2. Record your results in slide 14 of the Project Summary Template and section 3.1 of your Change Management SOP.
      Change Management TasksOriginatorSystem OwnerChange ManagerCAB MemberTechnical SMEService DeskCIO/ VP ITE-CAB Member
      Review the RFC C C A C R C R  
      Validate changes C C A C R C R  
      Assess test plan A C R R C   I  
      Approve the RFC I C A R C   I  
      Create communications plan R I A     I I  
      Deploy communications plan I I A I   R    
      Review metrics   C A R   C I  
      Perform a post implementation review   C R A     I  
      Review lessons learned from PIR activities     R A   C    

      Designate a Change Manager to own the process, change templates, and tools

      The Change Manager will be the point of contact for all process questions related to change management.

      • The Change Manager needs the authority to reject change requests, regardless of the seniority of the requester.
      • The Change Manager needs the authority to enforce compliance to a standard process.
      • The Change Manager needs enough cross-functional subject-matter expertise to accurately evaluate the impact of change from both an IT and business perspective.

      Info-Tech Best Practice

      Some organizations will not be able to assign a dedicated Change Manager, but they must still task an individual with change review authority and with ownership of the risk assessment and other key parts of the process.

      Responsibilities

      1. The Change Manager is your first stop for change approval. Both the change management and release and deployment management processes rely on the Change Manager to function.
      2. Every single change that is applied to the live environment, from a single patch to a major change, must originate with a request for change (RFC), which is then approved by the Change Manager to proceed to the CAB for full approval.
      3. Change templates and tools, such as the change calendar, list of preapproved changes, and risk assessment template are controlled by the Change Manager.
      4. The Change Manager also needs to have ownership over gathering metrics and reports surrounding deployed changes. A skilled Change Manager needs to have an aptitude for applying metrics for continual improvement activities.

      2.1.2 Document Your Change Manager’s Responsibilities

      Input

      • Current Change Manager job description (if available)

      Output

      • Change Manager job description and list of responsibilities

      Materials

      • Whiteboard/flip charts (or shared screen if working remotely)
      • Markers/pens
      • Info-Tech’s Change Manager Job Description
      • Change Management SOP

      Participants

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board

      1.Using the previous slide, Info-Tech’s Change Manager Job Description, and the examples below, brainstorm responsibilities for the Change Manager.

      2.Record the responsibilities in Section 3.2 of your Change Management SOP.

      Example:

      Change Manager: James Corey

      Responsibilities

      1. Own the process, tools, and templates.
      2. Control the Change Management SOP.
      3. Provide standard RFC forms.
      4. Distribute RFCs for CAB review.
      5. Receive all initial RFCs and check them for completion.
      6. Approve initial RFCs.
      7. Approve pre-approved changes.
      8. Approve the conversion of normal changes to pre-approved changes.
      9. Assemble the Emergency CAB (E-CAB) when emergency change requests are received.
      10. Approve submission of RFCs for CAB review.
      11. Chair the CAB:
        • Set the CAB agenda and distribute it at least 24 hours before the meeting.
        • Ensure the agenda is adhered to.
        • Make the final approval/prioritization decision regarding a change if the CAB is deadlocked and cannot come to an agreement.
        • Distribute CAB meeting minutes to all members and relevant stakeholders.

      Download the Change Manager Job Description

      Create a Change Advisory Board (CAB) to provide process governance

      The primary functions of the CAB are to:

      1. Protect the live environment from poorly assessed, tested, and implemented changes.
        • CAB approval is required for all normal and emergency changes.
        • If a change results in an incident or outage, the CAB is effectively responsible; it’s the responsibility of the CAB to assess and accept the potential impact of every change.
      2. Prioritize changes in a way that fairly reflects change impact and urgency.
        • Change requests will originate from multiple stakeholders, some of whom have competing interests.
        • It’s up to the CAB to prioritize these requests effectively so that business need is balanced with any potential risk to the infrastructure.
        • The CAB should seek to reduce the number of emergency/expedited changes.
      3. Schedule deployments in a way that minimizes conflict and disruption.
        • The CAB uses a change calendar populated with project work, upcoming organizational initiatives, and change freeze periods. They will schedule changes around these blocks to avoid disrupting user productivity.
        • The CAB should work closely with the release and deployment management teams to coordinate change/release scheduling.

      See what responsibilities in the CAB’s process are already performed by the DevOps lifecycle (e.g. authorization, deconfliction etc.). Do not duplicate efforts.

      Use diverse representation from the business to form an effective CAB

      The CAB needs insight into all areas of the business to avoid approving a high-risk change.

      Based on the core responsibilities you have defined, the CAB needs to be composed of a diverse set of individuals who provide quality:

      • Change need assessments – identifying the value and purpose of a proposed change.
      • Change risk assessments – confirmation of the technical impact and likelihood assessments that lead to a risk score, based on the inputs in RFC.
      • Change scheduling – offer a variety of perspectives and responsibilities and will be able to identify potential scheduling conflicts.
       CAB RepresentationValue Added
      Business Members
      • CIO
      • Business Relationship Manager
      • Service Level Manager
      • Business Analyst
      • Identify change blackout periods, change impact, and business urgency.
      • Assess impact on fiduciary, legal, and/or audit requirements.
      • Determine acceptable business risk.
      IT Operations Members
      • Managers representing all IT functions
      • IT Directors
      • Subject Matter Experts (SMEs)
      • Identify dependencies and downstream impacts.
      • Identify possible conflicts with pre-existing OLAs and SLAs.
      CAB Attendees
      • Specific SMEs, tech specialists, and business and vendor reps relevant to a particular change
      • Only attend meetings when invited by the Change Manager
      • Provide detailed information and expertise related to their particular subject areas.
      • Speak to requirements, change impact, and cost.

      Info-Tech Best Practice

      Form a core CAB (members attend every week) and an optional CAB (members who attend only when a change impacts them or when they can provide value in discussions about a change). This way, members can have their voice heard without spending every week in a meeting where they do not contribute.

      2.1.3 Define the Authority and Responsibilities of Your CAB

      Input

      • Current SOP or CAB charter (if available)

      Output

      • Documented list of CAB authorities and responsibilities

      Materials

      Participants

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board

      1.Using the previous slide and the examples below, list the authorities and responsibilities of your CAB.

      2.Record the responsibilities in section 3.3.2 of your Change Management SOP and the Project Summary Template.

      Example:

      CAP AuthorityCAP Responsibilities
      • Final authority over the deployment of all normal and emergency changes.
      • Authority to absorb the risk of a change.
      • Authority to set the change calendar:
        • Maintenance windows.
        • Change freeze periods.
        • Project work.
        • Authority to delay changes.
      • Evaluate all normal and emergency changes.
      • Verify all normal change test, backout, and implementation plans.
      • Verify all normal change test results.
      • Approve all normal and emergency changes.
      • Prioritize all normal changes.
      • Schedule all normal and emergency changes.
      • Review failed change deployments.

      Establish an emergency CAB (E-CAB) protocol

      • When an emergency change request is received, you will not be able to wait until the regularly scheduled CAB meeting.
      • As a group, decide who will sit on the E-CAB and what their protocol will be when assessing and approving emergency changes.

      Change owner conferences with E-CAB (best efforts to reach them) through email or messaging.

      E-CAB members and business system owners are provided with change details. No decision is made without feedback from at least one E-CAB member.

      If business continuity is being affected, the Change Manager has authority to approve change.

      Full documentation of the change (a retroactive RFC) is done after the change and is then reviewed by the CAB.

      Info-Tech Best Practice

      Members of the E-CAB should be a subset of the CAB who are typically quick to respond to their messages, even at odd hours of the night.

      2.1.4 Determine an E-CAB Protocol for Your Organization

      Input

      • Current SOP or CAB charter (if available)

      Output

      • E-CAB protocol

      Materials

      Participants

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board
      1. Gather the members of the E-CAB and other necessary representatives from the change management team.
      2. Determine the order of operations for the E-CAB in the event that an emergency change is needed.
      3. Consult the example emergency protocol below. Determine what roles and responsibilities are involved at each stage of the emergency change’s implementation.
      4. Document the E-CAB protocol in section 3.4 of your Change Management SOP.

      Example

      Assemble E-CAB

      Assess Change

      Test (if Applicable)

      Deploy Change

      Create Retroactive RFC

      Review With CAB

      Step 2.2

      Build Core Workflows

      Activities

      2.2.1 Build a CMDB-lite as a Reference for Requested Changes

      2.2.2 Create a Normal Change Process

      2.2.3 Create a Pre-Approved Change Process

      2.2.4 Create an Emergency Change Process

      Establish Roles and Workflows

      Step 2.1: Determine Roles and Responsibilities → Step 2.2: Build Core Workflows

      This step involves the following participants:

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board

      Outcomes of this step

      • Emergency change workflow
      • Normal process workflow
      • Pre-approved change workflow

      Establishing Workflows: Change Management Lifecycle

      Improve

      • A post-implementation review assesses the value of the actual change measured against the proposed change in terms of benefits, costs, and impact.
      • Results recorded in the change log.
      • Accountability: Change Manager Change Implementer

      Request

      • A change request (RFC) can be submitted via paper form, phone, email, or web portal.
      • Accountability: Change requester/Initiator

      Assess

      • The request is screened to ensure it meets an agreed-upon set of business criteria.
      • Changes are assessed on:
        • Impact of change
        • Risks or interdependencies
        • Resourcing and costs
      • Accountability: Change Manager

      Plan

      • Tasks are assigned, planned, and executed.
      • Change schedule is consulted and necessary resources are identified.
      • Accountability: Change Manager

      Approve

      • Approved requests are sent to the most efficient channel based on risk, urgency, and complexity.
      • Change is sent to CAB members for final review and approval
      • Accountability: Change Manager
        • Change Advisory Board

      Implement

      • Approved changes are deployed.
      • A rollback plan is created to mitigate risk.
      • Accountability: Change Manager Change Implementer

      Establishing workflows: employ a SIPOC model for process definition

      A good SIPOC (supplier, input, process, output, customer) model helps establish the boundaries of each process step and provides a concise definition of the expected outcomes and required inputs. It’s a useful and recommended next step for every workflow diagram.

      For change management, employ a SIPOC model to outline your CAB process:

      Supplier

      • Who or what organization provides the inputs to the process? The supplier can be internal or external.

      Input

      • What goes into the process step? This can be a document, data, information, or a decision.

      Process

      • Activities that occur in the process step that’s being analyzed.

      Output

      • What does the process step produce? This can be a document, data, information, or a decision.

      Customer

      • Who or what organization(s) takes the output of the process? The customer can be internal or external.

      Optional Fields

      Metrics

      • Top-level indicators that usually relate to the input and output, e.g. turnaround time, risk matrix completeness.

      Controls

      • Checkpoints to ensure process step quality.

      Dependencies

      • Other process steps that require the output.

      RACI

      • Those who are Responsible, Accountable, Consulted, or Informed (RACI) about the input, output, and/or process.

      Establish change workflows: assess requested changes to identify impact and dependencies

      An effective change assessment workflow is a holistic process that leaves no stone unturned in an effort to mitigate risk before any change reaches the approval stage. The four crucial areas of risk in a change workflow are:

      Dependencies

      Identify all components of the change.

      Ask how changes will affect:

      • Services on the same infrastructure?
      • Applications?
      • Infrastructure/app architecture?
      • Security?
      • Ability to support critical systems?

      Business Impact

      Frame the change from a business point of view to identify potential disruptions to business activities.

      Your assessment should cover:

      • Business processes
      • User productivity
      • Customer service
      • BCPs

      SLA Impact

      Each new change can impact the level of service available.

      Examine the impact on:

      • Availability of critical systems
      • Infrastructure and app performance
      • Infrastructure and app capacity
      • Existing disaster recovery plans and procedures

      Required Resources

      Once risk has been assessed, resources need to be identified to ensure the change can be executed.

      These include:

      • People (SMEs, tech support, work effort/duration)
      • System time for scheduled implementation
      • Hardware or software (new or existing, as well as tools)

      Establishing workflows: pinpoint dependencies to identify the need for additional changes

      An assessment of each change and a query of the CMDB needs to be performed as part of the change planning process to mitigate outage risk.

      • A version upgrade on one piece of software may require another component to be upgraded as well. For example, an upgrade to the database management system requires that an application that uses the database be upgraded or modified.
      • The sequence of the release must also be determined, as certain components may need to be upgraded before others. For example, if you upgrade the Exchange Server, a Windows update must be installed prior to the Exchange upgrade.
      • If you do not have a CMDB, consider building a CMDB-lite, which consists of a listing of systems, primary users, SMEs, business owners, and system dependencies (see next slide).

      Services Impacted

      • Have affected services been identified?
      • Have supporting services been identified?
      • Has someone checked the CMDB to ensure all dependencies have been accounted for?
      • Have we referenced the service catalog so the business approves what they’re authorizing?

      Technical Teams Impacted

      • Who will support the change throughout testing and implementation?
      • Will additional support be needed?
      • Do we need outside support from eternal suppliers?
      • Has someone checked the contract to ensure any additional costs have been approved?

      Build a dependency matrix to avoid change related collisions (optional)

      A CMDB-lite does not replace a CMDB but can be a valuable tool to leverage when requesting changes if you do not currently have configuration management. Consider the following inputs when building your own CMDB-lite.

      • System
        • To build a CMDB-lite, start with the top 10 systems in your environment that experience changes. This list can always be populated iteratively.
      • Primary Users
        • Listing the primary users will give a change requester a first glance at the impact of the change.
        • You can also use this information when looking at the change communication and training after the change is implemented.
      • SME/Backup
        • These are the staff that will likely build and implement the change. The backup is listed in case the primary is on holiday.
      • Business System Owner
        • The owner of the system is one of the people needed to sign off on the change. Having their support from the beginning of a change is necessary to build and implement it successfully.
      • Tier 1 Dependency
        • If the primary system experiences and outage, Tier 1 dependency functionality is also lost. To request a change, include the business system owner signoffs of the Tier 1 dependencies of the primary system.
      • Tier 2 Dependency
        • If the primary system experiences an outage, Tier 2 dependency functionality is lost, but there is an available workaround. As with Tier 1, this information can help you build a backout plan in case there is a change-related collision.
      • Tier 3 Dependency
        • Tier 3 functionality is not lost if the primary system experiences an outage, but nice-to-haves such as aesthetics are affected.

      2.2.1 Build a CMDB-lite as a Reference for Requested Changes

      Input

      • Current system ownership documentation

      Output

      • Documented reference for change requests (CMDB-lite)

      Materials

      • Whiteboard/flip charts (or shared screen if working remotely)
      • Sticky notes
      • Markers/pens

      Participants

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board
      1. Start with a list of your top 10-15 systems/services with the highest volume of changes.
      2. Using a whiteboard, flip chart, or shared screen, complete the table below by filling the corresponding Primary Users, SMEs, Business System Owner, and Dependencies as shown below. It may help to use sticky notes.
      3. Iteratively populate the table as you notice gaps with incoming changes.
      SystemPrimary UsersSMEBackup SME(s)Business System OwnerTier 1 Dependency (system functionality is down)Tier 2 (impaired functionality/ workaround available)Tier 3 Dependency (nice to have)
      Email Enterprise Naomi Amos James
      • ITSMs
      • Scan-to-email
      • Reporting
       
      • Lots
      Conferencing Tool Enterprise Alex Shed James
      • Videoconferencing
      • Conference rooms (can use Facebook messenger instead in worst case scenario)
      • IM
      ITSM (Service Now) Enterprise (Intl.) Anderson TBD Mike
      • Work orders
      • Dashboards
      • Purchasing
       
      ITSM (Manage Engine) North America Bobbie Joseph Mike
      • Work orders
      • Dashboards
      • Purchasing
       

      Establishing workflows: create standards for change approvals to improve efficiency

      • Not all changes are created equal, and not all changes require the same degree of approval. As part of the change management process, it’s important to define who is the authority for each type of change.
      • Failure to do so can create bureaucratic bottlenecks if each change is held to an unnecessary high level of scrutiny, or unplanned outages may occur due to changes circumventing the formal approval process.
      • A balance must be met and defined to ensure the process is not bypassed or bottlenecked.

      Info-Tech Best Practice

      Define a list pre-approved changes and automate them (if possible) using your ITSM solution. This will save valuable time for more important changes in the queue.

      Example:

      Change CategoryChange Authority
      Pre-approved change Department head/manager
      Emergency change E-CAB
      Normal change – low and medium risk CAB
      Normal change – high risk CAB and CIO (for visibility)

      Example process: Normal Change – Change Initiation

      Change initiation allows for assurance that the request is in scope for change management and acts as a filter for out-of-scope changes to be redirected to the proper workflow. Initiation also assesses who may be assigned to the change and the proper category of the change, and results in an RFC to be populated before the change reaches the build and test phase.

      The image is a horizontal flow chart, depicting an example of a change process.

      The change trigger assessment is critical in the DevOps lifecycle. This can take a more formal role of a technical review board (TRB) or, with enough maturity, may be automated. Responsibilities such as deconfliction, dependency identification, calendar query, and authorization identification can be done early in the lifecycle to decrease or eliminate the burden on CAB.

      For the full process, refer to the Change Management Process Library.

      Example process: Normal Change – Technical Build and Test

      The technical build and test stage includes all technical prerequisites and testing needed for a change to pass before proceeding to approval and implementation. In addition to a technical review, a solution consisting of the implementation, rollback, communications, and training plan are also built and included in the RFC before passing it to the CAB.

      The image is a flowchart, showing the process for change during the technical build and test stage.

      For the full process, refer to the Change Management Process Library.

      Example process: Normal Change – Change Approval (CAB)

      Change approval can start with the Change Manager reviewing all incoming RFCs to filter them for completeness and check them for red flags before passing them to the CAB. This saves the CAB from discussing incomplete changes and allows the Change Manager to set a CAB agenda before the CAB meeting. If need be, change approval can also set vendor communications necessary for changes, as well as the final implementation date of the change. The CAB and Change Manager may follow up with the appropriate parties notifying them of the approval decision (accepted, rescheduled, or rejected).

      The image shows a flowchart illustrating the process for change approval.

      For the full process, refer to the Change Management Process Library.

      Example process: Normal Change – Change Implementation

      Changes should not end at implementation. Ensure you define post-implementation activities (documentation, communication, training etc.) and a post-implementation review in case the change does not go according to plan.

      The image is a flowchart, illustrating the work process for change implementation and post-implementation review.

      For the full process, refer to the Change Management Process Library.

      2.2.2 Create a Normal Change Process

      Input

      • Current SOP/workflow library

      Output

      • Normal change process

      Materials

      Participants

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board
      1. Gather representatives from the change management team.
      2. Using the examples shown on the previous few slides, work as a group to determine the workflow for a normal change, with particular attention to the following sub-processes:
        1. Request
        2. Assessment
        3. Plan
        4. Approve
        5. Implementation and Post-Implementation Activities
      3. Optionally, you may create variations of the workflow for minor, medium, and major changes (e.g. there will be fewer authorizations for minor changes).
      4. For further documentation, you may choose to run the SIPOC activity for your CAB as outlined on this slide.
      5. Document the resulting workflows in the Change Management Process Library and section 11 of your Change Management SOP.

      Download the Change Management Process Library.

      Identify and convert low-risk normal changes to pre-approved once the process is established

      As your process matures, begin creating a list of normal changes that might qualify for pre-approval. The most potential for value in gains from change management comes from re-engineering and automating of high-volume changes. Pre-approved changes should save you time without threatening the live environment.

      IT should flag changes they would like pre-approved:

      • Once your change management process is firmly established, hold a meeting with all staff that make change requests and build changes.
      • Run a training session detailing the traits of pre-approved changes and ask these individuals to identify changes that might qualify.
      • These changes should be submitted to the Change Manager and reviewed, with the help of the CAB, to decide whether or not they qualify for pre-approval.

      Pre-approved changes are not exempt from due diligence:

      • Once a change is designated as pre-approved, the deployment team should create and compile all relevant documentation:
        • An RFC detailing the change, dependencies, risk, and impact.
        • Detailed procedures and required resources.
        • Implementation and backout plan.
        • Test results.
      • When templating the RFC for pre-approved changes, aim to write the documentation as if another SME were to implement it. This reduces confusion, especially if there’s staff turnover.
      • The CAB must approve, sign off, and keep a record of all documents.
      • Pre-approved changes must still be documented and recorded in the CMDB and change log after each deployment.

      Info-Tech Best Practice

      At the beginning of a change management process, there should be few active pre-approved changes. However, prior to launch, you may have IT flag changes for conversion.

      Example process: Pre-Approved Change Process

      The image shows two horizontal flow charts, the first labelled Pre-Approval of Recurring RFC, and the second labelled Implementation of Child RFC.

      For the full process, refer to the Change Management Process Library.

      Review the pre-approved change list regularly to ensure the list of changes are still low-risk and repeatable.

      IT environments change. Don’t be caught by surprise.

      • Changes which were once low-risk and repeatable may cause unforeseen incidents if they are not reviewed regularly.
      • Dependencies change as the IT environment changes. Ensure that the changes on the pre-approved change list are still low-risk and repeatable, and that the documentation is up to date.
      • If dependencies have changed, then move the change back to the normal category for reassessment. It may be redesignated as a pre-approved change once the documentation is updated.

      Info-Tech Best Practice

      Other reasons for moving a pre-approved change back to the normal category is if the change led to an incident during implementation or if there was an issue during implementation.

      Seek new pre-approved change submissions. → Re-evaluate the pre-approved change list every 4-6 months.

      The image shows a horizontal flow chart, depicting the process for a pre-approved change list review.

      For the full process, refer to the Change Management Process Library.

      2.2.3 Create a Pre-Approved Change Process

      Input

      • Current SOP/workflow library

      Output

      • Pre-approved change process

      Materials

      Participants

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board
      1. Gather representatives from the change management team.
      2. Using the examples shown on the previous few slides, work as a group to determine the workflow for a pre-approved change, with particular attention to the following sub-processes:
        1. Request
        2. Assessment
        3. Plan
        4. Approve
      3. Document the process of a converting a normal change to pre-approved. Include the steps from flagging a low-risk change to creating the related RFC template.
      4. Document the resulting workflows in the Change Management Process Library and sections 4.2 and 13 of your Change Management SOP.

      Reserve the emergency designation for real emergencies

      • Emergency changes have one of the following triggers:
        • A critical incident is impacting user productivity.
        • An imminent critical incident will impact user productivity.
      • Unless a critical incident is being resolved or prevented, the change should be categorized as normal.
      • An emergency change differs from a normal change in the following key aspects:
        • An emergency change is required to recover from a major outage – there must be a validated service desk critical incident ticket.
        • An urgent business requirement is not an “emergency.”
        • An RFC is created after the change is implemented and the outage is over.
        • A review by the full CAB occurs after the change is implemented.
        • The first responder and/or the person implementing the change may not be the subject matter expert for that system.
      • In all cases, an RFC must be created and the change must be reviewed by the full CAB. The review should occur within two business days of the event.
      Sample ChangeQuick CheckEmergency?
      Install the latest critical patches from the vendor. Are the patches required to resolve or prevent an imminent critical incident? No
      A virus or worm invades the network and a patch is needed to eliminate the threat. Is the patch required to resolve or prevent an imminent critical incident? Yes

      Info-Tech Best Practice

      Change requesters should be made aware that senior management will be informed if an emergency RFC is submitted inappropriately. Emergency requests trigger urgent CAB meetings, are riskier to deploy, and delay other changes waiting in the queue.

      Example process: Emergency Change Process

      The image is a flowchart depicting the process for an emergency change process

      When building your emergency change process, have your E-CAB protocol from activity 2.1.4 handy.

      • Focus on the following requirements for an emergency process:
        • E-CAB protocol and scope: Does the SME need authorization first before working on the change or can the SME proceed if no E-CAB members respond?
        • Documentation and communication to stakeholders and CAB after the emergency change is completed.
        • Input from incident management.

      For the full process, refer to the Change Management Process Library.

      2.2.4 Create an Emergency Change Process

      Input

      • Current SOP/workflow library

      Output

      • Emergency change process

      Materials

      Participants

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board
      1. Gather representatives from the change management team.
      2. Using the examples shown on the previous few slides, work as a group to determine the workflow for an emergency change, with particular attention to the following sub-processes:
        1. Request
        2. Assessment
        3. Plan
        4. Approve
      3. Ensure that the E-CAB protocol from activity 2.1.4 is considered when building your process.
      4. Document the resulting workflows in the Change Management Process Library and section 12 of your Change Management SOP.

      Case Study (part 2 of 4)

      Intel implemented a robust change management process.

      Industry: Technology

      Source: Daniel Grove, Intel

      Challenge

      Founded in 1968, the world’s largest microchip and semiconductor company employs over 100,000 people. Intel manufactures processors for major players in the PC market including Apple, Lenovo, HP, and Dell.

      Intel IT supports over 65,000 servers, 3.2 petabytes of data, over 70,000 PCs, and 2.6 million emails per day.

      Intel’s change management program is responsible for over 4,000 changes each week.

      Solution

      Intel identified 37 different change processes and 25 change management systems of record with little integration.

      Software and infrastructure groups were also very siloed, and this no doubt contributed to the high number of changes that caused outages.

      The task was simple: standards needed to be put in place and communication had to improve.

      Results

      Once process ownership was assigned and the role of the Change Manager and CAB clarified, it was a simple task to streamline and simplify processes among groups.

      Intel designed a new, unified change management workflow that all groups would adopt.

      Automation was also brought into play to improve how RFCs were generated and submitted.

      Phase 3

      Define the RFC and Post-Implementation Activities

      Define Change Management

      1.1 Assess Maturity

      1.2 Categorize Changes and Build Your Risk Assessment

      Establish Roles and Workflows

      2.1 Determine Roles and Responsibilities

      2.2 Build Core Workflows

      Define the RFC and Post-Implementation Activities

      3.1 Design the RFC

      3.2 Establish Post-Implementation Activities

      Measure, Manage, and Maintain

      4.1 Identify Metrics and Build the Change Calendar

      4.2 Implement the Project

      This phase will guide you through the following activities:

      • Design the RFC
      • Establish Post-Implementation Activities

      This phase involves the following participants:

      • IT Director
      • Infrastructure Manager
      • Change Manager
      • Members of the Change Advisory Board

      Step 3.1

      Design the RFC

      Activities

      3.1.1 Evaluate Your Existing RFC Process

      3.1.2 Build the RFC Form

      Define the RFC and Post-Implementation Activities

      Step 3.1: Design the RFC

      Step 3.2: Establish Post-Implementation Activities

      This step involves the following participants:

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board

      Outcomes of this step

      • A full RFC template and process that compliments the workflows for the three change categories

      A request for change (RFC) should be submitted for every non-standard change

      An RFC should be submitted through the formal change management practice for every change that is not a standard, pre-approved change (a change which does not require submission to the change management practice).

      • The RFC should contain all the information required to approve a change. Some information will be recorded when the change request is first initiated, but not everything will be known at that time.
      • Further information can be added as the change progresses through its lifecycle.
      • The level of detail that goes into the RFC will vary depending on the type of change, the size, and the likely impact of the change.
      • Other details of the change may be recorded in other documents and referenced in the RFC.

      Info-Tech Insight

      Keep the RFC form simple, especially when first implementing change management, to encourage the adoption of and compliance with the process.

      RFCs should contain the following information, at a minimum:

      1. Contact information for requester
      2. Description of change
      3. References to external documentation
      4. Items to be changed, reason for the change, and impact of both implementing and not implementing the change
      5. Change type and category
      6. Priority and risk assessment
      7. Predicted time frame, resources, and cost
      8. Backout or remediation plan
      9. Proposed approvers
      10. Scheduled implementation time
      11. Communications plan and post-implementation review

      3.1.1 Evaluate Your Existing RFC Process

      Input

      • Current RFC form or stock ITSM RFC
      • Current SOP (if available)

      Output

      • List of changes to the current RFC form and RFC process

      Materials

      Participants

      • IT Director
      • Infrastructure Manager
      • Change Manager
      • Members of the Change Advisory Board
      1. If the organization is already using an RFC form, review it as a group now and discuss its contents:
        • Does this RFC provide adequate information for the Change Manager and/or CAB to review?
        • Should any additional fields be added?
      2. Show the participants Info-Tech’s Request for Change Form Template and compare it to the one the organization is currently using.
      3. As a group, finalize an RFC table of contents that will be used to formalize a new or improved RFC.
      4. Decide which fields should be filled out by the requester before the initial RFC is submitted to the Change Manager:
        • Many sections of the RFC are relevant for change assessment and review. What information does the Change Manager need when they first receive a request?
        • The Change Manager needs enough information to ensure that the change is in scope and has been properly categorized.
      5. Decide how the RFC form should be submitted and reviewed; this can be documented in section 5 of your Change Management SOP.

      Download the Request for Change Form Template.

      Design the RFC to encourage process buy-in

      • When building the RFC, split the form up into sections that follow the normal workflow (e.g. Intake, Assessment and Build, Approval, Implementation/PIR). This way the form walks the requester through what needs to be filled and when.
      • Revisit the form periodically and solicit feedback to continually improve the user experience. If there’s information missing on the RFC that the CAB would like to know, add the fields. If there are sections that are not used or not needed for documentation, remove them.
      • Make sure the user experience surrounding your RFC form is a top priority – make it accessible, otherwise change requesters simply will not use it.
      • Take advantage of your ITSM’s dropdown lists, automated notifications, CMDB integrations, and auto-generated fields to ease the process of filling the RFC

      Draft:

      • Change requester
      • Requested date of deployment
      • Change risk: low/medium/high
      • Risk assessment
      • Description of change
      • Reason for change
      • Change components

      Technical Build:

      • Assess change:
        • Dependencies
        • Business impact
        • SLA impact
        • Required resources
        • Query the CMS
      • Plan and test changes:
        • Test plan
        • Test results
        • Implementation plan
        • Backout plan
        • Backout plan test results

      CAB:

      • Approve and schedule changes:
        • Final CAB review
        • Communications plan

      Complete:

      • Deploy changes:
        • Post-implementation review

      Designing your RFC: RFC draft

      • Change requester – link your change module to the active directory to pull the change requester’s contact information automatically to save time.
      • A requested date of deployment gives approvers information on timeline and can be used to query the change calendar for possible conflicts
      • Information about risk assessment based on impact and likelihood questionnaires are quick to fill out but provide a lot of information to the CAB. The risk assessment may not be complete at the draft stage but can be updated as the change is built. Ensure this field is up-to- date before it reaches CAB.
      • If you have a technical review stage where changes are directed to the proper workflow and resourcing is assessed, the description, reason, and change components are high-level descriptors of the change that will aid in discovery and lining the change up with the business vision (viability from both a technical and business standpoint).
      • Change requester
      • Requested date of deployment
      • Change Risk: low/medium/high
      • Risk assessment
      • Description of change
      • Reason for change
      • Change components

      Use the RFC to point to documentation already gathered in the DevOps lifecycle to cut down on unnecessary manual work while maintaining compliance.

      Designing your RFC: technical build

      • Dependencies and CMDB query, along with the proposed implementation date, are included to aid in calendar deconfliction and change scheduling. If there’s a conflict, it’s easier to reschedule the proposed change early in the lifecycle.
      • Business, SLA impact, and required resources can be tracked to provide the CAB with information on the business resources required. This can also be used to prioritize the change if conflicts arise.
      • Implementation, test, and backout plans must be included and assessed to increase the probability that a change will be implemented without failure. It’s also useful in the case of PIRs to determine root causes of change-related incidents.
      • Assess change:
        • Dependencies
        • Business impact
        • SLA impact
        • Required resources
        • Query the CMS
      • Plan and test changes:
        • Test plan
        • Test results
        • Implementation plan
        • Backout plan
        • Backout plan test results

      Designing your RFC: approval and deployment

      • Documenting approval, rejection, and rescheduling gives the change requester the go-ahead to proceed with the change, rationale on why it was prioritized lower than another change (rescheduled), or rationale on rejection.
      • Communications plans for appropriate stakeholders can also be modified and forwarded to the communications team (e.g. service desk or business system owners) before deployment.
      • Post-implementation activities and reviews can be conducted if need be before a change is closed. The PIR, if filled out, should then be appended to any subsequent changes of the same nature to avoid making the same mistake twice.
      • Approve and schedule changes:
        • Final CAB review
        • Communications plan
      • Deploy changes:
        • Post-implementation review

      Standardize the request for change protocol

      1. Submission Standards
        • Electronic submission will make it easier for CAB members to review the documentation.
        • As the change goes through the assessment, plan, and test phase, new documentation (assessments, backout plans, test results, etc.) can be attached to the digital RFC for review by CAB members prior to the CAB meeting.
        • Change management software won’t be necessary to facilitate the RFC submission and review; a content repository system, such as SharePoint, will suffice.
      2. Designate the first control point
        • All RFCs should be submitted to a single point of contact.
        • Ideally, the Change Manager or Technical Review Board should fill this role.
        • Whoever is tasked with this role needs the subject matter expertise to ensure that the change has been categorized correctly, to reject out-of-scope requests, or to ask that missing information be provided before the RFC moves through the full change management practice.

      Info-Tech Best Practice

      Technical and SME contacts should be noted in each RFC so they can be easily consulted during the RFC review.

      3.1.2 Build the RFC Form

      Input

      • Current RFC form or stock ITSM RFC
      • Current SOP (if available)

      Output

      • List of changes to the current RFC and RFC process

      Materials

      Participants

      • IT Director
      • Infrastructure Manager
      • Change Manager
      • Members of the Change Advisory Board
      1. Use Info-Tech’s Request for Change Form Template as a basis for your RFC form.
      2. Use this template to standardize your change request process and ensure that the appropriate information is documented effectively each time a request is made. The change requester and Change Manager should consolidate all information associated with a given change request in this form. This form will be submitted by the change requester and reviewed by the Change Manager.

      Case Study (part 3 of 4)

      Intel implemented automated RFC form generation.

      Industry: Technology

      Source: Daniel Grove, Intel

      Challenge

      Founded in 1968, the world’s largest microchip and semiconductor company employs over 100,000 people. Intel manufactures processors for major players in the PC market including Apple, Lenovo, HP, and Dell.

      Intel IT supports over 65,000 servers, 3.2 petabytes of data, over 70,000 PCs, and 2.6 million emails per day.

      Intel’s change management program is responsible for over 4,000 changes each week.

      Solution

      One of the crucial factors that was impacting Intel’s change management efficiency was a cumbersome RFC process.

      A lack of RFC usage was contributing to increased ad hoc changes being put through the CAB, and rescheduled changes were quite high.

      Additionally, ad hoc changes were also contributing heavily to unscheduled downtime within the organization.

      Results

      Intel designed and implemented an automated RFC form generator to encourage end users to increase RFC usage.

      As we’ve seen with RFC form design, the UX/UI of the form needs to be top notch, otherwise end users will simply circumvent the process. This will contribute to the problems you are seeking to correct.

      Thanks to increased RFC usage, Intel decreased emergency changes by 50% and reduced change-caused unscheduled downtime by 82%.

      Step 3.2

      Establish Post-Implementation Activities

      Activities

      3.2.1 Determine When the CAB Would Reject Tested Changes

      3.2.2 Create a Post-Implementation Activity Checklist

      Define the RFC and Post-Implementation Activities

      Step 3.1: Design RFC

      Step 3.2: Establish Post-Implementation Activities

      This step involves the following participants:

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board

      Outcomes of this step

      • A formalized post-implementation process for continual improvement

      Why would the CAB reject a change that has been properly assessed and tested?

      Possible reasons the CAB would reject a change include:

      • The product being changed is approaching its end of life.
      • The change is too costly.
      • The timing of the change conflicts with other changes.
      • There could be compliance issues.
      • The change is actually a project.
      • The risk is too high.
      • There could be regulatory issues.
      • The peripherals (test, backout, communication, and training plans) are incomplete.

      Info-Tech Best Practice

      Many reasons for rejection (listed above) can be caught early on in the process during the technical review or change build portion of the change. The earlier you catch these reasons for rejection, the less wasted effort there will be per change.

      Sample RFCReason for CAP Rejection
      There was a request for an update to a system that a legacy application depends on and only a specific area of the business was aware of the dependency. The CAB rejects it due to the downstream impact.
      There was a request for an update to a non-supported application, and the vendor was asking for a premium support contract that is very costly. It’s too expensive to implement, despite the need for it. The CAB will wait for an upgrade to a new application.
      There was a request to update application functionality to a beta release. The risk outweighs the business benefits.

      Determine When the CAB Would Reject Tested Changes

      Input

      • Current SOP (if available)

      Output

      • List of reasons to reject tested changes

      Materials

      • Whiteboard/flip charts (or shared screen if working remotely)
      • Projector
      • Markers/pens
      • Laptop with ITSM admin access
      • Project Summary Template

      Participants

      • IT Director
      • Infrastructure Manager
      • Change Manager
      • Members of the Change Advisory Board

      Avoid hand-offs to ensure a smooth implementation process

      The implementation phase is the final checkpoint before releasing the new change into your live environment. Once the final checks have been made to the change, it’s paramount that teams work together to transition the change effectively rather than doing an abrupt hand-off. This could cause a potential outage.

      1.

      • Deployment resources identified, allocated, and scheduled
      • Documentation complete
      • Support team trained
      • Users trained
      • Business sign-off
      • Target systems identified and ready to receive changes
      • Target systems available for installation maintenance window scheduled
      • Technical checks:
        • Disk space available
        • Pre-requisites met
        • Components/Services to be updated are stopped
        • All users disconnected
      • Download Info-Tech’sChange Management Pre-Implementation Checklist

      Implement change →

      2.

      1. Verification – once the change has been implemented, verify that all requirements are fulfilled.
      2. Review – ensure that all affected systems and applications are operating as predicted. Update change log.
      3. Transition – a crucial phase of implementation that’s often overlooked. Once the change implementation is complete from a technical point of view, it’s imperative that the team involved with the change inform and train the group responsible for managing the new change.

      Create a backout plan to reduce the risk of a failed change

      Every change process needs to plan for the potential for failure and how to address it effectively. Change management’s solution to this problem is a backout plan.

      A backout plan needs to contain a record of the steps that need to be taken to restore the live environment back to its previous state and maintain business continuity. A good backout plan asks the following questions:

      1. How will failure be determined? Who will make the determination to back out of a change be made and when?
      2. Do we fix on fail or do we rollback to the previous configuration?
      3. Is the service desk aware of the impending change? Do they have proper training?

      Notify the Service Desk

      • Notify the Service Desk about backout plan initiation.

      Disable Access

      • Disable user access to affected system(s).

      Conduct Checks

      • Conduct checks to all affected components.

      Enable User Access

      • Enable user access to affected systems.

      Notify the Service Desk

      • Notify the service desk that the backout plan was successful.

      Info-Tech Best Practice

      As part of the backout plan, consider the turnback point in the change window. That is, the point within the change window where you still have time to fully back out of the change.

      Ensure the following post-implementation review activities are completed

      Service Catalog

      Update the service catalog with new information as a result of the implemented change.

      CMDB

      Update new dependencies present as a result of the new change.

      Asset DB

      Add notes about any assets newly affected by changes.

      Architecture Map

      Update your map based on the new change.

      Technical Documentation

      Update your technical documentation to reflect the changes present because of the new change.

      Training Documentation

      Update your training documentation to reflect any information about how users interact with the change.

      Use a post-implementation review process to promote continual improvement

      The post-implementation review (PIR) is the most neglected change management activity.

      • All changes should be reviewed to understand the reason behind them, appropriateness, and recommendations for next steps.
      • The Change Manager manages the completion of information PIRs and invites RFC originators to present their findings and document the lessons learned.

      Info-Tech Best Practice

      Review PIR reports at CAB meetings to highlight the root causes of issues, action items to close identified gaps, and back-up documentation required. Attach the PIR report to the relevant RFC to prevent similar changes from facing the same issues in the future.

      1. Why do a post-implementation review?
        • Changes that don’t fail but don’t perform well are rarely reviewed.
        • Changes may fail subtly and still need review.
        • Changes that cause serious failures (i.e. unplanned downtime) receive analysis that is unnecessarily in-depth.
      2. What are the benefits?
        • A proactive, post-implementation review actually uses less resources than reactionary change reviews.
        • Root-cause analysis of failed changes, no matter what the impact.
        • Insight into changes that took longer than projected.
        • Identification of previously unidentified risks affecting changes.

      Determine the strategy for your PIR to establish a standardized process

      Capture the details of your PIR process in a table similar to the one below.

      Frequency Part of weekly review (IT team meeting)
      Participants
      • Change Manager
      • Originator
      • SME/supervisor/impacted team(s)

      Categories under review

      Current deviations and action items from previous PIR:

      • Complete
      • Partially complete
      • Complete, late
      • Change failed, rollback succeeded
      • Change failed, rollback failed
      • Major deviation from implementation plan
      Output
      • Root cause or failure or deviation
      • External factors
      • Remediation focus areas
      • Remediation timeline (follow-up at appropriate time)
      Controls
      • Reviewed at next CAB meeting
      • RFC close is dependent on completion of PIR
      • Share with the rest of the technical team
      • Lessons learned stored in the knowledgebase and attached to RFC for easy search of past issues.

      3.2.2 Create a Post-Implementation Activity Checklist

      Input

      • Current SOP (if available)

      Output

      • List of reasons to reject tested changes

      Materials

      Participants

      • CIO
      • IT Managers
      • Change Manager
      • Members of the Change Advisory Board
      1. Gather representatives from the change management team.
      2. Brainstorm duties to perform following the deployment of a change. Below is a sample list:
        • Example:
          • Was the deployment successful?
            • If no, was the backout plan executed successfully?
          • List change-related incidents
          • Change assessment
            • Missed dependencies
            • Inaccurate business impact
            • Incorrect SLA impact
            • Inaccurate resources
              • Time
              • Staff
              • Hardware
          • System testing
          • Integration testing
          • User acceptance testing
          • No backout plan
          • Backout plan failure
          • Deployment issues
      3. Record your results in the Change Management Post-Implementation Checklist.

      Download the Change Management Post-Implementation Checklist

      Case Study

      Microsoft used post-implementation review activities to mitigate the risk of a critical Azure outage.

      Industry: Technology

      Source: Jason Zander, Microsoft

      Challenge

      In November 2014, Microsoft deployed a change intended to improve Azure storage performance by reducing CPU footprint of the Azure Table Front-Ends.

      The deployment method was an incremental approach called “flighting,” where software and configuration deployments are deployed incrementally to Azure infrastructure in small batches.

      Unfortunately, this software deployment caused a service interruption in multiple regions.

      Solution

      Before the software was deployed, Microsoft engineers followed proper protocol by testing the proposed update. All test results pointed to a successful implementation.

      Unfortunately, engineers pushed the change out to the entire infrastructure instead of adhering to the traditional flighting protocol.

      Additionally, the configuration switch was incorrectly enabled for the Azure Blob storage Front-Ends.

      A combination of the two mistakes exposed a bug that caused the outage.

      Results

      Thankfully, Microsoft had a backout plan. Within 30 minutes, the change was rolled back on a global scale.

      It was determined that policy enforcement was not integrated across the deployment system. An update to the system shifted the process of policy enforcement from human-based decisions and protocol to automation via the deployment platform.

      Defined PIR activities enabled Microsoft to take swift action against the outage and mitigate the risk of a serious outage.

      Phase 4

      Measure, Manage, and Maintain

      Define Change Management

      1.1 Assess Maturity

      1.2 Categorize Changes and Build Risk Assessment

      Establish Roles and Workflows

      2.1 Determine Roles and Responsibilities

      2.2 Build Core Workflows

      Define RFC and Post-Implementation Activities

      3.1 Design RFC

      3.2 Establish post-implementation activities

      Measure, Manage, and Maintain

      4.1 Identify Metrics and Build the Change Calendar

      4.2 Implement the Project

      This phase will guide you through the following activities:

      • Identify Metrics and Build the Change Calendar
      • Implement the Project

      This phase involves the following participants:

      • CIO/IT Director
      • IT Managers
      • Change Manager

      Step 4.1

      Identify Metrics and Build the Change Calendar

      Activities

      4.1.1 Create an Outline for Your Change Calendar

      4.1.2 Determine Metrics, Key Performance Indicators (KPIs), and Critical Success Factors (CSFs)

      4.1.3 Track and Record Metrics Using the Change Management Metrics Tool

      Measure, Manage, and Maintain

      Step 4.1: Identify Metrics and Build the Change Calendar

      Step 4.2: Implement the Project

      This step involves the following participants:

      • CIO/IT Director
      • IT Managers
      • Change Manager

      Outcomes of this step

      • Clear definitions of change calendar content
      • Guidelines for change calendar scheduling
      • Defined metrics to measure the success of change management with associated reports, KPIs, and CSFs

      Enforce a standard method of prioritizing and scheduling changes

      The impact of not deploying the change and the benefit of deploying it should determine its priority.

      Risk of Not Deploying

      • What is the urgency of the change?
      • What is the risk to the organization if the change is not deployed right away?
      • Will there be any lost productivity, service disruptions, or missed critical business opportunities?
        • Timing
          • Does the proposed timing work with the approved changes already on the change schedule?
          • Has the change been clash checked so there are no potential conflicts over services or resources?
        • Once prioritized, a final deployment date should be set by the CAB. Check the change calendar first to avoid conflicts.

      Positive Impact of Deployment

      • What benefits will be realized once the change is deployed?
      • How significant is the opportunity that triggered the change?
      • Will the change lead to a positive business outcome (e.g. increased sales)?

      “The one who has more clout or authority is usually the one who gets changes scheduled in the time frame they desire, but you should really be evaluating the impact to the organization. We looked at the risk to the business of not doing the change, and that’s a good way of determining the criticality and urgency of that change.” – Joseph Sgandurra, Director, Service Delivery, Navantis

      Info-Tech Insight

      Avoid a culture where powerful stakeholders are able to push change deployment on an ad hoc basis. Give the CAB the full authority to make approval decisions based on urgency, impact, cost, and availability of resources.

      Develop a change schedule to formalize the planning process

      A change calendar will help the CAB schedule changes more effectively and increase visibility into upcoming changes across the organization.

      1. Establish change windows in a consistent change schedule:
        • Compile a list of business units that would benefit from a change.
        • Look for conflicts in the change schedule.
        • Avoid scheduling two or more major business units in a day.
        • Consider clients when building your change windows and change schedule.
      2. Gain commitments from key participants:
        • These individuals can confirm if there are any unusual or cyclical business requirements that will impact the schedule.
      3. Properly control your change calendar to improve change efficiency:
        • Look at the proposed start and end times: Are they sensible? Does the implementation window leave time for anything going wrong or needing to roll back the change?
        • Special considerations: Are there special circumstances that need to be considered? Ask the business if you don’t know.
        • The key principle is to have a sufficient window available for implementing changes so you only need to set up calendar freezes for sound business or technical reasons.

      Our mantra is to put it on the calendar. Even if it’s a preapproved change and doesn’t need a vote, having it on the calendar helps with visibility. The calendar is the one-stop shop for scheduling and identifying change dependencies.“ – Wil Clark, Director of Service and Performance Management, University of North Texas Systems

      Provide clear definitions of what goes on the change calendar and who’s responsible

      Roles

      • The Change Manager will be responsible for creating and maintaining a change calendar.
      • Only the Change Manager can physically alter the calendar by adding a new change after the CAB has agreed upon a deployment date.
      • All other CAB members, IT support staff, and other impacted stakeholders should have access to the calendar on a read-only basis to prevent people from making unauthorized changes to deployment dates.

      Inputs

      • Freeze periods for individual business departments/applications (e.g. finance month-end periods, HR payroll cycle, etc. – all to be investigated).
      • Maintenance windows and planned outage periods.
      • Project schedules, and upcoming major/medium changes.
      • Holidays.
      • Business hours (some departments work 9-5, others work different hours or in different time zones, and user acceptance testing may require business users to be available).

      Guidelines

      • Business-defined freeze periods are the top priority.
      • No major or medium normal changes should occur during the week between Christmas and New Year’s Day.
      • Vendor SLA support hours are the preferred time for implementing changes.
      • The vacation calendar for IT will be considered for major changes.
      • Change priority: High > Medium > Low.
      • Minor changes and preapproved changes have the same priority and will be decided on a case-by-case basis.

      The change calendar is a critical pre-requisite to change management in DevOps. Use the calendar to be proactive with proposed implementation dates and deconfliction before the change is finished.

      4.1.1 Create Guidelines for Your Change Calendar

      Input

      • Current change calendar guidelines

      Output

      • Change calendar inputs and schedule checklist

      Materials

      Participants

      • Change Manager
      • Members of the Change Advisory Board
      • Service Desk Manager
      • Operations (optional)
      1. Gather representatives from the change management team.
        • Example:
          • The change calendar/schedule includes:
            • Approved and scheduled normal changes.
            • Scheduled project work.
            • Scheduled maintenance windows.
            • Change freeze periods with affected users noted:
              • Daily/weekly freeze periods.
              • Monthly freeze periods.
              • Annual freeze periods.
              • Other critical business events.
      2. Create a checklist to run through before each change is scheduled:
        • Check the schedule and assess resource availability:
          • Will user productivity be impacted?
          • Are there available resources (people and systems) to implement the change?
          • Is the vendor available? Is there a significant cost attached to pushing change deployment before the regularly scheduled refresh?
          • Are there dependencies? Does the deployment of one change depend on the earlier deployment of another?
      3. Record your results in your Project Summary Template.

      Start measuring the success of your change management project using three key metrics

      Number of change-related incidents that occur each month

      • Each month, record the number of incidents that can be directly linked to a change. This can be done using an ITSM tool or manually by service desk staff.
      • This is a key success metric: if you are not tracking change-related incidents yet, start doing so as soon as possible. This is the metric that the CIO and business stakeholders will be most interested in because it impacts users directly.

      Number of unauthorized changes applied each month

      • Each month, record the number of changes applied without approval. This is the best way to measure adherence to the process.
      • If this number decreases, it demonstrates a reduction in risk, as more changes are formally assessed and approved before being deployed.

      Percentage of emergency changes

      • Each month, compare the number of emergency change requests to the total number of change requests.
      • Change requesters often designate changes as emergencies as a way of bypassing the process.
      • A reduction in emergency changes demonstrates that your process is operating smoothly and reduces the risk of deploying changes that have not been properly tested.

      Info-Tech Insight

      Start simple. Metrics can be difficult to tackle if you’re starting from scratch. While implementing your change management practice, use these three metrics as a starting point, since they correlate well with the success of change management overall. The following few slides provide more insight into creating metrics for your change process.

      If you want more insight into your change process, measure the progress of each step in change management with metrics

      Improve

      • Number of repeat failures (i.e. making the same mistake twice)
      • Number of changes converted to pre-approved
      • Number of changes converted from pre-approved back to normal

      Request

      • What percentage of change requests have errors or lack appropriate support?
      • What percentage of change requests are actually projects, service requests, or operational tasks?
      • What percentage of changes have been requested before (i.e. documented)?

      Assess

      • What percentage of change requests are out of scope?
      • What percentage of changes have been requested before (i.e. documented)?
      • What are the percentages of changes by category (normal, pre-approved, emergency)?

      Plan

      • What percentage of change requests are reviewed by the CAB that should have been pre-approved or emergency (i.e. what percentage of changes are in the wrong category)?

      Approve

      • Number of changes broken down by department (business unit/IT department to be used in making core/optional CAB membership more efficient)
      • Number of workflows that can be automated

      Implement

      • Number of changes completed on schedule
      • Number of changes rolled back
      • What percentage of changes caused an incident?

      Use metrics to inform project KPIs and CSFs

      Leverage the metrics from the last slide and convert them to data communicable to IT, management, and leadership

      • To provide value, metrics and measurements must be actionable. What actions can be taken as a result of the data being presented?
      • If the metrics are not actionable, there is no value and you should question the use of the metric.
      • Data points in isolation are mostly meaningless to inform action. Observe trends in your metrics to inform your decisions.
      • Using a framework to develop measurements and metrics provides a defined methodology that enables a mapping of base measurements through CSFs.
      • Establishing the relationship increases the value that measurements provide.

      Purposely use SDLC and change lifecycle metrics to find bottlenecks and automation candidates.

      Metrics:

      Metrics are easily measured datapoints that can be pulled from your change management tool. Examples: Number of changes implemented, number of changes without incident.

      KPIs:

      Key Performance Indicators are metrics presented in a way that is easily digestible by stakeholders in IT. Examples: Change efficiency, quality of changes.

      CSFs:

      Critical Success Factors are measures of the business success of change management taken by correlating the CSF with multiple KPIs. Examples: consistent and efficient change management process, a change process mapped to business needs

      List in-scope metrics and reports and align them to benefits

      Metric/Report (by team)Benefit
      Total number of RFCs and percentages by category (pre-approved, normal, emergency, escalated support, expedited)
      • Understand change management activity
      • Tracking maturity growth
      • Identifying “hot spots”
      Pre-approved change list (and additions/removals from the list) Workload and process streamlining (i.e. reduce “red tape” wherever possible)
      Average time between RFC lifecycle stages (by service/application) Advance planning for proposed changes
      Number of changes by service/application/hardware class
      • Identifying weaknesses in the architecture
      • Vendor-specific TCO calculations
      Change triggers Business- vs. IT-initiated change
      Number of RFCs by lifecycle stage Workload planning
      List of incidents related to changes Visible failures of the CM process
      Percentage of RFCs with a tested backout/validation plan Completeness of change planning
      List of expedited changes Spotlighting poor planning and reducing the need for this category going forward (“The Hall of Shame”)
      CAB approval rate Change coordinator alignment with CAB priorities – low approval rate indicates need to tighten gatekeeping by the change coordinator
      Calendar of changes Planning

      4.1.2 Determine Metrics, Key Performance Indicators (KPIs), and Critical Success Factors (CSFs)

      Input

      • Current metrics

      Output

      • List of trackable metrics, KPIs and CSFs

      Materials

      Participants

      • Change Manager
      • Members of the Change Advisory Board
      • Service Desk Manager
      • Operations (optional)
      1. Draw three tables for metrics, KPIs, and CSFs.
      2. Starting with the CSF table, fill in all relevant CSFs that your group wishes to track and measure.
      3. Next, work to determine relevant KPIs correlated with the CSFs and metrics needed to measure the KPIs. Use the tables included below (taken from section 14 of the Change Management SOP) to guide the process.
      4. Record the results in the tables in section 14 of your Change Management SOP.
      5. Decide on where and when to review the metrics to discuss your change management strategy. Designate and owner and record in the RACI and Communications section of your Change Management SOP.
      Ref #Metric

      M1

      Number of changes implemented for a time period
      M2 Number of changes successfully implemented for a time period
      M3 Number of changes implemented causing incidents
      M4 Number of accepted known errors when change is implemented
      M5 Total days for a change build (specific to each change)
      M6 Number of changes rescheduled
      M7 Number of training questions received following a change
      Ref#KPIProduct
      K1 Successful changes for a period of time (approach 100%) M2 / M1 x 100%
      K2 Changes causing incidents (approach 0%) M3 / M1 x 100%
      K3 Average days to implement a change ΣM5 / M1
      K4 Change efficiency (approach 100%) [1 - (M6 / M1)] x 100%
      K5 Quality of changes being implemented (approach 100%) [1 - (M4 / M1)] x 100%
      K6 Change training efficiency (approach 100%) [1 - (M7 / M1)] x 100%
      Ref#CSFIndicator
      C1 Successful change management process producing quality changes K1, K5
      C2 Consistent efficient change process K4, K6
      C3 Change process maps to business needs K5, K6

      Measure changes in selected metrics to evaluate success

      Once you have implemented a standardized change management practice, your team’s goal should be to improve the process, year over year.

      • After a process change has been implemented, it’s important to regularly monitor and evaluate the CSFs, KPIs, and metrics you chose to evaluate. Examine whether the process change you implemented has actually resolved the issue or achieved the goal of the critical success factor.
      • Establish a schedule for regularly reviewing the key metrics. Assess changes in those metrics and determine progress toward reaching objectives.
      • In addition to reviewing CSFs, KPIs, and metrics, check in with the release management team and end users to measure their perceptions of the change management process once an appropriate amount of time has passed.
      • Ensure that metrics are telling the whole story and that reporting is honest in order to be informative.

      Outcomes of standardizing change management should include:

      1. Improved efficiency, effectiveness, and quality of changes.
      2. Changes and processes are more aligned with the business needs and strategy.
      3. Improved maturity of change processes.

      Info-Tech Best Practice

      Make sure you’re measuring the right things and considering all sources of information. It’s very easy to put yourself in a position where you’re congratulating yourselves for improving on a specific metric such as number of releases per month, but satisfaction remains low.

      4.1.3 Track and Record Metrics Using the Change Management Metrics Tool

      Input

      • Current metrics

      Output

      • List of trackable metrics, KPIs and CSFs to be observed over the length of a year

      Materials

      Participants

      • Change Manager
      • Members of the Change Advisory Board
      • Service Desk Manager
      • Operations (optional)

      Tracking the progress of metrics is paramount to the success of any change management process. Use Info-Tech’s Change Management Metrics Tool to record metrics and track your progress. This tool is intended to be a substitute for organizations who do not have the capability to track change-related metrics in their ITSM tool.

      1. Input metrics from the previous activity to track over the course of a year.
      2. To record your metrics, open the tool and go to tab 2. The tool is currently primed to record and track five metrics. If you need more than that, you can edit the list in the hidden calculations tab.
      3. To see the progress of your metrics, move to tab 3 to view a dashboard of all metrics in the tool.

      Download the Change Management Metrics Tool

      Case Study

      A federal credit union was able to track maturity growth through the proper use of metrics.

      Industry: Federal Credit Union (anonymous)

      Source: Info-Tech Workshop

      Challenge

      At this federal credit union, the VP of IT wanted a tight set of metrics to engage with the business, communicate within IT, enable performance management of staff, and provide visibility into workload demands, among other requirements.

      The organization was suffering from “metrics fatigue,” with multiple reports being generated from all groups within IT, to the point that weekly/monthly reports were being seen as spam.

      Solution

      Stakeholders were provided with an overview of change management benefits and were asked to identify one key attribute that would be useful to their specific needs.

      Metrics were designed around the stakeholder needs, piloted with each stakeholder group, fine-tuned, and rolled out.

      Some metrics could not be automated off-the-shelf and were rolled out in a manual fashion. These metrics were subsequently automated and finally made available through a dashboard.

      Results

      The business received clear guidance regarding estimated times to implement changes across different elements of the environment.

      The IT managers were able to plan team workloads with visibility into upstream change activity.

      Architects were able to identify vendors and systems that were the leading source of instability.

      The VP of IT was able to track the maturity growth of the change management process and proactively engage with the business on identified hot spots.

      Step 4.2

      Implement the Project

      Activities

      4.2.1 Use a Communications Plan to Gain End User Buy-In

      4.2.2 Create a Project Roadmap to Track Your Implementation Progress

      Measure, Manage, and Maintain

      Step 4.1: Identify Metrics and Build the Change Calendar

      Step 3.2: Implement the Project

      This step involves the following participants:

      • CIO/IT Director
      • IT Managers
      • Change Manager

      Outcomes of this step

      • A communications plan for key messages to communicate to relevant stakeholders and audiences
      • A roadmap with assigned action items to implement change management

      Success of the new process will depend on introducing change and gaining acceptance

      Change management provides value by promptly evaluating and delivering changes required by the business and by minimizing disruption and rework caused by failed changes. Communication of your new change management process is key. If people do not understand the what and why, it will fail to provide the desired value.

      Info-Tech Best Practice

      Gather feedback from end users about the new process: if the process is too bureaucratic, end users are more likely to circumvent it.

      Main Challenges with Communication

      • Many people fail before they even start because they are buried in a mess created before they arrived – either because of a failed attempt to get change management implemented or due to a complicated system that has always existed.
      • Many systems are maintained because “that’s the way it’s always been done.”
      • Organizations don’t know where to start; they think change management is too complex a process.
      • Each group needs to follow the same procedure – groups often have their own processes, but if they don’t agree with one another, this could cause an outage.

      Educate affected stakeholders to prepare for organizational change

      An organizational change management plan should be part of your change management project.

      • Educate stakeholders about:
        • The process change (describe it in a way that the user can understand and is clear and concise).
          • IT changes will be handled in a standardized and repeatable fashion to minimize change-related incidents.
        • Who is impacted?
          • All users.
        • How are they impacted?
          • All change requests will be made using a standard form and will not be deployed until formal approval is received.
        • Change messaging.
          • How to communicate the change (benefits).
        • Learning and development – training your users on the change.
          • Develop and deliver training session on the Change Management SOP to familiarize users with this new method of handling IT change.

      Host a lunch-and-learn session

      • For the initial deployment, host a lunch-and-learn session to educate the business on the change management practice. Relevant stakeholders of affected departments should host it and cover the following topics:
      • What is change management (change management/change control)?
      • The value of change management.
      • What the Change Management SOP looks like.
      • Who is involved in the change management process (the CAB, etc.)?
      • What constitutes a pre-approved change and an emergency change?
      • An overview of the process, including how to avoid unauthorized changes.
      • Who should they contact in case of questions?

      Communicate the new process to all affected stakeholders

      Do not surprise users or support staff with changes. This will result in lost productivity and low satisfaction with IT services.

      • User groups and the business need to be given sufficient notice of an impending change.
      • This will allow them to make appropriate plans to accept the change, minimizing the impact of the change on productivity.
      • A communications plan will be documented in the RFC while the release is being built and tested.
      • It’s the responsibility of the change team to execute on the communications plan.

      Info-Tech Insight

      The success of change communication can be measured by monitoring the number of service desk tickets related to a change that was not communicated to users.

      Communication is crucial to the integration and overall implementation of your change management initiative. An effective communications plan will:

      • Gain support from management at the project proposal phase.
      • Create end-user buy-in once the program is set to launch.
      • Maintain the presence of the program throughout the business.
      • Instill ownership throughout the business from top-level management to new hires.

      Create your communications plan to anticipate challenges, remove obstacles, and ensure buy-in

      Management

      Technicians

      Business Stakeholders

      Provide separate communications to key stakeholder groups

      Why? What problems are you trying to solve?

      What? What processes will it affect (that will affect me)?

      Who? Who will be affected? Who do I go to if I have issues with the new process?

      When? When will this be happening? When will it affect me?

      How? How will these changes manifest themselves?

      Goal? What is the final goal? How will it benefit me?

      Info-Tech Insight

      Pay close attention to the medium of communication. For example, stakeholders on their feet all day would not be as receptive to an email communication compared to those who primarily work in front of a computer. Put yourself into various stakeholders’ shoes to craft a tailored communication of change management.

      4.2.1 Use a Communications Plan to Gain End User Buy-In

      Input

      • List of stakeholder groups for change management

      Output

      • Tailored communications plans for various stakeholder groups

      Materials

      Participants

      • Change Manager
      • Members of the Change Advisory Board
      • Service Desk Manager
      • Operations (optional)
      1. Using Info-Tech’s Change Management Communications Plan, identify key audiences or stakeholder groups that will be affected by the new change management practice.
      2. For each group requiring a communications plan, identify the following:
        • The benefits for that group of individuals.
        • The impact the change will have on them.
        • The best communication method(s) for them.
        • The time frame of the communication.
      3. Complete this information in a table like the one below:
      GroupBenefitsImpactMethodTimeline
      IT Standardized change process All changes must be reviewed and approved Poster campaign 6 months
      End Users Decreased wait time for changes Formal process for RFCs Lunch-and-learn sessions 3 months
      Business Reduced outages Increased involvement in planning and approvals Monthly reports 1 year
      1. Discuss the communications plan:
        • Will this plan ensure that users are given adequate opportunities to accept the changes being deployed?
        • Is the message appropriate for each audience? Is the format appropriate for each audience?
        • Does the communication include training where necessary to help users adopt any new functions/workflows being introduced?

      Download the Change Management Communications Plan

      Present your SOP to key stakeholders and obtain their approval

      Now that you have completed your Change Management SOP, the final step is to get sign-off from senior management to begin the rollout process.

      Know your audience:

      • Determine the service management stakeholders who will be included in the audience for your presentation.
      • You want your presentation to be succinct and hard hitting. Management’s time is tight and they will lose interest if you drag out the delivery.
      • Briefly speak about the need for more formal change management and emphasize the benefits of implementing a more formal process with a SOP.
      • Present your current state assessment results to provide context before presenting the SOP itself.
      • As with any other foundational activity, be prepared with some quick wins to gain executive attention.
      • Be prepared to review with both technical and less technical stakeholders.

      Info-Tech Insight

      The support of senior executive stakeholders is critical to the success of your SOP rollout. Try to wow them with project benefits and make sure they know about the risks/pain points.

      Download the Change Management Project Summary Template

      4.2.2 Create a Project Roadmap to Track Your Implementation Progress

      Input

      • List of implementation tasks

      Output

      • Roadmap and timeline for change management implementation

      Materials

      Participants

      • Change Manager
      • Members of the Change Advisory Board
      • Service Desk Manager
      • Operations (optional)
      1. Info-Tech’s Change Management Roadmap Tool helps you identify and prioritize tasks that need to be completed for the change management implementation project.
      2. Use this tool to identify each action item that will need to be completed as part of the change management initiative. Chart each action item, assign an owner, define the duration, and set a completion date.
      3. Use the resulting rocket diagram as a guide to task completion as you work toward your future state.

      Download the Change Management Roadmap Tool

      Case Study (part 4 of 4)

      Intel implemented a robust change management process.

      Industry: Technology

      Source: Daniel Grove, Intel

      Challenge

      Founded in 1968, the world’s largest microchip and semiconductor company employs over 100,000 people. Intel manufactures processors for major players in the PC market including Apple, Lenovo, HP, and Dell.

      Intel IT supports over 65,000 servers, 3.2 petabytes of data, over 70,000 PCs, and 2.6 million emails per day.

      Intel’s change management program is responsible for over 4,000 changes each week.

      Solution

      Intel had its new change management program in place and the early milestones planned, but one key challenge with any new project is communication.

      The company also needed to navigate the simplification of a previously complex process; end users could be familiar with any of the 37 different change processes or 25 different change management systems of record.

      Top-level buy-in was another concern.

      Results

      Intel first communicated the process changes by publishing the vision and strategy for the project with top management sponsorship.

      The CIO published all of the new change policies, which were supported by the Change Governance Council.

      Intel cited the reason for success as the designation of a Policy and Guidance Council – a group designed to own communication and enforcement of the new policies and processes put in place.

      Summary of Accomplishment

      Problem Solved

      You now have an outline of your new change management process. The hard work starts now for an effective implementation. Make use of the communications plan to socialize the new process with stakeholders and the roadmap to stay on track.

      Remember as you are starting your implementation to keep your documents flexible and treat them as “living documents.” You will likely need to tweak and refine the processware and templates several times to continually improve the process. Furthermore, don’t shy away from seeking feedback from your stakeholders to gain buy-in.

      Lastly, keep an eye on your progress with objective, data-driven metrics. Leverage the trends in your data to drive your decisions. Be sure to revisit the maturity assessment not only to measure and visualize your progress, but to gain insight into your next steps.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Additional Support

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.

      Info-Tech analysts will join you and your team at your location or welcome you to Info-Tech’s historic office in Toronto, Ontario, Canada to participate in an innovative onsite workshop.

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1.2 Complete a Change Management Maturity Assessment

      Run through the change management maturity assessment with tailored commentary for each action item outlining context and best practices.

      2.2.1 Plot the Process for a Normal Change

      Build a normal change process using Info-Tech’s Change Management Process Library template with an analyst helping you to right size the process for your organization.

      Related Info-Tech Research

      Standardize the Service Desk

      Improve customer service by driving consistency in your support approach and meeting SLAs.

      Stabilize Release and Deployment Management

      Maintain both speed and control while improving the quality of deployments and releases within the infrastructure team.

      Incident and Problem Management

      Don’t let persistent problems govern your department.

      Select Bibliography

      AXELOS Limited. ITIL Foundation: ITIL 4th edition. TSO, 2019, pp. 118–120.

      Behr, Kevin and George Spafford. The Visible Ops Handbook: Implementing ITIL in 4 Practical and Auditable Steps. IT Revolution Press. 2013.

      BMC. “ITIL Change Management.” BMC Software Canada, 22 December 2016.

      Brown, Vance. “Change Management: The Greatest ROI of ITIL.” Cherwell Service Management.

      Cisco. “Change Management: Best Practices.” Cisco, 10 March 2008.

      Grove, Daniel. “Case Study ITIL Change Management Intel Corporation.” PowerShow, 2005.

      ISACA. “COBIT 5: Enabling Processes.” ISACA, 2012.

      Jantti, M. and M. Kainulainen. “Exploring an IT Service Change Management Process: A Case Study.” ICDS 2011: The Fifth International Conference on Digital Society, 23 Feb. 2011.

      Murphy, Vawns. “How to Assess Changes.” The ITSM Review, 29 Jan. 2016.

      Nyo, Isabel. “Best Practices for Change Management in the Age of DevOps.” Atlassian Engineering, 12 May 2021.

      Phillips, Katherine W., Katie A. Liljenquist, and Margaret A. Neale. “Better Decisions Through Diversity.” Kellogg Insight, 1 Oct. 2010.

      Pink Elephant. “Best Practices for Change Management.” Pink Elephant, 2005.

      Sharwood, Simon. “Google broke its own cloud by doing two updates at once.” The Register, 24 Aug. 2016.

      SolarWinds. “How to Eliminate the No: 1 Cause of Network Downtime.” SolarWinds Tech Tips, 25 Apr. 2014.

      The Stationery Office. “ITIL Service Transition: 2011.” The Stationary Office, 29 July 2011.

      UCISA. “ITIL – A Guide to Change Management.” UCISA.

      Zander, Jason. “Final Root Cause Analysis and Improvement Areas: Nov 18 Azure Storage Service Interruption.” Microsoft Azure: Blog and Updates, 17 Dec. 2014.

      Appendix I: Expedited Changes

      Employ the expedited change to promote process adherence

      In many organizations, there are changes which may not fit into the three prescribed categories. The reason behind why the expedited category may be needed generally falls between two possibilities:

      1. External drivers dictate changes via mandates which may not fall within the normal change cycle. A CIO, judge, state/provincial mandate, or request from shared services pushes a change that does not fall within a normal change cycle. However, there is no imminent outage (therefore it is not an emergency). In this case, an expedited change can proceed. Communicate to the change requester that IT and the change build team will still do their best to implement the change without issue, but any extra risk of implementing this expedited change (compared to an normal change) will be absorbed by the change requester.
      2. The change requester did not prepare for the change adequately. This is common if a new change process is being established (and stakeholders are still adapting to the process). Change requesters or the change build team may request the change to be done by a certain date that does not fall within the normal change cycle, or they simply did not give the CAB enough time to vet the change. In this case, you may use the expedited category as a metric (or a “Hall of Shame” example). If you identify a department or individual that frequently request expedited changes, use the expedited category as a means to educate them about the normal change to discourage the behavior moving forward.

      Two possible ways to build an expedited change category”

      1. Build the category similar to an emergency change. In this case, one difference would be the time allotted to fully obtain authorization of the change from the E-CAB and business owner before implementing the change (as opposed to the emergency change workflow).
      2. Have the expedited change reflect the normal change workflow. In this case, all the same steps of the normal change workflow are followed except for expedited timelines between processes. This may include holding an impromptu CAB meeting to authorize the change.

      Example process: Expedited Change Process

      The image is a flowchart, showing the process for Expedited Change.

      For the full process, refer to the Change Management Process Library.

      Appendix II: Optimize IT Change Management in a DevOps Environment

      Change Management cannot be ignored because you are DevOps or Agile

      But it can be right-sized.

      The core tenets of change management still apply no matter the type of development environment an organization has. Changes in any environment carry risk of degrading functionality, and must therefore be vetted. However, the amount of work and rigor put into different stages of the change life cycle can be altered depending on the maturity of the development workflows. The following are several stage gates for change management that MUST be considered if you are a DevOps or Agile shop:

      • Intake assessment (separation of changes from projects, service requests, operational tasks)
        • Within a DevOps or Agile environment, many of the application changes will come directly from the SDLC and projects going live. It does not mean a change must go through CAB, but leveraging the pre-approved category allows for an organization to stick to development lifecycles without being heavily bogged down by change bureaucracy.
      • Technical review
        • Leveraging automation, release contingencies, and the current SDLC documentation to decrease change risk allows for various changes to be designated as pre-approved.
      • Authorization
        • Define the authorization and dependencies of a change early in the lifecycle to gain authorization and necessary signoffs.
      • Documentation/communication
        • Documentation and communication are post-implementation activities that cannot be ignored. If documentation is required throughout the SDLC, then design the RFC to point to the correct documentation instead of duplicating information.

      "Understand that process is hard and finding a solution that fits every need can be tricky. With this change management process we do not try to solve every corner case so much as create a framework by which best judgement can be used to ensure maximum availability of our platforms and services while still complying with our regulatory requirements and making positive changes that will delight our customers.“ -IT Director, Information Cybersecurity Organization

      Five principals for implementing change in DevOps

      Follow these best practices to make sure your requirements are solid:

      People

      The core differences between an Agile or DevOps transition and a traditional approach are the restructuring and the team behind it. As a result, the stakeholders of change management must be onboard for the process to work. This is the most difficult problem to solve if it’s an issue, but open avenues of feedback for a process build is a start.

      DevOps Lifecycles

      • Plan the dev lifecycle so people can’t skirt it. Ensure the process has automated checks so that it’s more work to skirt the system than it is to follow it. Make the right process the process of least resistance.
      • Plan changes from the start to ensure that cross-dependencies are identified early and that the proposed implementation date is deconflicted and visible to other change requesters and change stakeholders.

      Automation

      Automation comes in many forms and is well documented in many development workflows. Having automated signoffs for QA/security checks and stakeholders/cross dependency owner sign offs may not fully replace the CAB but can ease the burden on discussions before implementation.

      Contingencies

      Canary releases, phased releases, dark releases, and toggles are all options you can employ to reduce risk during a release. Furthermore, building in contingencies to the test/rollback plan decreases the risk of the change by decreasing the factor of likelihood.

      Continually Improve

      Building change from the ground up doesn’t meant the process has to be fully fledged before launch. Iterative improvements are possible before achieving an optimal state. Having the proper metrics on the pain points and bottlenecks in the process can identify areas for automation and improvement.

      Increasing the proportion of pre-approved changes

      Leverage the traditional change infrastructure to deploy changes quickly while keeping your risk low.

      • To designate a change as a pre-approved change it must have a low risk rating (based on impact and likelihood). Fortunately, many of the changes within the Agile framework are designed to be small and lower risk (at least within application development). Putting in the work ahead of time to document these changes, template RFCs, and document the dependencies for various changes allows for a shift in the proportion of pre-approved changes.
      • The designation of pre-approved changes is an ongoing process. This is not an overnight initiative. Measure the proportion of changes by category as a metric, setting goals and interim goals to shift the change proportion to a desired ratio.

      The image is a bar graph, with each bar having 3 colour-coded sections: Emergency, Normal, and Pre-Approved. The first bar is before, where the largest change category is Normal. The second bar is after, and the largest change category is Pre-Approved.

      Turn your CAB into a virtual one

      • The CAB does not have to fully disappear in a DevOps environment. If the SDLC is built in a way that authorizes changes through peer reviews and automated checks, by the time it’s deployed, the job of the CAB should have already been completed. Then the authorization stage-gate (traditionally, the CAB) shifts to earlier in the process, reducing the need for an actual CAB meeting. However, the change must still be communicated and documented, even if it’s a pre-approved change.
      • As the proportion of changes shifts from a high degree of normal changes to a high degree of pre-approved changes, the need for CAB meetings should decrease even further. As an end-state, you may reserve actual CAB meetings for high-profile changes (as defined by risk).
      • Lastly, change management does not disappear as a process. Periodic reviews of change management metrics and the pre-approved change list must still be completed.

      Create and Manage Enterprise Data Models

      • Buy Link or Shortcode: {j2store}340|cart{/j2store}
      • member rating overall impact: 9.2/10 Overall Impact
      • member rating average dollars saved: $7,263 Average $ Saved
      • member rating average days saved: 16 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Business executives don’t understand the value of Conceptual and Logical Data Models and how they define their data assets.
      • Data, like mercury, is difficult to manage and contain.
      • IT needs to justify the time and cost of developing and maintaining Data Models.
      • Data as an asset is only perceived from a physical point of view, and the metadata that provides context and definition is often ignored.

      Our Advice

      Critical Insight

      • Data Models tell the story of the organization and its data in pictures to be used by a business as a tool to evolve the business capabilities and processes.
      • Data Architecture and Data Modeling have different purposes and should be represented as two distinct processes within the software development lifecycle (SDLC).
      • The Conceptual Model provides a quick win for both business and IT because it can convey abstract business concepts and thereby compartmentalize the problem space.

      Impact and Result

      • A Conceptual Model can be used to define the semantics and relationships for your analytical layer.
        • It provides a visual representation of your data in the semantics of business.
        • It acts as the anchor point for all data lineages.
        • It can be used by business users and IT for data warehouse and analytical planning.
        • It provides the taxonomies for data access profiles.
        • It acts as the basis for your Enterprise Logical and Message Models.

      Create and Manage Enterprise Data Models Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create enterprise data models, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Setting the stage

      Prepare your environment for data architecture.

      • Enterprise Data Models

      2. Revisit your SDLC

      Revisit your SDLC to embed data architecture.

      • Enterprise Architecture Tool Selection

      3. Develop a Conceptual Model

      Create and maintain your Conceptual Data Model via an iterative process.

      4. Data Modeling Playbook

      View the main deliverable with sample models.

      • Data Modeling Playbook
      [infographic]

      Workshop: Create and Manage Enterprise Data Models

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the Data Architecture Practice

      The Purpose

      Understand the context and goals of data architecture in your organization.

      Key Benefits Achieved

      A foundation for your data architecture practice.

      Activities

      1.1 Review the business context.

      1.2 Obtain business commitment and expectations for data architecture.

      1.3 Define data architecture as a discipline, its role, and the deliverables.

      1.4 Revisit your SDLC to embed data architecture.

      1.5 Modeling tool acquisition if required.

      Outputs

      Data Architecture vision and mission and governance.

      Revised SDLC to include data architecture.

      Staffing strategy.

      Data Architecture engagement protocol.

      Installed modeling tool.

      2 Business Architecture and Domain Modeling

      The Purpose

      Identify the concepts and domains that will inform your data models.

      Key Benefits Achieved

      Defined concepts for your data models.

      Activities

      2.1 Revisit business architecture output.

      2.2 Business domain selection.

      2.3 Identify business concepts.

      2.4 Organize and group of business concepts.

      2.5 Build the Business Data Glossary.

      Outputs

      List of defined and documented entities for the selected.

      Practice in the use of capability and business process models to identify key data concepts.

      Practice the domain modeling process of grouping and defining your bounded contexts.

      3 Harvesting Reference Models

      The Purpose

      Harvest reference models for your data architecture.

      Key Benefits Achieved

      Reference models selected.

      Activities

      3.1 Reference model selection.

      3.2 Exploring and searching the reference model.

      3.3 Harvesting strategies and maintaining linkage.

      3.4 Extending the conceptual and logical models.

      Outputs

      Established and practiced steps to extend the conceptual or logical model from the reference model while maintaining lineage.

      4 Harvesting Existing Data Artifacts

      The Purpose

      Gather more information to create your data models.

      Key Benefits Achieved

      Remaining steps and materials to build your data models.

      Activities

      4.1 Use your data inventory to select source models.

      4.2 Match semantics.

      4.3 Maintain lineage between BDG and existing sources.

      4.4 Select and harvest attributes.

      4.5 Define modeling standards.

      Outputs

      List of different methods to reverse engineer existing models.

      Practiced steps to extend the logical model from existing models.

      Report examples.

      5 Next Steps and Wrap-Up (offsite)

      The Purpose

      Wrap up the workshop and set your data models up for future success.

      Key Benefits Achieved

      Understanding of functions and processes that will use the data models.

      Activities

      5.1 Institutionalize data architecture practices, standards, and procedures.

      5.2 Exploit and extend the use of the Conceptual model in the organization.

      Outputs

      Data governance policies, standards, and procedures for data architecture.

      List of business function and processes that will utilize the Conceptual model.

      Help Managers Inform, Interact, and Involve on the Way to Team Engagement

      • Buy Link or Shortcode: {j2store}595|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Employee Development
      • Parent Category Link: /train-and-develop
      • Employee engagement impacts a company’s bottom line as well as the quality of work life for employees.
      • Employee engagement surveys often fail to provide the value you are hoping for because they are treated like an annual project that quickly loses steam.
      • The responsibility for fixing the issues identified falls to HR, and ultimately HR has very little control over an employee’s concerns with their day-to-day role.

      Our Advice

      Critical Insight

      • HR and the executive team have been exclusively responsible for engagement for too long. Since managers have the greatest impact on employees, they should also be primarily responsible for employee engagement.
      • In most organizations, managers underestimate the impact they can have on employee engagement, and assume that the broader organization will take more meaningful action.
      • Improving employee engagement may be as simple as improving the frequency and quality of the “3Is”: informing employees about the why behind decisions, interacting with them on a personal level, and involving them in decisions that affect them.

      Impact and Result

      • Managers have the greatest impact on employee engagement as they are in a unique situation to better understand what makes employees tick.
      • If employees have a good relationship with their manager, they are much more likely to be engaged at work which ultimately leads to increases in revenue, profit, and shareholder return.

      Help Managers Inform, Interact, and Involve on the Way to Team Engagement Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Get more involved in analyzing and improving team engagement

      Improve employee engagement and ultimately the organization’s bottom line.

      • Storyboard: Help Managers Inform, Interact, and Involve on the Way to Team Engagement

      2. Gather feedback from employees

      Have a productive engagement feedback discussion with teams.

      • Engagement Feedback Session Agenda Template

      3. Engage teams to improve engagement

      Facilitate effective team engagement action planning.

      • Action Planning Worksheet

      4. Gain insight into what engages and disengages employees

      Solicit employee pain points that could potentially hinder their engagement.

      • Stay Interview Guide

      5. Get to know new hires on a more personal level

      Develop a stronger relationship with employees to drive engagement.

      • New Hire Conversation Guide
      [infographic]

      Do you believe in absolute efficiency?

      Weekend read. Hence I post this a bit later on Friday.
      Lately, I've been fascinated by infinity. And in infinity, some weird algebra pops up. Yet that weirdness is very much akin to what our business stakeholders want, driven by what our clients demand, and hence our KPIs drive us. Do more with less. And that is what absolute efficiency means.

      Register to read more …

      Reduce Manual Repetitive Work With IT Automation

      • Buy Link or Shortcode: {j2store}458|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $34,099 Average $ Saved
      • member rating average days saved: 2 Average Days Saved
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • IT staff are overwhelmed with manual repetitive work.
      • You have little time for projects.
      • You cannot move as fast as the business wants.

      Our Advice

      Critical Insight

      • Optimize before you automate.
      • Foster an engineering mindset.
      • Build a process to iterate.

      Impact and Result

      • Begin by automating a few tasks with the highest value to score quick wins.
      • Define a process for rolling out automation, leveraging SDLC best practices.
      • Determine metrics and continually track the success of the automation program.

      Reduce Manual Repetitive Work With IT Automation Research & Tools

      Start here – read the Executive Brief

      Read this Executive Brief to understand why you should reduce manual repetitive work with IT automation.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify automation candidates

      Select the top automation candidates to score some quick wins.

      • Reduce Manual Repetitive Work With IT Automation – Phase 1: Identify Automation Candidates
      • IT Automation Presentation
      • IT Automation Worksheet

      2. Map and optimize process flows

      Map and optimize process flows for each task you wish to automate.

      • Reduce Manual Repetitive Work With IT Automation – Phase 2: Map & Optimize Process Flows

      3. Build a process for managing automation

      Build a process around managing IT automation to drive value over the long term.

      • Reduce Manual Repetitive Work With IT Automation – Phase 3: Build a Process for Managing Automation

      4. Build automation roadmap

      Build a long-term roadmap to enhance your organization's automation capabilities.

      • Reduce Manual Repetitive Work With IT Automation – Phase 4: Build Automation Roadmap
      • IT Automation Roadmap
      [infographic]

      Workshop: Reduce Manual Repetitive Work With IT Automation

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify Automation Candidates

      The Purpose

      Identify top candidates for automation.

      Key Benefits Achieved

      Plan to achieve quick wins with automation for early value.

      Activities

      1.1 Identify MRW pain points.

      1.2 Drill down pain points into tasks.

      1.3 Estimate the MRW involved in each task.

      1.4 Rank the tasks based on value and ease.

      1.5 Select top candidates and define metrics.

      1.6 Draft project charters.

      Outputs

      MRW pain points

      MRW tasks

      Estimate of MRW involved in each task

      Ranking of tasks for suitability for automation

      Top candidates for automation & success metrics

      Project charter(s)

      2 Map & Optimize Processes

      The Purpose

      Map and optimize the process flow of the top candidate(s).

      Key Benefits Achieved

      Requirements for automation of the top task(s).

      Activities

      2.1 Map process flows.

      2.2 Review and optimize process flows.

      2.3 Clarify logic and finalize future-state process flows.

      Outputs

      Current-state process flows

      Optimized process flows

      Future-state process flows with complete logic

      3 Build a Process for Managing Automation

      The Purpose

      Develop a lightweight process for rolling out automation and for managing the automation program.

      Key Benefits Achieved

      Ability to measure and to demonstrate success of each task automation, and of the program as a whole.

      Activities

      3.1 Kick off your test plan for each automation.

      3.2 Define process for automation rollout.

      3.3 Define process to manage your automation program.

      3.4 Define metrics to measure success of your automation program.

      Outputs

      Test plan considerations

      Automation rollout process

      Automation program management process

      Automation program metrics

      4 Build Automation Roadmap

      The Purpose

      Build a roadmap to enhance automation capabilities.

      Key Benefits Achieved

      A clear timeline of initiatives that will drive improvement in the automation program to reduce MRW.

      Activities

      4.1 Build a roadmap for next steps.

      Outputs

      IT automation roadmap

      Further reading

      Reduce Manual Repetitive Work With IT Automation

      Free up time for value-adding jobs.

      ANALYST PERSPECTIVE

      Automation cuts both ways.

      Automation can be very, very good, or very, very bad.
      Do it right, and you can make your life a whole lot easier.
      Do it wrong, and you can suffer some serious pain.
      All too often, automation is deployed willy-nilly, without regard to the overall systems or business processes in which it lives.
      IT professionals should follow a disciplined and consistent approach to automation to ensure that they maximize its value for their organization.

      Derek Shank,
      Research Analyst, Infrastructure & Operations
      Info-Tech Research Group

      Executive summary

      Situation

      • IT staff are overwhelmed with manual repetitive work.
      • You have little time for projects.
      • You cannot move as fast as the business wants.

      Complication

      • Automation is simple to say, but hard to implement.
      • Vendors claim automation will solve all your problems.
      • You have no process for managing automation.

      Resolution

      • Begin by automating a few tasks with the highest value to score quick wins.
      • Define a process for rolling out automation, leveraging SDLC best practices.
      • Determine metrics and continually track the success of the automation program.

      Info-Tech Insight

      1. Optimize before you automate.The current way isn’t necessarily the best way.
      2. Foster an engineering mindset.Your team members may not be process engineers, but they should learn to think like one.
      3. Build a process to iterate.Effective automation can't be a one-and-done. Define a lightweight process to manage your program.

      Infrastructure & operations teams are overloaded with work

      • DevOps and digital transformation initiatives demand increased speed.
      • I&O is still tasked with security and compliance and audit.
      • I&O is often overloaded and unable to keep up with demand.

      Manual repetitive work (MRW) sucks up time

      • Manual repetitive work is a fact of life in I&O.
      • DevOps circles refer to this type of work simply as “toil.”
      • Toil is like treading water: it must be done, but it consumes precious energy and effort just to stay in the same place.
      • Some amount of toil is inevitable, but it's important to measure and cap toil, so it does not end up overwhelming your team's whole capacity for engineering work.

      Info-Tech Insight

      Follow our methodology to focus IT automation on reducing toil.

      Manual hand-offs create costly delays

      • Every time there is a hand-off, we lose efficiency and productivity.
      • In addition to the cost of performing manual work itself, we must also consider the impact of lost productivity caused by the delay of waiting for that work to be performed.

      Every queue is a tire fire

      Queues create waste and are extremely damaging. Like a tire fire, once you get started, they’re almost impossible to stamp out!

      Increase queues if you want

      • “More overhead”
      • “Lower quality”
      • “More variability”
      • “Less motivation”
      • “Longer cycle time”
      • “Increased risk”

      (Source: Edwards, citing Donald G. Reinersten: The Principles of Product Development Flow: Second Generation Lean Product Development )

      Increasing complexity makes I&O’s job harder

      Every additional layer of complexity multiplies points of failure. Beyond a certain level of complexity, troubleshooting can become a nightmare.

      Today, Operations is responsible for the outcomes of a full stack of a very complex, software-defined, API-enabled system running on infrastructure they may or may not own.
      – Edwards

      Growing technical debt means an ever-rising workload

      • Enterprises naturally accumulate technical debt.
      • All technology requires care and feeding.
      • I&O cannot control how much technology it’s expected to support.
      • I&O faces a larger and larger workload as technical debt accumulates.

      The systems built under each new technology paradigm never fully replace the systems built under the old paradigms. It’s not uncommon for an enterprise to have an accumulation of systems built over 10-15 years and have no budget, risk appetite, or even a viable path to replace them all. With each shift, who bares [SIC] the brunt of the responsibility for making sure the old and the new hang together? Operations, of course. With each new advance, Operations juggles more complexity and more layers of legacy technologies than ever before.
      – Edwards

      Most IT shops can’t have a dedicated engineering team

      • In most organizations, the team that builds things is best equipped to support them.
      • Often the knowledge to design systems and the knowledge to run those systems naturally co-exists in the same personnel resources.
      • When your I&O team is trying to do engineering work, they can end up frequently interrupted to perform operational tasks.
      A Venn Diagram is depicted which compares People who build things with People who run things. the two circles are almost completely overlapping, indicating the strong connection between the two groups.

      Personnel resources in most IT organizations overlap heavily between “build” and “run.”

      IT operations must become an engineering practice

      • Usually you can’t double your staff or double their hours.
      • IT professionals must become engineers.
      • We do this by automating manual repetitive work and reducing toil.
      Two scenarios are depicted. The first scenario is found at a hypothetical work camp, in which one employee performs the task of manually splitting firewood with an axe. In order to split twice as much firewood, the employee would need to spend twice the time. The second scenario is Engineering Operations. in this scenario, a wood processor is used to automate the task, allowing far more wood to be split in same amount of time.

      Build your Sys Admin an Iron Man suit

      Some CIOs see a Sys Admin and want to replace them with a Roomba. I see a Sys Admin and want to build them an Iron Man suit.
      – Deepak Giridharagopal, CTO, Puppet

      Two Scenarios are depicted. In one, an employee is replaced by automation, represented by a Roomba, reducing costs by laying off a single employee. In the second scenario, the single employee is given automated tools to do their job, represented by an iron-man suit, leading to a 10X boost in employee productivity.

      Use automation to reduce risk

      Consistency

      When we automate, we can make sure we do something the same way every time and produce a consistent result.

      Auditing and Compliance

      We can design an automated execution that will ship logs that provide the context of the action for a detailed audit trail.

      Change

      • Enterprise environments are continually changing.
      • When context changes, so does the procedure.
      • You can update your docs all you want, but you can't make people read them before executing a procedure.
      • When you update the procedure itself, you can make sure it’s executed properly.

      Follow Info-Tech’s approach: Start small and snowball

      • It’s difficult for I&O to get the staffing resources it needs for engineering work.
      • Rather than trying to get buy-in for resources using a “top down” approach, Info-Tech recommends that I&O score some quick wins to build momentum.
      • Show success while giving your team the opportunity to build their engineering chops.

      Because the C-suite relies on upwards communication — often filtered and sanitized by the time it reaches them — executives don’t see the bottlenecks and broken processes that are stalling progress.
      – Andi Mann

      Info-Tech’s methodology employs a targeted approach

      • You aren’t going to automate IT operations end-to-end overnight.
      • In fact, such a large undertaking might be more effort than it’s worth.
      • Info-Tech’s methodology employs a targeted approach to identify which candidates will score some quick wins.
      • We’ll demonstrate success, gain momentum, and then iterate for continual improvement.

      Invest in automation to reap long-term rewards

      • All too often people think of automation like a vacuum cleaner you can buy once and then forget.
      • The reality is you need to perform care and feeding for automation like for any other process or program.
      • To reap the greatest rewards you must continually invest in automation – and invest wisely.

      To get the full ROI on your automation, you need to treat it like an employee. When you hire an employee, you invest in that person. You spend time and resources training and nurturing new employees so they can reach their full potential. The investment in a new employee is no different than your investment in automation.– Edwards

      Measure the success of your automation program

      Example of How to Estimate Dollar Value Impact of Automation
      Metric Timeline Target Value
      Hours of manual repetitive work 12 months 20% reduction $48,000/yr.(1)
      Hours of project capacity 18 months 30% increase $108,000/yr.(2)
      Downtime caused by errors 6 months 50% reduction $62,500/yr.(3)

      1 15 FTEs x 80k/yr.; 20% of time on MRW, reduced by 20%
      2 15 FTEs x 80k/yr.; 30% project capacity, increased by 30%
      3 25k/hr. of downtime.; 5 hours per year of downtime caused by errors

      Automating failover for disaster recovery

      CASE STUDY

      Industry Financial Services
      Source Interview

      Challenge

      An IT infrastructure manager had established DR failover procedures, but these required a lot of manual work to execute. His team lacked the expertise to build automation for the failover.

      Solution

      The manager hired consultants to build scripts that would execute portions of the failover and pause at certain points to report on outcomes and ask the human operator whether to proceed with the next step.

      Results

      The infrastructure team reduced their achievable RTOs as follows:
      Tier 1: 2.5h → 0.5h
      Tier 2: 4h → 1.5h
      Tier 3: 8h → 2.5h
      And now, anyone on the team could execute the entire failover!

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Reduce Manual Repetitive Work With IT Automation – project overview

      1. Select Candidates 2. Map Process Flows 3. Build Process 4. Build Roadmap
      Best-Practice Toolkit

      1.1 Identify MRW pain points

      1.2 Drill down pain points into tasks

      1.3 Estimate the MRW involved in each task

      1.4 Rank the tasks based on value and ease

      1.5 Select top candidates and define metrics

      1.6 Draft project charters

      2.1 Map process flows

      2.2 Review and optimize process flows

      2.3 Clarify logic and finalize future-state process flows

      3.1 Kick off your test plan for each automation

      3.2 Define process for automation rollout

      3.3 Define process to manage your automation program

      3.4 Define metrics to measure success of your automation program

      4.1 Build automation roadmap

      Guided Implementations

      Introduce methodology.

      Review automation candidates.

      Review success metrics.

      Review process flows.

      Review end-to-end process flows.

      Review testing considerations.

      Review automation SDLC.

      Review automation program metrics.

      Review automation roadmap.

      Onsite Workshop Module 1:
      Identify Automation Candidates
      Module 2:
      Map and Optimize Processes
      Module 3:
      Build a Process for Managing Automation
      Module 4:
      Build Automation Roadmap
      Phase 1 Results:
      Automation candidates and success metrics
      Phase 2 Results:
      End-to-end process flows for automation
      Phase 3 Results:
      Automation SDLC process, and automation program management process
      Phase 4 Results:
      Automation roadmap

      Understand Common IT Contract Provisions to Negotiate More Effectively

      • Buy Link or Shortcode: {j2store}234|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $31,716 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Contract reviews are tedious, and reviewers may lack the skills and experience to effectively complete the process.
      • Vendors have a repository of contract terms and conditions that are road-tested and often biased in their favor.
      • Vendors change their contracts frequently through hyperlinked documents without notifying customers, and the onus is on you to stay compliant.

      Our Advice

      Critical Insight

      • Focus on the terms and conditions, not just the price. Too often, organizations focus on the price contained within their contracts, neglecting to address core terms and conditions that can end up costing multiples of the initial price.
      • Lawyers can’t ensure you get the best business deal. Lawyers tend to look at general terms and conditions for legal risk and may not understand IT-specific components and business needs.

      Impact and Result

      • Align contract language to meet IT and business needs.
      • Communicate more effectively with Legal and the vendors.
      • Identify and reduce contractual and performance risk.
      • Understand the relationship between contract provisions.
      • Negotiate more effectively.

      Understand Common IT Contract Provisions to Negotiate More Effectively Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should employ a systematic process for reviewing contracts, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess contract terms and conditions

      Review and assess your IT contracts for vendor-biased terms and conditions, and gain tips for getting vendors to take on their fair share of risk and become more accountable.

      • Contract Review Tool
      • Contract Playbook
      [infographic]

      Workshop: Understand Common IT Contract Provisions to Negotiate More Effectively

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess Contract Terms and Conditions

      The Purpose

      Understand IT contract clauses, improve risk identification, and be more effective at negotiating contract terms.

      Key Benefits Achieved

      Increased awareness of how contract provisions relate to each other.

      Demystification of legalese and legal concepts.

      Increased ability to seek assistance from internal parties (e.g. Legal, Risk, and Procurement).

      Activities

      1.1 Review the Contract Review Tool.

      1.2 Review the Contract Playbook template.

      1.3 Review 35 contract provisions and reinforce key learnings with exercises (spread across three days)

      Outputs

      Partial completion of the template

      Exercise results and debrief

      Considerations to Optimize Container Management

      • Buy Link or Shortcode: {j2store}499|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Data Center & Facilities Strategy
      • Parent Category Link: /data-center-and-facilities-strategy

      Do you experience challenges with the following:

      • Equipping IT operations processes to manage containers.
      • Choosing the right container technology.
      • Optimizing your infrastructure strategy for containers.

      Our Advice

      Critical Insight

      • Plan ahead to ensure your container strategy aligns with your infrastructure roadmap. Before deciding between bare metal and cloud, understand the different components of a container management solution and plan for current and future infrastructure services.
      • When selecting tools from multiple sources, it is important to understand what each tool should and should not meet. This holistic approach is necessary to avoid gaps and duplication of effort.

      Impact and Result

      Use the reference architecture to plan for the solution you need and want to deploy. Infrastructure planning and strategy optimizes the container image supply chain, uses your current infrastructure, and reduces costs for compute and image scan time.

      Considerations to Optimize Container Management Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Considerations to Optimize Container Management Deck – A document to guide you design your container strategy.

      A document that walks you through the components of a container management solution and helps align your business objectives with your current infrastructure services and plan for your future assets.

      • Considerations to Optimize Container Management Storyboard

      2. Container Reference Architecture – A best-of-breed template to help you build a clear, concise, and compelling strategy document for container management.

      Complete the reference architecture tool to strategize your container management.

      • Container Reference Architecture
      [infographic]

      Further reading

      Considerations to Optimize Container Management

      Design a custom reference architecture that meets your requirements.

      Analyst Perspective

      Containers have become popular as enterprises use DevOps to develop and deploy applications faster. Containers require managed services because the sheer number of containers can become too complex for IT teams to handle. Orchestration platforms like Kubernetes can be complex, requiring management to automatically deploy container-based applications to operating systems and public clouds. IT operations staff need container management skills and training.

      Installing and setting up container orchestration tools can be laborious and error-prone. IT organizations must first implement the right infrastructure setup for containers by having a solid understanding of the scope and scale of containerization projects and developer requirements. IT administrators also need to know how parts of the existing infrastructure connect and communicate to maintain these relationships in a containerized environment. Containers can run on bare metal servers, virtual machines in the cloud, or hybrid configurations, depending on your IT needs

      Nitin Mukesh, Senior Research Analyst, Infrastructure and Operations

      Nitin Mukesh
      Senior Research Analyst, Infrastructure and Operations
      Info-Tech Research Group

      Executive Summary

      Your Challenge Common Obstacles Info-Tech’s Approach

      The container software market is constantly evolving. Organizations must consider many factors to choose the right container management software for their specific needs and fit their future plans.

      It's important to consider your organization's current and future infrastructure strategy and how it fits with your container management strategy. The container management platform you choose should be compatible with the existing network infrastructure and storage capabilities available to your organization.

      IT operations staff have not been thinking the same way as developers who have now been using an agile approach for some time. Container image builds are highly automated and have several dependencies including scheduling, testing, and deployment that the IT staff is not trained for or lack the ability to create anything more than a simple image.

      Use the reference architecture to plan for the solution you need and want to deploy. Infrastructure planning and strategy optimizes the container image supply chain and reduces costs for compute and image scan time.

      Plan ahead to ensure your container strategy aligns with your infrastructure roadmap. Before deciding between bare metal and cloud, understand the different components of a container management solution and plan for current and future infrastructure services.

      Your challenge

      Choosing the right container technology: IT is a rapidly changing and evolving market, with startups and seasoned technology vendors maintaining momentum in everything from container platforms to repositories to orchestration tools. The rapid evolution of container platform components such as orchestration, storage, networking, and system services such as load balancing has made the entire stack a moving target.

      However, waiting for the industry to be standardized can be a recipe for paralysis, and waiting too long to decide on solutions and approaches can put a company's IT operations in catch-up mode.

      Keeping containers secure: Security breaches in containers are almost identical to operating system level breaches in virtual machines in terms of potential application and system vulnerabilities. It is important for any DevOps team working on container and orchestration architecture and management to fully understand the potential vulnerabilities of the platforms they are using.

      Optimize your infrastructure strategy for containers: One of the challenges enterprise IT operations management teams face when it comes to containers is the need to rethink the underlying infrastructure to accommodate the technology. While you may not want to embrace the public cloud for your critical applications just yet, IT operations managers will need an on-premises infrastructure so that applications can scale up and down the same way as they are containerized.

      Common ways organizations use containers

      A Separation of responsibilities
      Containerization provides a clear separation of responsibilities as developers can focus on application logic and dependencies, while IT operations teams can focus on deployment and management instead of application details such as specific software versions and configurations.

      B Workload portability
      Containers can run almost anywhere: physical servers or on-premise data centers on virtual machines or developer machines, as well as public clouds on Linux, Windows, or Mac operating systems, greatly easing development and deployment.

      “Lift and shift” existing applications into a modern cloud architecture. Some organizations even use containers to migrate existing applications to more modern environments. While this approach provides some of the basic benefits of operating system virtualization, it does not provide all the benefits of a modular, container-based application architecture.

      C Application isolation
      Containers virtualize CPU, memory, storage, and network resources at the operating system level, providing developers with a logically isolated view of the operating system from other applications.

      Source: TechTarget, 2021

      What are containers and why should I containerize?

      A container is a partially isolated environment in which an application or parts of an application can run. You can use a single container to run anything from small microservices or software processes to larger applications. Inside the container are all the necessary executable, library, and configuration files. Containers do not contain operating system images. This makes them lighter and more portable with much less overhead. Large application deployments can deploy multiple containers into one or more container clusters (CapitalOne, 2020).

      Containers have the following advantages:

      • Reduce overhead costs: Because containers do not contain operating system images, they require fewer system resources than traditional or hardware virtual machine environments.
      • Enhanced portability: Applications running in containers can be easily deployed on a variety of operating systems and hardware platforms.
      • More consistent operations: DevOps teams know that applications in containers run the same no matter where they are deployed.
      • Efficiency improvement: Containers allow you to deploy, patch, or scale applications faster.
      • Develop better applications: Containers support Agile and DevOps efforts to accelerate development and production cycles.

      Source: CapitalOne, 2020

      Container on the cloud or on-premise?

      On-premises containers Public cloud-based containers

      Advantages:

      • Full control over your container environment.
      • Increased flexibility in networking and storage configurations.
      • Use any version of your chosen tool or container platform.
      • No need to worry about potential compliance issues with data stored in containers.
      • Full control over the host operating system and environment.

      Disadvantages:

      • Lack of easy scalability. This can be especially problematic if you're using containers because you want to be more agile from a DevOps perspective.
      • No turnkey container deployment solution. You must set up and maintain every component of the container stack yourself.

      Advantages:

      • Easy setup and management through platforms such as Amazon Elastic Container Service or Azure Container Service. These products require significant Docker expertise to use but require less installation and configuration than on-premise installations.
      • Integrates with other cloud-based tools for tasks such as monitoring.
      • Running containers in the cloud improves scalability by allowing you to add compute and storage resources as needed.

      Disadvantages:

      • You should almost certainly run containers on virtual machines. That can be a good thing for many people; however, you miss out on some of the potential benefits of running containers on bare metal servers, which can be easily done.
      • You lose control. To build a container stack, you must use the orchestrator provided by your cloud host or underlying operating system.

      Info-Tech Insight
      Start-ups and small businesses that don't typically need to be closely connected to hardware can easily move (or start) to the cloud. Large (e.g. enterprise-class) companies and companies that need to manage and control local hardware resources are more likely to prefer an on-premises infrastructure. For enterprises, on-premises container deployments can serve as a bridge to full public cloud deployments or hybrid private/public deployments. The answer to the question of public cloud versus on premises depends on the specific needs of your business.

      Container management

      From container labeling that identifies workloads and ownership to effective reporting that meets the needs of different stakeholders across the organization, it is important that organizations establish an effective framework for container management.

      Four key considerations for your container management strategy:

      01 Container Image Supply Chain
      How containers are built

      02 Container Infrastructure and Orchestration
      Where and how containers run together

      03 Container Runtime Security and Policy Enforcement
      How to make sure your containers only do what you want them to do

      04 Container Observability
      Runtime metrics and debugging

      To effectively understand container management solutions, it is useful to define the various components that make up a container management strategy.

      1: Container image supply chain

      To run a workload as a container, it must first be packaged into a container image. The image supply chain includes all libraries or components that make up a containerized application. This includes CI/CD tools to test and package code into container images, application security testing tools to check for vulnerabilities and logic errors, registries and mirroring tools for hosting container images, and attribution mechanisms such as image signatures for validating images in registries.

      Important functions of the supply chain include the ability to:

      • Scan container images in registries for security issues and policy compliance.
      • Verify in-use image hashes have been scanned and authorized.
      • Mirror images from public registries to isolate yourself from outages in these services.
      • Attributing images to the team that created them.

      Source: Rancher, 2022

      Info-Tech Insight
      It is important to consider disaster recovery for your image registry. As mentioned above, it is wise to isolate yourself from registry disruptions. However, external registry mirroring is only one part of the equation. You also want to make sure you have a high availability plan for your internal registry as well as proper backup and recovery processes. A highly available, fault-tolerant container management platform is not just a runtime environment.

      2: Container infrastructure and orchestration

      Orchestration tools

      Once you have a container image to run, you need a location to run it. That means both the computer the container runs on and the software that schedules it to run. If you're working with a few containers, you can make manual decisions about where to run container images, what to run with container images, and how best to manage storage and network connectivity. However, at scale, these kinds of decisions should be left to orchestration tools like Kubernetes, Swarm, or Mesos. These platforms can receive workload execution requests, determine where to run based on resource requirements and constraints, and then actually launch that workload on its target. And if a workload fails or resources are low, it can be restarted or moved as needed.

      Source: DevOpsCube, 2022

      Storage

      Storage is another important consideration. This includes both the storage used by the operating system and the storage used by the container itself. First, you need to consider the type of storage you actually need. Can I outsource my storage concerns to a cloud provider using something like Amazon Relational Database Service instead? If not, do you really need block storage (e.g. disk) or can an external object store like AWS S3 meet your needs? If your external object storage service can meet your performance and durability requirements as well as your governance and compliance needs, you're in luck. You may not have to worry about managing the container's persistent storage. Many external storage services can be provisioned on demand, support discrete snapshots, and some even allow dynamic scaling on demand.

      Networking

      Network connectivity inside and outside the containerized environment is also very important. For example, Kubernetes supports a variety of container networking interfaces (CNIs), each providing different functionality. Questions to consider here are whether you can set traffic control policies (and the OSI layer), how to handle encryption between workloads and between workloads and external entities, and how to manage traffic import for containerized workloads. The impact of these decisions also plays a role on performance.

      Backups

      Backups are still an important task in containerized environments, but the backup target is changing slightly. An immutable, read-only container file system can be recreated very easily from the original container image and does not need to be backed up. Backups or snapshots on permanent storage should still be considered. If you are using a cloud provider, you should also consider fault domain and geo-recovery scenarios depending on the provider's capabilities. For example, if you're using AWS, you can use S3 replication to ensure that EBS snapshots can be restored in another region in case of a full region outage.

      3: Container runtime security and policy enforcement

      Ensuring that containers run in a place that meets the resource requirements and constraints set for them is necessary, but not sufficient. It is equally important that your container management solution performs continuous validation and ensures that your workloads comply with all security and other policy requirements of your organization. Runtime security and policy enforcement tools include a function for detecting vulnerabilities in running containers, handling detected vulnerabilities, ensuring that workloads are not running with unnecessary or unintended privileges, and ensuring that only other workloads that need to be allowed can connect.

      One of the great benefits of (well implemented) containerized software is reducing the attackable surface of the application. But it doesn't completely remove it. This means you need to think about how to observe running applications to minimize security risks. Scanning as part of the build pipeline is not enough. This is because an image without vulnerabilities at build time can become a vulnerable container because new flaws are discovered in its code or support libraries. Instead, some modern tools focus on detecting unusual behavior at the system call level. As these types of tools mature, they can make a real difference to your workload’s security because they rely on actual observed behavior rather than up-to-date signature files.

      4: Container observability

      What’s going on in there?

      Finally, if your container images are being run somewhere by orchestration tools and well managed by security and policy enforcement tools, you need to know what your containers are doing and how well they are doing it. Orchestration tools will likely have their own logs and metrics, as will networking layers, and security and compliance checking tools; there is a lot to understand in a containerized environment. Container observability covers logging and metrics collection for both your workloads and the tools that run them.

      One very important element of observability is the importance of externalizing logs and metrics in a containerized environment. Containers come and go, and in many cases the nodes running on them also come and go, so relying on local storage is not recommended.

      The importance of a container management strategy

      A container management platform typically consists of a variety of tools from multiple sources. Some container management software vendors or container management services attempt to address all four key components of effective container management. However, many organizations already have tools that provide at least some of the features they need and don't want to waste existing licenses or make significant changes to their entire infrastructure just to run containers.

      When choosing tools from multiple sources, it's important to understand what needs each tool meets and what it doesn't. This holistic approach is necessary to avoid gaps and duplication of effort.

      For example, scanning an image as part of the build pipeline and then rescanning the image while the container is running is a waste of CPU cycles in the runtime environment. Similarly, using orchestration tools and separate host-based agents to aggregate logs or metrics can waste CPU cycles as well as storage and network resources.

      Planning a container management strategy

      1 DIY, Managed Services, or Packaged Products
      Developer satisfaction is important, but it's also wise to consider the team running the container management software. Migrating from bare metal or virtual machine-based deployment methodologies to containers can involve a significant learning curve, so it's a good idea to choose a tool that will help smooth this curve.
      2 Kubernetes
      In the world of container management, Kubernetes is fast becoming the de facto standard for container orchestration and scheduling. Most of the products that address the other aspects of container management discussed in this post (image supply chain, runtime security and policy enforcement, observability) integrate easily with Kubernetes. Kubernetes is open-source software and using it is possible if your team has the technical skills and the desire to implement it themselves. However, that doesn't mean you should automatically opt to build yourself.
      3 Managed Kubernetes
      Kubernetes is difficult to implement well. As a result, many solution providers offer packaged products or managed services to facilitate Kubernetes adoption. All major cloud providers now offer Kubernetes services that reduce the operational burden on your teams. Organizations that have invested heavily in the ecosystem of a particular cloud provider may find this route suitable. Other organizations may be able to find a fully managed service that provides container images and lets the service provider worry about running the images which, depending on the cost and capacity of the organization, may be the best option.
      4 Third-Party Orchestration Products
      A third approach is packaged products from providers that can be installed on the infrastructure (cloud or otherwise). These products can offer several potential advantages over DIY or cloud provider offerings, such as access to additional configuration options or cluster components, enhanced functionality, implementation assistance and training, post-installation product support, and reduced risk of cloud provider lock-in.

      Source: Kubernetes, 2022; Rancher, 2022

      Infrastructure considerations

      It's important to describe your organization’s current and future infrastructure strategy and how it fits into your container management strategy. It’s all basic for now, but if you plan to move to a virtual machine or cloud provider next year, your container management solution should be able to adapt to your environment now and in the future. Similarly, if you’ve already chosen a public cloud, you may want to make sure that the tool you choose supports some of the cloud options, but full compatibility may not be an important feature.

      Infrastructure considerations extend beyond computing. Choosing a container management platform should be compatible with the existing network infrastructure and storage capacity available to your organization. If you have existing policy enforcement, monitoring, and alerting tools, the ideal solution should be able to take advantage of them. Moving to containers can be a game changer for developers and operations teams, so continuing to use existing tools to reduce complexity where possible can save time and money.

      Leverage the reference architecture to guide your container management strategy

      Questions for support transition

      Using the examples as a guide, complete the tool to strategize your container management

      Download the Reference Architecture

      Bibliography

      Mell, Emily. “What is container management and why is it important?” TechTarget, April 2021.
      https://www.techtarget.com/searchitoperations/definition/container-management-software#:~:text=A%20container%20management%20ecosystem%20automates,operator%20to%20keep%20up%20with

      Conrad, John. “What is Container Orchestration?” CapitalOne, 24 August 2020.
      https://www.capitalone.com/tech/cloud/what-is-container-orchestration/?v=1673357442624

      Kubernetes. “Cluster Networking.” Kubernetes, 2022.
      https://kubernetes.io/docs/concepts/cluster-administration/networking/

      Rancher. “Comparing Kubernetes CNI Providers: Flannel, Calico, Canal, and Weave.” Rancher, 2022.
      https://www.suse.com/c/rancher_blog/comparing-kubernetes-cni-providers-flannel-calico-canal-and-weave/

      Wilson, Bob. “16 Best Container Orchestration Tools and Services.” DevopsCube, 5 January 2022.
      https://devopscube.com/docker-container-clustering-tools/

      Document Business Goals and Capabilities for Your IT Strategy

      • Buy Link or Shortcode: {j2store}77|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy
      • As a strategic driver, IT needs to work with the business. Yet, traditionally IT has not worked hand-in-hand with the business. IT does not know what information it needs from the business to execute on its initiatives.
      • A faster time to new investment decisions mean that IT needs a repeatable and efficient process to understand what the business needs.
      • CIOs must execute strategic initiatives to create an IT function that can support the business. Most CIOs fail because of low business support.

      Our Advice

      Critical Insight

      • Understanding the business context is a must for all strategic IT initiatives. At its core, each strategic IT project requires answers to a specific set of questions regarding the business.
      • An effective CIO understands which part of the business context applies to which strategic IT project and, in turn, what questions to ask to uncover those insights.

      Impact and Result

      • Uncover what IT knows and needs to know about the business context. This is a necessary first step to begin each of Info-Tech’s strategic IT initiatives, which any CIO should complete.
      • Conduct efficient and repeatable business context discovery activities to uncover business context gaps.
      • Document the business context you have uncovered and streamline the process for executing on Info-Tech’s strategic CIO blueprints.

      Document Business Goals and Capabilities for Your IT Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should define the business context, review Info-Tech’s methodology, and understand how we can support you in completing key CIO strategic initiatives.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and document the business needs of the organization

      Define the business context needed to complete strategic IT initiatives.

      • Document Business Goals and Capabilities for Your IT Strategy – Storyboard
      • Business Context Discovery Tool
      • Business Context Discovery Record Template
      • PESTLE Analysis Template
      • Strategy Alignment Map Template
      [infographic]

      Workshop: Document Business Goals and Capabilities for Your IT Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify the Missing Business Context (pre-work)

      The Purpose

      Conduct analysis and facilitate discussions to uncover business needs for IT.

      Key Benefits Achieved

      A baseline understanding of what business needs mean for IT

      Activities

      1.1 Define the strategic CIO initiatives our organization will pursue.

      1.2 Complete the Business Context Discovery Tool.

      1.3 Schedule relevant interviews.

      1.4 Select relevant Info-Tech diagnostics to conduct.

      Outputs

      Business context scope

      Completed Business Context Discovery Tool

      Completed Info-Tech diagnostics

      2 Uncover and Document the Missing Context

      The Purpose

      Analyze the outputs from step 1 and uncover the business context gaps.

      Key Benefits Achieved

      A thorough understanding of business needs and why IT should pursue certain initiatives

      Activities

      2.1 Conduct group or one-on-one interviews to identify the missing pieces of the business context.

      Outputs

      Documentation of answers to business context gaps

      3 Uncover and Document the Missing Context

      The Purpose

      Analyze the outputs from step 1 and uncover the business context gaps.

      Key Benefits Achieved

      A thorough understanding of business needs and why IT should pursue certain initiatives

      Activities

      3.1 Conduct group or one-on-one interviews to identify the missing pieces of the business context.

      Outputs

      Documentation of answers to business context gaps

      4 Review Business Context and Next Steps

      The Purpose

      Review findings and implications for IT’s strategic initiative.

      Key Benefits Achieved

      A thorough understanding of business needs and how IT’s strategic initiatives addresses those needs

      Activities

      4.1 Review documented business context with IT team.

      4.2 Discuss next steps for strategic CIO initiative execution.

      Outputs

      Finalized version of the business context

      Develop a Master Data Management Practice and Platform

      • Buy Link or Shortcode: {j2store}401|cart{/j2store}
      • member rating overall impact: 9.3/10 Overall Impact
      • member rating average dollars saved: $27,416 Average $ Saved
      • member rating average days saved: 15 Average Days Saved
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • The volume of enterprise data is growing rapidly and comes from a wide variety of internal and external data sources (e.g. ERP, CRM). When data is located in different systems and applications, coupled with degradation and proliferation, this can lead to inaccurate, inconsistent, and redundant data being shared across departments within an organization.
      • Data kept in separate soiled sources can result in poor stakeholder decision making and inefficient business processes. Some common master data problems include:
        • The lack of a clean customer list results in poor customer service.
        • Hindering good analytics and business predictions, such as incorrect supply chain decisions when having duplicate product and vendor data between plants.
        • Creating cross-group consolidated reports from inconsistent local data that require too much manual effort and resources.

      Our Advice

      Critical Insight

      • Everybody has master data (e.g. customer, product) but not master data problems (e.g. duplicate customers and products). MDM is complex in practice and requires investments in data governance, data architecture, and data strategy. Identifying business outcomes based on quality master data is essential before you pull the trigger on an MDM solution.

      Impact and Result

      This blueprint can help you:

      • Build a list of business-aligned data initiatives and capabilities that address master data problem and realize business strategic objectives.
      • Design a master data management practice based on the required business and data process.
      • Design a master data management platform based on MDM implementation style and prioritized technical capabilities.

      Develop a Master Data Management Practice and Platform Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Develop a Master Data Management Practice and Platform Deck – A clear blueprint that provides a step-by-step approach to aid in the development of your MDM practice and platform.

      This blueprint will help you achieve a single view of your most important data assets by following our two-phase methodology:

    • Build a vision for MDM
    • Build an MDM practice and platform
      • Develop a Master Data Management Practice and Platform – Phases 1-2

      2. Master Data Management Readiness Assessment Tool – A tool to help you make the decision to stop the MDM project now or to continue the path to MDM.

      This tool will help you determine if your organization has a master data problem and if an MDM project should be undertaken.

      • Master Data Management Readiness Assessment Tool

      3. Master Data Management Business Needs Assessment Tool – A tool to help you identify and document the various data sources in the organization and determine which data should be classified as master data.

      The tool will help you identify the sources of data within the business unit and use the typical properties of master data to determine which data should be classified as master data.

      • Master Data Management Business Needs Assessment Tool

      4. Master Data Management Business Case Presentation Template – A template to communicate MDM basics, benefits, and approaches to obtain business buy-in for the MDM project.

      The template will help you communicate your organization's specific pains surrounding poor management of master data and identify and communicate the benefits of effective MDM. Communicate Info-Tech's approach for creating an effective MDM practice and platform.

      • Master Data Management Business Case Presentation Template

      5. Master Data Management Project Charter Template – A template to centralize the critical information regarding to objectives, staffing, timeline, and expected outcome of the project.

      The project charter will help you document the project sponsor of the project. Identify purpose, goals, and objectives. Identify the project risks. Build a cross-functional project team and assign responsibilities. Define project team expectations and meeting frequency. Develop a timeline for the project with key milestones. Identify metrics for tracking success. Receive approval for the project.

      • Master Data Management Project Charter Template

      6. Master Data Management Architecture Design Template – An architecture design template to effectively document the movement of data aligned with the business process across the organization.

      This template will assist you:

    • Document the current state and achieve a common understanding of the business process and movement of data across the company.
    • Identify the source of master data and what other systems will contribute to the MDM system.
    • Document the target architectural state of the organization.
      • Master Data Management Architecture Design Template

      7. Master Data Management Practice Pattern Template – Pre-built practice patterns to effectively define the key services and outputs that must be delivered by establishing core capabilities, accountabilities, roles, and governance for the practice.

      The master data management practice pattern describes the core capabilities, accountabilities, processes, essential roles, and the elements that provide oversight or governance of the practice, all of which are required to deliver on high value services and deliverables or output for the organization.

      • Master Data Management Practice Pattern Template

      8. Master Data Management Platform Template – A pre-built platform template to illustrate the organization’s data environment with MDM and the value MDM brings to the organization.

      This template will assist you:

    • Establish an understanding of where MDM fits in an organization’s overall data environment.
    • Determine the technical capabilities that is required based on organization’s data needs for your MDM implementation.
      • Master Data Management Platform Template

      Infographic

      Workshop: Develop a Master Data Management Practice and Platform

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Develop a Vision for the MDM Project

      The Purpose

      Identification of MDM and why it is important.

      Differentiate between reference data and master data.

      Discuss and understand the key challenges and pains felt by the business and IT with respect to master data, and identify the opportunities MDM can provide to the business.

      Key Benefits Achieved

      Identification of what is and is not master data.

      Understand the value of MDM and how it can help the organization better monetize its data.

      Knowledge of how master data can benefit both IT and the business.

      Activities

      1.1 Establish business context for master data management.

      1.2 Assess the value, benefits, challenges, and opportunities associated with MDM.

      1.3 Develop the vision, purpose, and scope of master data management for the business.

      1.4 Identify MDM enablers.

      1.5 Interview business stakeholders.

      Outputs

      High-level data requirements

      Identification of business priorities

      Project vision and scope

      2 Document the Current State

      The Purpose

      Recognize business drivers for MDM.

      Determine where master data lives and how this data moves within the organization.

      Key Benefits Achieved

      Streamline business process, map the movement of data, and achieve a common understanding across the company.

      Identify the source of master data and what other systems will contribute to the MDM system.

      Activities

      2.1 Evaluate the risks and value of critical data.

      2.2 Map and understand the flow of data within the business.

      2.3 Identify master data sources and users.

      2.4 Document the current architectural state of the organization.

      Outputs

      Data flow diagram with identified master data sources and users

      Business data glossary

      Documented current data state.

      3 Document the Target State

      The Purpose

      Document the target data state of the organization surrounding MDM.

      Identify key initiatives and metrics.

      Key Benefits Achieved

      Recognition of four MDM implementation styles.

      Identification of key initiatives and success metrics.

      Activities

      3.1 Document the target architectural state of the organization.

      3.2 Develop alignment of initiatives to strategies.

      3.3 Consolidate master data management initiatives and strategies.

      3.4 Develop a project timeline and define key success measures.

      Outputs

      Documented target state surrounding MDM.

      Data and master data management alignment and strategies

      4 Develop an MDM Practice and Platform

      The Purpose

      Get a clear picture of what the organization wants to get out of MDM.

      Identify master data management capabilities, accountabilities, process, roles, and governance.

      Key Benefits Achieved

      Prioritized master data management capabilities, accountabilities, process, roles, and governance.

      Activities

      4.1 Identify master data management capabilities, roles, process, and governance.

      4.2 Build a master data management practice and platform.

      Outputs

      Master Data Management Practice and Platform

      Further reading

      Develop a Master Data Management Practice and Platform

      Are you sure you have a master data problem?

      Analyst Perspective

      The most crucial and shared data assets inside the firm must serve as the foundation for the data maturing process. This is commonly linked to your master data (such as customers, products, employees, and locations). Every organization has master data, but not every organization has a master data problem.

      Don't waste time or resources before determining the source of your master data problem. Master data issues are rooted in the business practices of your organization (such as mergers and acquisitions and federated multi-geographic operations). To address this issue, you will require a master data management (MDM) solution and the necessary architecture, governance, and support from very senior champions to ensure the long-term success of your MDM initiative. Approaching MDM with a clear blueprint that provides a step-by-step approach will aid in the development of your MDM practice and platform.

      Ruyi Sun

      Ruyi Sun
      Research Specialist
      Data & Analytics Practice
      Info-Tech Research Group

      Rajesh Parab

      Rajesh Parab
      Research Director
      Data & Analytics Practice
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Common Obstacles

      Info-Tech’s Approach

      Your organization is experiencing data challenges, including:

      • Too much data volume, variety, and velocity, from more and more sources.
      • Duplicate and disorganized data across multiple systems and applications.
      • Master data is pervasive throughout the business and is often created and captured in highly disparate sources that often are not easily shared across business units and applications.

      MDM is useful in situations such as a business undergoing a merger or acquisition, where a unique set of master data needs to be created to act as a single source of truth. However, having a unified view of the definitions and systems of record for the most critical data in your organization can be difficult to achieve. An organization might experience some pain points:

      • Failure to identify master data problem and organization’s data needs.
      • Conflicting viewpoints and definitions of data assets across business units.
      • Recognize common business operating models or strategies with master data problems.
      • Identify the organization’s problem and needs out of its master data and align to strategic business needs.
      • Define the architecture, governance, and support.
      • Create a practice and platform for the organization’s MDM program.

      Info-Tech Insight

      Everybody has master data (e.g. customer, product) but not a master data problem (e.g. duplicate customers and products). MDM is complex in practice and requires investments in data governance, data architecture, and data strategy. Identifying business outcomes based on quality master data is essential before you pull the trigger on an MDM solution.

      What is master data and master data management?

      • Master data domains include the most important data assets of an organization. For this data to be used across an enterprise in consistent and value-added ways, the data must be properly managed. Some common master data entities include customer, product, and employees.
      • Master data management (MDM) is the control over master data values to enable consistent, shared, contextual use across systems, of the most accurate, timely, and relevant version of truth about essential business entities (DAMA DMBOK).
      • The fundamental objective of MDM is to enable the business to see one view of critical data elements across the organization.
      • MDM systems will detect and declare relationships between data, resolve duplicate records, and make data available to the people, processes, and applications that need it. The end goal of an MDM implementation is to make sure your investment in MDM technology delivers the promised business results. By supplementing the technology with rules, guidelines, and standards around enterprise data you will ensure data continues to be synchronized across data sources on an ongoing basis.

      The image contains a screenshot of Info-Tech's Data Management Framework.

      Info-Tech’s Data Management Framework Adapted from DAMA-DMBOK and Advanced Knowledge Innovations Global Solutions. See Create a Data Management Roadmap blueprint for more information.

      Why manage master data?

      Master data drives practical insights that arise from key aspects of the business.

      Customer Intimacy

      Innovation Leadership

      Risk Management

      Operational Excellence

      Improve marketing and the customer experience by using the right data from the system of record to analyze complete customer views of transactions, sentiments, and interactions.

      Gain insights on your products, services, usage trends, industry directions, and competitor results, and use these data artifacts to support decisions on innovations, new products, services, and pricing.

      Maintain more transparent and accurate records and ensure that appropriate rules are followed to support audit, compliance, regulatory, and legal requirements. Monitor data usage to avoid fraud.

      Make sure the right solution is delivered rapidly and consistently to the right parties for the right price and cost structure. Automate processes by using the right data to drive process improvements.

      85% of customers expect consistent interactions across departments (Salesforce, 2022).

      Top-decile economic performers are 20% more likely to have a common source of data that serves as the single source of truth across the organization compared to their peers (McKinsey & Company, 2021).

      Only 6% of board members believe they are effective in managing risk (McKinsey & Company, 2018).

      32% of sales and marketing teams consider data inconsistency across platforms as their biggest challenge (Dun & Bradstreet, 2022).

      Your Challenge

      Modern organizations have unprecedented data challenges.

      • The volume of enterprise data is growing rapidly and comes from a wide variety of internal and external data sources (e.g. ERP, CRM). When data is located in different systems and applications, coupled with degradation and proliferation, this can lead to inaccurate, inconsistent, and redundant data being shared across departments within an organization.
      • For example, customer information may not be identical in the customer service system, shipping system, and marketing management platform because of manual errors or different name usage (e.g. GE or General Electric) when input by different business units.
      • Data kept in separate soiled sources can also result in poor stakeholder decision making and inefficient business processes. Some issues include:
        • The lack of clean customer list results in poor customer service.
        • Hindering good analytics and business predictions, such as incorrect supply chain decision when having duplicate product and vendor data between plants.
        • Creating cross-group consolidated reports from duplicate and inconsistent local data requires too much manual effort and resources.

      On average, 25 different data sources are used for generating customer insights and engagement.

      On average, 16 different technology applications are used to leverage customer data.

      Source: Deloitte Digital, 2020

      Common Obstacles

      Finding a single source of truth throughout the organization can be difficult.

      Changes in business process often come with challenges for CIOs and IT leaders. From an IT perspective, there are several common business operating models that can result in multiple sets of master data being created and held in various locations. Some examples could be:

      • Integrate systems following corporate mergers and acquisitions
      • Enterprise with multi-product line
      • Multinational company or multi-geographic operations with various ERP systems
      • Digital transformation projects such as omnichannel

      In such situations, implementing an MDM solution helps achieve harmonization and synchronization of master data and provide a single, reliable, and precise view of the organization. However, MDM is a complex system that requires more than just a technical solution. An organization might experience the following pain points:

      • Failure to identify master data problem and organization’s data needs.
      • Conflicting viewpoints and definitions of data assets that should reside in MDM across business units.

      Building a successful MDM initiative can be a large undertaking that takes some preparation before starting. Understanding the fundamental roles that data governance, data architecture, and data strategy play in MDM is essential before the implementation.

      “Only 3 in 10 of respondents are completely confident in their company's ability to deliver a consistent omnichannel experience.”

      Source: Dun & Bradstreet, 2022

      The image contains an Info-Tech Thought Model of the Develop a Master Data Management Practice & Platform.

      Insight summary

      Overarching insight

      Everybody has master data (e.g. customer, product) but not a master data problem (e.g. duplicate customers and products). MDM is complex in practice and requires investments in data governance, data architecture, and data strategy. Figuring out what the organization needs out of its master data is essential before you pull the trigger on an MDM solution.

      Phase 1 insight

      A master data management solution will assist you in solving master data challenges if your organization is large or complex, such as a multinational corporation or a company with multiple product lines, with frequent mergers and acquisitions, or adopting a digital transformation strategy such as omnichannel.

      Organizations often have trouble getting started because of the difficulty of agreeing on the definition of master data within the enterprise. Reference data is an easy place to find that common ground.

      While the organization may have data that fits into more than one master data domain, it does not necessarily need to be mastered. Determine what master data entities your organization needs.

      Although it is easy to get distracted by the technical aspects of the MDM project – such as extraction and consolidation rules – the true goal of MDM is to make sure that the consumers of master data (such as business units, sales) have access to consistent, relevant, and trusted shared data.

      Phase 2 insight

      An organization with activities such as mergers and acquisitions or multi-ERP systems poses a significant master data challenge. Prioritize your master data practice based on your organization’s ability to locate and maintain a single source of master data.

      Leverage modern capabilities such as artificial intelligence or machine learning to support large and complex MDM deployments.

      Blueprint Overview

      1. Build a Vision for MDM

      2. Build an MDM Practice and Platform

      Phase Steps

      1. Assess Your Master Data Problem
      2. Identify Your Master Data Domains
      3. Create a Strategic Vision
      1. Document Your Organization’s Current Data State
      2. Document Your Organization’s Target Data State
      3. Formulate an Actionable MDM Practice and Platform

      Phase Participants

      CIO, CDO, or IT Executive

      Head of the Information Management Practice

      Business Domain Representatives

      Enterprise Architecture Domain Architects

      Information Management MDM Experts

      Data Stewards or Data Owners

      Phase Outcomes

      This step identifies the essential concepts around MDM, including its definitions, your readiness, and prioritized master data domains. This will ensure the MDM initiatives are aligned to business goals and objectives.

      To begin addressing the MDM project, you must understand your current and target data state in terms of data architecture and data governance surrounding your MDM strategy. With all these considerations in mind, design your organizational MDM practice and platform.

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      1. MDM Readiness Assessment ToolThe image contains a screenshot of the MDM Readiness Assessment Tool. 2. Business Needs Assessment Tool The image contains a screenshot of the Business Needs Assessment Tool.
      3. Business Case Presentation Template The image contains a screenshot of the Business Case Presentation Template. 4. Project Charter Template The image contains a screenshot of the Project Charter Template.
      5. Architecture Design Template The image contains a screenshot of the Architecture Design Template.

      Key deliverable:

      6. MDM Practice Pattern Template

      7. MDM Platform Template

      Define the intentional relationships between the business and the master data through a well-thought-out master data platform and practice.

      The image contains a screenshot to demonstrate the intentional relationships between the business and the master data.

      Measure the value of this blueprint

      Refine the metrics for the overall Master Data Management Practice and Platform.

      In phase 1 of this blueprint, we will help you establish the business context and master data needs.

      In phase 2, we will help you document the current and target state of your organization and develop a practice and platform so that master data is well managed to deliver on those defined metrics.

      Sample Metrics

      Method of Calculation

      Master Data Sharing Availability and Utilization

      # of Business Lines That Use Master Data

      Master Data Sharing Volume

      # of Master Entities

      # of Key Elements, e.g. # of Customers With Many Addresses

      Master Data Quality and Compliance

      # of Duplicate Master Data Records

      Identified Sources That Contribute to Master Data Quality Issues

      # of Master Data Quality Issues Discovered or Resolved

      # of Non-Compliance Issues

      Master Data Standardization/Governance

      # of Definitions for Each Master Entity

      # of Roles (e.g. Data Stewards) Defined and Created

      Trust and Satisfaction

      Trust Indicator, e.g. Confidence Indicator of Golden Record

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2

      Call #1: Identify master data problem and assess your organizational readiness for MDM.

      Call #2: Define master data domains and priorities.

      Call #3: Determine business requirements for MDM.

      Call #4: Develop a strategic vision for the MDM project.

      Call #5: Map and understand the flow of data within the business.

      Call #6: Document current architectural state.

      Call #7: Discover the MDM implementation styles of MDM and document target architectural state.

      Call #8: Create MDM data practice and platform.

      Call #9: Summarize results and plan next steps.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 8 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.
      workshops@infotech.com 1-888-670-8889

      Day 1 Day 2 Day 3 Day 4 Day 5

      Develop a Vision for the MDM Project

      Document the
      Current State

      Document the
      Target State

      Develop a MDM Practice and Platform

      Next Steps and
      Wrap-Up (offsite)

      Activities

      • Establish business context for master data management.
      • Assess the readiness, value, benefits, challenges, and opportunities associated with MDM.
      • Develop the vision, purpose, and scope of master data management for the business.
      • Identify master data management enablers.
      • Interview business stakeholders.
      • Evaluate the risks and value of critical data.
      • Map and understand the flow of data within the business.
      • Identify master data sources and users.
      • Document the current architectural state of the organization
      • Document the target data state of the organization.
      • Develop alignment of initiatives to strategies.
      • Consolidate master data management initiatives and strategies.
      • Develop a project timeline and define key success measures.
      • Identify master data management capabilities, roles, process, and governance.
      • Build a master data management practice and platform.
      • Complete in-progress deliverables from previous four days.
      • Set up review time for workshop deliverables and to discuss next steps.

      Deliverables

      1. High-level data requirements
      2. Identification of business priorities
      3. Project vision and scope
      1. Data flow diagram with identified master data sources and users
      2. Business data glossary
      3. Documented current data state
      1. Documented target state surrounding MDM
      2. Data and master data management alignment and strategies
      1. Master Data Management Practice and Platform
      1. Master Data Management Strategy for continued success

      Phase 1: Build a Vision for MDM

      Develop a Master Data Management Practice and Platform

      Step 1.1

      Assess Your Master Data Problem

      Objectives

      1. Build a solid foundation of knowledge surrounding MDM.

      2. Recognize MDM problems that the organization faces in the areas of mergers and acquisitions, omnichannel, multi-product line, and multi-ERP setups.

      This step involves the following participants:

      CIO, CDO, or IT Executive

      Head of Information Management

      Outcomes of this step

      An understanding of master data, MDM, and the prerequisites necessary to create an MDM program.

      Determine if there is a need for MDM in the organization.

      Understand your data – it’s not all transactional

      Info-Tech analyzes the value of data through the lenses of its four distinct classes: Master, Transactional, Operational, and Reference.

      Master

      Transactional

      Operational

      Reference

      • Addresses critical business entities that fall into four broad groupings: party (customers, suppliers); product (products, policies); location (physical spaces and segmentations); and financial (contracts, transactions).
      • This data is typically critical to the organization, less volatile, and more complex in nature; it contains many data elements and is used across systems.
      • Transactional data refers to data generated when dealing with external parties, such as clients and suppliers.
      • Transactional data may be needed on a per-use basis or through several activities.
      • The data can also be accessed in real-time if needed.
      • Operational data refers to data that is used to support internal business activities, processes, or workflows.
      • This data is generated during a one-time activity or multiple times through a data hub or orchestration layer.
      • Depending on the need for speed, there can be a real-time aspect to the situation.
      • Examples: scheduling service data or performance data.
      • Reference data refers to simple lists of data that are typically static and help categorize other data using code tables.
      • Examples: list of countries or states, postal codes, general ledger chart of accounts, currencies, or product code.

      Recognize the fundamental prerequisites for MDM before diving into more specific readiness requirements

      Organizational buy-in

      • Ensure there is someone actively invested and involved in the progress of the project. Having senior management support, especially in the form of an executive sponsor or champion, is necessary to approve MDM budgets and resourcing.
      • MDM changes business processes and practices that affect many departments, groups, and people – this type of change may be disruptive so sponsorship from the top ensures your project will keep moving forward even during difficulties.
      • Consider developing a cross-functional master data team involving stakeholders from management, IT, and the business units. This group can ensure that the MDM initiative is aligned with and supports larger organizational needs and everyone understands their role.

      Understanding the existing data environment

      • Knowing the state of an organization’s data architecture, and which data sources are linked to critical business processes, is essential before starting an MDM project.
      • Identify the areas of data pain within your organization and establish the root cause. Determine what impact this is having on the business.

      Before starting to look at technology solutions, make sure you have organizational buy-in and an understanding of the existing data environment. These two prerequisites are the foundation for MDM success.

      Master data management provides opportunities to use data for analytical and operational purposes with greater accuracy

      MDM can be approached in two ways: analytical and operational.

      Think of it in the context of your own organization:

      • How will MDM improve the ability for accurate data to be shared across business processes (Operational MDM)?
      • How will MDM improve the quality of reports for management reporting and executive decision making (Analytical MDM)?

      An investment in MDM will improve the opportunities for using the organization’s most valuable data assets, including opportunities like:

      • Data is more easily shared across the organization’s environment with greater accuracy and trust.
      • Multiple instances of the same data are consistent.
      • MDM enables the ability to find the right data more quickly.

      9.5% of revenue was at risk when bad experiences were offered to customers.

      Source: Qualtrics XM Institute, 2022

      Master data management drives better customer experience

      85% In a survey of nearly 17,000 consumers and business buyers, 85% of customers expect consistent interactions across departments.

      Source: Salesforce, 2022

      Yet, 60% of customer say it generally feels like sales, service, and marketing teams do not share information.

      Source: Salesforce, 2022

      What is a business without the customer? Positive customer service experience drives customer retention, satisfaction, and revenue growth, and ultimately, determines the success of the organization. Effective MDM can improve customer experiences by providing consistent interactions and the ability to meet customer expectations.

      61% of customers say they would switch to a competitor after just one bad customer service experience.

      Source: Zendesk, 2022

      Common business operating models or strategies with master data problems

      Mergers and acquisitions (M&A)

      M&A involves activities related to the consolidation of two companies. From IT’s perspective, whether the organization maintains different IT systems and applications in parallel or undergoes data integration process, it is common to have multiple instances of the same customer or product entity across different systems between companies, leading to incomplete, duplicate, and conflicting data sets. The organization may face challenges in both operational and analytical aspects. For many, the objective is to create a list of master data to have a single view of the organization.

      Multiple-instance ERP or multinational organizations

      Multiple-instance ERP solutions are commonly used by businesses that operate globally to accommodate each country’s needs or financial systems (Brightwork Research). With MDM, having a single source of truth could be a great advantage in certain business units to collaborate globally, such as sharing inventory coding systems to allow common identity and productive resource allocation and shared customer information for analytical purposes.

      Common business operating models or strategies with master data problems (cont.)

      Multiple product lines of business

      An example for firms that sells multiple product lines could be Nike’s multiple product lines including footwear, clothing, and equipment. Keeping track of many product lines is a constant challenge for organizations in terms of inventory management, vendor database, and a tracking system. The ability to track and maintain your product data accurately and consistently is crucial for a successful supply chain (whether in a warehouse, distribution center, or retail office), which leads to improved customer satisfaction and increased sales.

      Info-Tech Insight
      A master data management solution will assist you in solving master data challenges if your organization is large or complex such as a multinational corporation or a company with multiple product lines, frequent mergers and acquisitions, or adopting a digital transformation strategy such as omnichannel.

      Omni-channel

      In e-commerce and retail industry, omnichannel means a business strategy that offers seamless shopping experiences across all channels, such as in-store, mobile, and online (Oracle). This also means the company needs to provide consistent information on orders, inventory, pricing, and promotions to customers and keep the customer records up to date. The challenges of omnichannel include having to synchronize data across channels and systems such as ERP, CRM, and social media. MDM becomes a solution for the success of an omnichannel strategy that refers to the same source of truth across business functions and channels.

      Assess business model using Info-Tech’s MDM Readiness Assessment Tool

      30 Minutes

      • The MDM Readiness Assessment Tool will help you make the decision to stop the MDM project now or to continue on the path to MDM.
      • Not all organizations need MDM. Don’t waste precious IT time and resources if your organization does not have a master data problem.

      The image contains screenshots of the MDM Readiness Assessment Tool.

      Download the MDM Readiness Assessment Tool

      Input Output
      • List of key MDM decision points
      • MDM readiness
      Materials Participants
      • Master Data Management Readiness Assessment Tool
      • Head of Information Management
      • CIO, CDO, or IT Executive

      Step 1.2

      Identify the Master Data Domains

      Objectives

      Determine which data domain contains the most critical master data in the organization for an MDM strategy.

      This step involves the following participants:

      Business Domain Representatives

      Data Stewards or Data Owners

      Information Management Team

      Outcomes of this step

      Determine the ideal data domain target for the organization based on where the business is experiencing the largest pains related to master data and where it will see the most benefit from MDM.

      Reference data makes tackling master data easier

      Reference data serves as a great starting place for an MDM project.

      • Reference data is the simple lists of data that are typically static and help categorize other data using code tables. Examples include lists of countries or states, postal codes, general ledger charts of accounts, currencies, or product codes.
      • Loading information into the warehouse or an MDM hub usually requires reconciling reference data from multiple sources. By getting reference data in order first, MDM will be easier to implement.
      • Reference data also requires a relatively small investment with good returns so the value of the project can easily be demonstrated to stakeholders.
      • One example of how reference data makes master data easier to tackle is a master list of an organization’s customers that needs an attribute of an address. By maintaining a list of postal codes or cities as reference data, this is made much easier to manage than simply allowing free text.

      Info-Tech Insight

      Organizations often have trouble getting started because of the difficulty of agreeing on the definition of master data within the enterprise. Reference data is an easy place to find that common ground.

      There are several key considerations when defining which data is master data in the organization

      A successful implementation of MDM depends on the careful selection of the data element to be mastered. As departments often have different interests, establishing a standard set of data elements can lead to a lot of discussion. When selecting what data should be considered master data, consider the following:

      • Complexity. As the number of elements in a set increases, the likelihood that the data is master data also increases.
      • Volatility. Master data tends to be less volatile. The more volatile data is, the more likely it is transactional data.
      • Risk. The more likely data may have a risk associated with it, the more likely it should be managed with MDM.
      • Value. The more valuable a data set is to the organization, the greater the chance it is master data.
      • Sharing. If the data set is used in multiple systems, it likely should be managed with an MDM system.

      Begin by documenting the existing data sources within the organization.

      Use Info-Tech’s Master Data Management Business Needs Assessment Tool to determine master data sources.

      Info-Tech Insight

      While the organization may have data that fits into more than one master data domain, it does not necessarily need to be mastered. Determine what master data entities your organization needs.

      Master data also fall into these four areas

      More perspectives to consider and define which data is your master data.

      Internally Created Entities

      Externally Created Entities

      Large Non-Recurring Transactions

      Categories/Relationships/ Hierarchies/Aggregational Patterns

      • Business objects and concepts at the core of organizational activities that are created and maintained only by this organization.
      • Examples: customers, suppliers, products, projects
      • Business objects and concepts at the core of organizational activities that are created outside of this organization, but it keeps its own master list of these entities with additional attributions.
      • Examples: equipment, materials, industry classifications
      • Factual records reflecting the organization’s activities.
      • Examples: large purchases, large sales, measuring equipment data, student academic performance
      • Lateral and hierarchical relationships across master entities.
      • Organization-wide standards for data / information organization and aggregation.
      • Examples: classifications of equipment and materials, legal relationships across legal entities, sales regions or sub-regions

      Master data types can be divided into four main domains

      Parties

      • Data about individuals, organizations, and the roles they play in business relationships.
      • In the commercial world this means customer, employee, vendor, partner, and competitor data.

      Product

      • Can focus on organization's internal products or services or the entire industry, including competitor products and services.
      • May include information about part/ingredient usage, versions, patch fixes, pricing, and bundles.

      Financial

      • Data about business units, cost centers, profit centers, general ledger accounts, budgets, projections, and projects
      • Typically, ERP systems serve as the central hub for this.

      Locations

      • Often seen as the domain that encompasses other domains. Typically includes geopolitical data such as sales territories.
      • Provides ability to track and share reference information about different geographies and create hierarchical relationships based on information.

      Single Domain vs. Multi-Domain

      • By focusing on a single master data domain, organizations can start with smaller, more manageable steps, rather than trying to tackle everything at once.
      • MDM solutions can be domain-specific or be designed to support multiple domains.
      • Multi-domain MDM is a solution that manages multiple types of master data in one repository. By implementing multi-domain from the beginning, an organization is better able to support growth across all dimensions and business units.

      Use Info-Tech’s Master Data Management Business Needs Assessment Tool to determine master data priorities

      2 hours

      Use the Master Data Management Business Needs Assessment Tool to assist you in determining the master data domains present in your organization and the suggested domain(s) for your MDM solution.

      The image contains screenshots of the Master Data Management Business Needs Assessment Tool.

      Download the MDM Business Needs Assessment Tool

      Input Output
      • Current data sources within the organization
      • Business requirements of master data
      • Prioritized list of master data domains
      • Project scope
      Materials Participants
      • Master Data Management Business Needs Assessment Tool
      • Data Stewards or Data Custodians
      • Information Management Team

      Step 1.3

      Create a Strategic Vision for Your MDM Program

      Objectives

      1. Understand the true goal of MDM – ensuring that the needs of the master data users in the organization are fulfilled.

      2. Create a plan to obtain organizational buy-in for the MDM initiative.

      3. Organize and officialize your project by documenting key metrics, responsibilities, and goals for MDM.

      This step involves the following participants:

      CEO, CDO, or CIO

      Business Domain Representatives

      Information Management Team

      Outcomes of this step

      Obtain business buy-in and direction for the MDM initiative.

      Create the critical foundation plans that will guide you in evaluating, planning, and implementing your immediate and long-term MDM goals.

      MDM is not just IT’s responsibility

      Make sure the whole organization is involved throughout the project.

      • Master data is created for the organization as a whole, so get business input to ensure IT decisions fit with corporate goals and objectives.
      • The ownership of master data is the responsibility of the business. IT is responsible for the MDM project’s technology, support, platforms, and infrastructure; however, the ownership of business rules and standards reside with the business.
      • MDM requires IT and the business to form a partnership. While IT is responsible for the technical component, the business will be key in identifying master data.
      • MDM belongs to the entire organization – not a specific department – and should be created with the needs of the whole organization in mind. As such, MDM needs to be aligned with company’s overall data strategy. Data strategy planning involves identifying and translating business objectives and capability goals into strategies for improving data usage by the business and enhancing the capabilities of MDM.

      Keep the priorities of the users of master data at the forefront of your MDM initiative.

      • To fully satisfy the needs of the users of master data, you have to know how the data is consumed. Information managers and architects must work with business teams to determine how organizational objectives are achieved by using master data.
      • Steps to understanding the users of master data and their needs:
      1. Identify and document the users of master data – some examples include business units such as marketing, sales, and innovation teams.
      2. Interview those identified to understand how their strategic goals can be enabled by MDM. Determine their needs and expectations.
      3. Determine how changes to the master data management strategy will bring about improvements to information sharing and increase the value of this critical asset.

      Info-Tech Insight

      Although it is easy to get distracted by the technical aspects of the MDM project – such as extraction and consolidation rules – the true goal of MDM is to make sure that the consumers of master data (such as business units, sales reps) have access to consistent, relevant, and trusted shared data.

      Interview business stakeholders to understand how IT’s implementation of MDM will enable better business decisions

      1 hours

      Instructions

      1. Identify which members of the business you would like to interview to gather an understanding of their current data issues and desired data usage. (Recommendation: Gather a diverse set of individuals to help build a broader and more holistic knowledge of data consumption wants or requirements.)
      2. Prepare your interview questions.
      3. Interview the identified members of the business.
      4. Debrief and document results.

      Tactical Tips

      • Include members of your team to help heighten their knowledge of the business.
      • Identify a team member to operate as the formal scribe.
      • Keep the discussion as free flowing as possible; it will likely enable the business to share more. Don’t get defensive – one of the goals of the interviews is to open communication lines and identify opportunities for change, not create tension between IT and the business.
      Input Output
      • Current master data pain points and issues
      • Desired master data usage
      • Prioritized list of master data management enablers
      • Understanding of organizational strategic plan
      Materials Participants
      • Interview questions
      • Whiteboard/flip charts
      • Information Management Team
      • Business Line Representatives

      Info-Tech Insight

      Prevent the interviews from being just a venue for the business to complain about data by opening the discussion of having them share current concerns and then focus the second half on what they would like to do with data and how they see master data assets supporting their strategic plans.

      Ensure buy-in for the MDM project by aligning the MDM vision and the drivers of the organization

      MDM exists to enable the success of the organization as a whole, not just as a technology venture. To be successful in the MDM initiative, IT must understand how MDM will help the critical aspects of the business. Likewise, the business must understand why it is important to them to ensure long-term support of the project.

      The image contains a screenshot example of the text above.

      “If an organization only wants to look at MDM as a tech project, it will likely be a failure. It takes a very strong business and IT partnership to make it happen.”

      – Julie Hunt, Software Industry Analyst, Hub Designs Magazine

      Use Info-Tech’s Master Data Management Business Case Presentation Template to help secure business buy-in

      1-2 hours

      The image contains screenshots of the Master Data Management Business Case Presentation Template.

      Objectives

      • This presentation should be used to help obtain momentum for the ongoing master data management initiative and continued IT- business collaboration.
      • Master data management and the state of processes around data can be a sensitive business topic. To overcome issues of resistance from the operational or strategic levels, create a well-crafted business case.
      Input Output
      • Business requirements
      • Goals of MDM
      • Pain points of inadequate MDM
      • Awareness built for MDM project
      • Target data domains
      • Project scope
      Materials Participants
      • Master Data Management Business Case Presentation Template
      • Data Stewards or Data Custodians
      • CEO, CDO, or CIO
      • Information Management Team

      Download the MDM Business Case Presentation Template

      Use Info-Tech’s project charter to support your team in organizing their master data management plans

      Use this master document to centralize the critical information regarding the objectives, staffing, timeline, budget, and expected outcome of the project.

      1. MDM Vision and Mission

      Overview

      Define the value proposition behind addressing master data strategies and developing the organization's master data management practice.

      Consider

      Why is this project critical for the business?

      Why should this project be done now, instead of delayed further down the road?

      2. Goals or Objectives

      Overview

      Your goals and objectives should be practical and measurable. Goals and objectives should be mapped back to the reasons for MDM that we identified in the Executive Brief.

      Example Objectives

      Align the organization’s IT and business capabilities in MDM to the requirements of the organization’s business processes and the data that supports it.

      3. Expected Outcomes

      Overview

      Master data management as a concept can change based on the organization and with definitions and expectations varying heavily for individuals. Ensure alignment at the outset of the project by outlining and attaining agreement on the expectations and expected outcomes (deliverables) of the project.

      Recommended Outcomes

      Outline of an action plan

      Documented data strategies

      4. Outline of Action Plan

      Overview

      Document the plans for your project in the associated sections of the project charter to align with the outcomes and deliverables associated with the project. Use the sample material in the charter and the “Develop Your Timeline for the MDM Project” section to support developing your project plans.

      Recommended Project Scope

      Align master data MDM plan with the business.

      Document current and future architectural state of MDM.

      Download the MDM Project Charter Template

      5. Identify the Resourcing Requirements

      Overview

      Create a project team that has representation of both IT and the business (this will help improve alignment and downstream implementation planning).

      Business Roles to Engage

      Data owners (for subject area data)

      Data stewards who are custodians of business data (related to subject areas evaluated)

      Data scientists or other power users who are heavy consumers of data

      IT Roles to Engage

      Data architect(s)

      Any data management professionals who are involved in modeling data, managing data assets, or supporting the systems in which the data resides.

      Database administrators or data warehousing architects with a deep knowledge of data operations.

      Individuals responsible for data governance.

      Phase 2: Build the MDM Practice and Platform

      Develop a Master Data Management Practice and Platform

      Step 2.1

      Document the Current Data State

      Objectives

      1. Understand roles that data strategy, data governance, and data architecture play in MDM.

      2. Document the organization’s current data state for MDM.

      This step involves the following participants:

      Data Stewards or Data Custodians

      Data or Enterprise Architect

      Information Management Team

      Outcomes of this step

      Document the organization’s current data state, understanding the business processes and movement of data across the company.

      Effective data governance will create the necessary roles and rules within the organization to support MDM

      • A major success factor for MDM falls under data governance. If you don’t establish data governance early on, be prepared to face major obstacles throughout your project. Governance includes data definitions, data standards, access rights, and quality rules and ensures that MDM continues to offer value.
      • Data governance involves an organizational committee or structure that defines the rules of how data is used and managed – rules around its quality, processes to remediate data errors, data sharing, managing data changes, and compliance with internal and external regulations.
      • What is required for governance of master data? Defined roles, including data stewards and data owners, that will be responsible for creating the definitions relevant to master data assets.

      The image contains a screenshot of the Data Governance Key to Data Enablement.

      For more information, see Info-Tech Research Group’s Establish Data Governance blueprint.

      Ensure MDM success by defining roles that represent the essential high-level aspects of MDM

      Regardless of the maturity of the organization or the type of MDM project being undertaken, all three representatives must be present and independent. Effective communication between them is also necessary.

      Technology Representative

      Governance Representative

      Business Representative

      Role ensures:

      • MDM technology requirements are defined.
      • MDM support is provided.
      • Infrastructure to support MDM is present.

      Role ensures:

      • MDM roles and responsibilities are clearly defined.
      • MDM standards are adhered to.

      Role ensures:

      • MDM business requirements are defined.
      • MDM business matching rules are defined.

      The following roles need to be created and maintained for effective MDM:

      Data Owners are accountable for:

      • Data created and consumed.
      • Ensuring adequate data risk management is in place.

      Data Stewards are responsible for:

      • The daily and routine care of all aspects of data systems.
      • Supporting the user community.
      • Collecting, collating, and evaluating issues and problems with data.
      • Managing standard business definitions and metadata for critical data elements.

      Another crucial aspect of implementing MDM governance is defining match rules for master data

      • Matching, merging, and linking data from multiple systems about the same item, person, group, etc. attempts to remove redundancy, improve data quality, and provide information that is more comprehensive.
      • Matching is performed by applying inference rules. Data cleansing tools and MDM applications often include matching engines used to match data.
        • Engines are dependent on clearly defined matching rules, including the acceptability of matches at different confidence levels.
      • Despite best efforts, match decisions sometimes prove to be incorrect. It is essential to maintain the history of matches so that matches can be undone when they are discovered to be incorrect.
      • Artificial intelligence (AI) for match and merge is also an option, where the AI engine can automatically identify duplicate master data records to create a golden record.

      Match-Merge Rules vs. Match-Link Rules

      Match-Merge Rules

      • Match records and merge the data from these records into a single, unified, reconciled, and comprehensive record. If rules apply across data sources, create a single unique and comprehensive record in each database.
      • Complex due to the need to identify so many possible circumstances, with different levels of confidence and trust placed on data values in different fields from different sources.
      • Challenges include the operational complexity of reconciling the data and the cost of reversing the operation if there is a false merge.

      Match-Link Rules

      • Identify and cross-reference records that appear to relate to a master record without updating the content of the cross-referenced record.
      • Easier to implement and much easier to reverse.
      • Simple operation; acts on the cross-reference table and not the individual fields of the merged master data record, even though it may be more difficult to present comprehensive information from multiple records.

      Data architecture will assist in producing an effective data integration model for the technology underlying MDM

      Data quality is directly impacted by architecture.

      • With an MDM architecture, access, replication, and flow of data are controlled, which increases data quality and consistency.
      • Without an MDM architecture, master data occurs in application silos. This can cause redundant and inconsistent data.

      Before designing the MDM architecture, consider:

      • How the business is going to use the master data.
      • Architectural style (this is often dependent on the existing IT architecture, but generally, organizations starting with MDM find a hub architecture easiest to work with).
      • Where master data is entered, updated, and stored.
      • Whether transactions should be processed as batch or real-time.
      • What systems will contribute to the MDM system.
      • Implementation style. This will help ensure the necessary applications have access to the master data.

      “Having an architectural oversight and reference model is a very important step before implementing the MDM solutions.”

      – Selwyn Samuel, Director of Enterprise Architecture

      Document the organization’s data architecture to generate an accurate picture of the current data state

      2-3 hours

      Populate the template with your current organization's data components and the business flow that forms the architecture.

      Think about the source of master data and what other systems will contribute to the MDM system.

      The image contains a screenshot of the MDM Architecture Design Template.

      Input Output
      • Business process streamline
      • Current data state
      Materials Participants
      • MDM Architecture Design Template ArchiMate file
      • Enterprise Architect
      • Data Architect

      Download the MDM Architecture Design Template ArchiMate file

      Step 2.2

      Document the Target Data State

      Objectives

      1. Understand four implementation styles for MDM deployments.

      2. Document target MDM implementation systems.

      This step involves the following participants:

      Data Stewards or Data Custodians

      Data or Enterprise Architect

      Information Management Team

      Outcomes of this step

      Document the organization’s target architectural state surrounding MDM, identifying the specific MDM implementation style.

      How the organization’s data flows through IT systems is a convenient way to define your MDM state

      Understanding the data sources present in the organization and how the business organizes and uses this data is critical to implementing a successful MDM strategy.

      Operational MDM

      • As you manage data in an operational MDM system, the data gets integrated back into the systems that were the source of the data in the first place. The “best records” are created from a combination of data elements from systems that create relevant data (e.g. billing system, call center, reservation system) and then the data is sent back to the systems to update it to the best record. This includes both batch and real-time processing data.

      Analytical MDM

      • Generates “best records” the same way that operational MDM does. However, the data doesn’t go back to the systems that generated the data but rather to a repository for analytics, decision management, or reporting system purposes.

      Discovery of master data is the same for both approaches, but the end use is very different.

      The approaches are often combined by technologically mature organizations, but analytical MDM is generally more expensive due to increased complexity.

      Central to an MDM program is the implementation of an architectural framework

      Info-Tech Research Group’s Reference MDM Architecture uses a top-down approach.

      A top-down approach shows the interdependent relationship between layers – one layer of functionality uses services provided by the layers below, and in turn, provides services to the layers above.

      The image contains a screenshot of the Architectural Framework.

      Info-Tech Research Group’s Reference MDM Architecture can meet the unique needs of different organizations

      The image contains a screenshot of Info-Tech Research Group's Reference MDM Architecture.

      The MDM service layers that make up the hub are:

      • Virtual Registry. The virtual registry is used to create a virtual view of the master data (this layer is not necessary for every MDM implementation).
      • Interface Services. The interface services work directly with the transport method (e.g. Web Service, Pub/Sub, Batch/FTP).
      • Rules Management. The rules management layer manages business rules and match rules set by the organization.
      • Lifecycle Management. This layer is responsible for managing the master data lifecycle. This includes maintaining relationships across domains, modeling classification and hierarchies within the domains, helping with master data quality through profiling rules, deduplicating and merging data to create golden records, keeping authoring logs, etc.
      • Base Services. The base services are responsible for managing all data (master, history, metadata, and reference) in the MDM hub.
      • Security. Security is the base layer and is responsible for protecting all layers of the MDM hub.

      An important architectural decision concerns where master data should live

      All MDM architectures will contain a system of entry, a system of record, and in most cases, a system of reference. Collectively, these systems identify where master data is authored and updated and which databases will serve as the authoritative source of master data records.

      System of Entry (SOE)

      System of Record (SOR)

      System of Reference (SORf)

      Any system that creates master data. It is the point in the IT architecture where one or more types of master data are entered. For example, an enterprise resource planning (ERP) application is used as a system of entry for information about business entities like products (product master data) and suppliers (supplier master data).

      The system designated as the authoritative data source for enterprise data. The true system of record is the system responsible for authoring and updating master data and this is normally the SOE. An ideal MDM system would contain and manage a single, up-to-date copy of all master data. This database would provide timely and accurate business information to be used by the relevant applications. In these cases, one or more SOE applications (e.g. customer relationship management or CRM) will be declared the SOR for certain types of data. The SOR can be made up of multiple physical subsystems.

      A replica of master data that can be synchronized with the SOR(s). It is updated regularly to resolve discrepancies between data sets, but will not always be completely up to date. Changes in the SOR are typically batched and then transmitted to the SORf. When a SORf is implemented, it acts as the authoritative source of enterprise data, given that it is updated and managed relative to the SOR. The SORf can only be used as a read-only source for data consumers.

      Central to an MDM program is the implementation of an architectural framework

      These styles are complementary and see increasing functionality; however, organizations do not need to start with consolidation.

      Consolidation

      Registry

      Coexistence

      Transactional

      What It Means

      The MDM is a system of reference (application systems serve as the systems of record). Data is created and stored in the applications and sent (generally in batch mode) to a centralized MDM system.

      The MDM is a system of reference. Master data is created and stored in the

      application systems, but key master data identifiers are linked with the MDM system, which allows a view of master data records to be assembled.

      The MDM is a system of reference. Master data is created and stored in application systems; however, an authoritative record of master data is also created (through matching) and stored in the MDM system.

      The MDM is a genuine source of record. All master data records are centrally authored and materialized in the MDM system.

      Use Case

      This style is ideal for:

      • Organizations that want to have access to master data for reporting.
      • Organizations that do not need real-time access to master data.

      This style is ideal for:

      • A view of key master data identifiers.
      • Near real-time master data reference.
      • Organizations that need access to key master data for operational systems.
      • Organizations facing strict data replication regulations.

      This style is ideal for:

      • A complete view of each master data entity.
      • Deployment of workflows for collaborative authoring.
      • A central reference system for master data.

      This style is ideal for:

      • Organizations that want true master data management.
      • Organizations that need complete, accurate, and consistent master data at all times.
      • Transactional access to master data records.
      • Tight control over master data.

      Method of Use

      Analytical

      Operational

      Analytical, operational, or collaborative

      Analytical, operational, or collaborative

      Consolidation implementation style

      Master data is created and stored in application systems and then placed in a centralized MDM hub that can be used for reference and reporting.

      The image contains a screenshot of the architectural framework and MDM hub.

      Advantages

      • Prepares master data for enterprise data warehouse and reporting by matching/merging.
      • Can serve as a basis for coexistence or transactional MDM.

      Disadvantages

      • Does not provide real-time reference because updates are sent to the MDM system in batch mode.
      • New data requirements will need to be managed at the system of entry.

      Registry implementation style

      Master data is created and stored in applications. Key identifiers are then linked to the MDM system and used as reference for operational systems.

      The image contains a screenshot of the architectural framework with a focus on registry implementation style.

      Advantages

      • Quick to deploy.
      • Can get a complete view of key master data identifiers when needed.
      • Data is always current since it is accessed from the source systems.

      Disadvantages

      • Depends on clean data at the source system level.
      • Can be complex to manage.
      • Except for the identifiers persisting in the MDM system, all master data records remain in the applications, which means there is not a complete view of all master data records.

      Coexistence implementation style

      Master data is created and stored in existing systems and then synced with the MDM system to create an authoritative record of master data.

      The image contains a screenshot of the architectural framework with a focus on the coexistence implementation style.

      Advantages

      • Easier to deploy workflows for collaborative authoring.
      • Creates a complete view for each master data record.
      • Increased master data quality.
      • Allows for data harmonization across systems.
      • Provides organizations with a central reference system.

      Disadvantages

      • Master data is altered in both the MDM system and source systems. Data may not be up to date until synchronization takes place.
      • Higher deployment costs because all master data records must be harmonized.

      Transactional implementation style

      All master data records are materialized in the MDM system, which provides the organization with a single, complete source of master data at all times.

      The image contains a screenshot of the architectural framework with a focus on the transactional implementation style.

      Advantages

      • Functions as a system of record, providing complete, consistent, accurate, and up-to-date data.
      • Provides a single location for updating and managing master data.

      Disadvantages

      • The implementation of this style may require changes to existing systems and business processes.
      • This implementation style comes with increased cost and complexity.

      All organizations are different; identify the architecture and implementation needs of your organization

      Architecture is not static – it must be able to adapt to changing business needs.

      • The implementation style an organization chooses is dependent on organizational factors such as the purpose of MDM and method of use.
      • Some master data domains may require that you start with one implementation style and later graduate to another style while retaining the existing data model, metadata, and matching rules. Select a starting implementation style that will best suit the organization.
      • Organizations with multi-domain master data may have to use multiple implementation styles. For example, data domain X may require the use of a registry implementation, while domain Y requires a coexistence implementation.

      Document your target data state surrounding MDM

      2-3 hours

      Populate the template with your target organization’s data architecture.

      Highlight new capabilities and components that MDM introduced based on MDM implementation style.

      The image contains a screenshot of the MDM Architecture Design Template.

      Input Output
      • Business process streamline
      • MDM architectural framework
      • Target data state
      Materials Participants
      • MDM Architecture Design Template ArchiMate File
      • Enterprise Architect
      • Data Architect
      • Head of Data

      Step 2.3

      Develop MDM Practice and Platform

      Objectives

      1. Review Info-Tech’s practice pattern and design your master data management practice.

      2. Design your master data management platform.

      3. Consider next steps for the MDM project.

      This step involves the following participants:

      Data Stewards or Data Custodians

      Data or Enterprise Architect

      Information Management Team

      Outcomes of this step

      Define the key services and outputs that must be delivered by establishing core capabilities, accountabilities, roles, and governance for the practice and platform.

      What does a master data management practice pattern look like?

      The master data management practice pattern describes the core capabilities, accountabilities, processes, and essential roles and the elements that provide oversight or governance of the practice, all of which are required to deliver on high-value services and deliverables or output for the organization.

      The image contains a screenshot to demonstrate the intentional relationships between the business and the master data.

      Download the Master Data Management Practice Pattern Template ArchiMate File

      Master data management data practice setup

      • Define the practice lead’s accountabilities and responsibilities.
      • Assign the practice lead.
      • Design the practice, defining the details of the practice (including the core capabilities, accountabilities, processes, and essential roles; the elements that provide oversight or governance of the practice; and the practice’s services and deliverables or output for the organization).
      • Define services and accountabilities:
      1. Define deployment and engagement model
      2. Define practice governance and metrics
      3. Define processes and deliverables
      4. Summarize capabilities
      5. Use activity slide to assign the skills to the role

      General approach to setting up data practices

      Guidelines for designing and establishing your various data practices.

      Understand master data management practice pattern

      A master data management practice pattern includes key services and outputs that must be delivered by establishing core capabilities, accountabilities, roles, and governance for the practice.

      Assumption:

      The accountabilities and responsibilities for the master data management practice have been established and assigned to a practice lead.

      1. Download and review Master Data Management Practice Pattern (Level 1 – Master Data Management Practice Pattern).
      2. Review and update master data management processes for your organization.

      Download the Master Data Management Practice Pattern Template ArchiMate File

      Info-Tech Insight

      An organization with heavy merger and acquisition activity poses a significant master data challenge. Prioritize your master data practice based on your organization’s ability to locate and maintain a single source of master data.

      The image contains a screenshot of the Master Data Management Process.

      Initiate your one-time master data management practice setup

      1. Ensure data governance committees are established.
      2. Align master data management working group responsibilities with data governance committee.
      3. Download and review Master Data Management Practice Pattern Setup (Level 1 – Master Data Management Practice Setup).
      4. Start establishing your master data practice:
      5. 4.1 Define services and accountabilities

        4.2 Define processes and deliverables by stakeholder

        4.3 Design practice operating model

        4.4 Perform skills inventory and design roles

        4.5 Determine practice governance and metrics

        4.6 Summarize practice capabilities

      6. Define key master data management deliverable and processes.

      The image contains a screenshot of the Process Template MDM Conflict Resolution.

      Download and Update:

      Process Template: MDM Conflict Resolution

      MDM operating model

      The operating model is a visualization of how MDM commonly operates and the value it brings to the organization. It illustrates the master data flow, which works from left to right, from source system to consumption layer. Another important component of the model is the business data glossary, which is part of your data governance plan, to define terminology and master data’s key characteristics across business units.

      The image contains a screenshot of the MDM Operating Model.

      Choosing the appropriate technology capabilities

      An MDM platform should include certain core technical capabilities:

      • Master data hub: Functions as a system of reference, providing an authoritative source of data in read-only format to systems downstream.
      • Data modeling: Ability to model complex relationships between internal application sources and other parties.
      • Workflow management: Ability to support flexible and comprehensive workflow-based capabilities.
      • Relationship and hierarchies: Ability to determine relationships and identify hierarchies within the same domain or across different domains of master data.
      • Information quality: Ability to profile, cleanse, match, link, identify, and reconcile master data in different data sources to create and maintain the “golden record.”
      • Loading, integration, synchronization: Ability to load data quality tools and integrate so there is a bidirectional flow of data. Enable data migration and updates that prevent duplicates within the incoming data and data found in the hub.
      • Security: Ability to control access of MDM and the ability to report on activities. Ability to configure and manage different rules and visibilities.
      • Ease of use: Including different user interfaces for technical and business roles.
      • Scalability and high performance/high availability: Ability to expand or shrink depending on the business needs and maintain a high service level.

      Other requirements may include:

      • MDM solution that can handle multiple domains on a single set of technology and hardware.
      • Offers a broad set of data integration connectors out of the box.
      • Offers flexible deployments (on-premises, cloud, as-a-service).
      • Supports all architectural implementation styles: registry, consolidation, coexistence, and transactional.
      • Data governance tools: workflow and business process management (BPM) functionality to link data governance with operational MDM.
      • Uses AI to automate MDM processes.

      Info-Tech Research Group’s MDM platform

      The image contains a screenshot of Info-Tech's MDM Platform.

      Info-Tech Research Group’s MDM platform summarizes an organization’s data environment and the technical capabilities that should be taken into consideration for your organization's MDM implementation.

      Design your master data management platform

      2-3 hours

      Instructions

      Download the Master Data Management Platform Template.

      The platform is not static. Adapt the template to your own needs based on your target data state, required technical capabilities, and business use cases.

      The image contains a screenshot of Info-Tech's MDM Platform.

      Input Output
      • Technology capabilities
      • Target data state
      • Master Data Management Platform
      Materials Participants
      • Master Data Management Platform Template
      • Data Architect
      • Enterprise Architect
      • Head of Data

      Download the MDM Platform Template

      Next steps for the MDM project

      There are several deployment options for MDM platforms; pick the one best suited to the organization’s business needs:

      On-Premises Solutions

      Cloud Solutions

      Hybrid Solutions

      Embrace the technology

      MDM has traditionally been an on-premises initiative. On-premises solutions have typically had different instances for various divisions. On-premises solutions offer interoperability and consistency.

      Many IT teams of larger companies prefer an on-premises implementation. They want to purchase a perpetual MDM software license, install it on hardware systems, configure and test the MDM software, and maintain it on an ongoing basis.

      Cloud MDM solutions can be application-specific or platform-specific, which involves using a software platform or web-based portal interface to connect internal and external data. Cloud is seen as a more cost-effective MDM solution as it doesn’t require a large IT staff to configure the system and can be paid for through a monthly subscription. Because many organizations are averse to storing their master data outside of their firewalls, some cloud MDM solutions manage the data where it resides (either software as a service or on-premises), rather than maintaining it in the cloud.

      MDM system resides both on premises and in the cloud. As many organizations have some applications on premises and others in the cloud, having a hybrid MDM solution is a realistic option for many. MDM can be leveraged from either on-premises or in the cloud solutions, depending on the current needs of the organization.

      • Vendor-supplied MDM solutions often provide complete technical functionality in the package and various deployment options.
      • Consider leverage Info-Tech’s SoftwareReviews to accelerate and improve your software selection process.

      Capitalizing on trends in the MDM technology space would increase your competitive edge

      AI improves master data management.

      • With MDM technology improving every year, there are a greater number of options to choose from than ever before. AI is one of the hottest trends in MDM.
      • By using machine learning (ML) techniques, AI can automate many activities surrounding MDM to ease manual processes and improve accuracy, such as automating master data profiling, managing workflow, identifying duplication, and suggesting match and merge proposals.
      • Some other powerful applications include product categorization and hierarchical management. The product is assigned to the correct level of the category hierarchy based on the probability that a block of words in a product title or description belongs to product categories (Informatica, 2021).

      Info-Tech Insight

      Leverage modern capabilities such as AI and ML to support large and complex MDM deployments.

      The image contains a screenshot of the AI Activities in MDM.

      Informatica, 2021

      Related Info-Tech Research

      Build Your Data Quality Program

      • Data needs to be good, but truly spectacular data may go unnoticed. Provide the right level of data quality, with the appropriate effort, for the correct usage. This blueprint will help you determine what “the right level of data quality” means and create a plan to achieve that goal for the business.

      Build a Data Architecture Roadmap

      • Optimizing data architecture requires a plan, not just a data model.

      Create a Data Management Roadmap

      • Streamline your data management program with our simplified framework.

      Related Info-Tech Research

      Build a Robust and Comprehensive Data Strategy

      • Formulate a data strategy that stitches all of the pieces together to better position you to unlock the value in your data.

      Build Your Data Practice and Platform

      • The true value of data comes from defining intentional relationships between the business and the data through a well-thought-out data platform and practice.

      Establish Data Governance

      • Establish data trust and accountability with strong governance.

      Research Authors and Contributors

      Authors:

      Name

      Position

      Company

      Ruyi Sun

      Research Specialist, Data & Analytics

      Info-Tech Research Group

      Rajesh Parab

      Research Director, Data & Analytics

      Info-Tech Research Group

      Contributors:

      Name

      Position

      Company

      Selwyn Samuel

      Director of Enterprise Architecture

      Furniture manufacturer

      Julie Hunt

      Consultant and Author

      Hub Designs Magazine and Julie Hunt Consulting

      David Loshin

      President

      Knowledge Integrity Inc.

      Igor Ikonnikov

      Principal Advisory Director

      Info-Tech Research Group

      Irina Sedenko

      Advisory Director

      Info-Tech Research Group

      Anu Ganesh

      Principal Research Director

      Info-Tech Research Group

      Wayne Cain

      Principal Advisory Director

      Info-Tech Research Group

      Reddy Doddipalli

      Senior Workshop Director

      Info-Tech Research Group

      Imad Jawadi

      Senior Manager, Consulting

      Info-Tech Research Group

      Andy Neill

      Associate Vice President

      Info-Tech Research Group

      Steve Wills

      Practice Lead

      Info-Tech Research Group

      Bibliography

      “DAMA Guide to the Data Management Body of Knowledge (DAMA-DMBOK Guide).” First Edition. DAMA International. 2009. Digital. April 2014.
      “State of the Connected Customer, Fifth Edition.” Salesforce, 2022. Accessed Jan. 2023.
      “The new digital edge: Rethinking strategy for the postpandemic era.” McKinsey & Company, 26 May. 2021. Assessed Dec. 2022.
      “Value and resilience through better risk management.” Mckinsey & Company, 1 Oct. 2018. Assessed Dec. 2022.
      “Plotting a course through turbulent times (9TH ANNUAL B2B SALES & MARKETING DATA REPORT)” Dun & Bradstreet, 2022. Assessed Jan. 2023.
      ““How to Win on Customer Experience.”, Deloitte Digital, 2020. Assessed Dec. 2022.
      “CX Trends 2022.”, Zendesk, 2022. Assessed Jan. 2023
      .”Global consumer trends to watch out for in 2023.” Qualtrics XM Institute, 8 Nov. 2022. Assessed Dec. 2022
      “How to Understand Single Versus Multiple Software Instances.” Brightwork Research & Analysis, 24 Mar. 2021. Assessed Dec. 2022
      “What is omnichannel?” Oracle. Assessed Dec. 2022
      “How AI Improves Master Data Management (MDM).” Informatica, 30 May. 2021. Assessed Dec. 2022

      Enable Product Delivery – Executive Leadership Workshop

      • Buy Link or Shortcode: {j2store}353|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Development
      • Parent Category Link: /development
      • You need to clearly convey the direction and strategy of your product portfolio to gain alignment, support, and funding from your organization.
      • IT organizations are traditionally organized to deliver initiatives in specific periods of time. This conflicts with product delivery, which continuously delivers value over the lifetime of a product.
      • Delivering multiple products together creates additional challenges because each product has its own pedigree, history, and goals.

      Our Advice

      Critical Insight

      • Empowered product managers and product owners are the key to ensuring your delivery teams are delivering the right value at the right time to the right stakeholders.
      • Establishing operationally aligned product families helps bridge the gap between enterprise priorities and product enhancements.
      • Leadership must be aligned to empower and support Agile values and product teams to unlock the full value realization within your organization.

      Impact and Result

      • Common understanding of product management and Agile delivery.
      • Commitment to support and empower product teams.

      Enable Product Delivery – Executive Leadership Workshop Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Enabling Product Delivery – Executive workshop to align senior leadership with their transition to product management and delivery.

      • Enabling Product Delivery – Executive Workshop Storyboard

      2. Enabling Product Delivery –Executive Workshop Outcomes.

      • Enabling Product Delivery – Executive Workshop Outcomes
      [infographic]

      Workshop: Enable Product Delivery – Executive Leadership Workshop

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understanding Your Top Challenges

      The Purpose

      Understand the drivers for your product transformation.

      Key Benefits Achieved

      Define the drivers for your transition to product-centric delivery.

      Activities

      1.1 What is driving your organization to become product focused?

      Outputs

      List of challenges and drivers

      2 Transitioning From Projects to Product-Centric Delivery

      The Purpose

      Understand the product transformation journey and differences.

      Key Benefits Achieved

      Identify the cultural, behavioral, and leadership changes needed for a successful transformation.

      Activities

      2.1 Define the differences between projects and product delivery

      Outputs

      List of differences

      3 Enterprise Agility and the Value of Change

      The Purpose

      Understand why smaller iterations increase value realization and decrease accumulated risk.

      Key Benefits Achieved

      Leverage smaller iterations to reduce time to value and accumulated risk to core operations.

      Activities

      3.1 What is business agility?

      Outputs

      Common understanding about the value of smaller iterations

      4 Defining Products and Product Management in Your Context

      The Purpose

      Establish an organizational starting definition of products.

      Key Benefits Achieved

      Tailor product management to meet the needs and vision of your organization.

      Activities

      4.1 What is a product? Who are your consumers?

      4.2 Identify enablers and blockers of product ownership

      4.3 Define a set of guiding principles for product management

      Outputs

      Product definition

      List of enablers and blockers of product ownership

      Set of guiding principles for product management

      5 Connecting Product Management to Agile Practices

      The Purpose

      Understand the relationship between product management and product delivery.

      Key Benefits Achieved

      Optimize product management to prioritize the right changes for the right people at the right time.

      Activities

      5.1 Discussions

      Outputs

      Common understanding

      6 Commit to Empowering Agile Product Teams

      The Purpose

      Personalize and commit to supporting product teams.

      Key Benefits Achieved

      Embrace leadership and cultural changes needed to empower and support teams.

      Activities

      6.1 Your management culture

      6.2 Personal Cultural Stop, Start, and Continue

      6.3 Now, Next, Later to support product owners

      Outputs

      Your management culture map

      Personal Cultural Stop, Start, and Continue list

      Now, Next, Later roadmap

      Further reading

      Enable Product Delivery – Executive Leadership Workshop

      Strengthen product management in your organization through effective executive leadership by focusing on product teams, core capabilities, and proper alignment.

      Objective of this workshop

      To develop a common understanding and foundation for product management so we, as leaders, better understand how to lead product owners, product managers, and their teams.

      Enable Product Delivery - Executive Leadership Workshop

      Learn how enterprise agility can provide lasting value to the organization

      Clarify your role in supporting your teams to deliver lasting value to stakeholders and customers

      1. Understanding Your Top Challenges
        • Define your challenges, goals, and opportunities Agile and product management will impact.
      2. Transitioning from Projects to Product-centric Delivery
        • Understand the shift from fixed delivery to continuous improvement and delivery of value.
      3. Enterprise Agility and the Value of Change
        • Organizations need to embrace change and leverage smaller delivery cycles.
      4. Defining Your "Products" and Product Management
        • Define products in your culture and how to empower product delivery teams.
      5. Connecting Product Management to Agile Practices
        • Use product ownership to drive increased ROI into your product delivery teams and lifecycles.
      6. Commit to Empowering Agile Product Teams
        • Define the actions and changes you must make for this transformation to be successful.

      Your Product Transformation Journey

      1. Make the Case for Product Delivery
        • Align your organization with the practices to deliver what matters most
      2. Enable Product Delivery – Executive Workshop
        • One-day executive workshop – align and prepare your leadership
        • Audience: Senior executives and IT leadership.
          Size: 8-16 people
          Time: 6 hours
      3. Deliver on Your Digital Product Vision
        • Enhance product backlogs, roadmapping, and strategic alignment
        • Audience: Product Owners/Mangers
          Size: 10-20 people
          Time: 3-4 days
      4. Deliver Your Digital Products at Scale
        • Scale Product Families to Align Enterprise Goals
        • Audience: Product Owners/Mangers
          Size: 10-20 people
          Time: 3-4 days
      5. Mature and Scale Product Ownership
        • Align and mature your product owners
        • Audience: Product Owners/Mangers
          Size: 8-16 people
          Time: 2-4 days

      Repeat workshops with different companies, operating units, departments, or teams as needed.

      What is a workshop?

      We WILL ENGAGE in discussions and activities:

      • Flexible, to accommodate the needs of the group.
      • Open forum for discussion and questions.
      • Share your knowledge, expertise, and experiences (roadblocks and success stories).
      • Everyone is part of the process.
      • Builds upon itself.

      This workshop will NOT be:

      • A lecture or class.
      • A monologue that never ends.
      • Technical training.
      • A presentation.
      • Us making all the decisions.

      Roles within the workshop

      We each have a role to play to make our workshop successful!

      Facilitators

      • Introduce the best practice framework used by Info-Tech.
      • Ask questions about processes, procedures, and assumptions.
      • Guide for the methodology.
      • Liaison for any other relevant Info-Tech research or services.

      Participants

      • Contribute and speak out as much as needed.
      • Provide expertise on the current processes and technology.
      • Ask questions.
      • Provide feedback.
      • Collaborate and work together to produce solutions.

      Understanding Your Top Challenges

      • Understanding Your Top Challenges
      • Transitioning From Projects to Product-Centric Delivery
      • Enterprise Agility and the Value of Change
      • Defining Your Products and Product Management
      • Connecting Product Management to Agile Practices
      • Commit to Empowering Agile Product Teams
      • Wrap-Up and Retrospective

      Executive Summary

      Your Challenge

      • Products are the lifeblood of an organization. They deliver the capabilities needed to deliver value to customers, internal users, and stakeholders.
      • The shift to becoming a product organization is intended to continually increase the value you provide to the broader organization as you grow and evolve.
      • You need to clearly convey the direction and strategy of your product portfolio to gain alignment, support, and funding from your organization.

      Common Obstacles

      • IT organizations are traditionally organized to deliver initiatives in specific periods of time. This conflicts with product delivery, which continuously delivers value over the lifetime of a product.
      • Delivering multiple products together creates additional challenges because each product has its own pedigree, history, and goals.
      • Product owners struggle to prioritize changes to deliver product value. This creates a gap and conflict between product and enterprise goals.

      Info-Tech's Approach

      Info-Tech's approach will guide you through:

      • Understanding the top challenges driving your product initiative.
      • Improving your transitioning from projects to product-centric delivery.
      • Enhancing enterprise agility and the value of change.
      • Defining products and product management in your context.
      • Connecting product management to Agile practices.
      • Committing to empowering Agile Product teams.
      This is an image of an Info-Tech Thought Map for Accelerate Your Transition to Product Delivery
      This is an image of an Info-Tech Thought Map for Delier on your Digital Product Vision
      This is an image of an Info-Tech Thought Map for Deliver Digital Products at Scale via Enterprise Product Families.
      This is an image of an Info-Tech Thought Map for What We Mean by an Applcation Department Strategy.

      What is driving your organization to become product focused?

      30 minutes

      • Team introductions:
        • Share your name and role
        • What are the key challenges you are looking to solve around product management?
        • What blockers or challenges will we need to overcome?

      Capture in the Enable Product Delivery – Executive Leadership Workshop Outcomes and Next Steps.

      Input

      • Organizational knowledge
      • Goals and challenges

      Output

      • List of key challenges
      • List of workshop expectations
      • Parking lot items

      Transitioning From Projects to Product-Centric Delivery

      • Understanding Your Top Challenges
      • Transitioning From Projects to Product-Centric Delivery
      • Enterprise Agility and the Value of Change
      • Defining Your Products and Product Management
      • Connecting Product Management to Agile Practices
      • Commit to Empowering Agile Product Teams
      • Wrap-Up and Retrospective

      Define the differences between projects and product delivery

      30 minutes

      • Consider project delivery and product delivery.
      • Discussion:
        • What are some differences between the two?

      Capture in the Enable Product Delivery – Executive Leadership Workshop Outcomes and Next Steps.

      Input

      • Organizational knowledge
      • Internal terms and definitions

      Output

      • List of differences between projects and product delivery

      Define the differences between projects and product delivery

      15 minutes

      Project Delivery

      vs

      Product Delivery

      Point in time

      What is changed

      Method of funding changes

      Needs an owner

      Input

      • Organizational knowledge
      • Internal terms and definitions

      Output

      • List of differences between projects and product delivery

      Capture in the Enable Product Delivery – Executive Leadership Workshop Outcomes and Next Steps.

      Identify the differences between a project-centric and a product-centric organization

      Project

      Product

      Fund Projects

      Funding

      Fund Products or Teams

      Line of Business Sponsor

      Prioritization

      Product Owner

      Makes Specific Changes
      to a Product

      Product Management

      Improve Product Maturity
      and Support

      Assign People to Work

      Work Allocation

      Assign Work
      to Product Teams

      Project Manager Manages

      Capacity Management

      Team Manages Capacity

      Info-Tech Insight

      Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end user value and enterprise alignment.

      Projects can be a mechanism for funding product changes and improvements

      This is an image showing the relationship between the project lifecycle, a hybrid lifecycle, and a product lifecycle.

      Projects within products

      Regardless of whether you recognize yourself as a "product-based" or "project-based" shop, the same basic principles should apply.

      You go through a period or periods of project-like development to build a version of an application or product.

      You also have parallel services along with your project development, which encompass the more product-based view. These may range from basic support and maintenance to full-fledged strategy teams or services like sales and marketing.

      While Agile and product are intertwined, they are not the same!

      Delivering products does not necessarily require an Agile mindset. However, Agile methods help facilitate the journey because product thinking is baked into them.

      This image shows the product delivery maturity process from waterfall to continuous integration and delivery.

      Product roadmaps guide delivery and communicate your strategy

      In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.

      This is an image adapted from Pichler, What is Product Management.

      Adapted from: Pichler, "What Is Product Management?"

      Info-Tech Insight

      The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.

      The First 100 Days as CISO

      • Buy Link or Shortcode: {j2store}248|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: 50 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: Security Strategy & Budgeting
      • Parent Category Link: /security-strategy-and-budgeting
      • Make a good first impression at your new job.
      • Obtain guidance on how you should approach the first 100 days.
      • Assess the current state of the security program and recommend areas of improvement and possible solutions.
      • Develop a high-level security strategy in three months.

      Our Advice

      Critical Insight

      • Every CISO needs to follow Info-Tech’s five-step approach to truly succeed in their new position. The meaning and expectations of a CISO role will differ from organization to organization and person to person, however, the approach to the new position will be relatively the same.
      • Eighty percent of your time will be spent listening. The first 100 days of the CISO role is an information gathering exercise that will involve several conversations with different stakeholders and business divisions. Leverage this collaborative time to understand the business, its internal and external operations, and its people. Unequivocally, active listening will build company trust and help you to build an information security vision that reflects that of the business strategy.
      • Start “working” before you actually start the job. This involves finding out as much information about the company before officially being an employee. Investigate the company website and leverage available organizational documents and initial discussions to better understand your employer’s leadership, company culture ,and business model.

      Impact and Result

      • Hit the ground running with Info-Tech’s ready-made agenda vetted by CISO professionals to impress your colleagues and superiors.
      • Gather details needed to understand the organization (i.e. people, process, technology) and determine the current state of the security program.
      • Track and assess high-level security gaps using Info-Tech’s diagnostic tools and compare yourself to your industry’s vertical using benchmarking data.
      • Deliver an executive presentation that shows key findings obtained from your security evaluation.

      The First 100 Days as CISO Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why the first 100 days of being a CISO is a crucial time to be strategic. Review Info-Tech’s methodology and discover our five-step approach to CISO success.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Prepare

      Review previous communications to prepare for your first day.

      • CISO Diary
      • Introduction Sheet

      2. Build relationships

      Understand how the business operates and develop meaningful relationships with your sphere of influence.

      3. Inventory components of the business

      Inventory company assets to know what to protect.

      4. Assess security posture

      Evaluate the security posture of the organization by leveraging Info-Tech’s IT Security diagnostic program.

      • Diagnostic Benchmarks: Security Governance & Management Scorecard
      • Diagnostic Benchmarks: Security Business Satisfaction Report

      5. Deliver plan

      Communicate your security vision to business stakeholders.

      • The First 100 Days as CISO Executive Presentation Template
      • The First 100 Days as CISO Executive Presentation Example
      [infographic]

      Leadership Workshop Overview

      • Buy Link or Shortcode: {j2store}475|cart{/j2store}
      • member rating overall impact: 8.8/10 Overall Impact
      • member rating average dollars saved: $69,299 Average $ Saved
      • member rating average days saved: 28 Average Days Saved
      • Parent Category Name: Leadership Development Programs
      • Parent Category Link: /leadership-development-programs

      Leadership has evolved over time. The velocity of change has increased and leadership for the future looks different than the past.

      Our Advice

      Critical Insight

      Development of the leadership mind should never stop. This program will help IT leaders continue to craft their leadership competencies to navigate the ever-changing world in which we operate.

      Impact and Result

      • Embrace and lead change through active sharing, transparency, and partnerships.
      • Encourage growth mindset to enhance innovative ideas and go past what has always been done.
      • Actively delegate responsibilities and opportunities that engage and develop team members to build on current skills and prepare for the future.

      Leadership Workshop Overview Research & Tools

      Start here – read the Workshop Overview

      Read our concise Workshop Overview to find out how this program can support the development needs of your IT leadership teams.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Info-Tech Leadership Workshop Overview
      [infographic]

      Map Your Business Architecture to Define Your Strategy

      • Buy Link or Shortcode: {j2store}579|cart{/j2store}
      • member rating overall impact: 9.4/10 Overall Impact
      • member rating average dollars saved: $357,799 Average $ Saved
      • member rating average days saved: 30 Average Days Saved
      • Parent Category Name: Strategy & Operating Model
      • Parent Category Link: /strategy-and-operating-model
      • Organizations need to innovate rapidly to respond to the changing forces in their industry, but their IT initiatives often fail to deliver meaningful outcomes.
      • Planners face challenges in understanding the relationships between the important customer-focused innovations they’re trying to introduce and the resources (capabilities) that make them possible, including applications, human resources, information, and processes. For example, are we risking the success of a new service offering by underpinning it with a legacy or manual solution?

      Our Advice

      Critical Insight

      Successful execution of business strategy requires planning that:

      1. Accurately reflects organizational capabilities.
      2. Is traceable so all levels can understand how decisions are made.
      3. Makes efficient use of organizational resources.

      To accomplish this, the business architect must engage stakeholders, model the business, and drive planning with business architecture.

      • Business architecture is often regarded as an IT function when its role and tools should be fixtures within the business planning and innovation practice.
      • Any size of organization – from start-ups to global enterprises -- can benefit from using a common language and modeling rigor to identify the opportunities that will produce the greatest impact and value.
      • You don’t need sophisticated modeling software to build an effective business architecture knowledgebase. In fact, the best format for engaging business stakeholders is intuitive visuals using business language.

      Impact and Result

      • Execute more quickly on innovation and transformation initiatives.
      • More effectively target investments in resources and IT according to what goals and requirements are most important.
      • Identify problematic areas (e.g. legacy applications, manual processes) that hinder the business strategy and create inefficiencies in our information technology operation.

      Map Your Business Architecture to Define Your Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Map Your Business Architecture Deck – A step-by-step document that walks you through how to properly engage business and IT in applying a common language and process rigor to build key capabilities required to achieve innovation and growth goals.

      Build a structured, repeatable framework for both IT and business stakeholders to appraise the activities that deliver value to consumers; and assess the readiness of their capabilities to enable them.

      • Map Your Business Architecture to Define Your Strategy – Phases 1-3

      2. Stakeholder Engagement Strategy Template – A best-of-breed template to help you build a clear, concise, and compelling strategy document for identifying and engaging stakeholders.

      This template helps you ensure that your business architecture practice receives the resources, visibility, and support it needs to be successful, by helping you develop a strategy to engage the key stakeholders involved.

      • Stakeholder Engagement Strategy Template

      3. Value Stream Map Template – A template to walk through the value streams that are tied to your strategic goals.

      Record the complete value stream and decompose it into stages. Add a description of the expected outcome of the value stream and metrics for each stage.

      • Value Stream Map Template

      4. Value Stream Capability Mapping Template – A template to define capabilities and align them to selected value streams.

      Build a business capability model for the organization and map capabilities to the selected value stream.

      • Value Stream – Capability Mapping Template
      [infographic]

      Workshop: Map Your Business Architecture to Define Your Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Discover the Business Context

      The Purpose

      Identify and consult stakeholders to discover the business goals and value proposition for the customer.

      Key Benefits Achieved

      Engage stakeholders and SMEs in describing the business and its priorities and culture.

      Identify focus for the areas we will analyze and work on.

      Activities

      1.1 Select key stakeholders

      1.2 Plan for engaging stakeholders

      1.3 Gather business goals and priorities

      Outputs

      Stakeholder roles

      Engagement plan

      Business strategy, value proposition

      2 Define Value Streams

      The Purpose

      Describe the main value-adding activities of the business from the consumer’s point of view, e.g. provide product or service.

      Key Benefits Achieved

      Shared understanding of why we build resources and do what we do.

      Starting point for analyzing resources and investing in innovation.

      Activities

      2.1 Define or update value streams

      2.2 Decompose selected value stream(s) into value stages and identify problematic areas and opportunities

      Outputs

      Value streams for the enterprise

      Value stages breakdown for selected value stream(s)

      3 Build Business Capability Map

      The Purpose

      Describe all the capabilities that make up an organization and enable the important customer-facing activities in the value streams.

      Key Benefits Achieved

      Basis for understanding what resources the organization has and their ability to support its growth and success.

      Activities

      3.1 Define and describe all business capabilities (Level 1)

      3.2 Decompose and analyze capabilities for a selected priority value stream.

      Outputs

      Business Capability Map (Level 1)

      Business Capabilities Level 2 for selected value stream

      4 Develop a Roadmap

      The Purpose

      Use the Business Capability Map to identify key capabilities (e.g. cost advantage creator), and look more closely at what applications or information or business processes are doing to support or hinder that critical capability.

      Key Benefits Achieved

      Basis for developing a roadmap of IT initiatives, focused on key business capabilities and business priorities.

      Activities

      4.1 Identify key capabilities (cost advantage creators, competitive advantage creators)

      4.2 Assess capabilities with the perspective of how well applications, business processes, or information support the capability and identify gaps

      4.3 Apply analysis tool to rank initiatives

      Outputs

      Business Capability Map with key capabilities: cost advantage creators and competitive advantage creators

      Assessment of applications or business processes or information for key capabilities

      Roadmap of IT initiatives

      Further reading

      Map Your Business Architecture to Define Your Strategy

      Plan your organization’s capabilities for best impact and value.

      Info-Tech Research Group

      Info-Tech is a provider of best-practice IT research advisory services that make every IT leader’s job easier.

      35,000 members sharing best practices you can leverage Millions spent developing tools and templates annually Leverage direct access to over 100 analysts as an extension of your team Use our massive database of benchmarks and vendor assessments Get up to speed in a fraction of the time

      Analyst perspective

      Know your organization’s capabilities to build a digital and customer-driven culture.

      Business architecture provides a holistic and unified view of:

      • All the organization’s activities that provide value to their clients (value streams).
      • The resources that make them possible and effective (capabilities, i.e. its employees, software, processes, information).
      • How they inter-relate, i.e. depend on and impact each other to help deliver value.

      Without a business architecture it is difficult to see the connections between the business’s activities for the customer and the IT resources supporting them – to demonstrate that what we do in IT is customer-driven.

      As a map of your business, the business architecture is an essential input to the digital strategy:

      • Develop a plan to transform the business by investing in the most important capabilities.
      • Ensure project initiatives are aligned with business goals as they evolve.
      • Respond more quickly to customer requirements and to disruptions in the industry by streamlining operations and information sharing across the enterprise.

      Crystal Singh, Research Director, Data and Analytics

      Crystal Singh
      Research Director, Data and Analytics
      Info-Tech Research Group

      Andrea Malick, Research Director, Data and Analytics

      Andrea Malick
      Research Director, Data and Analytics
      Info-Tech Research Group

      Executive summary

      Your Challenge Common Obstacles Info-Tech’s Approach

      Organizations need to innovate rapidly to respond to ever-changing forces and demands in their industry. But they often fail to deliver meaningful outcomes from their IT initiatives within a reasonable time.

      Successful companies are transforming, i.e. adopting fluid strategies that direct their resources to customer-driven initiatives and execute more quickly on those initiatives. In a responsive and digital organization, strategies, capabilities, information, people, and technology are all aligned, so work and investment are consistently allocated to deliver maximum value.

      You don’t have a complete reference map of your organization’s capabilities on which to base strategic decisions.

      You don’t know how to prioritize and identify the capabilities that are essential for achieving the organization’s customer-driven objectives.

      You don’t have a shared enterprise vision, where everyone understands how the organization delivers value and to whom.

      Begin important business decisions with a map of your organization – a business reference architecture. Model the business in the form of architectural blueprints.

      Engage your stakeholders. Recognize the opportunity for mapping work, and identify and engage the right stakeholders.

      Drive business architecture forward to promote real value to the organization. Assess your current projects to determine if you are investing in the right capabilities. Conduct business capability assessments to identify opportunities and prioritize projects.

      Info-Tech Insight
      Business architecture is the set of strategic planning techniques that connects organization strategy to execution in a manner that is accurate and traceable and promotes the efficient use of organizational resources.

      Blueprint activities summary

      Phase Purpose Activity Outcome
      1. Business context:
      Identify organization goals, industry drivers, and regulatory requirements in consultation with business stakeholders.
      Identify forces within and outside the organization to consider when planning the focus and timing of digital growth, through conducting interviews and surveys and reviewing existing strategies. Business value canvas, business strategy on a page, customer journey
      2. Customer activities (value stream):
      What is the customer doing? What is our reason for being as a company? What products and services are we trying to deliver?
      Define or update value streams, e.g. purchase product from supplier, customer order, and deliver product to customer. Value streams enterprise-wide (there may be more than one set of value streams, e.g. a medical school and community clinic)
      Prioritize value streams:
      Select key value streams for deeper analysis and focus.
      Assess value streams. Priority value streams
      Value stages:
      Break down the selected value stream into its stages.
      Define stages for selected value streams. Selected value stream stages
      3. Business capability map, level 1 enterprise:
      What resources and capabilities at a high level do we have to support the value streams?
      Define or update the business capabilities that align with and support the value streams. Business capability map, enterprise-wide capabilities level 1
      Business capability map, level 2 for selected area:
      List resources and capabilities that we have at a more detailed level.
      Define or update business capabilities for selected value stream to level 2. Business capability map, selected value stream, capability level 2
      Heatmap Business Capability Map: Flag focus areas in supporting technology, applications, data and information.

      Info-Tech’s workshop methodology

      Day 1: Discover Business Context Day 2: Define Value Streams Day 3: Build Business Capability Map Day 4: Roadmap Business Architecture
      Phase Steps

      1.1 Collect corporate goals and strategies

      1.2 Identify stakeholders

      2.1 Build or update value streams

      2.2 Decompose selected value stream into value stages and analyze for opportunities

      3.1 Update business capabilities to level 1 for enterprise

      3.2 For selected value streams, break down level 1 to level 2

      3.3 Use business architecture to heatmap focus areas: technology, information, and processes

      3.4 Build roadmap of future business architecture initiatives

      Phase Outcomes
      • Organizational context and goals
      • Business strategy on a page, customer journey map, business model canvas
      • Roles and responsibilities
      • Value stream map and definitions
      • Selected value stream(s) decomposed into value stages
      • Enterprise business capabilities map to level 1
      • Business architecture to level 2 for prioritized value stream
      • Heatmap business architecture
      • Business architecture roadmap, select additional initiatives

      Key concepts for this blueprint

      INDUSTRY VALUE CHAIN DIGITAL TRANSFORMATION BUSINESS ARCHITECTURE
      A high-level analysis of how the industry creates value for the consumer as an overall end-to-end process. The adoption of digital technologies to innovate and re-invent existing business, talent ,and operating models to drive growth, business value, and improved customer experience. A holistic, multidimensional business view of capabilities, end-to-end value, and operating model in relation to the business strategy.
      INDUSTRY VALUE STREAM STRATEGIC OBJECTIVES CAPABILITY ASSESSMENTS
      A set of activities, tasks, and processes undertaken by a business or a business unit across the entire end-to-end business function to realize value. A set of standard objectives that most industry players will feature in their corporate plans. A heat-mapping effort to analyze the maturity and priority of each capability relative to the strategic priorities that they serve.

      Info-Tech’s approach

      1 Understand the business context and drivers
      Deepen your understanding of the organization’s priorities by gathering business strategies and goals. Talking to key stakeholders will allow you to get a holistic view of the business strategy and forces shaping the strategy, e.g. economy, workforce, and compliance.
      2 Define value streams; understand the value you provide
      Work with senior leadership to understand your customers’ experience with you and the ways your industry provides value to them.
      Assess the value streams for areas to explore and focus on.
      3 Customize the industry business architecture; develop business capability map
      Work with business architects and enterprise architects to customize Info-Tech’s business architecture for your industry as an enterprise-wide map of the organization and its capabilities.
      Extend the business capability map to more detail (Level 2) for the value stream stages you select to focus on.

      Business architecture is a planning function that connects strategy to execution

      Business architecture provides a framework that connects business strategy and IT strategy to project execution through a set of models that provide clarity and actionable insights. How well do you know your business?

      Business architecture is:

      • Inter-disciplinary: Business architecture is a core planning activity that supports all important decisions in the organization, for example, organizational resources planning. It’s not just about IT.
      • Foundational: The best way to answer the question, “Where do we start?” or “Where is our investment best directed?”, comes from knowing your organization, what its core functions and capabilities are (i.e. what’s important to us as an organization), and where there is work to do.
      • Connecting: Digital transformation and modernization cannot work with siloes. Connecting siloes means first knowing the organization and its functions and recognizing where the siloes are not communicating.

      Business architecture must be branded as a front-end planning function to be appropriately embedded in the organization’s planning process.

      Brand business architecture as an early planning pre-requisite on the basis of maintaining clarity of communication and spreading an accurate awareness of how strategic decisions are being made.

      As an organization moves from strategy toward execution, it is often unclear as to exactly how decisions pertaining to execution are being made, why priority is given to certain areas, and how the planning function operates.

      The business architect’s primary role is to model this process and document it.

      In doing so, the business architect creates a unified view as to how strategy connects to execution so it is clearly understood by all levels of the organization.

      Business architecture is part of the enterprise architecture framework

      Business Architecture
      Business strategy map Business model canvas Value streams
      Business capability map Business process flows Service portfolio
      Data Architecture Application Architecture Infrastructure Architecture
      Conceptual data model Application portfolio catalog Technology standards catalog
      Logical data model Application capability map Technology landscape
      Physical data model Application communication model Environments location model
      Data flow diagram Interface catalog Platform decomposition diagram
      Data lifecycle diagram Application use-case diagram Network computing / hardware diagram
      Security Architecture
      Enterprise security model Data security model Application security model

      Business architecture is a set of shared and practical views of the enterprise

      The key characteristic of the business architecture is that it represents real-world aspects of a business, along with how they interact.

      Many different views of an organization are typically developed. Each view is a diagram that illustrates a way of understanding the enterprise by highlighting specific information about it:

      • Business strategy view captures the tactical and strategic goals that drive an organization forward.
      • Business capabilities view describes the primary business functions of an enterprise and the pieces of the organization that perform those functions.
      • Value stream view defines the end-to-end set of activities that deliver value to external and internal stakeholders.
      • Business knowledge view establishes the shared semantics (e.g. customer, order, and supplier) within an organization and relationships between those semantics (e.g. customer name, order date, supplier name) – an information map.
      • Organizational view captures the relationships among roles, capabilities, and business units, the decomposition of those business units into subunits, and the internal or external management of those units.

      Business architect connects all the pieces

      The business owns the strategy and operating model; the business architect connects all the pieces together.

      R Business Architect (Responsible)
      A Business Unit Leads (Accountable)
      C Subject Matter Experts (Consulted)
      – Business Lines, Operations, Data, Technology Systems & Infrastructure Leads
      I Business Operators (Informed)
      – Process, Data, Technology Systems & Infrastructure

      Choose a key business challenge to address with business architecture

       Choose a key business challenge to address with business architecture

      Picking the right project is critical to setting the tone for business architecture work in the organization.

      Best practices for business architecture success

      Consider these best practices to maintain a high level of engagement from key stakeholders throughout the process of establishing or applying business architecture.

      Balance short-term cost savings with long-term benefits

      Participate in project governance to facilitate compliance

      Create a center of excellence to foster dialogue

      Identify strategic business objectives

      Value streams: Understand how you deliver value today

      It is important to understand the different value-generating activities that deliver an outcome for and from your customers.

      We do this by looking at value streams, which refer to the specific set of activities an industry player undertakes to create and capture value for and from the end consumer (and so the question to ask is, how do you make money as an organization?).

      Our approach helps you to strengthen and transform those value streams that generate the most value for your organization.

      Understand how you deliver value today

      An organization can have more than one set of streams.
      For example, an enterprise can provide both retail shopping and financial services, such as credit cards.

      Define the organization’s value streams

      • Value streams connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities. Those activities are dependent on the specific industry segment an organization operates within. Value streams can extend beyond the organization into the supporting ecosystem, whereas business processes are contained within and the organization has complete control over them.
      • There are two types of value streams: core value streams and support value streams. Core value streams are mostly externally facing: they deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map. Support value streams are internally facing and provide the foundational support for an organization to operate.
      • An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers. Info-Tech recommends identifying and organizing the value streams with customers and partners as end-value receivers.

      Example: Value stream descriptions for the retail industry

      Value Streams Create or Purchase the Product Manage Inventory Distribute Product Sell Product, Make Product Available to Customers
      • Product is developed before company sells it.
      • Make these products by obtaining raw materials from external suppliers or using their own resources.
      • Retailers purchase the products they are going to sell to customers from manufacturers or wholesale distributors.
      • Retailer success depends on its ability to source products that customers want and are willing to buy.
      • Inventory products are tracked as they arrive in the warehouse, counted, stored, and prepared for delivery.
      • Estimate the value of your inventory using retail inventory management software.
      • Optimizing distribution activities is an important capability for retailers. The right inventory needs to be at a particular store in the right quantities exactly when it is needed. This helps to maximize sales and minimize how much cash is held up in inventory.
      • Proper supply chain management can not only reduce costs for retailers but drive revenues by enhancing shopping experiences.
      • Once produced, retailers need to sell the products. This is done through many channels including physical stores, online, the mail, or catalogs.
      • After the sale, retailers typically have to deliver the product, provide customer care, and manage complaints.
      • Retailers can use loyalty programs, pricing, and promotions to foster repeat business.

      Value streams describe your core business

      Value streams describe your core business

      Value streams – the activities we do to provide value to customers – require business capabilities.

      Value streams are broken down further into value stages, for example, the Sell Product value stream has value stages Evaluate Options, Place Order, and Make Payment.

      Think of value streams as the core operations: the reason for your organization’s being. A professional consulting organization may have a legal team but it does not brand itself as a law firm. A core value stream is providing research products and services; a business capability that supports it is legal counsel.

      Decompose the value stream into stages

      The stages of a value stream are usually action-oriented statements or verbs that make up the individual steps involved throughout the scope of the value stream, e.g. Place Order or Make Payment.

      Each value stream should have a trigger or starting point and an end result for a client or receiver.

      Decompose the value stream into stages

      There should be measurable value or benefits at each stage. These are key performance indicators (KPIs). Spot problem areas in the stream.

      Value streams usually fall into one of these categories:

      1. Fulfillment of products and services
      2. Manufacturing
      3. Software products
      4. Supporting value streams (procurement of supplies, product planning)

      Value streams need capabilities

      • Value streams connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities.
      • There are two types of value streams: core value streams and support value streams. Core value streams are mostly externally facing: they deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map. Support value streams are internally facing and provide the foundational support for an organization to operate.
      • There can be different end-value receivers. Info-Tech recommends identifying and organizing the value streams with customers and partners as end-value receivers.

      Value streams need business capabilities

      Business capabilities are built up to allow the business to perform the activities that bring value to customers. Map capabilities to the value-add activities in the value stream. Business capabilities lie at the top layer of the business architecture:

      • They are the most stable reference for planning organizations.
      • They make strategy more tangible.
      • If properly defined, they can help overcome organizational silos.

      Value streams need business capabilities

      Example business capability map – Higher Education

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Example business capability map for: Higher Education

      Example business capability map for Higher Education

      Example business capability map – Local Government

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

      Example business capability map for: Local Government

      Example business capability map for Local Government

      Value streams need business capabilities

      Value streams – the activities we do to provide value to customers – require business capabilities. Value streams are broken down further into value stages.

      Business capabilities are built up to allow the business to perform the activities that bring value to customers. Map capabilities to the activities in the value stage to spot opportunities and problems in delivering services and value.

      Business processes fulfill capabilities. They are a step-by-step description of who is performing what to achieve a goal. Capabilities consist of networks of processes and the resources – people, technology, materials – to execute them.

      Capability = Processes + Software, Infrastructure + People

      Prioritize a value stream and identify its supporting capabilities

      Prioritize your improvement objectives and business goals and identify a value stream to transform.

      Align the business objectives of your organization to your value streams (the critical actions that take place within your organization to add value to a customer).

      Prioritize a value stream to transform based on the number of priorities aligned to a value stream, and/or the business value (e.g. revenue, EBITDA earnings, competitive differentiation, or cost efficiency).

      Decompose the selected value stream into value stages.

      Align capabilities level 1 and 2 to value stages. One capability may support several value stages in the stream.

      Build a business architecture for the prioritized value stream with a map of business capabilities up to level 2.

      NOTE: We can’t map all capabilities all at once: business architecture is an ongoing practice; select key mapping initiatives each year based on business goals.

      Prioritize a value stream and identify its supporting capabilities

      Map business capabilities to Level 2

       Map business capabilities to Level 2

      Map capabilities to value stage

      Map capabilities to value stage

      Business value realization

      Business value defines the success criteria of an organization as manifested through organizational goals and outcomes, and it is interpreted from four perspectives:

      • Profit generation: The revenue generated from a business capability with a product that is enabled with modern technologies.
      • Cost reduction: The cost reduction when performing business capabilities with a product that is enabled with modern technologies.
      • Service enablement: The productivity and efficiency gains of internal business operations from products and capabilities enhanced with modern technologies.
      • Customer and market reach: The improved reach and insights of the business in existing or new markets.

      Business Value Matrix

      Value, goals, and outcomes cannot be achieved without business capabilities

      Break down your business goals into strategic and achievable initiatives focused on specific value streams and business capabilities.

      Business goals and outcomes

      Accelerate the process with an industry business architecture

      It’s never a good idea to start with a blank page.

      The business capability map available from Info-Tech and with industry standard models can be used as an accelerator. Assemble the relevant stakeholders – business unit leads and product/service owners – and modify the business capability map to suit your organization’s context.

      Acceleration path: Customize generic capability maps with the assistance of our industry analysts.

      Accelerate the process with an industry business architecture

      Identify goals and drivers

      Consider organizational goals and industry forces when planning.

      Business context Define value streams Build business capability map
      1.1 Select key stakeholders
      1.2 Collect and understand corporate goals
      2.1 Update or define value streams
      2.2 Decompose and analyze selected value stream
      3.1 Build level 1 capability map
      3.2 Build level 2 capability map
      3.3 Heatmap capability map
      3.4 Roadmap

      Use inputs from business goals and strategies to understand priorities.

      It is not necessary to have a comprehensive business strategy document to start – with key stakeholders, the business architect should be able to gather a one-page business value canvas or customer journey.

      Determine how the organization creates value

      Begin the process by identifying and locating the business mission and vision statements.

      What is business context?

      “The business context encompasses an understanding of the factors impacting the business from various perspectives, including how decisions are made and what the business is ultimately trying to achieve. The business context is used by IT to identify key implications for the execution of its strategic initiatives.”

      Source: Businesswire, 2018

      Identify the key stakeholders who can help you promote the value of business architecture

      First, as the CIO, you must engage executive stakeholders and secure their support.
      Focus on key players who have high power and high interest in business architecture.

      Engage the stakeholders who are impacted the most and have the power to impede the success of business architecture.

      For example, if the CFO – who has the power to block funding – is disengaged, business architecture will be put at risk.

      Use Info-Tech’s Stakeholder Power Map Template to help prioritize time spent with stakeholders.

      Sample power map

      Identify the key stakeholders concerned with the business architecture project

      A business architecture project may involve the following stakeholders:

      Business architecture project stakeholders

      You must identify who the stakeholders are for your business architecture work.

      Think about:

      • Who are the decision makers and key influencers?
      • Who will impact the business architecture work? Who will the work impact?
      • Who has vested interest in the success or failure of the practice?
      • Who has the skills and competencies necessary to help us be successful?

      Avoid these common mistakes:

      • Don’t focus on the organizational structure and hierarchy. Often stakeholder groups don’t fit the traditional structure.
      • Don’t ignore subject-matter experts on either the business or IT side. You will need to consider both.

      1.1 Identify and assemble key stakeholders

      1-3 hours

      Build an accurate depiction of the business.

      1. It is important to make sure the right stakeholders participate in this exercise. The exercise of identifying capabilities for an organization is very introspective and requires deep analysis.
      2. Consider:
        1. Who are the decision makers and key influencers?
        2. Who will impact the business capability work? Who has a vested interest in the success or failure of the outcome?
        3. Who has the skills and competencies necessary to help you be successful?
      3. Avoid:
        1. Don’t focus on the organizational structure and hierarchy. Often stakeholder groups don’t fit the traditional structure.
        2. Don’t ignore subject matter experts on either the business or IT side. You will need to consider both.
      Input Output
      • List of who is accountable for key business areas and decisions
      • Organizational chart
      • List of who has decision-making authority
      • A list of the key stakeholders
      Materials Participants
      • Whiteboard/Flip Charts
      • Modeling software (e.g. Visio, ArchiMate)
      • Business capability map industry models
      • CIO
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • Departmental Executives & Senior Managers

      Conduct interviews with the business to gather intelligence for strategy

      Talking to key stakeholders will allow you to get a holistic view of the business strategy.

      Stakeholder interviews provide holistic view of business strategy

      Build a strategy on a page through executive interviews and document reviews

      Understanding the business mandate and priorities ensures alignment across the enterprise.

      A business strategy must articulate the long-term destination the business is moving into. This illustration shapes all the strategies and activities in every other part of the business, including what IT capabilities and resources are required to support business goals. Ultimately, the benefits of a well-defined business strategy increase as the organization scales and as business units or functions are better equipped to align the strategic planning process in a manner that reflects the complexity of the organization.

      Using the Business Strategy on a Page canvas, consider the questions in each bucket to elicit the overall strategic context of the organization and uncover the right information to build your digital strategy. Interview key executives including your CEO, CIO, CMO, COO, CFO, and CRO, and review documents from your board or overall organizational strategy to uncover insights.

      Info-Tech Insight
      A well-articulated and clear business strategy helps different functional and business units work together and ensures that individual decisions support the overall direction of the business.

      Focus on business value and establish a common goal

      Business architecture is a strategic planning function and the focus must be on delivering business value.

      Examples business objectives:

      • Digitally transform the business, redefining its customer interactions.
      • Identify the root cause for escalating customer complaints and eroding satisfaction.
      • Identify reuse opportunities to increase operational efficiency.
      • Identify capabilities to efficiently leverage suppliers to handle demand fluctuations.

      Info-Tech Insight
      CIOs are ideally positioned to be the sponsors of business architecture given that their current top priorities are digital transformation, innovation catalyzation, and business alignment.

      1.2 Collect and understand business objectives

      1-3 hours

      Having a clear understanding of the business is crucial to executing on the strategic IT initiatives.

      1. Discover the strategic CIO initiatives your organization will pursue:
      • Schedule interviews.
      • Use the CIO Business Vision diagnostic or Business Context Discovery Tool.
    • Document the business goals.
    • Update and finalize business goals.
    • InputOutput
      • Existing business goals and strategies
      • Existing IT strategies
      • Interview findings
      • Diagnostic results
      • List of business goals
      • Strategy on a page
      • Business model canvas
      • Customer journey
      MaterialsParticipants
      • CIO Business Vision diagnostic
      • Interview questionnaire
      • CIO
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • Departmental Executives & Senior Managers

      CIO Business Vision Diagnostic

      CEO

      Vision

      Where do you want to go?
      What is the problem your organization is addressing?

      Mission/Mandate

      What do you do?
      How do you do?
      Whom do you do it for?

      Value Streams

      Why are you in business? What do you do?
      What products and services do you provide?
      Where has your business seen persistent demand?

      Key Products & Services

      What are your top three to five products and services?

      Key Customer Segments

      Who are you trying to serve or target?
      What are the customer segments that decide your value proposition?

      Value Proposition

      What is the value you deliver to your customers?

      Future Value Proposition

      What is your value proposition in three to five years’ time?

      Digital Experience Aspirations

      How can you create a more effective value stream?
      For example, greater value to customers or better supplier relationships.

      Business Resilience Aspirations

      How can you reduce business risks?
      For example, compliance, operational, security, or reputational.

      Sustainability (or ESG) Aspirations

      How can you deliver ESG and sustainability goals?

      Interview the following executives for each business goal area.

      CEO
      CRO
      COO

      Core Business Goals

      What are the core business goals to meet business objectives?

      Top Priorities & Initiatives

      What are the top initiatives and priorities over the planning horizon?

      Performance Insights/Metrics

      What do we need to achieve?
      How can the success be measured?

      CMO
      COO
      CFO

      Shared Business Goals

      What are the shared (operational) business goals to meet business objectives?

      Top Priorities & Initiatives

      What are the top initiatives and priorities over the planning horizon?

      Performance Insights/Metrics

      What do we need to achieve?
      How can the success be measured?

      CFO
      CIO
      COO
      CHRO

      Enabling Business Goals

      What are the enabling (supporting/enterprise) business goals to meet business objectives?

      Top Priorities & Initiatives

      What are the top initiatives and priorities over the planning horizon?

      Performance Insights/Metrics

      What do we need to achieve?
      How can the success be measured?

      Craft a strategy to increase stakeholder support and participation

      The BA practice’s supporters are potential champions who will help you market the value of BA; engage with them first to create positive momentum. Map out the concerns of each group of stakeholders so you can develop marketing tactics and communications vehicles to address them.

      Example Communication Strategy

      Stakeholder Concerns Tactics to Address Concerns Communication Vehicles Frequency
      Supporters
      (High Priority)
      • Build ability to execute BA techniques
      • Build executive support
      • Build understanding of how they can contribute to the success of the BA practice
      • Communicate the secured executive support
      • Help them apply BA techniques in their projects
      • Show examples of BA work (case studies)
      • Personalized meetings and interviews
      • Department/functional meetings
      • Communities of practice or centers of excellent (education and case studies)
      Bi-Monthly
      Indifferent
      (Medium Priority)
      • Build awareness and/or confidence
      • Feel like BA has nothing to do with them
      • Show quick wins and case studies
      • Centers of excellence (education and case studies
      • Use the support of the champions
      Quarterly
      Resistors
      (Medium Priority)
      • BA will cause delays
      • BA will step in their territory
      • BA’s scope is too broad
      • Lack of understanding
      • Prove the value of BA – case studies and metrics
      • Educate how BA complements their work
      • Educate them on the changes resulting from the BA practice’s work, and involve them in crafting the process
      • Individual meetings and interviews
      • Political jockeying
      • Use the support of the champions
      Tailored to individual groups

      1.3 Craft a strategy to increase stakeholder support and participation

      1-2 hours

      Now that you have organized and categorized your stakeholders based on their power, influence, interest, and knowledge of business architecture, it is time to brainstorm how you are going to gain their support and participation.

      Think about the following:

      • What are your stakeholders’ concerns?
      • How can you address them?
      • How will you deliver the message?
      • How often will you deliver the message?

      Avoid these common mistakes:

      • Your communication strategy development should be an iterative process. Do not assume to know the absolute best way to get through to every resistor right away. Instead, engage with your supporters for their input on how to communicate to resistors and repeat the process for indifferent stakeholders as well.
      Input Output
    • Stakeholder Engagement Map
      • Stakeholder Communications Strategy
      Materials Participants
      • Stakeholder Engagement Strategy Template
      • A computer
      • A whiteboard and markers CIO
      • Business Architect
      • IT Department Leads

      Download the Stakeholder Engagement Strategy Template for this project.

      Engaging the right stakeholders

      CASE STUDY

      Industry
      Financial - Banking

      Source
      Anonymous

      Situation Complication Result

      To achieve success with the business architecture initiative, the bank’s CIO needed to put together a plan to engage the right stakeholders in the process.

      Without the right stakeholders, the initiative would suffer from inadequate information and thus would run the risk of delivering an ineffective solution.

      The bank’s culture was resistant to change and each business unit had its own understanding of the business strategy. This was a big part of the problem that led to decreasing customer satisfaction.

      The CIO needed a unified vision for the business architecture practice involving people, process, and technology that all stakeholders could support.

      Starting with enlisting executive support in the form of a business sponsor, the CIO identified the rest of the key stakeholders, in this case, the business unit heads, who were necessary to engage for the initiative.

      Once identified, the CIO promoted the benefits of business architecture to each of the business unit heads while taking stock of their individual needs.

      1.4 Develop a plan to engage key stakeholders

      1 hour

      Using your stakeholder power map as a starting point, focus on the three most important quadrants: those that contain stakeholders you must keep informed, those to keep satisfied, and the key players.

      Plot the stakeholders from those quadrants on a stakeholder engagement map.

      Think about the following:

      • Who are your resistors? These individuals will actively detract from project’s success if you don’t address their concerns.
      • Who is indifferent? These individuals need to be educated more on the benefits of business architecture to have an opinion either way.
      • Who are your supporters? These individuals will support you and spread your message if you equip them to do so.

      Avoid these common mistakes:

      • Do not jump to addressing resistor concerns first. Instead, equip your supporters with the info they need to help your cause and gain positive momentum before approaching resistors.
      InputOutput
      • Stakeholder Engagement Map
      • Stakeholder Communications Strategy
      MaterialsParticipants
      • Stakeholder Engagement Strategy Template
      • A computer
      • A whiteboard and markers
      • CIO
      • Business Architect
      • IT Department Leads

      Download the Stakeholder Engagement Strategy Template for this project.

      1.5 Craft a strategy to increase stakeholder support and participation

      1-2 hours

      Now that you have organized and categorized your stakeholders based on their power, influence, interest, and knowledge of business architecture, it is time to brainstorm how you are going to gain their support and participation.

      Think about the following:

      • What are your stakeholders’ concerns?
      • How can you address them?
      • How will you deliver the message?
      • How often will you deliver the message?

      Avoid these common mistakes:

      • Your communication strategy development should be an iterative process. Do not assume to know the absolute best way to get through to every resistor right away. Instead, engage with your supporters for their input on how to communicate to resistors and repeat the process for indifferent stakeholders as well.
      InputOutput
      • Stakeholder Engagement Map
      • Stakeholder Communications Strategy
      MaterialsParticipants
      • Stakeholder Engagement Strategy Template
      • A computer
      • A whiteboard and markers
      • CIO
      • Business Architect
      • IT Department Leads

      Download the Stakeholder Engagement Strategy Template for this project.

      Define value streams

      Identify the core activities your organization does to provide value to your customers.

      Business context Define value streams Build business capability map

      1.1 Select key stakeholders
      1.2 Collect and understand corporate goals

      2.1 Update or define value streams
      2.2 Decompose and analyze selected value stream

      3.1 Build Level 1 capability map
      3.2 Build Level 2 capability map
      3.3 Heatmap capability map
      3.4 Roadmap

      This phase will walk you through the following activities:

      • Note: It is recommended that you gather and leverage relevant industry standard business architecture models you may have available to you. Example: Info-Tech Industry Business Architecture, BIZBOK, APQC.
      • Defining or updating the organization’s value streams.
      • Selecting priority value streams for deeper analysis.

      This phase involves the following participants:

      • Business Architect, Enterprise Architect
      • Relevant Business Stakeholder(s): Business Unit Leads, Departmental Executives, Senior Mangers, Business Analysts

      Define the organization’s value streams

      • Value streams connect business goals to the organization’s value realization activities. They enable an organization to create and capture value in the marketplace by engaging in a set of interconnected activities. Those activities are dependent on the specific industry segment an organization operates within. Value streams can extend beyond the organization into the supporting ecosystem, whereas business processes are contained within and the organization has complete control over them.
      • There are two types of value streams: core value streams and support value streams. Core value streams are mostly externally facing: they deliver value to either an external or internal customer and they tie to the customer perspective of the strategy map. Support value streams are internally facing and provide the foundational support for an organization to operate.
      • An effective method for ensuring all value streams have been considered is to understand that there can be different end-value receivers. Info-Tech recommends identifying and organizing the value streams with customers and partners as end-value receivers.

      Connect business goals to value streams

      Example strategy map and value stream

      Identifying value streams

      Value streams connect business goals to organization’s value realization activities. They enable an organization to create and capture value in the market place by engaging in a set of interconnected activities.

      There are several key questions to ask when endeavoring to identify value streams.

      Key Questions
      • Who are your customers?
      • What are the benefits we deliver to them?
      • How do we deliver those benefits?
      • How does the customer receive the benefits?

      Example: Value stream descriptions for the retail industry

      Value StreamsCreate or Purchase ProductManage InventoryDistribute ProductSell Product
      • Retailers need to purchase the products they are going to sell to customers from manufacturers or wholesale distributors.
      • A retailer’s success depends on its ability to source products that customers want and are willing to buy.
      • In addition, they need to purchase the right amount and assortment of products based on anticipated demand.
      • The right inventory needs to be at a particular store in the right quantities exactly when it is needed. This helps to maximize sales and minimize how much cash is held up in inventory.
      • Inventory management includes tracking, ordering, and stocking products, e.g. raw materials, finished products, buffer inventory.
      • Optimizing distribution activities is important for retailers.
      • Proper supply chain management can not only reduce costs for retailers but also drive revenues by enhancing shopping experiences.
      • Distribution includes transportation, packaging and delivery.
      • As business becomes global, it is important to ensure the whole distribution channel is effective.
      • Once produced, retailers need to sell the products. This is done through many channels including physical stores, online, the mail, or catalogs.
      • After the sale, retailers typically have to deliver the product, provide customer care, and manage complaints.
      • Retailers can use loyalty programs, pricing, and promotions to foster repeat business.

      Value streams describe your core business

      Value streams – the activities we do to provide value to customers – require business capabilities.

      Value streams are broken down further into value stages, for example, Sell Product value stream has value stages Evaluate Options, Place Order, and Make Payment.

      Think of value streams as the core operations, the reason for our organization’s being. A professional consulting organization may have a legal team but it does not brand itself as a law firm. A core value stream is providing research products and services – a business capability that supports it is legal counsel.

      2.1 Define value streams

      1-3 hours

      Unify the organization’s perspective on how it creates value.

      1. Write a short description of the value stream that includes a statement about the value provided and a clear start and end for the value stream. Validate the accuracy of the descriptions with your key stakeholders.
      2. Consider:
        1. How does the organization deliver those benefits?
        2. How does the customer receive the benefits?
        3. What is the scope of your value stream? What will trigger the stream to start and what will the final value be?
      3. Avoid: Don’t start with a blank page. Use Info-Tech’s business architecture models for sample value streams.
      Input Output
      • Business strategy or goals
      • Financial statements
      • Info-Tech’s industry-specific business architecture
      • List of organizational specific value streams
      • Detailed value stream definition(s)
      Materials Participants
      • Whiteboard / Kanban Board
      • Reference Architecture Template – See your Account Representative for details
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Info-Tech Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      See your Info-Tech Account Representative for access to the Reference Architecture Template

      Decompose the value stream into stages

      The stages of a value stream are usually action-oriented statements or verbs that make up the individual steps involved throughout the scope of the value stream, e.g. Place Order or Make Payment.

      Each value stream should have a trigger or starting point and an end result for a client or receiver.

      Decompose the value stream into stages

      There should be measurable value or benefits at each stage.
      These are key performance indicators (KPIs).
      Spot problem areas in the stream.

      Value streams usually fall into one of these categories:

      1. Fulfillment of products and services
      2. Manufacturing
      3. Software products
      4. Supporting value streams (procurement of supplies, product planning)

      Value stream and value stages examples

      Customer Acquisitions
      Identify Prospects > Contact Prospects > Verify Interests

      Sell Product
      Identify Options > Evaluate Options > Negotiate Price and Delivery Date > Place Order > Get Invoice > Make Payment

      Product Delivery
      Confirm Order > Plan Load > Receive Warehouse > Fill Order > Ship Order > Deliver Order > Invoice Customer

      Product Financing
      Initiate Loan Application > Decide on Application > Submit Documents > Review & Satisfy T&C > Finalize Documents > Conduct Funding > Conduct Funding Audits

      Product Release
      Ideate > Design > Build > Release

      Sell Product is a value stream, made up of value stages Identify options, Evaluate options, and so on.

      2.2 Decompose selected value streams

      1-3 hours

      Once we have a good understanding of our value streams, we need to decide which ones to focus on for deeper analysis and modeling, e.g. extend the business architecture to more detailed level 2 capabilities.

      Organization has goals and delivers products or services.

      1. Identify which value propositions are most important, e.g. be more productive or manage money more simply.
      2. Identify the value stream(s) that create the value proposition.
      3. Break the selected value stream into value stages.
      4. Analyze value stages for opportunities.

      Practical Guide to Agile Strategy Execution

      InputOutput
      • Value stream maps and definitions
      • Business goals, business model canvas, customer journey (value proposition) Selected value streams decomposed into value stages
      • Analysis of selected value streams for opportunities
      • Value stream map
      MaterialsParticipants
      • Whiteboard / Kanban Board
      • Reference Architecture Template – See your Account Representative for details
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Build your value stream one layer at a time to ensure clarity and comprehensiveness

      The first step of creating a value stream is defining it.

      • In this step, you create the parameters around the value stream and document them in a list format.
      • This allows you to know where each value stream starts and ends and the unique value it provides.

      The second step is the value stream mapping.

      • The majority of the mapping is done here where you break down your value stream into each of its component stages.
      • Analysis of these stages allows for a deeper understanding of the value stream.
      • The mapping layer connects the value stream to organizational capabilities.

      Define the value streams that are tied to your strategic goals and document them in a list

      Title

      • Create a title for your value stream that indicates the value it achieves.
      • Ensure your title is clear and will be understood the same way across the organization.
      • The common naming convention for value streams is to use nouns, e.g. product purchase.

      Scope

      • Determine the scope of your value stream by defining the trigger to start the value stream and final value delivered to end the value stream.
      • Be precise with your trigger to ensure you do not mistakenly include actions that would not trigger your value stream.
      • A useful tip is creating a decision tree and outlining the path that results in your trigger.

      Objectives

      • Determine the objectives of the value stream by highlighting the outcome it delivers.
      • Identify the desired outcomes of the value stream from the perspective of your organization.

      Example Value Streams List

      Title Scope Objectives
      Sell Product From option identification to payment Revenue Growth

      Create a value stream map

      A Decompose the Value Stream Into Stages B Add the Customer Perspective
      • Determine the different stages that comprise the value stream.
      • Place the stages in the correct order.
      • Outline the likely sentiment and meaningful needs of the customer at each value stage.
      C Add the Expected Outcome D Define the Entry and Exit Criteria
      • Define the desired outcome of each stage from the perspective of the organization.
      • Define both the entry and exit criteria for each stage.
      • Note that the entry criteria of the first stage is what triggers the value stream.
      E Outline the Metrics F Assess the Stages
      • For each stage of the value stream, outline the metrics the organization can use to identify its ability to attain the desired outcome.
      • Assess how well each stage of the value stream is performing against its target metrics and use this as the basis to drill down into how/where improvements can be made.

      Decompose the value stream into its value stages

      The first step in creating a value stream map is breaking it up into its component stages.

      The stages of a value stream are usually action-oriented statements or verbs that make up the individual steps involved throughout the scope of the value stream.

      Illustration of decomposing value stream into its value stages

      The Benefit
      Segmenting your value stream into individual stages will give you a better understanding of the steps involved in creating value.

      Connect the stages of the value stream to a specific customer perspective

      Example of a sell product value stream

      The Benefit
      Adding the customer’s perspective will inform you of their priorities at each stage of the value stream.

      Connect the stages of the value stream to a desired outcome

      Example of a sell product value stream

      The Benefit
      Understanding the organization’s desired outcome at each stage of the value stream will help set objectives and establish metrics.

      Define the entry and exit criteria of each stage

      Example of entry and exit criteria for each stage

      The Benefit
      Establishing the entry and exit criteria for each stage will help you understand how the customer experience flows from one end of the stream to the other.

      Outline the key metric(s) for each stage

      Outline the key metrics for each stage

      The Benefit
      Setting metrics for each stage will facilitate the tracking of success and inform the business architecture practitioner of where investments should be made.

      Example value stream map: Sell Product

      Assess the stages of your value stream map to determine which capabilities to examine further

      To determine which specific business capabilities you should seek to assess and potentially refine, you must review performance toward target metrics at each stage of the value stream.

      Stages that are not performing to their targets should be examined further by assessing the capabilities that enable them.

      Value Stage Metric Description Metric Target Current Measure Meets Objective?
      Evaluate Options Number of Product Demonstrations 12,000/month 9,000/month No
      Identify Options Google Searches 100K/month 100K/month Yes
      Identify Options Product Mentions 1M/month 1M/month Yes
      Website Traffic (Hits)
      Average Deal Size
      Number of Deals
      Time to Complete an Order
      Percentage of Invoices Without Error
      Average Time to Acquire Payment in Full

      Determine the business capabilities that support the value stage corresponding with the failing metric

      Sell Product

      Identify Options > Evaluate Options > Negotiate Price and Delivery Date > Place Order > Get Invoice > Make Payment

      The value stage(s) that doesn’t meet its objective metrics should be examined further.

      • This is done through business capability mapping and assessment.
      • Starting at the highest level (level 0) view of a business, the business architecture practitioner must drill down into the lower level capabilities that support the specific value stage to diagnose/improve an issue.

      Info-Tech Insight
      In the absence of tangible metrics, you will have to make a qualitative judgement about which stage(s) of the value stream warrant further examination for problems and opportunities.

      Build business capability map

      Align supporting capabilities to priority activities.

      Business context Define value streams Build business capability map
      1.1 Select key stakeholders
      1.2 Collect and understand corporate goals
      2.1 Update or define value streams
      2.2 Decompose and analyze selected value stream
      3.1 Build Level 1 capability map
      3.2 Build Level 2 capability map
      3.3 Heatmap capability map
      3.4 Roadmap

      This step will walk you through the following activities:

      • Determine which business capabilities support value streams
      • Accelerate the process with an industry reference architecture
      • Validate the business capability map
      • Establish level 2 capability

      This step involves the following participants:

      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Outcomes of this step

    • A validated level 1 business capability map
    • Level 2 capabilities for selected value stream(s)
    • Heatmapped business capability map
    • Business architecture initiatives roadmap
    • Develop a business capability map – level 1

      • Business architecture consists of a set of techniques to create multiple views of an organization; the primary view is known as a business capability map.
      • A business capability defines what a business does to enable value creation and achieve outcomes, rather than how. Business capabilities are business terms defined using descriptive nouns such as “Marketing” or “Research and Development.” They represent stable business functions, are unique and independent of each other, and typically will have a defined business outcome. Business capabilities should not be defined as organizational units and are typically longer lasting than organizational structures.
      • A business capability mapping process should begin at the highest-level view of an organization, the level 1, which presents the entire business on a page.
      • An effective method of organizing business capabilities is to split them into logical groupings or categories. At the highest level, capabilities are either “core” (customer-facing functions) or “enabling” (supporting functions).
      • As a best practice, Info-Tech recommends dividing business capabilities into the categories illustrated to the right.

      The Business Capability Map is the primary visual representation of the organization’s key abilities or services that are delivered to stakeholders. This model forms the basis of strategic planning discussions.

      Example of a business capability map

      Example business capability map – Higher Education

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Example business capability map for: Higher Education

      Example business capability map for higher education

      Example business capability map – Local Government

      A business capability map can be thought of as a visual representation of your organization’s business capabilities and represents a view of what your data program must support.

      Validate your business capability map with the right stakeholders, including your executive team, business unit leaders, and/or other key stakeholders.

      Example business capability map for: Local Government

      Example business capability map for local government

      Map capabilities to value stage

      Example of a value stage

      Source: Lambert, “Practical Guide to Agile Strategy Execution”

      3.1 Build level 1 business capability map

      1-3 hours

      1. Analyze the value streams to identify and describe the organization’s capabilities that support them. This stage requires a good understanding of the business and will be a critical foundation for the business capability map. Use the reference business architecture’s business capability map for your industry for examples of level 1 and 2 business capabilities and the capability map template to work in.
      2. Avoid:
        1. Don’t repeat capabilities. Capabilities are typically mutually exclusive activities.
        2. Don’t include temporary initiatives. Capabilities should be stable over time. The people, processes, and technologies that support capabilities will change continuously.

      Ensure you engage with the right stakeholders:

      Don’t waste your efforts building an inaccurate depiction of the business: The exercise of identifying capabilities for an organization is very introspective and requires deep analysis.

      It is challenging to develop a common language that everyone will understand and be able to apply. Invest in the time to ensure the right stakeholders are brought into the fold and bring their business area expertise and understanding to the table.

      InputOutput
      • Existing business capability maps
      • Value stream map
      • Info-Tech’s industry-specific business architecture
      • Level 1 business capability map for enterprise
      MaterialsParticipants
      • Whiteboard
      • Reference Architecture Template – See your Account Representative for details
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Prioritize one value stream and build a business architecture to level 2 capabilities

      Prioritize your innovation objectives and business goals, and identify a value stream to transform.

      Align the innovation goals and business objectives of your organization to your value streams (the critical actions that take place within your organization to add value to a customer).
      Prioritize a value stream to transform based on the number of priorities aligned to a value stream and/or the business value (e.g. revenue, EBITDA earnings, competitive differentiation, or cost efficiency).
      Working alongside a business or enterprise architect, build a reference architecture for the prioritized value stream up to level 2.

      Example of a value stream to business architecture level 2 capabilities

      Info-Tech Insight
      To produce maximum impact, focus on value streams that provide two-thirds of your enterprise value (EBITDA earnings).

      From level 1 to level 2 business capabilities

      Example moving from level 1 to level 2 business capabilities

      3.2 Build level 2 business capability map

      1-3 hours

      It is only at level 2 and further that we can pinpoint the business capabilities – the exact resources, whether applications or data or processes – that we need to focus on to realize improvements in the organization’s performance and customer experience.

      1. Gather industry reference models and any existing business capability maps.
      2. For the selected value stream, further break down its level 1 business capabilities into level 2 capabilities.
      3. You can often represent the business capabilities on a single page, providing a holistic visual for decision makers.
      4. Use meaningful names for business capabilities so that planners, stakeholders, and subject matter experts can easily search the map.
      InputOutput
      • Existing business capability maps
      • Value stream map
      • Info-Tech’s industry-specific business architecture
      • Level 1 business capability map
      • Level 2 Business Capability Map for selected Value Stream
      MaterialsParticipants
      • Whiteboard
      • Reference Architecture Template – See your Account Representative for details.
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Download: See your Account Representative for access to Info-Tech’s Reference Architecture Template

      3.3 Heatmap business capability map

      1-3 hours

      Determine the organization’s key capabilities.

      1. Determine cost advantage creators. If your organization has a cost advantage over competitors, the capabilities that enable it should be identified and prioritized. Highlight these capabilities and prioritize the programs that support them.
      2. Determine competitive advantage creators. If your organization does not have a cost advantage over competitors, determine if it can deliver differentiated end-customer experiences. Once you have identified the competitive advantages, understand which capabilities enable them. These capabilities are critical to the success of the organization and should be highly supported.
      3. Define key future state capabilities. In addition to the current and competitive advantage creators, the organization may have the intention to enhance new capabilities. Discuss and select the capabilities that will help drive the attainment of future goals.
      4. Assess how well information, applications, and processes support capabilities.
      InputOutput
      • Business capability map
      • Cost advantage creators
      • Competitive advantage creators
      • IT and business assessments
      • Key business capabilities
      • Business process review
      • Information assessment
      • Application assessment
      • List of IT implications
      MaterialsParticipants
      • Whiteboard
      • Reference Architecture Template – See your Account Representative for details.
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Download: See your Account Representative for access to Info-Tech’s Reference Architecture Template

      Business capability map: Education

      Illustrative example of a business capability map for education

      Define key capabilities

      Illustrative example of Define key capabilities

      Note: Illustrative Example

      Business process review

      Illustrative example of a business process review

      Note: Illustrative Example

      Information assessment

       Illustrative example of an Information assessment

      Note: Illustrative Example

      Application assessment

       Illustrative example of an Application assessment

      Note: Illustrative Example

      MoSCoW analysis for business capabilities

       Illustrative example of a MoSCoW analysis for business capabilities

      Note: Illustrative Example

      Ranked list of IT implications

      MoSCoW Rank IT Implication Value Stream Impacted Comments/Actions
      M [Implication] [Value Stream]
      M [Implication] [Value Stream]
      M [Implication] [Value Stream]
      S [Implication] [Value Stream]
      S [Implication] [Value Stream]
      S [Implication] [Value Stream]
      C [Implication] [Value Stream]
      C [Implication] [Value Stream]
      C [Implication] [Value Stream]
      W [Implication] [Value Stream]
      W [Implication] [Value Stream]
      W [Implication] [Value Stream]

      3.4 Roadmap business architecture initiatives

      1-3 hours

      Unify the organization’s perspective on how it creates value.

      1. Write a short description of the value stream that includes a statement about the value provided and a clear start and end for the value stream. Validate the accuracy of the descriptions with your key stakeholders.
      2. Consider:
        1. How does the organization deliver those benefits?
        2. How does the customer receive the benefits?
        3. What is the scope of your value stream? What will trigger the stream to start and what will the final value be?
      3. Don’t start with a blank page. Use Info-Tech’s business architecture models for sample value streams.
      InputOutput
      • Existing business capability maps
      • Value stream map
      • Info-Tech’s industry-specific business architecture
      • Level 1 business capability map
      • Heatmapped business capability map
      MaterialsParticipants
      • Whiteboard
      • Reference Architecture Template – See your Account Representative for details.
      • Other industry standard reference architecture models: BIZBOK, APQC, etc.
      • Archi Models
      • Enterprise/Business Architect
      • Business Analysts
      • Business Unit Leads
      • CIO
      • Departmental Executives & Senior Managers

      Download: See your Account Representative for access to Info-Tech’s Reference Architecture Template

      Example: Business architecture deliverables

      Enterprise Architecture Domain Architectural View Selection
      Business Architecture Business strategy map Required
      Business Architecture Business model canvas Optional
      Business Architecture Value streams Required
      Business Architecture Business capability map Not Used
      Business Architecture Business process flows
      Business Architecture Service portfolio
      Data Architecture Conceptual data model
      Data Architecture Logical data model
      Data Architecture Physical data model
      Data Architecture Data flow diagram
      Data Architecture Data lineage diagram

      Tools and templates to compile and communicate your business architecture work

      The Industry Business Reference Architecture Template for your industry is a place for you to collect all of the activity outputs and outcomes you’ve completed for use in next-steps.

      Download the Industry Business Reference Architecture Template for your industry

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit Guided Implementation Workshop Consulting
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options

      Research Contributors and Experts

      Name Role Organization
      Ibrahim Abdel-Kader Research Analyst, Data & Analytics Info-Tech Research Group
      Ben Abrishami-Shirazi Technical Counselor, Enterprise Architecture Info-Tech Research Group
      Andrew Bailey Consulting, Manager Info-Tech Research Group
      Dana Dahar Research & Advisory Director, CIO / Digital Business Strategy Info-Tech Research Group
      Larry Fretz VP Info-Tech Research Group
      Shibly Hamidur Enterprise Architect Toronto Transit Commission (TTC)
      Rahul Jaiswal Principal Research Director, Industry Info-Tech Research Group
      John Kemp Executive Counselor, Executive Services Info-Tech Research Group
      Gerald Khoury Senior Executive Advisor Info-Tech Research Group
      Igor Ikonnikov Principal Advisory Director, Data & Analytics Info-Tech Research Group
      Daniel Lambert VP Benchmark Consulting
      Milena Litoiu Principal Research Director, Enterprise Architecture Info-Tech Research Group
      Andy Neill AVP Data & Analytics, Chief Enterprise Architect Info-Tech Research Group
      Rajesh Parab Research Director, Data & Analytics Info-Tech Research Group
      Rick Pittman VP, Research Info-Tech Research Group
      Irina Sedenko Research Director, Data & Analytics Info-Tech Research Group

      Bibliography

      Andriole, Steve. “Why No One Understands Enterprise Architecture & Why Technology Abstractions Always Fail.” Forbes, 18 September 2020. Web.

      “APQC Process Classification Framework (PCF) – Retail.” American Productivity & Quality Center, 9 January 2019. Web.

      Brose, Cari. “Who’s on First? Architecture Roles and Responsibilities in SAFe.” Business Architecture Guild, 9 March 2017. Web.

      Burlton, Roger, Jim Ryne, and Daniel St. George. “Value Streams and Business Processes: The Business Architecture Perspective.” Business Architecture Guild, December 2019. Web.

      “Business Architecture: An overview of the business architecture professional.” Capstera, 5 January 2022. Web.

      Business Architecture Guild. “What is Business Architecture?” Business Analyst Mentor, 18 November 2022. Web.

      “Business Architecture Overview.” The Business Architecture Working Group of the Object Management Group (OMG), n.d. Web.

      “Delivering on your strategic vision.” The Business Architecture Guild, n.d. Web.

      Ecker, Grant. “Deploying business architecture.” LinkedIn, 11 November 2021. (Presentation)

      IRIS. “Retail Business Architecture Framework and Examples.” IRIS Business Architect, n.d. Web.

      IRIS. “What Is Business Architecture?” IRIS Business Architect, 8 May 2014. Web.

      IRIS. “Your Enterprise Architecture Practice Maturity 2021 Assessment.” IRIS Business Architect, 17 May 2021. Web.

      Khuen, Whynde. “How Business Architecture Breaks Down and Bridges Silos.” Biz Arch Mastery, January 2020. Web.

      Lambert, Daniel. “Practical Guide to Agile Strategy Execution.” 18 February 2020.

      Lankhorst, Marc, and Bernd Ihnen. “Mapping the BIZBOK Metamodel to the ArchiMate Language.” Bizzdesign, 2 September 2021. Web.

      Ramias, Alan, and Andrew Spanyi, “Demystifying the Relationship Between Processes and Capabilities: A Modest Proposal.” BPTrends, 2 February 2015. Web.

      Newman, Daniel. “NRF 2022: 4 Key Trends From This Year’s Big Show.” Forbes, 20 January 2022. Web.

      Research and Markets. “Define the Business Context Needed to Complete Strategic IT Initiatives: 2018 Blueprint.” Business Wire, 1 February 2018. Web.

      Sabanoglu, Tugba. “Retail market worldwide - Statistics & Facts.” Statista, 21 April 2022. Web.

      Spacey, John. “Capability vs Process.” Simplicable, 18 November 2016. Web.

      “The Definitive Guide to Business Capabilities.” LeanIX, n.d. Web.

      TOGAF 9. Version 9.1. The Open Group, 2011. Web.

      “What is Business Architecture?” STA Group, 2017. PDF.

      Whittie, Ralph. “The Business Architecture, Value Streams and Value Chains.” BA Institute, n.d. Web.

      What is resilience?

      • Large vertical image:
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A

      Aside from the fact that operational resilience is mandated by law as of January 2025 (yes, next year), having your systems and applications available to your customers whenever they need your services is always a good idea. Customers, both existing and new ones, typically prefer smooth operations over new functionality. If you have any roadblocks in your current customer journey, then solving those is also part of operational resilience (and excellence).

      Does this mean you should not market new products or services? Of course not! Solving a customer journey roadblock is ensuring that your company is resilient. The Happy Meal is a prime example: it solved a product roadblock for small children and a profits roadblock for the company. For more info, just google it. But before you bring a new service online, be sure that it can withstand the punches that will be thrown at it. 

      What is resilience? 

      Resilience is the art of making sure your services are available to your customers whenever they can use them. Note I did not say 24/7/365. Your business may require that, but perhaps your systems need "only" to be available during "normal" business hours.

      Resilient systems can withstand adverse events that impair their ability to perform normal functions, and, like in the case the Happy Meals, increased peak demands. Events can include simple breakdowns (like a storage device, an internet connection that fails, or a file that fails to load) or something worse, like a cyber attack or a larger failure in your data center.

      Your client does not care what the cause is; what counts for the client is, "Can I access your service? (or buy that meal for my kid.)"

      Resilience entails several aspects:

      • availability
      • performance
      • right-sizing
      • hardening
      • restore-ability
      • testing
      • monitoring
      • management and governance

      It is now tempting to apply these aspects only to your organization's IT or technical parts. That is insufficient. Your operations, management, and even e.g. sales must ensure that services rendered result in happy clients and happy shareholders/owners. The reason is that resilient operations are a symphony. Not one single department or set of actions will achieve this. When you have product development working with the technical teams to develop a resilient flow at the right level for its earning potential, then you maximize profits.

      This synergy ensures that you invest exactly the right level of resources. There are no exaggerated technical or operational elements for ancillary services. That frees resources to ensure your main services receive the full attention they deserve.

      Resilience, in other words, is the result of a mindset and a way of operating that helps your business remain at the top of its game and provides a top service to clients while keeping the bottom line in the black. 

      Why do we need to spend on this?

      I mean, if it ain't broke, don't fix it. That old adage is true, and yet not. Services can remain up and running for a long time with single points of failure. But can you afford to have them break at any time? If yes, and your customers don't mind waiting for you to patch things up, then you can "risk-accept" that situation. But how realistic is that these days? If I cannot buy it at your shop today, I'll more than likely get it from another. If I'm in a contract with you, yet you cannot deliver, we will have a conversation, or at the very least, a moment of disappointment. If you have enough "disappointments," you will lose the customer. Lose enough customers, and you will have a reputational problem or worse.

      We don't like to spend resources on something that "may"go wrong. We do risk assessments to determine the true cost of non-delivery and the likelihood of that happening. And there are different ways to deal with that assessment's outcome. Not everything needs to have double the number of people working on it, just in case one resignes. Not every system needs an availability of 99,999%.

      But sometimes, we do not have a choice. When lives are at stake, like in medical or aviation services, being sorry is not a good starting point. The same goes for financial services. the DORA and NIS2 legislation in the EU, the CEA, FISMA, and GLBA in the US, and ESPA in Japan, to name a few, are legislations that require your company, if active in the relevant regulated sectors, to comply and ensure that your services continue to perform.

      Most of these elements have one thing in common: we need to know what is important for our service delivery and what is not.

      Business service

      That brings us to the core subject of what needs to be resilient. The answer is very short and very complex at the same time. It is the service that you offer to your customers which must meet reliance levels.

      Take the example of a hospital. When there is a power outage, the most critical systems must continue operating for a given period. That also means that sufficient capable staff must be present to operate said equipment; it even means that the paths leading to said hospital should remain available; if not by road, then, e.g., by helicopter. If these inroads are unavailable, an alternate hospital should be able to take on the workload. 

      Not everything here in this example is the responsibility of the hospital administrators! This is why the management and governance parts of the resilience ecosystem are so important in the bigger picture. 

      If we look at the financial sector, the EU DORA (Digital Operational Resilience Act) specifically states that you must start with your business services. Like many others, the financial sector can no longer function without its digital landscape. If a bank is unexpectedly disconnected from its payment network, especially SWIFT, it will not be long before there are existential issues. A trading department stands to lose millions if the trading system fails. 

      Look in your own environment; you will see many such points. What if your internet connection goes down, and you rely on it for most of your business? How long can you afford to be out? How long before your clients notice and take action? Do you supply a small but critical service to an institution? Then, you may fall under the aforementioned laws (it's called third-party requirements, and your client may be liable to follow them.)

      But also, outside of the technology, we see points in the supply chain that require resilience. Do you still rely on a single person or provider for a critical function? Do you have backup procedures if the tech stops working, yet your clients require you to continue to service them? 

      In all these and other cases, you must know what your critical services are so that you can analyze the requirements and put the right measures in place.

      Once you have defined your critical business services and have analyzed their operational requirements, you can start to look at what you need to implement the aforementioned areas of availability, monitoring, hardening, and others. Remember we're still at the level of business service. The tech comes later and will require a deeper analysis. 

      In conclusion.

      Resilient operations ensure that you continue to function, at the right price, in the face of adverse events. If you can, resilience starts at the business level from the moment of product conception. If the products have long been developed, look at how they are delivered to the client and upgrade operations, resources, and tech where needed.

      In some cases, you are legally required to undertake this exercise. But in all cases, it is important that you understand your business services and the needs of your clients and put sufficient resources in the right places of your delivery chain. 

      If you want to discuss this further, please contact me for a free talk.

       

      IT Operations

      Build a Digital Workspace Strategy

      • Buy Link or Shortcode: {j2store}294|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $12,399 Average $ Saved
      • member rating average days saved: 10 Average Days Saved
      • Parent Category Name: End-User Computing Strategy
      • Parent Category Link: /end-user-computing-strategy
      • IT must figure out what a digital workspace is, why they’re building one, and what type they want.
      • Remote work creates challenges that cannot be solved by technology alone.
      • Focusing solely on technology risks building something the business doesn’t want or can’t use.

      Our Advice

      Critical Insight

      Building a smaller digital workspace doesn’t mean that the workspace will have a smaller impact on the business.

      Impact and Result

      • Partner with the business to create a team of digital workspace champions.
      • Empower employees with a tool that makes remote work easier.

      Build a Digital Workspace Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should partner with the business for building a digital workspace, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify the digital workspace you want to build

      Create a list of benefits that the organization will find compelling and build a cross-functional team to champion the workspace.

      • Build a Digital Workspace Strategy – Phase 1: Identify the Digital Workspace You Want to Build
      • Digital Workspace Strategy Template
      • Digital Workspace Executive Presentation Template

      2. Identify high-level requirements

      Design the digital workspace’s value proposition to drive your requirements.

      • Build a Digital Workspace Strategy – Phase 2: Identify High-Level Requirements
      • Sample Digital Workspace Value Proposition
      • Flexible Work Location Policy
      • Flexible Work Time Policy
      • Flexible Work Time Off Policy
      • Mobile Device Remote Wipe Waiver Template
      • Mobile Device Connectivity & Allowance Policy
      • General Security – User Acceptable Use Policy

      3. Identify initiatives and a high-level roadmap

      Take an agile approach to building your digital workspace.

      • Build a Digital Workspace Strategy – Phase 3: Identify Initiatives and a High-Level Roadmap
      [infographic]

      Workshop: Build a Digital Workspace Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify the Digital Workspace You Want to Build

      The Purpose

      Ensure that the digital workspace addresses real problems the business is facing.

      Key Benefits Achieved

      Defined benefits that will address business problems

      Identified strategic business partners

      Activities

      1.1 Identify the digital workspace’s direction.

      1.2 Prioritize benefits and define a vision.

      1.3 Assemble a team of digital workspace champions.

      Outputs

      Vision statement

      Mission statement

      Guiding principles

      Prioritized business benefits

      Metrics and key performance indicators

      Service Owner, Business Owner, and Project Sponsor role definitions

      Project roles and responsibilities

      Operational roles and responsibilities

      2 Identify Business Requirements

      The Purpose

      Drive requirements through a well-designed value proposition.

      Key Benefits Achieved

      Identified requirements that are based in employees’ needs

      Activities

      2.1 Design the value proposition.

      2.2 Identify required policies.

      2.3 Identify required level of input from users and business units.

      2.4 Document requirements for user experiences, processes, and services.

      2.5 Identify in-scope training and culture requirements.

      Outputs

      Prioritized functionality requirements

      Value proposition for three business roles

      Value proposition for two service provider roles

      Policy requirements

      Interview and focus group plan

      Business process requirements

      Training and culture initiatives

      3 Identify IT and Service Provider Requirements

      The Purpose

      Ensure that technology is an enabler.

      Key Benefits Achieved

      Documented requirements for IT and service provider technology

      Activities

      3.1 Identify systems of record requirements.

      3.2 Identify requirements for apps.

      3.3 Identify information storage requirements.

      3.4 Identify management and security integrations.

      3.5 Identify requirements for internal and external partners.

      Outputs

      Requirements for systems for record

      Prioritized list of apps

      Storage system requirements

      Data and security requirements

      Outsourcing requirements

      The Essential COVID-19 Childcare Policy for Every Organization, Yesterday

      • Buy Link or Shortcode: {j2store}598|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Manage & Coach
      • Parent Category Link: /manage-coach
      • Helping employees navigate personal and business responsibilities to find solutions that ensure both are taken care of.
      • Reducing potential disruption to business operations through employee absenteeism due to increased care-provider responsibilities.

      Our Advice

      Critical Insight

      • Remote work is complicated by children at home with school closures. Implement alternative temporary work arrangements that allow and support employees to balance work and personal obligations.
      • Adjustments to work arrangements and pay may be necessary. Temporary work arrangements while caring for dependents over a longer-term pandemic may require adjustments to the duties carried out, number of hours worked, and adjustments to employee pay.
      • Managing remotely is more than staying in touch by phone. As a leader you will need to provide clear options that provide solutions to your employees to avoid them getting overwhelmed while taking care of the business to ensure there is a business long term.

      Impact and Result

      • Develop a policy that provides parameters around mutually agreed adjustments to performance levels while balancing dependent care with work during a pandemic.
      • Take care of the business through clear guidelines on compensation while taking care of the health and wellness of your people.
      • Develop detailed work-from-home plans that lessen disruption to your work while taking care of children or aged parents.

      The Essential COVID-19 Childcare Policy for Every Organization, Yesterday Research & Tools

      Start here. Read The Essential COVID-19 Childcare Policy for Every Organization, Yesterday

      Read our recommendations and follow the steps to develop a policy that will help your employees work productively while managing care-provider responsibilities at home.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • The Essential COVID-19 Childcare Policy for Every Organization, Yesterday Storyboard
      • Pandemic Dependent Care Policy
      • COVID-19 Dependent Care Policy Manager Action Toolkit
      • COVID-19 Dependent Care Policy Employee Guide
      • Dependent-Flextime Agreement Template
      • Workforce Planning Tool
      • Nine Ways to Support Working Caregivers Today
      • Employee Resource Group (ERG) Charter Template
      [infographic]

      Get the Best Discount Possible With a Data-Driven Negotiation Approach

      • Buy Link or Shortcode: {j2store}610|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Selection & Implementation
      • Parent Category Link: /selection-and-implementation
      • Vendors have well-honed negotiation strategies that don’t prioritize the customer’s best interest, and they will take advantage of your weaknesses to extract as much money as they can from the deal.
      • IT teams are often working with time pressure and limited resources or experience in negotiation. Even those with an experienced procurement team aren’t evenly matched with the vendor when it comes to the ins and outs of the product.
      • As a result, many have a poor negotiation experience and fail to get the discount they wanted, ultimately leading to dissatisfaction with the vendor.

      Our Advice

      Critical Insight

      • Requirements should always come first, but IT leaders are under pressure to get discounts and cost ends up playing a big role in decision making.
      • Cost is one of the top factors influencing satisfaction with software and the decision to leave a vendor.
      • The majority of software customers are receiving a discount. If you’re in the minority who are not, there are strategies you can and should be using to improve your negotiating skills. Discounts of up to 40% off list price are available to those who enter negotiations prepared.

      Impact and Result

      • SoftwareReviews data shows that there are multiple benefits to taking a concerted approach to negotiating a discount on your software.
      • The most common ways of getting a discount (e.g. volume purchasing) aren’t necessarily the best methods. Choose a strategy that is appropriate for your organization and vendor relationship and that focuses on maximizing the value of your investment for the long term. Optimizing usage or licenses as a discount strategy leads to the highest software satisfaction.
      • Using a vendor negotiation service or advisory group was one of the most successful strategies for receiving a discount. If your team doesn’t have the right negotiation expertise, Info-Tech can help.

      Get the Best Discount Possible With a Data-Driven Negotiation Approach Research & Tools

      Prepare to negotiate

      Leverage insights from SoftwareReviews data to best position yourself to receive a discount through your software negotiations.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Get the Best Discount Possible with a Data-Driven Negotiation Approach Storyboard
      [infographic]

      Unify a Mixed Methodology Portfolio

      • Buy Link or Shortcode: {j2store}441|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Portfolio Management
      • Parent Category Link: /portfolio-management
      • As portfolio manager, you oversee a portfolio made up of projects using different types of planning and execution methodologies – from traditional Waterfall, to Agile, to hybrid approaches and beyond. The discontinuity between reporting metrics and funding models makes a holistic and perpetually actionable view of the portfolio elusive.
      • Agile’s influence is growing within the organization’s project ecosystem. Even projects that don’t formally use Agile methods often adopt agile tendencies, such as mitigating risk with shorter, more iterative development cycles and increasing collaboration with stakeholders. While this has introduced efficiencies at the project level, it has not translated into business agility, with decision makers still largely playing a passive role in terms of steering the portfolio.
      • Senior management still expects traditional commitments and deadlines, not “sprints” and “velocity.” The reluctance of many Agile purists to adhere to traditional timeline, budget, and scope commitments is not making Agile a particularly popular conversation topic among the organization’s decision-making layer.
      • As portfolio manager, it’s your job to unify these two increasingly fragmented worlds into a unified portfolio.

      Our Advice

      Critical Insight

      • As Agile’s influence grows and project methodologies morph and proliferate, a more engaged executive layer is required than what we see in a traditional portfolio approach. Portfolio owners have to decide what gets worked on at a regular cadence.
      • What’s the difference? In the old paradigm, nobody stopped the portfolio owners from approving too much. Decisions were based on what should be done, rather than what could get done in a given period, with the resources available.
      • The engaged portfolio succeeds by making sure that the right people work on the right things as much as possible. The portfolio owner plays a key, ongoing role in identifying the work that needs to be done, and the portfolio managers optimize the usage of resources.

      Impact and Result

      • Establish universal control points. While the manager of a mixed methodology portfolio doesn’t need to enforce a standardized project methodology, she or he does need to establish universal control points for both intake and reporting at the portfolio level. Use this research to help you define a sustainable process that will work for all types of projects.
      • Scale the approvals process. For a mixed methodology portfolio to work, the organization needs to reconcile different models for approving and starting projects. This blueprint will help you define a right-sized intake process and decision-making paradigm for sprints and project phases alike.
      • Foster ongoing executive engagement. Mixed methodology success is contingent on regular and ongoing executive engagement. Use the tools and templates associated with this blueprint to help get buy-in and commitment upfront, and then to build out portfolio reports and dashboard that will help keep the executive layer informed and engaged long term.

      Unify a Mixed Methodology Portfolio Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should consider an Engaged Agile Portfolio approach, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Get portfolio commitments

      Assess the current state of the portfolio and ensure that portfolio owners and other stakeholders are onboard before you move forward to develop and implement new portfolio processes.

      • Unify a Mixed Methodology Portfolio – Phase 1
      • Mixed Methodology Portfolio Analyzer
      • Mixed Methodology Portfolio Strategy Template
      • Mixed Methodology Portfolio Stakeholder Survey Tool

      2. Define your portfolio processes

      Wireframe standardized portfolio processes for all project methodologies to follow.

      • Unify a Mixed Methodology Portfolio – Phase 2
      • Agile Portfolio Sprint Prioritization Tool
      • Project Methodology Assessment Tool

      3. Implement your processes

      Pilot your new portfolio processes and decision-making paradigm. Then, execute a change impact analysis to inform your communications strategy and implementation plan.

      • Unify a Mixed Methodology Portfolio – Phase 3
      • Process Pilot Plan Template
      • Intake and Prioritization Impact Analysis Tool
      • Resource Management Impact Analysis Tool
      [infographic]

      Workshop: Unify a Mixed Methodology Portfolio

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess Current State of the Portfolio

      The Purpose

      Determine the current state of your project execution and portfolio oversight practices.

      Align different types of projects within a unified portfolio.

      Define the best roles and engagement strategies for individual stakeholders as you transition to an Engaged Agile Portfolio.

      Key Benefits Achieved

      A current state understanding of project and portfolio management challenges.

      Bolster the business case for developing an Engaged Agile Portfolio.

      Increase stakeholder and team buy-in.

      Activities

      1.1 Calculate the size of your portfolio in human resource hours.

      1.2 Estimate your project sizes and current project methodology mix.

      1.3 Document the current known status of your in-flight projects.

      1.4 Perform a project execution portfolio oversight survey.

      Outputs

      Your portfolio’s project capacity in resource hours.

      Better understanding of project demand and portfolio mix.

      Current state visibility.

      An objective assessment of current areas of strengths and weaknesses.

      2 Define Your Portfolio Processes

      The Purpose

      Objectively and transparently approve, reject, and prioritize projects.

      Prioritize work to start and stop on a sprint-by-sprint basis.

      Maintain a high frequency of accurate reporting.

      Assess and report the realization of project benefits.

      Key Benefits Achieved

      Improve timeliness and accuracy of project portfolio reporting.

      Make better, faster decisions about when to start and stop work on different projects.

      Increase stakeholder satisfaction.

      Activities

      2.1 Develop a portfolio intake workflow.

      2.2 Develop a prioritization scorecard and process.

      2.3 Establish a process to estimate sprint demand and resource supply.

      2.4 Develop a process to estimate sprint value and necessity.

      Outputs

      An intake workflow.

      A prioritization scorecard and process.

      A process to estimate sprint demand and resource supply.

      A process to estimate sprint value and necessity.

      3 Implement Your Processes

      The Purpose

      Analyze the potential change impacts of your new portfolio processes and how they will be felt across the organization.

      Develop an implementation plan to ensure strategy buy-in.

      Key Benefits Achieved

      A strategic and well-planned approach to process implementation.

      Activities

      3.1 Analyze change impacts of new portfolio processes.

      3.2 Prepare a communications plan based upon change impacts.

      3.3 Develop an implementation plan.

      3.4 Present new portfolio processes to portfolio owners.

      Outputs

      A change impact analysis.

      A communications plan.

      An implementation plan.

      Portfolio strategy buy-in.

      Risk management company

      Expert risk management consultancy firm

      Based on experience
      Implementable advice
      human-based and people-oriented

      Engage Tymans Group, expert risk management and consultancy company, to advise you on mitigating, preventing, and monitoring IT and information security risks within your business. We offer our extensive experience as a risk consulting company to provide your business with a custom roadmap and practical solutions to any risk management problems you may encounter.

      Security and risk management

      Our security and risk services

      Security strategy

      Security Strategy

      Embed security thinking through aligning your security strategy to business goals and values

      Read more

      Disaster Recovery Planning

      Disaster Recovery Planning

      Create a disaster recovey plan that is right for your company

      Read more

      Risk Management

      Risk Management

      Build your right-sized IT Risk Management Program

      Read more

      Check out all our services

      Setting up risk management within your company with our expert help

      Risk is unavoidable when doing business, but that does not mean you should just accept it and move on. Every company should try to manage and mitigate risk as much as possible, be it risks regarding data security or general corporate security. As such, it would be wise to engage an expert risk management and consultancy company, like Tymans Group. Our risk management consulting firm offers business practical solutions for setting up risk management programs and IT risk monitoring protocols as well as solutions for handling IT incidents. Thanks to our experience as a risk management consulting firm, you enjoy practical and proven solutions based on a people-oriented approach.

      Benefit from our expert advice on risk management

      If you engage our risk management consultancy company you get access to various guides and documents to help you set up risk management protocols within you company. Additionally, you can book a one-hour online talk with our risk management consulting firm’s CEO Gert Taeymans to discuss any problems you may be facing or request an on-site appointment in which our experts analyze your problems. The talk can discuss any topic, from IT risk control to external audits and even corporate security consultancy. If you have any questions about our risk management and consulting services for your company, we are happy to answer them. Just contact our risk management consulting firm through the online form and we will get in touch with as soon as possible.

      Register to read more …

      Implement a Transformative IVR Experience That Empowers Your Customers

      • Buy Link or Shortcode: {j2store}68|cart{/j2store}
      • member rating overall impact: 8.5/10 Overall Impact
      • member rating average dollars saved: $6,499 Average $ Saved
      • member rating average days saved: 15 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Today’s customers expect a top-tier experience when interacting with businesses.
      • The advancements in IVR technology mean that IT departments are managing added complexity in drafting a strategy for a top-tier IVR approach.
      • Implementing best practices and the right enabling technology stack is critical to supporting world-class customer experience through IVR.

      Our Advice

      Critical Insight

      • Don’t assume that contact centers and IVR systems are relics of the past. Customers still look to phone calls as being the most effective way to get a fast answer.
      • Tailor your IVR system for your customers. There is no “one-size-fits-all” approach – understand your key customer demographics and support their experience by implementing the most effective strategies for them.
      • Don’t buy best of breed, buy best for you. Base your enabling technology selection on your requirements and use cases, not on the latest industry trends and developments.

      Impact and Result

      • Before selecting and deploying technology solutions, create a database of common customer pain points and FAQs to act as an outline for the call flow tree.
      • Understand and apply operational best practices, such as ensuring proper call menu organization and using self-service applications, to improve IVR metrics and, ultimately, the customer experience.
      • Understand emerging technologies and evolving trends in the IVR space, including natural language processing and integrating your IVR with other essential enterprise applications (e.g. customer relationship management platforms).

      Implement a Transformative IVR Experience That Empowers Your Customers Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Transformative IVR Experience Deck – A deck outlining the best strategies and enabling technologies to implement in your IVR approach to improve your customer experience.

      This storyboard offers insight into impactful strategies and beneficial enabling technologies to implement in your IVR approach to improve your customers’ experience and to reduce the load on your support staff. This deck outlines IT’s role in the IVR development process, offering insight into how to develop an effective IVR call flow and providing details on relevant enabling technologies to consider implementing to further improve your offering.

      • Implement a Transformative IVR Experience That Empowers Your Customers – Phases 1-4

      2. IVR Call Flow Template – A template designed to help you build an effective call flow tree by providing further insight into how to better understand your customers.

      This template demonstrates an ideal IVR approach, outlining a sample call flow for a telecommunications company designed to meet the needs of a curated customer persona. Use this template to gain a better understanding of your own key customers and to construct your own call flow tree.

      • Create an IVR Call Flow That Empowers Your Customers
      [infographic]

      Further reading

      Implement a Transformative IVR Experience That Empowers Your Customers

      Learn the strategies that will allow you to develop an effective interactive voice response (IVR) framework that supports self-service and improves customer experience.

      Stop! Are you ready for this project?

      This Research Is Designed For:

      • Business analysts, application directors/managers, and customer service leaders tasked with developing and executing a technology enablement strategy for optimizing their contact center approach.
      • Any organization aiming to improve its customer experience by implementing a customer-centric approach to over-the-phone service via an IVR system.

      This Research Will Help You:

      • Adopt the best strategies for outlining an effective IVR approach and for transforming an existing IVR system.
      • Improve customer experience and ultimately customer satisfaction by enabling you to create a more efficient IVR call flow tree.
      • Select the proper IVR strategies to focus on based on the maturity level of your organization's call center.
      • Review the "art of the possible" and learn of the latest developments in successful IVR execution.
      • Learn IT's role in developing a successful IVR system and in developing a technology strategy that optimizes your IVR approach.

      Executive Summary

      Your Challenge

      • Today's customers expect a top-tier experience when interacting with businesses.
      • The advancements in IVR technology mean that IT departments are managing added complexity in drafting a strategy for a top-tier IVR approach.
      • Implementing best practices and the right enabling technology stack is critical to supporting world-class customer experience through IVR.

      Common Obstacles

      • Many organizations do not have a clear understanding of customers' drivers for contacting their IVR.
      • As many contact centers look to improve the customer experience, the need for an impactful IVR system has markedly increased. The proliferation of recommendations for IVR best practices and related technologies has made it difficult to identify and implement the right approach.
      • With a growing number of IVR-related requests, IT must be prepared to speak intelligently about requirements and the "art of the possible."

      Info-Tech's Approach

      • Before selecting and deploying technology solutions, create a database of common customer call drivers to act as an outline for the call flow tree.
      • Understand and apply operational best practices, such as ensuring proper call menu organization and using self-service applications, to improve IVR metrics and, ultimately, the customer experience.
      • Understand evolving trends and emerging technologies in the IVR space, including offering personalized service and using natural language processing/conversational AI.

      Info-Tech Insight

      Tailor your IVR system specifically for your customers. There is no one-size-fits-all approach. Understand your key customers and support their experience by implementing the most effective strategies for them.

      Voice is still the dominant way in which customers choose to receive support

      Despite the contrary beliefs that the preference for phone support and IVR systems is declining, studies have consistently shown that consumers still prefer receiving customer service over the phone.

      76%

      of customers prefer the "traditional" medium of phone calls to reach customer support agents.

      50%

      of customers across all age groups generally use the phone to contact customer support, making it the most-used customer service channel.

      Your IVR approach can make or break your customers' experience

      The feelings that customers are left with after interacting with contact centers and support lines has a major impact on their future purchase decisions

      Effective IVR systems provide customers with positive experiences, keeping them happy and satisfied. Poorly executed IVR systems leave customers feeling frustrated and contribute to an overall negative experience. Negative experiences with your IVR system could lead to your customers taking their business elsewhere.

      In fact, research by Haptik shows that an average of $262 per customer is lost each year due to poor IVR experiences ("7 Conversational IVR Trends for 2021 and Beyond," Haptik, 2021).

      50%

      of customers have abandoned their business transactions while dealing with an IVR system.

      Source: Vonage, 2020

      45%

      of customers will abandon a business altogether due to a poor IVR experience.

      Source: "7 Remarkable IVR Trends For the Year 2022 And Beyond," Haptik, 2021

      IVR systems only improve your customers' experience when done properly

      There are many common mistakes that organizations make when implementing their own IVR strategies:

      1. Offering too many menu options. IVR systems are supposed to allow customers to resolve their inquiries quickly, so it is integral that you organize your menu effectively. Less is more when it comes to your IVR call flow tree.
      2. A lack of self-service capabilities. IVR systems are meant to maximize customer service and improve the customer experience by offering self-service functionality. If resolutions for common issues can't be found through IVR, your return on investment (ROI) is limited.
      3. Having callers get stuck in an "IVR loop." Customers caught hearing the same information repeatedly will often abandon their call. Don't allow customers to get "tangled" in your call flow tree; always make human contact an option.
      4. Not offering personalized service. The inability to identify customers by their number or other identifying features leads to poor personalization and time wasted repeating information, contributing to an overall negative experience.
      5. Not updating the IVR system. By not taking advantage of new developments in IVR technology and by not using customer and employee feedback to upgrade your offering, you are missing out on the potential to improve your customers' experience. Complacency kills, and your organization will be at a competitive disadvantage because of it.

      Implement a transformative IVR approach that empowers your customers

      Call flow trees don't grow overnight; they require commitment, nurturing, and care

      1. Focus on the Roots of Your Call Flow Tree
        • Your call flow tree will only grow as strong as the roots allow it; begin beneath the surface by understanding the needs of your customers and the goals of your organization first, before building your initial IVR menu.
      2. Allow Customers the Opportunity to Branch Out
        • Empower your customers by directing your call flow tree to self-service applications where possible and to live agents when necessary.
      3. Let Your Call Flow Tree Flourish
        • Integrate your IVR with other relevant business applications and apply technological developments that align with the needs of your customers and the goals of your organization.
      4. Keep Watering Your Call Flow Tree
        • Don't let your call flow tree die! Elicit feedback from relevant stakeholders and develop an iterative review cycle to identify and implement necessary changes to your call flow tree, ensuring continued growth.

      IT plays an integral role in supporting the IVR approach

      IT is responsible for providing technology enablement of the IVR strategy

      While IT may not be involved in organizing the call flow tree itself, their impact on an organization's IVR approach is undeniable. Not only will IT assist with the implementation and integration of your IVR system, they will also be responsible for maintaining the technology on an ongoing basis. As such, IT should be a part of your organization's software selection team, following Info-Tech's methodology for optimizing your software selection process.

      • With an understanding of the organization's customer experience management strategy and business goals, IT should be looked toward to:
      • Provide insight into the "art of the possible" with IVR systems.
      • Recommend enabling technologies relative to your call center's maturity (e.g. agent assist and natural language processing).
      • Outline integration capabilities with your existing application portfolio.
      • Highlight any security concerns.
      • Assist with vendor engagement.
      • Take part in stakeholder feedback groups, consulting with agents about their pain points and attempting to solve their problems.

      Guided Implementation

      What does a typical GI on this topic look like?

      Focus on the Roots of Your Call Flow Tree

      Allow Customers the Opportunity to Branch Out Let Your IVR Call Flow Tree Flourish Keep Watering Your Call Flow Tree

      Call #1: Introduce the project, scoping customer call drivers and defining metrics of success.

      Call #3: Discuss the importance of promoting self-service and how to improve call routing processes, assessing the final tiers of the IVR.

      Call #4: Discuss the benefits of integrating your IVR within your existing business architecture and using relevant enabling technologies.

      Call #5: Discuss how to elicit feedback from relevant stakeholders and develop an iterative IVR review cycle, wrapping up the project.

      Call #2: Begin assessing initial IVR structure.

      A Guided Implementation (GI) is a series

      of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is 5 to 7 calls over the course of 4 to 6 months.

      Phase 1

      Focus on the Roots of Your Call Flow Tree

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Understand your customers

      1.2 Develop goals for your IVR

      1.3 Align goals with KPIs

      1.4 Build your initial IVR menu

      2.1 Build the second tier of your IVR menu

      2.2 Build the third tier of your IVR menu

      3.1 Learn the benefits of a personalized IVR

      3.2 Review new technology to apply to your IVR

      4.1 Gather insights on your IVR's performance

      4.2 Create an agile review method

      This phase will walk you through the following activities:

      • Building a database of your customers' call drivers
      • Developing IVR-related goals and connecting them with your key performance indicators (KPIs)
      • Developing the first tier of your IVR menu

      This phase involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Implement a Transformative IVR Approach That Empowers Your Customers

      Step 1.1

      Understand Your Customers

      This step will walk you through the following activity:

      1.1.1 Build a database of the reasons why your customers call your contact center

      Focus on the Roots of Your Call Flow Tree

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • List of your customers' call drivers

      Help your customers get to where they need to go

      Understand which questions customers need answered the most and organize your IVR menu accordingly

      • With any IVR system, your primary focus should be creating a simple, easily navigated call flow. You not only want your customers to be able to find the solutions that they are looking for, but you want them to be able to do so easily and quickly.
      • In order to direct customers more efficiently, you need to understand why they're motivated to call your contact center. This will be different for every organization, so it requires a deeper understanding of your customers.
      • After understanding the motivators behind your customers' reasons for calling, you'll be able to organize your call flow tree effectively.
      • Assign the most popular reasons that customers call first in your IVR call flow. Organizing your call flow in such a way will ensure a quicker turn around time for customer inquiries, providing callers with the immediate resolution that they are seeking.

      "Call flows are the structure of a call center's interactive voice response (IVR). They define the path a caller takes to reach a resolution. The more efficient the flow, the quicker a resolution can be – thereby delivering a better caller experience."

      Thomas Randall, Ph.D.
      Senior Research Analyst
      Info-Tech Research Group

      1.1.1 Activity: Build a list of the most common reasons that your key customers call your contact center

      30 minutes

      1. As a group, review the reasons that customers call your contact center. This includes reviewing which questions are asked most frequently, what services are most often inquired about, and what pain points and complaints live agents hear most regularly.
      2. Organize each call driver from most to least popular based on how often they are heard.
      3. Record your findings.
      Input Output
      • List of common customer questions
      • List of common customer pain points/complaints
      • Database of customer call drivers
      Materials Participants
      • Whiteboard
      • Markers
      • Project team
      • Customer service leaders/live agents

      Info-Tech Insight

      To understand why your customers are calling, first you need to know who your customers are. Improve your caller understanding by creating customer personas.

      1.1.1 Activity: Build a list of the most common reasons that your key customers call your contact center

      Example

      Customer Call Drivers
      Need to pay a bill
      Complaints about an outage to their service
      Inquiry about new plans
      Need to update account information
      Complaints about their last bill

      Step 1.2

      Develop Goals for Your IVR

      This step will walk you through the following activity:

      1.2.1 Outline IVR-related goals relevant to your organization.

      Focus on the Roots of Your Call Flow Tree

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Goals for your organizational IVR

      Create IVR-related goals you wish for your organization to achieve

      Organizations across different industries will measure success in a multitude of ways; develop goals that are relevant to your needs and desires

      Based on your customer experience strategy and what industry you're in, the goals that you aim to accomplish will look different. A doctor's office will be more concerned with an accurate diagnosis and high first call resolution rate than low average talk time!

      Setting business goals relevant to your organization is only half of the battle; it's just as important to hold your organization accountable to those goals and measure your continued progress toward meeting them.

      1.2.1 Activity: Brainstorm a list of goals that you would like your organization to achieve when optimizing your IVR approach

      30 minutes

      1. In two to three groups, brainstorm goals related to your IVR that are relevant to your organization.
      2. Classify these goals as being either quick wins or part of a longer-term engagement based on the time they would take to accomplish.
      3. Introduce your goals to the entire group, coming to an agreement on the top goals that the organization should aim to achieve through implementing a new/transformed IVR approach.
      InputOutput
      • Customer experience strategy
      • Desired IVR-related achievements
      • Organizational IVR goals
      MaterialsParticipants
      • Whiteboard
      • Markers
      • Project team

      1.2.1 Activity: Brainstorm a list of goals that you would like your organization to achieve when optimizing your IVR approach

      Example

      Goal Designation
      Lower the average queue time Quick win
      Lower call abandonment rate Quick win
      Lower customer attrition Long-term
      Lower employee attrition Long-term
      Increase average speed of answer Quick win

      Step 1.3

      Align Your Goals With Your KPIs

      This step will walk you through the following activity:

      1.3.1 Review your organizational IVR goals and connect them with your key performance indicators (KPIs)

      Focus on the Roots of Your Call Flow Tree

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Metrics used to measure organizational success related to your IVR

      Ensure you are using the proper metrics for measuring the success of your call flow tree

      You won't know if your IVR is operating successfully if you don't know what success looks like for you. It is important to align your contact center KPIs with your business goals so you can hold your IVR system accountable.

      Example

      Metric Description Current Score Target Score [Date/Year]
      First call resolution
      Average abandonment rate
      Customer attrition
      Employee attrition
      Average queue time
      Service level
      Average speed of answer
      Average handle time
      Average call transfer rate
      Average talk time
      Customer self-service resolution
      Agent satisfaction
      Customer satisfaction

      1.3.1 Activity: Develop KPIs for your contact center and connect them to your organization's business goals

      30 minutes

      1. As a group, establish the metrics or KPIs that will be used to measure your progress against the organizational IVR goals created in Activity 1.2.1.
      2. Take note of your current score for each of your organizational goals and determine your target score.
      3. Attach a deadline or target date by which you would like to reach your target score. Target dates can vary based on whether your goal is classified as a quick win or part of a longer-term engagement.
      InputOutput
      • Organizational IVR goals
      • KPIs
      MaterialsParticipants
      • Whiteboard
      • Markers
      • Project team

      Step 1.4

      Build Your Initial IVR Menu

      This step will walk you through the following activity:

      1.4.1 Develop the first tier of your IVR menu, determining the initial selections that customers will have to choose from

      Focus on the Roots of Your Call Flow Tree

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Tier one of your IVR call flow tree

      Keep your IVR concise – minimize the length of your voice prompts and limit the depth of your menus

      You don't want to overload your customers with information. Providing your callers with overly detailed prompts and too many menu options will only lead to frustration, ultimately diminishing both the efficiency and the effectiveness of your IVR. Limiting the length of your voice prompts and the depth of your menus will lay out a clear path for your callers, increasing the likelihood that they are able to navigate your IVR accurately.

      Each of your IVR menus should provide your customers with no more than five selections.

      Your IVR should offer a maximum of three menu tiers.

      Each of your selection "descriptions" or voice prompts should be no longer than four seconds in length.

      Info-Tech Insight

      According to a study by Telzio (2020), introductory IVR messages that greet your customers and identify your company should be under 7.9 seconds in length. Longer introductions will only bore, frustrate, and overload the customer before the call really even begins.

      When developing your voice prompts, it is integral to speak clearly using simple and easily understood language

      • Speak clearly and stay away from industry-specific jargon to ensure that your voice prompts are widely understood by your customer base. This will allow callers to digest the information relayed through your IVR more accurately.
      • Part of increasing the retention of information communicated through your IVR is also ensuring that sufficient pauses are taken between each of your voice prompts. Just as you want to avoid overloading your customers with voice prompts that are too long and too detailed, you also want to give your callers adequate time to process the information that is being relayed to them.
      • Improving the ease of listening to your IVR will reduce the risk of overwhelming your callers and will increase the likelihood that they are able to follow along appropriately, directing themselves down the proper call flow.

      Info-Tech Insight

      Securing voice talent and be expensive and cumbersome. Consider using an automated voice through a text-to-speech solution for your prompts. This will ensure that all your prompts are consistent throughout your menus, and it also makes it significantly easier to provide crucial updates within your IVR system.

      When sufficient pauses are taken between menu options, input errors can be reduced by over…

      Source: Ansafone Contact Centers, 2019

      1.4.1 Activity: Begin building your call flow tree by developing the initial selections that customers will choose from when dialing into your IVR

      30 minutes

      1. Review the database of customer call drivers completed in Activity 1.1.1 to create the opening menu of your IVR call flow tree.
      2. Limit your selections/prompts to a maximum of five by grouping related questions, services, and complaints/pain points into broad categories.
      3. Organize your selections/prompts according to how often customers call in relating to that topic.

      Info-Tech Insight

      Remember: You don't need five selections! That is the maximum recommended number of prompts to use and will most likely be reserved for more complex call flows. More isn't always better. If you can limit your initial menu to fewer selections, then do so.

      InputOutput
      • Database of customer call drivers
      • Initial IVR menu
      MaterialsParticipants
      • Whiteboard
      • Markers
      • Project team

      1.4.1 Activity: Begin building your call flow tree by developing the initial selections that customers will choose from when dialing into your IVR

      Example

      IVR Initial Greeting

      1. For Billing and Payments

      2. To Report an Outage

      3. To Make Changes to Your Plan or Account

      Phase 2

      Allow Customers the Opportunity to Branch Out

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Understand your customers

      1.2 Develop goals for your IVR

      1.3 Align goals with KPIs

      1.4 Build your initial IVR menu

      2.1 Build the second tier of your IVR menu

      2.2 Build the third tier of your IVR menu

      3.1 Learn the benefits of a personalized IVR

      3.2 Review new technology to apply to your IVR

      4.1 Gather insights on your IVR's performance

      4.2 Create an agile review method

      This phase will walk you through the following activities:

      • Completing the second tier of your call flow tree
      • Completing the third and final tier of your call flow tree

      This phase involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Implement a Transformative IVR Approach That Empowers Your Customers

      Step 2.1

      Build the Second Tier of Your IVR Menu

      This step will walk you through the following activity:

      • 2.1.1 Complete the second tier of your call flow tree, branching out from your initial menu

      Allow Customers the Opportunity to Branch Out

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Tier 2 of your IVR call flow tree

      An IVR system should empower your customers to solve problems on their own

      Integrate business applications into your IVR menus to enable self-service capabilities and automate processes where possible

      • An IVR system should assist your customer service team while also empowering your customers. This can be accomplished through offering self-service and using automated messaging via a broadcast messaging system.
      • Some common self-service practices include providing callers with the ability to check credit card statements, pay bills, and track shipments.
      • Automated messaging can be used to address common customer questions. For instance, if a company-wide issue exists, an automated message can outline the issue and highlight the approximate time for resolution, providing customers with the answer they were seeking while eliminating the need to speak to a live agent. This technique is commonly practiced by internet providers during outages.
      • Providing callers with the opportunity to find a resolution for themselves through self-service and automated messaging not only improves the customer experience but also frees up your customer service team for more pressing matters.

      73%

      of customers want to be provided with the ability to solve issues on their own.

      67%

      of customers prefer to use self-service options over speaking with a customer service representative.

      Source: Raffle, 2020

      2.1.1 Activity: Grow your call flow tree! Begin branching out from your initial menu options and develop the second tier of your IVR system

      30 minutes

      1. Branch out from your initial IVR menu created in Activity 1.4.1. Get more specific in your prompts, branching out from the general groupings you have created.
      2. Consult with your database of customer call drivers created in Activity 1.1.1 to organize your subgroupings, again prioritizing the services most sought and the questions, complaints, and pain points most frequently heard.
      3. Limit each subsection to a maximum of five prompts.

      Info-Tech Insight

      Always provide your callers with the option to go back to a previous menu or to have menu options repeated.

      InputOutput
      • Database of customer call drivers
      • Initial IVR menu
      • Second IVR menu
      MaterialsParticipants
      • Whiteboard
      • Markers
      • Project team

      2.1.1 Activity: Grow your call flow tree! Begin branching out from your initial menu options and develop the second tier of your IVR system

      Example

      This is an image of the sample flow tree from Activity 2.1.1


      Step 2.2

      Build the Third Tier of Your IVR Menu

      This step will walk you through the following activity:

      2.2.1 Complete your call flow tree by branching out your third and final tier of menu options.

      Allow Customers the Opportunity to Branch Out

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Third and final tier of your IVR call flow tree

      Provide your callers with the option to speak to a live agent – but not too soon

      While promoting self-service and automating certain processes will improve the functionality of your IVR, it is also important to realize that some issues will ultimately require human intervention. An effective IVR system harmonizes these concepts by making human contact an option, but not too early in the process. You need to find the right balance!

      When organizing your IVR call flow tree, you need to be conscious of sending clients in an endless "IVR loop." You should never have your IVR continually repeat its menu options. Customers will abandon an IVR if they are stuck in an IVR loop, being forced to listen to the same information repeatedly without having a way to reach an agent.

      If a problem cannot be solved within three steps or by the third tier of your IVR menus, callers should be provided with the option to speak to a live agent, if not automatically routed to one. By providing your callers with the option to speak to a live agent on the third tier of your IVR, you are still offering ample time for customers to discover an avenue to solve their issue on their own through self-service, without frustrating them by losing them in an endless loop of IVR options.

      30%

      of customers say that not being able to reach a human agent is the most frustrating aspect of a poor customer service experience.

      Source: ProProfs Chat, 2022

      Info-Tech Insight

      Consider routing callers to a live agent not only on the third tier of your IVR menus but also after three input errors. Multiple input errors can show an eagerness to speak to a representative or a strong misunderstanding of the IVR offering.

      How you direct a customer to a live agent can make all the difference

      Don't think that just offering your customers the option to speak to a live agent is enough. When aiming to significantly improve your customers' experience, how you direct calls to your live agents plays a major role. When a call is being directed to a live agent, be sure to:

      • Optimize your call routing and minimize call transfers. Use skills-based routing to direct your incoming client calls to the most suitable agent to resolve their issue. Inaccurately routing callers through your IVR leads to having to transfer the customer to another agent, which is a major contributor to a negative customer experience.
      • Include wait-time expectations and call-back functionality. There is no denying it: Waiting on hold can be a real pain. If a customer needs to go on hold, inform them of where they are in the queue and what the approximate wait time is. A little transparency can go a long way. You should also provide customers with the option to have a representative call them back. This greatly improves the customer experience, particularly when wait times are long.
      • Play useful on-hold messages. If a customer does decide to wait on the line to speak to a representative, ensure your on-hold messaging doesn't negatively impact their experience. Always have multiple songs and messages available to cycle through to limit customer annoyance. For on-hold messages, consider mentioning self-service capabilities available on other channels or providing company news and information on special promotions. Know your key customer demographics and plan your on-hold messaging accordingly.

      72%

      of customers view having to talk to multiple agents as poor customer service.

      Source: ProProfs Chat, 2022

      33%

      of customers highlight waiting on hold as being their biggest frustration.

      Source: EmailAnalytics, 2022

      2.2.1 Activity: Complete your call flow tree!

      30 minutes

      1. Branch out from the second tier of your IVR call flow tree created in Activity 2.1.1, connecting relevant prompts with self-service applications and automated responses. Keep in mind, most of your frequently asked questions can and should be directed toward an automated response.
      2. Direct all remaining prompts to a live agent, ensuring each selection from your second-tier menu is capped off appropriately.

      Info-Tech Insight

      Remember: Your IVR system doesn't live in isolation. The information offered by your IVR, particularly from automated messages, should be consistent with information found within other resources (e.g. online knowledge bases).

      InputOutput
      • Tier 1 and 2 of your IVR menus
      • Completed IVR call flow
      MaterialsParticipants
      • Whiteboard
      • Markers
      • Project team

      2.2.1 Activity: Complete your call flow tree!

      Example

      This is an image of the sample flow tree from Activity 2.2.1

      Phase 3

      Let Your IVR Call Flow Tree Flourish

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Understand your customers

      1.2 Develop goals for your IVR

      1.3 Align goals with KPIs

      1.4 Build your initial IVR menu

      2.1 Build the second tier of your IVR menu

      2.2 Build the third tier of your IVR menu

      3.1 Learn the benefits of a personalized IVR

      3.2 Review new technology to apply to your IVR

      4.1 Gather insights on your IVR's performance

      4.2 Create an agile review method

      This phase will walk you through the following activities:

      • Reviewing the benefits of offering personalized service
      • Reviewing new technologies offered in the IVR space

      This phase involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Implement a Transformative IVR Approach That Empowers Your Customers

      Step 3.1

      Learn the Benefits of a Personalized IVR

      This step will walk you through the following activity:

      3.1.1 Review the benefits of offering personalized service, namely by connecting your IVR system with your customer knowledge base

      Let Your IVR Call Flow Tree Flourish

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Understanding the importance of offering personalized service

      Personalizing service is integral for improving your customer experience

      Integrate your IVR system with your customer relationship management (CRM) system or customer knowledge base of choice to provide support to your customers on a personal level.

      The integration of your IVR system with your CRM or other applicable knowledge base allows for customer data (e.g. customer history and previous interactions) to be accessible to your staff during calls. Access to this data allows for a deeper understanding of your customers and for personalization of service. This provides immediate benefits to your contact center that will improve your customer experience.

      When you inevitably do need to transfer a customer to another agent, they won't have to repeat their issue to a new representative, as all their information will now be easily accessible. Being forced to repeat themselves to multiple agents is a major cause of frustration for customers. This integration would also allow you to route callers to the previous agent that they dealt with whenever possible for the purpose of continuity, and it would enable you to implement other beneficial technologies as well.

      One such example is "agent assist." Agent assist is an AI bot that listens in on calls, learning customer context and automatically searching knowledge bases to help resolve queries without the agent having to put the caller on hold to manually perform that work themselves. Not only does agent assist improve customer resolution times, but it also ramps up onboarding time, allowing for new agents to enter the workforce and perform with confidence earlier.

      76%

      of consumers expect personalized experiences.

      71%

      of customers expect internal collaboration so that they don't have to repeat themselves.

      Source: Zendesk, 2019

      Personalization can empower your IVR in many ways

      Personalizing your IVR does much more than just provide your customer service representatives with conversational context. Personalization enables your IVR to recognize callers by their phone number, or even by voice via biometric authentication technologies.

      This advanced level of recognition allows your IVR to greet your callers by name, speak to them in their preferred language, send follow-up correspondence to their preferred method of communication (i.e. email or SMS), and even provide them with contact numbers and addresses for your organization's physical locations that are closest to them.

      An example of a more advanced functionality is having your IVR call flow personalized for each customer based on their call history. As customers call in, their data is collected, ultimately improving your IVR's ability to predict and understand caller intent. This makes personalized call flows possible. If customers typically call in to make payments, your IVR can logically deduce that their next call will be for the same reason, and it will alter the call menu to direct them to that functionality more efficiently.

      Step 3.2

      Review New Technology to Apply to Your IVR

      This step will walk you through the following activity:

      3.2.1 Review new technologies offered in the IVR space and understand their impact

      Let Your IVR Call Flow Tree Flourish

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Understanding of key technologies

      Let your customers tell you exactly what they need

      Use natural language processing and conversational AI to further advance your IVR offering

      Instead of making your customers work their way through your call flow tree to find out what they need, why not just ask them? Conversational IVR, also known as an "intuitive IVR system," makes this possible.

      Think Google Assistant, Siri, and Alexa. Your customers can simply tell you what they need and your conversational IVR, using the advancements in natural language processing and conversational AI, will take it from there, directing callers to the resources needed to resolve their issues.

      Powerful enough to understand full sentences and not just select words or phrases, the increased intelligence of a conversational IVR system allows it to handle complex customer inquiries. Leveraging machine learning capabilities, the system will only continue to improve its ability to understand caller intent, ultimately leading to increased call routing accuracy as it fields more and more calls.

      Info-Tech Insight

      Remember: Your customers want fast and easy, not overwhelming and confusing. Some customers who are greeted with an open-ended question from a conversational IVR may not be sure how to respond.

      Understand your key customer demographics and act accordingly. It may be beneficial to provide your callers with guidelines of what to say. Outlining appropriate responses that will guide your customers to their desired department quicker will boost their experience with your conversational IVR.

      There are a lot of benefits to implementing a conversational IVR

      • Putting your callers in control and offering a more humanized approach, conversational IVRs are the preferred first point of contact for customers.
      • Conversational IVRs reduce the time required to reach resolution and can handle more calls than a standard IVR.
      • Conversational IVRs allow for the collection of more relevant data. By not limiting callers to predetermined menu options, you can track the reasons behind customers' calls with more accuracy, using this data to drive future IVR developments.
      • Conversational IVRs are more cost-effective than standard IVRs. According to a report by IBM, companies world-wide spend over $1.3 trillion to address 256 billion customer calls annually. This means that each call a live agent addresses costs an average of $30 (Cognigy, 2020). With a conversational IVR, that cost can be reduced to one-eighth (ETCIO.com, 2020).
      • Conversational IVRs can be handle calls in multiple languages, offering improved scalability for companies operating multi-nationally.

      60%

      of callers will bypass the pre-recorded messages in a standard IVR to reach a human voice.

      Source: Cognigy, 2020

      66%

      of requests can be resolved faster by a conversational IVR than by a live agent.

      Source: Cognigy, 2020

      Despite this, only...

      28%

      of IVR systems contacted use voice response as their primary input method.

      Source: Telzio, 2020

      How do you know if a conversational IVR is right for your organization?

      Large, enterprise-level organizations that field a high volume of customer calls are more likely to receive the benefits and higher ROI from implementing a conversational IVR

      Instead of updating the entire IVR system and implementing a conversational IVR, smaller and mid-level organizations should consider attaching a natural language processing front-end to their existing IVR. Through this, you will be able to reap a lot of the same benefits you would if you were to upgrade to a conversational IVR.

      You can attach a natural language processing front-end to your existing IVR in two ways.

      1. Use an API to recognize your customer's voice prompts. Greet your customers with a question, such as "what is your reason for calling," as your initial IVR menu, and when your customer answers, their response will be sent to your selected API (Amazon Lex, IBM Watson, Google Dialogflow, etc.). The API will then process the customer's input and direct the caller to the appropriate branch of your call flow tree.
      2. Use a conversational AI platform to field your calls. Implement a conversational AI platform to be the first point of contact for your customers. After receiving and analyzing the input from your customers, the platform would then route your callers to your current IVR system and to the appropriate menu, whether that be to an automated message, a self-service application, or a live agent.

      Phase 4

      Keep Watering Your IVR Call Flow Tree

      Phase 1

      Phase 2

      Phase 3

      Phase 4

      1.1 Understand your customers

      1.2 Develop goals for your IVR

      1.3 Align goals with KPIs

      1.4 Build your initial IVR menu

      2.1 Build the second tier of your IVR menu

      2.2 Build the third tier of your IVR menu

      3.1 Learn the benefits of a personalized IVR

      3.2 Review new technology to apply to your IVR

      4.1 Gather insights on your IVR's performance

      4.2 Create an agile review method

      This phase will walk you through the following activities:

      • Understanding the importance of receiving feedback from relevant stakeholders and the best practices for obtaining feedback
      • Understanding the best practices for developing an ongoing review cycle

      This phase involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Implement a Transformative IVR Approach That Empowers Your Customers

      Step 4.1

      Gather Insights on Your IVR's Performance

      This step will walk you through the following activity:

      4.1.1 Understand the importance of receiving feedback and review the best methods for obtaining it from your clients.

      Keep Watering Your IVR Call Flow Tree

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Understanding of the importance of receiving feedback and how to obtain it from customers

      Elicit feedback from your employees and from your customers

      Your live agents are on the proverbial front lines, fielding calls from customers daily. As such, they are the prime stakeholders for knowing what kinds of calls the organization receives and how often. Their input on the most frequent reasons that customers call, whether it be to address common pain points or to have FAQs answered, is invaluable. Ask them regularly for their feedback on how the IVR system is performing and which updates should be implemented.

      While improving the agent experience is a driver behind adopting an IVR system, the focus should always be improving your customer experience. So why wouldn't you ask your customers for their feedback on your IVR offering? Most customers don't only want to be asked to provide feedback, they expect to be asked. Have your agents ask your customers directly about their experience with your IVR or use the functions of your IVR to offer automated end-of-call surveys.

      Info-Tech Insight

      Many IVR systems are capable of recording calls. Listening back on previous calls is another great way to further understand how your IVR is performing, and it also can provide a glimpse into your customers' experience.

      Surveys provide great insight into your customers' level of satisfaction – not only with your IVR but also with your live agents

      Customer satisfaction score (CSAT) is a great way to determine how happy callers are with their experiences with your organization. CSAT surveys ask your clients outright how satisfied they are with their recent interaction and have them rate your service on a scale. While straightforward, the feedback received from CSAT surveys is more general and can lack depth.

      For more detailed responses, consider asking your clients an open-ended question as opposed to using a rating scale. This will provide you with a more specific understanding of your customers' experience. For this, an IVR system that supports voice transcription is best. Automated speech-to-text functionality will ensure rapid results.

      Another option is to offer a survey that includes skip logic. These multi-tiered surveys, much like an IVR call flow tree, direct your callers to different follow-up questions based on their previous answers. While capable of providing more insight into the customer experience, these surveys are only recommended for more complex service offerings.

      Customer feedback is vitally important

      Asking for feedback makes your callers feel valued, and it also provides your organization with extremely useful information – including an understanding of what you may need to change within your IVR

      90%

      of consumers believe that organizations should provide them with the opportunity to give customer feedback.

      Source: SmallBizGenius, 2022

      41%

      of customer support professionals say that CSAT is their team's most important KPI.

      Source: Hiver, 2022

      Step 4.2

      Create an Agile Review Method

      This step will walk you through the following activity:

      4.2.1 Understand the best practices for developing an ongoing review cycle for your IVR approach

      Keep Watering Your IVR Call Flow Tree

      This step involves the following participants:

      • Business stakeholders (business analysts, application director/manager, customer service leaders)
      • IT project team

      Outcomes of this step

      • Understanding of the importance of IVR maintenance and of the development of an iterative review cycle

      Create an agile review method to continually enhance your call flows

      • Track items
        • Elicit feedback from your key stakeholders (i.e. live agents) as part of a regular review – every month, two months, six months, or year – of your call flow tree's efficiency. Delve into the feedback elicited from your customers at the same intervals. Look for patterns and trends and record items accordingly.
      • Manage backlog
        • Store and organize your recorded items into a backlog, prioritizing items to implement in order of importance. This could be structured by way of identifying which items are a quick win vs. which items are part of a more strategic and long-term implementation.
      • Perform iteration
        • Record key metric scores and communicate the changes you have planned to stakeholders before you implement items. Then, make the change.
      • Be retrospective
        • Examine the success of the implementation by comparing your metric scores from before and after the change. Record instances where performing similar changes could be carried out better in future iterations.

      Summary of Accomplishment

      • Knowledge Gained
        • Benefits of enabling personalized service
        • IVR-enabling technologies
        • Methods of eliciting feedback
      • Processes Optimized
        • IVR voice prompt creation
        • IVR voice prompt organization
        • IVR review cycles
      • Deliverables Completed
        • Database of customer call drivers
        • Organizational IVR goals and KPIs
        • IVR call flow tree

      Related Info-Tech Research

      This is a picture of a hand holding a cellular phone

      Choose a Right-Sized Contact Center Solution

      • IT needs a method to pinpoint which contact center solution best aligns with business objectives, adapting to a post-COVID-19 world of remote work, flexibility, and scalability.
      This image contains a screenshot from Info-tech's Build a Strong Technology Foundation for Customer Experience Management.

      Build a Strong Technology Foundation for Customer Experience Management

      • Customer expectations around personalization, channel preferences, and speed-to-resolution are at an all-time high. Your customers are willing to pay more for high-value experiences, and having a strong customer experience management (CXM) strategy is a proven path to creating sustainable value for the organization.
      This image contains a screenshot from Info-tech's IT Strategy Research Center

      IT Strategy Research Center

      • Create an IT strategy based on business needs, not just intuition.
      This image contains a screenshot from Info-tech's SoftwareReviews blueprint.

      SoftwareReviews

      • Accelerate and improve your software selection process with enterprise software reviews. Focus on available resources for communications platform as a service providers and conversational intelligence software.

      Bibliography

      "7 Conversational IVR Trends for 2021 and Beyond." Haptik, 25 March 2021. Accessed 16 June 2022.
      "7 Remarkable IVR Trends For the Year 2022 And Beyond." Haptik, 30 Dec. 2021. Accessed 27 April 2022.
      "8 IVR Strategies that Keep Customers Happy." Ansafone Contact Centers, 31 May 2019. Accessed 25 April 2022.
      "Agent Assist." Speakeasy AI, 19 April 2022. Accessed 27 April 2022.
      "AI chatbot that's easy to use." IBM, n.d. Accessed 21 June 2022.
      "IVR Trends to Watch in 2020 and Beyond: Inside CX." Intrado, 1 May 2020. Accessed 27 April 2022.
      "RIP IVR: 1980-2020." Vonage, 2 June 2020. Accessed 16 June 2022.
      Andrea. "What do Customers Want? – 37 Customer Service Statistics." SmallBizGenius, 17 March 2022. Accessed 24 May 2022.
      Anthony, James. "106 Customer Service Statistics You Must See: 2021/2022 Data & Analysis." FinancesOnline, 14 Jan. 2022. Accessed 27 April 2022.
      Brown, James. "14 stats that prove the importance of self-service in customer service." raffle, 13 Oct. 2020. Accessed 17 June 2022.
      Buesing, Eric, et al. "Getting the best customer service from your IVR: Fresh eyes on an old problem." McKinsey & Company, 1 Feb. 2019. Accessed 25 April 2022.
      Callari, Ron. "IVR Menus and Best Practices." Telzio, 4 Sep. 2020. Accessed 27 April 2022.
      Cornell, Jared. "104 Customer Service Statistics & Facts of 2022." ProProfs Chat, 6 April 2022. Accessed 16 June 2022.
      DeCarlo, Matthew. "18 Common IVR Mistakes & How To Configure Effective IVR." GetVoIP, 13 June 2019. Accessed 27 April 2022.
      DeMers, Jayson. "77 Customer Service Statistics to Know." EmailAnalytics, 23 March 2022. Accessed 27 April 2022.
      Frants, Valeriy. Interview. Conducted by Austin Wagar, 22 June 2022.
      Grieve, Patrick. "Personalized customer service: what it is and how to provide it." Zendesk, 28 June 2019. Accessed 27 April 2022.
      "How Natural Language Processing Can Help Your Interactive Voice Response System Meet Best Practice." Hostcomm, 15 July 2019. Accessed 25 April 2022.
      "IVR and customer experience: get the best UX for your clients." Kaleyra, 14 Dec. 2020. Accessed 25 April 2022.
      Irvine, Bill. "Selecting an IVR System for Customer Satisfaction Surveys." IVR Technology Group, 14 April 2020. Accessed 22 June 2022.
      Kulbyte, Toma. "Key Customer Experience Statistics to Know." SuperOffice, 24 June 2021. Accessed 24 May 2022.
      Leite, Thiago. "What's the Difference Between Standard & Conversational IVR?" Cognigy, 27 Oct. 2020. Accessed 24 May 2022.
      Maza, Cristina. "What is IVR? The ultimate guide." Zendesk, 30 Sep. 2020. Accessed 25 April 2022.
      McCraw, Corey. "What is IVR Call Flow? Benefits, Features, Metrics & More." GetVoIP, 30 April 2020. Accessed 25 April 2022.
      Mircevski, Bruno. "Smart IVR Introduction – What Is It and Why You Should Use It." Ideta, 7 March 2022. Accessed 28 April 2022.
      Oriel, Astha. "Artificial Intelligence in IVR: A Step Towards Faster Customer Services." Analytics Insight, 19 Aug. 2020. Accessed 24 May 2022.
      Perzynska, Kasia. "What is CSAT & How to Measure Customer Satisfaction?" Survicate, 9 March 2022. Accessed 22 June 2022.
      Pratt, Mary K. "How to set business goals, step by step." TechTarget, 27 April 2022. Accessed 21 June 2022.
      Robinson, Kerry. "Insight of the Week: Make Your IVR More Like Alexa." Waterfield Tech, 20 April 2022. Accessed 25 April 2022.
      Sehgal, Karishma. "Exclusive Research – 76% of customer service teams offer support outside of business hours." Hiver, 4 May 2022. Accessed 22 June 2022.
      Smith, Mercer. "111 Customer Service Statistics and Facts You Shouldn't Ignore." Help Scout, 23 May 2022. Accessed 24 June 2022.
      Thompson, Adrian. "A Guide to Conversational IVR." The Bot Forge, 27 Jan. 2021. Accessed 21 June 2022.
      Tolksdorf, Juergen. " 5 Ways to Leverage AI and Agent-Assist to Improve Customer Experience." Genesys, 19 May 2020. Accessed 27 April 2022.
      Vaish, Aakrit. "5 ways conversational IVR is helping businesses revolutionize customer service." ETCIO.com, 20 March 2020. Web.
      Westfall, Leah. "Improving customer experience with the right IVR strategy." RingCentral, 23 July 2021. Accessed 25 April 2022.

      Improve IT Operations With AI and ML

      • Buy Link or Shortcode: {j2store}454|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Operations Management
      • Parent Category Link: /i-and-o-process-management
      • Many IT departments experience difficulty with meeting the business' expectations for service delivery on a regular basis.
      • Despite significant investment in improving various areas of IT operations, you still feel like you’re constantly firefighting.
      • To tackle these issues, businesses tend to invest in purchasing multiple solutions. This not only complicates their IT operations, but also, in some cases, deteriorates functionality.

      Our Advice

      Critical Insight

      • To leverage AI capabilities, you first need to assess the current state of your IT operations and know what your priorities are.
      • Contemplate use cases that will get the most benefit from automation and start with processes that you are relatively comfortable handling.
      • Analyze your initial plan to identify easy wins, then expand your AIOps.

      Impact and Result

      • Perform a current state assessment to spot which areas within your operations management are the least mature and causing you the most grief. Identify which functional areas within operations management need to be prioritized for improvement.
      • Make a shortlist of use cases that will get the most benefit from AI-based technology.
      • Prepare a plan to deploy AI capabilities to improve your IT operations.

      Improve IT Operations With AI and ML Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out about the latest improvements in AIOps and how these can help you improve your IT operations. Review Info-Tech’s methodology and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess the current state of IT operations management

      Identify where your organization currently stands in its operations management practices.

      • AIOps Project Summary Template
      • AIOps Prerequisites Assessment Tool

      2. Identify initiatives that align with operations requirements

      Recognize the benefits of AI and ML for your business. Determine the necessary roles and responsibilities for potential initiatives, then develop and assess your shortlist.

      • AIOps RACI Template
      • AIOps Shortlisting Tool

      3. Develop the AI roadmap

      Analyze your ROI for AIOps and create an action plan. Communicate your AI and ML initiatives to stakeholders to obtain their support.

      • AIOps ROI Calculator
      • AIOps Roadmap Tool
      • AIOps Communications Plan Template
      [infographic]

      Break Open Your DAM With Intuitive Metadata

      • Buy Link or Shortcode: {j2store}389|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Data Management
      • Parent Category Link: /data-management
      • Organizations are facing challenges from explosive information growth in both volume and complexity, as well as the need to use more new sources of information for social media just to remain in business.
      • A lot of content can be created quickly, but managing those digital assets properly through metadata tagging that will be used consistently and effectively requires processes to be in place to create standardized and informational metadata at the source of content creation.
      • Putting these processes in place changes the way the organization handles its information, which may generate pushback, and requires socialization and proper management of the metadata strategy.

      Our Advice

      Critical Insight

      • Metadata is an imperative part of the organizations broader information management strategy. Some may believe that metadata is not needed anymore; Google search is not a magic act – it relies on information tagging that reflects cultural sentiment.
      • Metadata should be pliable. It needs to grow with the changing cultural and corporate vernacular and knowledge, and adapt to changing needs.
      • Build a map for your metadata before you dig for buried treasure. Implement metadata standards and processes for current digital assets before chasing after your treasure troves of existing artifacts.

      Impact and Result

      • Create a sustainable and effective digital asset management (DAM) program by understanding Info-Tech’s DAM framework and how the framework fits within your organization for better management of key digital assets.
      • Create an enterprise-wide metadata design principles handbook to keep track of metadata schemas and standards, as well as communicate the standards to the entire organization.
      • Gather requirements for your DAM program, as well as the DAM system and roles, by interviewing key stakeholders and identifying prevalent pains and opportunities. Understand where digital assets are created, used, and stored throughout the enterprise to gain a high-level perspective of DAM requirements.
      • Identify the organization’s current state of metadata management along with the target state, identify the gaps, and then define solutions to fill those gaps. Ensure business initiatives are woven into the mix.
      • Create a comprehensive roadmap to prioritize initiatives and delineate responsibilities.

      Break Open Your DAM With Intuitive Metadata Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should develop a digital asset management program focused on metadata, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build a foundation for your DAM project

      Gain an in-depth understanding of what digital asset management is as well as how it is supported by Info-Tech’s DAM framework.

      • Break Open Your DAM With Intuitive Metadata – Phase 1: Build a Foundation for Your DAM Project
      • DAM Design Principles Handbook
      • Where in the World Is My Digital Asset? Tool
      • Digital Asset Inventory Tool
      • DAM Requirements Gathering Tool

      2. Dive into the DAM strategy

      Create a metadata program execution strategy and assess current and target states for the organization’s DAM.

      • Break Open Your DAM With Intuitive Metadata – Phase 2: Dive Into the DAM Strategy
      • DAM Roadmap Tool
      • DAM Metadata Execution Strategy Document

      3. Create intuitive metadata for your DAM

      Design a governance plan for ongoing DAM and metadata management.

      • Break Open Your DAM With Intuitive Metadata – Phase 3: Create Intuitive Metadata for Your Digital Assets
      • Metadata Manager Tool
      [infographic]

      Workshop: Break Open Your DAM With Intuitive Metadata

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Structure the Metadata Project

      The Purpose

      Develop a foundation of knowledge regarding DAM and metadata, as well as the best practices for organizing the organization’s information and digital assets for ideal findability.

      Key Benefits Achieved

      Design standardized processes for metadata creation and digital asset management to help to improve findability of key assets.

      Gain knowledge of how DAM can benefit both IT and the business.

      Activities

      1.1 Build a DAM and metadata knowledge foundation.

      1.2 Kick-start creation of the organization’s DAM design principles handbook.

      1.3 Interview key business units to understand drivers for the program.

      1.4 Develop a DAM framework.

      Outputs

      DAM Design Principles Handbook

      DAM Execution Strategy Document

      2 Assess Requirements for the DAM Program

      The Purpose

      Inventory the organization’s key digital assets and their repositories.

      Gather the organization’s requirements for a full-time digital asset librarian, as well as the DAM system.  

      Key Benefits Achieved

      Determine clear and specific requirements for the organization from the DAM system and the people involved.

      Activities

      2.1 Conduct a digital asset inventory to identify key assets to include in DAM.

      2.2 Prioritize digital assets to determine their risk and value to ensure appropriate support through the information lifecycle.

      2.3 Determine the requirements of the business and IT for the DAM system and its metadata.

      Outputs

      Digital Asset Inventory Tool

      DAM Requirements Gathering Tool

      3 Design Roadmap and Plan Implementation

      The Purpose

      Determine strategic initiatives and create a roadmap outlining key steps required to get the organization to start enabling data-driven insights.

      Determine timing of the initiatives. 

      Key Benefits Achieved

      Establish a clear direction for the DAM program.

      Build a step-by-step outline of how to create effective metadata with true business-IT collaboration.

      Have prioritized initiatives with dependencies mapped out.

      Activities

      3.1 Assess current and target states of DAM in the organization.

      3.2 Brainstorm and document practical initiatives to close the gap.

      3.3 Discuss strategies rooted in business requirements to execute the metadata management program to improve findability of digital assets.

      Outputs

      DAM Roadmap Tool

      4 Establish Metadata Governance

      The Purpose

      Identify the roles required for effective DAM and metadata management.

      Create sample metadata according to established guiding principles and implement a feedback method to create intuitive metadata in the organization. 

      Key Benefits Achieved

      Metadata management is an ongoing project. Implementing it requires user input and feedback, which governance will help to support.

      By integrating metadata governance with larger information or data governance bodies, DAM and metadata management will gain sustainability. 

      Activities

      4.1 Discuss and assign roles and responsibilities for initiatives identified in the roadmap.

      4.2 Review policy requirements for the information assets in the organization and strategies to address enforcement.

      4.3 Integrate the governance of metadata into larger governance committees.

      Outputs

      DAM Execution Strategy

      Drive Ongoing Adoption With an M365 Center of Excellence

      • Buy Link or Shortcode: {j2store}66|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: 20 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: End-User Computing Applications
      • Parent Category Link: /end-user-computing-applications

      There are roadblocks common to all CoEs: lack of in-house expertise, lack of resources (time, budget, etc.), and employee perception that this is just another burdensome administrative layer. These are exacerbated when building an M365 CoE.

      • Constant vendor-initiated change in M365 means expertise always needs updating.
      • The self-service architecture of M365 is at odds with centralized limits and controls.
      • M365 has a multitude of services that can be adopted across a huge swath of the organization compared to the specific capabilities and limited audience of traditional CoEs.

      Our Advice

      Critical Insight

      The M365 CoE should be somewhat decentralized to avoid an “us versus them” mentality. Having clear KPIs at the center of the program makes it easier to demonstrate improvements and competencies. COMMUNICATE these early successes! They are vital in gaining widespread credibility and momentum.

      Impact and Result

      Having a clear vision of what you want business outcomes you want your Microsoft 365 CoE to accomplish is key. This vision helps select the core competencies and deliverables of the CoE.

      • Ongoing measurement and reporting of business value generated from M365 adoption.
      • Servant leadership allows the CoE to work closely and deeply with end users, which builds them up to share knowledge with others
      • Focus and clear lines of accountability ensure that everyone involved feels part of the compromise when decisions are to be made.

      Drive Ongoing Adoption With an M365 Center of Excellence Research & Tools

      Build out your M365 CoE competencies, membership, and roles; create success metrics and build your M365 adoption, then communicate

      In this deck we explain why your M365 CoE needs to be distributed and how it should be organized. Using a roadmap will assist you in building competency and maturity through training, certifications, and building governance.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Drive Ongoing Adoption With an M365 Center of Excellence Storyboard
      [infographic]

      Further reading

      Drive Ongoing Adoption With an M365 Center of Excellence

      Accelerate business processes change and get more value from your subscription by building and sharing thanks to an effective Centre of Excellence.

      CLIENT ADVISORY DECK

      Drive Ongoing Adoption With an M365 Centre of Excellence

      Accelerate business processes change and get more value from your subscription by building and sharing thanks to an effective Centre of Excellence

      Research Team:
      John Donovan
      John Annand
      Principal Research Directors I&O Practice

      41 builds released in 2021!
      IT can no longer be expected to provide training to all users on all features

      • Traditional classroom training (online and self-paced) is time consuming and overly generic
      • Users tend to hold onto old familiar tools even as new ones roll out
      • Citizen Programming comes with a lot of promise but also the spectre of reliving the era of Access ‘97 databases
      • Seemingly small decisions around configuration have outsized impacts
      • Every enterprises’ journey through adoption is unique

      ▲20% $ spent in 2021

      148% more meetings
      66% more users collaborating on documents
      40.6B more emails

      2021 vs. 2022 Source: Microsoft The Work Trend Index

      • Who needs to be in a CoE? What daily tasks do they undertake?
      • How do you turn artifacts like best practice documents into actual behavioral change?
      • How does CoE differ from governance? And why is it going to be any more successful?
      • How does the CoE evolve over time as enterprises become more mature?

      CoE Competencies, Membership and Roles
      Communication, Standards Templates
      Adoption, and Business Success Metrics

      this image depicts the key CoE Competencies: Goals; Controls; Tools; Training; and Support

      Using these deliverables, Info-Tech will help you drive consistency in your enterprise collaboration, increase end-user satisfaction in the tools they are provided, optimize your license spending, fill the gaps between implementation of a technology and realization of business value, and empower end-users to innovate in ways that senior leadership had not imagined.

      Executive Summary

      Insight

      User adoption is the primary focus of the efforts in the CoE

      User adoption and setting up guardrails in governance are the focuses of the CoE in its early stages. Purging obsolete data from legacy share servers, and exchange, and rationalize legacy applications that are comparable to Microsoft offerings. The primary goal is M365 excellence, but that needs to be primed with a Roadmap, and laying down clear milestones to show progress, along with setting up quick wins to get buy in from the organization.

      Breakdown your CoE into distinct areas for improvement

      Due to the size and complexity of Microsoft 365, breaking it into clearly defined divisions makes sense. The parts that need to be fragmented into are, Collaboration, Power Apps, Office tools, Learning, Professional Training and Certifications, Governance and Support. Subject Matter experts needs to keep pace with the ever-changing M365 environment with enhancements continuously being rolled out. (There were 41 build releases in 2021 alone! )

      Set up your M365 CoE in a decentralized design

      Define how your CoE will be set up. It will either be centralized, distributed, or a combination of both. They all have their strengths and weaknesses; however a distributed CoE can ensure there is buy-in from the various departments across the CoE, as they participate in the decision making and therefore the direction the CoE goes. Additionally, it ensures that each segment of the CoE is accountable for the success of the M365 adoption, its usage, and delivering value to the organization.

      Summary

      Your Challenge

      You have purchased Microsoft 365 for your business, and you have determined that you are not realizing the full value and potential of the product, neither adoption nor usage – for example, you have legacy applications that the user base is reluctant to move away from, whether it be Skype, Jabber, or other collaboration tools available to them. You have released Teams to the organization but may have not shown how useful it is and you have not communicated to the business that it is your new collaboration tool, along with SharePoint Online and OneDrive. How do you fix this problem?

      Common Obstacles

      There are roadblocks common to all CoEs: lack of in-house expertise, lack of resources (time, budget, etc.) and employee perception of just another burdensome administrative layer. These are exacerbated when building an M365 CoE.

      • Constant vendor-initiated change in M365 means expertise always needs updating
      • The self-service architecture of M365 is at odds with centralized limits and controls
      • M365 is a multitude of services, adopted across a huge swath of the organization compared to the specific capabilities and limited audience of traditional CoEs

      Info-Tech’s Approach

      Having a clear vision of what business outcomes you want your Microsoft 365 CoE to accomplish is key. This vision helps select the core competencies and deliverables of the CoE.

      1. Ongoing measurement and reporting of business value generated from M365 adoption
      2. Servant leadership allows the CoE to work closely and deeply with end-users, which builds them up to share knowledge with others
      3. Focus and clear lines of accountability ensure that everyone involved feels part of the compromise when decisions are to be made

      Info-Tech Insight

      The M365 CoE should be somewhat decentralized to avoid an “us versus them” mentality. Having clear KPIs at the center of the program makes it easier to demonstrate improvements and competencies. COMMUNICATE these early successes! They are vital in gaining widespread credibility and momentum.

      Charter Mandate Authority to Operate

      Mission : To accelerate the value that M365 brings to the organization by using the M365 CoE to increase adoption, build competency through training and best practices, and deliver on end user innovation throughout the business.

      Vision Statement: To transform the organization’s efficiencies and performance through an optimized world-class M365 CoE by meeting all KPIs set out in the Charter.

      Info-Tech Insights

      A mission and vision for your M365 CoE are a necessary step to kick the program off. Not aving clear goals and a roadmap to get there will hinder your progress. It may even stall the whole objective if you cannot agree or measure what you are trying to accomplish

      • The scope of the M365 CoE is to build the adoption rate that can meet milestone goals to advance user competency, as well as the maturation of the SMEs in each segment of the CoE leadership and contributors.
      • Maturity will be measured through 100% adoption, specifically around collaboration tools and Office apps across the organization that use M365. Strategic value will be measured by core competencies within the CoE.
      • SMEs are developed and educated with certifications and other training throughout the course of the CoE development to bring “bench strength” to the vision of optimizing a world-class M365 CoE.
      • SMEs will all be certified Microsoft professionals. They will set the standard to be met within the CoE. The SMEs can either be internal candidates or external hires, depending on the current IT department competency.
      • Additional resources required will be tech savvy department leads that understand and can help in the training of staff, who also are willing to spend a certain amount of their work time in coaching colleagues.
      • They will be assisted by the training through the SMEs providing relevant material and various M365 courses both in class and self-paced online learning using M365 VIVA tools.

      Charter Metrics

      Areas in Scope:

      • Ensure Mission is aligned to the business objectives.
      • Form core team for M365 CoE, including steering committee.
      • Create document for signoff from business sponsors.
      • Build training plans for users, engineers, and admins.
      • Document best practices and build standard templates for organizational uniformity.
      • Build governance charter and priorities, setting up guardrails early to ensure compliance and security.
      • Transition away and retire all legacy on-Prem apps to M365 Cloud apps.
      • Build a RACI model for roles and responsibility.

      Info-Tech Insights

      If meaningful metrics are set up correctly, the CoE can produce results early in the one- or two-year process, demonstrating business value and increasing production amongst staff and demonstrating SME development.

      this image contains example metrics, spread across three phases.

      CoE

      What are the reason to build an M365 CoE, and what is it expected to deliver?

      What It IS NOT

      It does not design or build applications, migrate applications, or create migration plans. It does not deploy applications nor does it operate and monitor applications. While a steering committee is a key part of the M365 CoE, its real function is to set the standards to be achieved though metrics that can measure a successful, efficient, and best-in-class M365 operation. It does not set business goals but does align M365 goals to the business drivers. SMEs in the CoE give guidance on M365 best practices and assist in its adoption and users’ competency.

      What It IS

      M365 CoE means investing in and developing usage growth and adoption while maintaining governance and control. A CoE is designed to drive innovation and improvement, and as a business-wide functional unit, it can break down geographical and organizational silos that utilize their own tools and collaboration platforms. It builds a training and artifacts database of relevant and up-to-date materials.

      Why Build It

      Benefits that can be realized are:

      • Building efficiencies, delivering quality training and knowledge transfer, and reducing risk from an organized and effective governance.
      • Consistency in document and information management.
      • Reusable templates and blueprints that standardize the business processes.
      • Standardized and communicated business policies around security and best practices.
      • Overcoming the challenges that comes with the titan of a platform that is M365.

      Expected Goals and Benefits With Risk

      Demonstrated impact for sustainability
      Ensuring value is delivered
      Ability to escalate to executive branch

      The What?

      What does the M365 CoE solve?

      • M365 Adoption
      • M365 tools templates
      • SME in tools deployment and delivery
      • Training and education – create artifacts and organize training sessions and certifications
      • Empower users into super users
      • Build analytics around usage, adoption, and ROI from license optimization

      And the How?

      How does the M365 CoE do it?

      • By defining clear adoption goals and best practices
      • By building a dedicated team with the confidence to improve the user experience
      • By creating a collection of reusable artifacts.
      • By establishing a stable, tested environment ensures users are not hindered in execution of the tools
      • By continuously improving M365 processes

      What are the Risks?

      • All goals must be achievable
      • Timeline phases are based on core SME competency of the IT department and the training quality of end users
      • Current state of SMEs in house or hired to execute the mandate of the M365 CoE
      • Business success – if business is struggling to make profits and grow, its usually the CoE that will get chopped – mainly due to layoffs
      • Inability to find SMEs or train SMEs
      • Turnover in CoE due to job function changes or attrition
      • Overload of day-to-day responsibilities preventing SMEs from executing work for the CoE – Need to align SMEs and CoE steering chair to establish and enable shared responsibilities.

      Who needs to be in a CoE for M365

      Design the CoE – What model to be used?

      What are their daily tasks? Is the CoE centralized, decentralized, or a combination?

      a flow chart is depicted, starting with the executive steering committee, describing governance 365, and VP applications.

      Info-Tech Insights

      Due to the size and complexity of Microsoft 365, a decentralized model works best. Each segment of the group could in themselves be a CoE, as in governance, training, or collaboration CoE. Maintaining SME in each group will drive the success of the M365 CoE.

      Key Competencies for CoE

      • Build a team of experts in M365 with sub teams in Products.
      • Manage the business processes around M365.
      • Train and optimize technical teams.
      • Share best practices and create a knowledge base.
      • Build processes that are repeatable and self-provisioned.
      This image depicts the core Coe Competencies, Strategy; Technology; Governance; and Skills/Capabilities.

      CoE for M365

      What is the Structure? Is it centralized, decentralized, or combination? What are the pros and cons?

      Thought Model

      This image depicts a thought model describing CoE for M365.

      How does the CoE differ from governance?

      Why is it going to be any more successful?

      “These problems already exist and haven't been successfully addressed by governance – how is the CoE going to be any different?”

      • Leadership
      • Empower end users
      • Automation of processes
      • Retention policies
      • Governance priorities
      • Risk management
      • Standard procedures
      • Set metrics
      • Self service
      • Training
      • SMEs
      • Automation
      • Innovation

      CoE

      While M365 governance is an integral part of the M365 CoE, the CoE is a more strategic program aimed at providing guidance, experienced leadership, and training.

      The CoE is designed to drive innovation and improvements throughout the organization’s M365 deployment. It will build best practices, create artifacts, and mentor members to become SMEs.

      Governance

      CoE is a form of collaborative governance. Those responsible for making the rules are the same ones who are working through how the rules are implemented in practice.

      The word most associated with CoE is "nurture." The word most associated with governance is "prevent."

      The CoE is experimental and innovative and constantly revising its guidance compared to governance, which is opaque and static.

      RACI chart for CoE define activities and ownership

      The Work

      Build artifacts

      Templates

      Scripts

      Reference architecture

      Policies definition

      Blueprints

      Version control

      Measure usage and ROI

      Quality assurance

      Baseline creation and integrity

      ActivitiesSupport Steering CTraining TeamM365 Tools Admin M365 Security AdminDoc Mgt
      Monitor M365 ChangeAIRR
      CommunicationsIR
      TrainingAR
      Support – Microsoft + HelpdeskRI
      Monitor UsageR
      Security and ComplianceAR
      Decom On-PremAR
      Eliminate Shadow ITR
      Identity and AccessAR
      Automate Policies in TennantAR
      Audit MonitorAR
      Data and Information ProtectionARR
      Build TemplatesAAR
      Manage ArtifactsARA

      Steering Committee

      This image contains a screenshot of the organization of the CoE Steering Committee

      Roles and Responsibilities

      • Set the goals and metrics for the CoE charter
      • Ensure the CoE is aligned to the business objectives
      • Clear any roadblocks that may hinder progress for the team leads
      • Provide guidance on best practices
      • Set expectations for training and certifications
      • Build SME strength through mentoring
      • Promote and facilitate research into M365 developments and releases
      • Ensure knowledge transfer is documented
      • Create roadmap to ensure phase KPIs are met and drive toward excellence

      Info-Tech Insight

      Executive sponsorship is an element of the CoE that cannot be overlooked. If this occurs, the funding and longevity of the CoE will be limited. Additionally, ensure you determine if the CoE will have an end of life and what that looks like.

      M365 Governance CoE Team

      Governance and Management

      After you’ve developed and implemented your data classification framework, ongoing governance and maintenance will be critical to your success. In addition to tracking how sensitivity labels are used in practice, you’ll need to update your control requirements based on changes in regulations, cybersecurity leading practices, and the nature of the content you manage. Governance and maintenance efforts can include:

      • Establishing a governance body dedicated to data classification or adding a data classification responsibility to the charter of an existing information security body.
      • Defining roles and responsibilities for those overseeing Data Classification
      • Establishing KPIs to monitor and measure progress
      • Tracking cybersecurity leading practices and regulatory changes
      • Developing Standard Operating Procedures that support and enforce a data classification framework

      Governance CoE

      Tools Used in the Governance CoE Identity – MFA, SSO, Identity Manager, Conditional Access, AD , Microsoft Defender, Compliance Assessments Templates

      Security and Compliance - Azure Purview, Microsoft Defender Threat Analytics, Rules-Based Classification (AIP Client & Scanner), Endpoint DLP, Insider Risk Management

      Information Management – Audit Log Retention, Information Protection and Governance, Trainable Classifiers

      Licenses – Entitlement Management, Risk-Based Conditional Access.

       This image depicts the M365 Governance CoE Team organization.

      M365 Tools CoE Team

      • Collaboration tools are at the center of the product portfolio for M365.
      • Need to get users empowered to manage and operate Teams, OneDrive, and SharePoint Online and promote uniform communications and collaborate with document building, sharing, and storing.

      This image depicts a screenshot of the Tools CoE Team organization

      Collaboration SME – Teams admin, Exchange admin, SharePoint, One Drive admin, Viva Learning (Premium), and Viva Insights (Premium)

      Application SME – Covers all updates and new features related to Office programs

      Power BI SME – Covers Power Automate for Office 365, Power Apps for Office 365, and Power BI Pro

      Voice and Video – Tools-Calling Plan, Audio Conference (Full), Teams Phone, Mobility

      PMO – Manages all M365 products online and in production. Also coordinates enhancements, writes up documentation for updates, and releases them to the training CoE for publication.

      Microsoft 365 tools used to support business

      M365 Training CoE Team

      Training and certifications for both end users and technical staff managing the M365 platform. Ensure that you set goals and objectives with your training schedule.

      this image depicts the framework for the training CoE team.

      Training for SMEs can be broken into two categories:

      First line training is internal training for users, in the collaboration space. Teams, One Drive, SharePoint Online, Exchange, and specialty training on Office tools – Word, PowerPoint, Excel, and Microsoft Forms.

      Second line training is professional development for the SMEs including certifications in M365 admin, Global admin, Teams admin, and SharePoint administrator.

      Additional training and certification can be obtained in governance, information management, and in the admin center for licencing optimization and compliance.

      Tools used

      • Viva topics – Integrated knowledge and expert discovery
      • Viva Insight
      • Viva Learning
      • Viva Connections
      • Dynamics 365
      • Voice of the customer surveys

      Support M365 CoE Team

      This image depicts the framework for m365 CoE team support.

      Support CoE:

      In charge of creating a knowledge base for M365. Manages incidents with access, usage, and administering apps to desktop. Manages change issues related to updates in patching.

      Help Desk Admin:

      Resets passwords when self service fails, force sign out, manages service requests.

      Works with learning CoE to populate knowledge base with articles and templates.

      Manages end user issues with changes and enhancements for M365.

      Supporting Metrics

      • Number of calls for M365 support
      • Recurring M365 incidents
      • Number of unresolved Platform issues
      • First call resolution
      • Knowledge sharing of M365
      • Customer satisfaction
      • Turnaround time of tickets created

      Roadmap

      How does the CoE evolve over time as enterprises become more mature?

      • Depending on the complexity and regulatory requirements of the business, baseline governance and rules around external partners sharing internal documents will need to be set up.
      • Identifying your SMEs in the organization is a perquisite at the beginning stages of setting up the M365 working group.
      • Build a roadmap to get to maturity and competency that brings strategic business value.
      • Meet milestone goals through a two-year, three-phase process. Begin with setting up governance guardrails.
      • Set up foundational baselines against which metrics will be measured.
      • Set up the M365 CoE, at first with target easy wins through group training and policy communications throughout the organization.
      this image depicts the CoE Roadmap, from Foundational Baseline, to Standardize Process, to Optimization

      How do you turn artifacts like best practice documents into actual behavior change?

      this image depicts the process of turning M365 ARtifacts into actual behavioural change within a company

      Info-Tech Insights

      Building Blocks
      The building blocks for a change in end user behavior are based on four criteria which must be clearly communicated. Knowledge transfer from SMEs to the training team is key. That in turn leads to effective knowledge transfer, allowing end users to develop skills quickly that can be shared with their teams. Sharing practices leads to best practices and maintaining these in a repository that can be quickly accessed will build on the efficiencies and effectiveness of the employees.

      How Do You Empower End Users to Innovate?

      Info-Tech Insights

      Understand the Vision

      Empowering End users starts with understanding the business vision that is embedded into the M365 CoE charter.

      Ensure that the business innovation goals are aligned to the organizational strategies.

      The innovative strategies need to be clearly communicated to the employees and the tools to achieve this needs to be mapped out and trained. Clearly lay out the goals, outcomes, and expectations.

      End users need to understand how the M365 CoE will assist them in their day-to-day operations, whether in the collaboration space with their colleagues, or with power BI that assists them in their decision making though analytics.

      The Right Resources

      Arm your team with the resources they need to be successful. Building use cases as part of the training program will give the employees insight into how the M365 tools can be used in their daily work environment. It will also address the pervasive use of nonstandard tools as is seen throughout organizations that are operated in a vacuum.

      Empowering your user base though the knowledge transfer borne through the building of artifacts that deal with real life examples that join the dots for employees.

      By painting a picture of how the innovative use of the M365 platform can be achieved, users will feel empowered and use those use cases to build out their own innovative ideas.

      Hybrid Work

      Digital fabric

      Collaboration – Communication – Creation

      Cloud Services – Innovative Apps – Security

      Productivity anywhere any place

      Shared working documents in secure cloud

      Mesh for Microsoft Teams/Viva

      Power apps and dataverse for Teams

      Self Service M365

      My Apps

      My Sign-Ins

      My Groups

      My Staff

      My Access

      My Account

      Password reset

      Sample Best Practices
      Tools and Standards Templates

      Then communicate them

      Collaboration Best Practices

      Sharing documents

      Real time co-authoring

      Comment

      Meet

      Mobile

      Version History

      Security Best Practices

      This is a screenshot of the Security Best Practices

      Default Security Settings

      Microsoft Security Score

      Enable Alert Policies

      Assign RBAC for Admins

      Enable Continuous Access Evaluation

      Admin Roles Best Practices in M365

      This is a screenshot of the admin roles best ractices in M365.

      Business Success Metrics for M365 CoE

      What does success look like?

      • Are you aligning the M365 metrics to business goals?
      • Are your decisions data driven?
      • Are you able to determine opportunities to improve with your metrics – continuous process improvement?
      • Are you seeing productivity gains, and are they being measured?
      This image contains a screenshot of the Business Success Metrics for M365-CoE: SMC Training; Content published and tagged; Usage Metrics; Cost Metrics; Adoption Metrics; New Product Introduction

      Activity Output

      Start building your M365 CoE and considering the steps for the Phase 1 checklist

      BUILD A FOUNDATIONAL BASELINE

      Step 1

      1. Select Resources to create a CoE working group
      2. Define your goals and objectives
      3. Identify SMEs within the business and do a gap analysis
      4. Build the M365 charter, mission, and vision
      5. Build consensus and sponsorship from C suite
      6. Create an organizational M365 framework that provides best coverage for all touch points to the platform, from support to training to controls.
      7. Determine the type of CoE you want to create that fits your business (centralized, distributed, or a combination).

      Step 2

      1. Build training plans for SMEs and M365 teams
      2. Populate company intranet with artifacts, knowledge articles, and user training portal with all things M365
      3. Build out best practice workbooks, tools, and templates that encompass all departments
      4. Create roles and responsibilities matrix
      5. Identify “super users” in departments to assist with promoting learning and knowledge sharing.
      6. Develop Metrics scorecards on success criteria ensuring they align to business goals

      Step 3

      1. Rational M365 licensing
      2. Create communication plan promoting CoE and M365 advantages
      3. Align your governance posture and building guardrails
      4. Identify legacy apps that can be retired and replaced
      5. Train support team and analysts with metrics supporting M365 CoE goals
      6. Create baseline metrics with clear alignment to business KPIs

      Related Blueprints

      Modernize Your Microsoft Licensing for the Cloud Era

      • Take control of your Microsoft licensing and optimize spend

      Govern Office 365

      • Office 365 is as difficult to wrangle as it is valuable. Leverage best practices to produce governance outcomes aligned with your goals

      Migrate to Office 365 Now

      • One small step to cloud, one big leap to Office 365. The key is to look before you leap

      Build a Data Classification MVP for M365

      • Kickstart your governance with data classification users will actually use!

      Bibliography

      “Five Guiding Principles of a successful Center of Excellence” Perficient, n.d. Web.

      “Self Service in Microsoft 365.” Janbakker.tech, n.d. Web.

      “My Apps portal overview.” Microsoft, June 2, 2022. Web.

      “Collaboration Best Practices Microsoft365.” Microsoft, n.d. Web.

      “Security Best Practices Microsoft 365” Microsoft, July 1, 2022. Web.

      Identify and Reduce Agile Contract Risk

      • Buy Link or Shortcode: {j2store}232|cart{/j2store}
      • member rating overall impact: 8.0/10 Overall Impact
      • member rating average dollars saved: $10,000 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Customer maturity levels with Agile are low, with 67% of organizations using Agile for less than five years.
      • Customer competency levels with Agile are also low, with 84% of organizations stating they are below a high level of competency.
      • Contract disputes are the number one or two types of disputes faced by organizations across all industries.

      Our Advice

      Critical Insight

      • Agile contracts require different wording and protections than traditional or waterfall contracts.
      • Agile buzzwords by themselves do not create an Agile contract.
      • There is a delicate balance between being overly prescriptive in an Agile contract and too lax.

      Impact and Result

      • Identify options for Agile contract provisions.
      • Manage Agile contract risk by selecting the appropriate level of protections for an Agile project.
      • Harness the power of Agile development and collaboration with the vendor while preserving contractual flexibility.
      • Focus on the correct contract clauses to manage Agile risk.

      Identify and Reduce Agile Contract Risk Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should treat Agile contracts differently from traditional or waterfall contracts, and review Info-Tech’s methodology, and understand the twelve contract clauses that are different for Agile contracts.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and evaluate options

      Use the information in this blueprint and Info-Tech’s Agile Contract Playbook-Checklist to review and assess your Agile contracts, ensuring that the provisions and protections are suitable for Agile contracts specifically.

      • Agile Contracts Playbook-Checklist
      [infographic]

      Workshop: Identify and Reduce Agile Contract Risk

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Identify and Evaluate Options

      The Purpose

      To understand Agile-specific contract clauses, to improve risk identification, and to be more effective at negotiating Agile contract terms.

      Key Benefits Achieved

      Increased awareness of how Agile contract provisions are different from traditional or waterfall contracts in 12 key areas.

      Understanding available options.

      Understanding the impact of being too prescriptive.

      Activities

      1.1 Review the Agile Contract Playbook-Checklist.

      1.2 Review 12 contract provisions and reinforce key learnings with exercises.

      Outputs

      Configured Playbook-Checklist as applicable

      Exercise results and debrief

      Knowledge Management

      • Buy Link or Shortcode: {j2store}33|cart{/j2store}
      • Related Products: {j2store}33|crosssells{/j2store}
      • member rating overall impact: 9.0/10
      • member rating average dollars saved: $10,000
      • member rating average days saved: 2
      • Parent Category Name: People and Resources
      • Parent Category Link: /people-and-resources
      Mitigate Key IT Employee Knowledge Loss

      Lead Strategic Decision Making With Service Portfolio Management

      • Buy Link or Shortcode: {j2store}397|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • member rating average days saved: Read what our members are saying
      • Parent Category Name: Service Management
      • Parent Category Link: /service-management
      • There are no standardized processes for the intake of new ideas and no consistent view of the drivers needed to assess the value of these ideas.
      • IT is spending money on low-value services and doesn’t have the ability to understand and track value in order to prioritize IT investment.
      • CIOs are not trusted to drive innovation.

      Our Advice

      Critical Insight

      • The service portfolio empowers IT to be a catalyst in business strategy, change, and growth.
      • IT must drive value-based investment by understanding value of all services in the portfolio.
      • Organizations must assess the value of their services throughout their lifecycle to optimize business outcomes and IT spend.

      Impact and Result

      • Optimize IT investments by prioritizing services that provide more value to the business, ensuring that you do not waste money on low-value or out-of-date IT services.
      • Ensure that services are directly linked to business objectives, goals, and needs, keeping IT embedded in the strategic vision of the organization.
      • Enable the business to understand the impact of IT capabilities on business strategy.
      • Ensure that IT maintains a strategic and tactical view of the services and their value.
      • Drive agility and innovation by having a streamlined view of your business value context and a consistent intake of ideas.
      • Provide strategic leadership and create new revenue by understanding the relative value of new ideas vs. existing services.

      Lead Strategic Decision Making With Service Portfolio Management Research & Tools

      Start here – read the Executive Brief

      Service portfolio management enables organizations to become strategic value creators by establishing a dynamic view of service value. Understand the driving forces behind the need to manage services through their lifecycles.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Establish the service portfolio

      Establish and understand the service portfolio process by setting up the Service Portfolio Worksheet.

      • Lead Strategic Decision Making With Service Portfolio Management – Phase 1: Establish the Service Portfolio
      • Service Portfolio Worksheet

      2. Develop a value assessment framework

      Use the value assessment tool to assess services based on the organization’s context of value.

      • Lead Strategic Decision Making With Service Portfolio Management – Phase 2: Develop a Value Assessment Framework
      • Value Assessment Tool
      • Value Assessment Example Tool

      3. Manage intake and assessment of initiatives

      Create a centralized intake process to manage all new service ideas.

      • Lead Strategic Decision Making With Service Portfolio Management – Phase 3: Manage Intake and Assessment of Initiatives
      • Service Intake Form

      4. Assess active services

      Continuously validate the value of the existing service and determine the future of service based on the value and usage of the service.

      • Lead Strategic Decision Making With Service Portfolio Management – Phase 4: Assess Active Services

      5. Manage and communicate the service portfolio

      Communicate and implement the service portfolio within the organization, and create a mechanism to seek out continuous improvement opportunities.

      • Lead Strategic Decision Making With Service Portfolio Management – Phase 5: Manage and Communicate the Service Portfolio
      [infographic]

      Workshop: Lead Strategic Decision Making With Service Portfolio Management

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Establish the Service Portfolio

      The Purpose

      Establish and understand the service portfolio process by setting up the Service Portfolio Worksheet.

      Understand at a high level the steps involved in managing the service portfolio.

      Key Benefits Achieved

      Adapt the Service Portfolio Worksheet to organizational needs and create a plan to begin documenting services in the worksheet.

      Activities

      1.1 Review the Service Portfolio Worksheet.

      1.2 Adapt the Service Portfolio Worksheet.

      Outputs

      Knowledge about the use of the Service Portfolio Worksheet.

      Adapt the worksheet to reflect organizational needs and structure.

      2 Develop a Value Assessment Framework

      The Purpose

      Understand the need for a value assessment framework.

      Key Benefits Achieved

      Identify the organizational context of value through a holistic look at business objectives.

      Leverage Info-Tech’s Value Assessment Tool to validate and determine service value.

      Activities

      2.1 Understand value from business context.

      2.2 Determine the governing body.

      2.3 Assess culture and organizational structure.

      2.4 Complete the value assessment.

      2.5 Discuss value assessment score.

      Outputs

      Alignment on value context.

      Clear roles and responsibilities established.

      Ensure there is a supportive organizational structure and culture in place.

      Understand how to complete the value assessment and obtain a value score for selected services.

      Understand how to interpret the service value score.

      3 Manage Intake and Assessment of Initiatives

      The Purpose

      Create a centralized intake process to manage all new service ideas.

      Key Benefits Achieved

      Encourage collaboration and innovation through a transparent, formal, and centralized service intake process.

      Activities

      3.1 Review or design the service intake process.

      3.2 Review the Service Intake Form.

      3.3 Design a process to assess and transfer service ideas.

      3.4 Design a process to transfer completed services to the service catalog.

      Outputs

      Create a centralized process for service intake.

      Complete the Service Intake Form for a specific initiative.

      Have a process designed to transfer approved projects to the PMO.

      Have a process designed for transferring of completed services to the service catalog.

      4 Assess Active Services

      The Purpose

      Continuously validate the value of existing services.

      Key Benefits Achieved

      Ensure services are still providing the expected outcome.

      Clear next steps for services based on value.

      Activities

      4.1 Discuss/review management of active services.

      4.2 Complete value assessment for an active service.

      4.3 Determine service value and usage.

      4.4 Determine the next step for the service.

      4.5 Document the decision regarding the service outcome.

      Outputs

      Understand how active services must be assessed throughout their lifecycles.

      Understand how to assess an existing service.

      Place the service on the 2x2 matrix based on value and usage.

      Understand the appropriate next steps for services based on value.

      Formally document the steps for each of the IRMR options.

      5 Manage and Communicate Your Service Portfolio

      The Purpose

      Communicate and implement the service portfolio within the organization.

      Key Benefits Achieved

      Obtain buy-ins for the process.

      Create a mechanism to identify changes within the organization and to seek out continuous improvement opportunities for the service portfolio management process and procedures.

      Activities

      5.1 Create a communication plan for service portfolio and value assessment.

      5.2 Create a communication plan for service intake.

      5.3 Create a procedure to continuously validate the process.

      Outputs

      Document the target audience, the message, and how the message should be communicated.

      Document techniques to encourage participation and promote participation from the organization.

      Document the formal review process, including cycle, roles, and responsibilities.

      Stakeholder Relations

      • Buy Link or Shortcode: {j2store}25|cart{/j2store}
      • Related Products: {j2store}25|crosssells{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Strategy and Governance
      • Parent Category Link: /strategy-and-governance

      The challenge

      • Stakeholders come in a wide variety, often with competing and conflicting demands.
      • Some stakeholders are hard to identify. Those hidden agendas may derail your efforts.
      • Understanding your stakeholders' relative importance allows you to prioritize your IT agenda according to the business needs.

      Our advice

      Insight

      • Stakeholder management is an essential factor in how successful you will be.
      • Stakeholder management is a continuous process. The landscape constantly shifts.
      • You must also update your stakeholder management plan and approach on an ongoing basis.

      Impact and results 

      • Use your stakeholder management process to identify, prioritize, and manage key stakeholders effectively.
      • Continue to build on strengthening your relationships with stakeholders. It will help to gain easier buy-in and support for your future initiatives. 

      The roadmap

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      Make the case

      Identify stakeholders

      • Stakeholder Management Analysis Tool (xls)

      Analyze your stakeholders

      Assess the stakeholder's influence, interest, standing, and support to determine priority for future actions 

      Manage your stakeholders

      Develop your stakeholder management and communication plans

      • Stakeholder Management Plan Template (doc)
      • Communication Plan Template (doc)

      Monitor your stakeholder management plan performance

      Measure and monitor the success of your stakeholder management process.

       

       

      Implement Your Negotiation Strategy More Effectively

      • Buy Link or Shortcode: {j2store}225|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management
      • Forty-eight percent of CIOs believe their budgets are inadequate.
      • CIOs and IT departments are getting more involved with negotiations to reduce costs and risk.
      • Not all negotiators are created equal, and the gap between a skilled negotiator and an average negotiator is not always easy to identify objectively.
      • Skilled negotiators are in short supply.

      Our Advice

      Critical Insight

      • Preparation is critical for the success of your negotiation, but you cannot prepare for every eventuality.
      • Communication is the heart and soul of negotiations, but what is being “said” is only part of the picture.
      • Skilled negotiators separate themselves based on skillsets, and outcomes alone may not provide an accurate assessment of a negotiator.

      Impact and Result

      Addressing and managing critical negotiation elements helps:

      • Improve negotiation skills.
      • Implement your negotiation strategy more effectively.
      • Improve negotiation results.

      Implement Your Negotiation Strategy More Effectively Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create and follow a scalable process for preparing to negotiate with vendors, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. During

      Throughout this phase, ten essential negotiation elements are identified and reviewed.

      • Implement Your Negotiation Strategy More Effectively – Phase 1: During
      • During Negotiations Tool
      [infographic]

      Workshop: Implement Your Negotiation Strategy More Effectively

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 12 Steps to Better Negotiation Preparation

      The Purpose

      Improve negotiation skills and outcomes.

      Understand how to use the Info-Tech During Negotiations Tool.

      Key Benefits Achieved

      A better understanding of the subtleties of the negotiation process and an identification of where the negotiation strategy can go awry.

      The During Negotiation Tool will be reviewed and configured for the customer’s environment (as applicable).

      Activities

      1.1 Manage six key items during the negotiation process.

      1.2 Set the right tone and environment for the negotiation.

      1.3 Focus on improving three categories of intangibles.

      1.4 Improve communication skills to improve negotiation skills.

      1.5 Customize your negotiation approach to interact with different personality traits and styles.

      1.6 Maximize the value of your discussions by focusing on seven components.

      1.7 Understand the value of impasses and deadlocks and how to work through them.

      1.8 Use concessions as part of your negotiation strategy.

      1.9 Identify and defeat common vendor negotiation ploys.

      1.10 Review progress and determine next steps.

      Outputs

      Sample negotiation ground rules

      Sample vendor negotiation ploys

      Sample discussion questions and evaluation matrix

      Passwordless Authentication

      • Buy Link or Shortcode: {j2store}466|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: End-User Computing
      • Parent Category Link: /end-user-computing
      • Stakeholders believe that passwords are still good enough.
      • You don’t know how the vendor products match to the capabilities you need to offer.
      • What do you need to test when you prototype these new technologies?
      • What associated processes/IT domains will be impacted or need to be considered?

      Our Advice

      Critical Insight

      Passwordless is the right direction even if it’s not your final destination.

      Impact and Result

      • Be able to handle objections from those who believe passwords are still “fine.”
      • Prioritize the capabilities you need to offer the enterprise, and match them to products/features you can buy from vendors.
      • Integrate passwordless initiatives with other key functions (cloud, IDaM, app rationalization, etc.).

      Passwordless Authentication Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Passwordless Authentication – Know when you’ve been beaten!

      Back in 2004 we were promised "the end of passwords" – why, then, are we still struggling with them today?

      • Passwordless Authentication Storyboard
      [infographic]

      Further reading

      Passwordless Authentication

      Know when you've been beaten!

      Executive Summary

      Your Challenge

      • The IT world is an increasingly dangerous place.
      • Every year literally billions of credentials are compromised and exposed on the internet.
      • The average employee has between 27 and 191 passwords to manage.
      • The line between business persona and personal persona has been blurred into irrelevancy.
      • You need a method of authenticating users that is up to these challenges

      Common Obstacles

      • Legacy systems aside (wouldn't that be nice) this still won't be easy.
      • Social inertia – passwords worked before, so surely, they can still work today! Besides, users don't want to change.
      • Analysis paralysis – I don't want to get this wrong! How do I choose something that is going to be at the core of my infrastructure for the next 10 years?
      • Identity management – how can you fix authentication when people have multiple usernames?

      Info-Tech's Approach

      • Inaction is not an option.
      • Most commercial, off-the-shelf apps are moving to a SaaS model, so start your efforts with them.
      • Your existing vendors already have technologies you are underusing or ignoring – stop that!
      • Your users want this change – they just might not know it yet…
      • Much like zero trust network access, the journey is more important than the destination. Incremental steps on the path toward passwordless authentication will still yield significant benefits.

      Info-Tech Insight

      Users have been burdened with unrealistic expectations when it comes to their part in maintaining enterprise security. Given the massive rise in the threat landscape, it is time for Infrastructure to adopt a user-experience-based approach if we want to move the needle on improving security posture.

      Password Security Fallacy

      "If you buy the premise…you buy the bit."
      Johnny Carson

      We've had plenty of time to see this coming.

      Why haven't we done something?

      • Passwords are a 1970s construct.
      • End-users are complexity averse.
      • Credentials are leaked all the time.
      • New technologies will defeat even the most complex passwords.

      Build the case, both to business stakeholders and end users, that "password" is not a synonym for "security."

      Be ready for some objection handling!

      This is an image of Bill Gates and Gavin Jancke at the 2004 RSA Conference in San Francisco, CA

      Image courtesy of Microsoft

      RSA Conference, 2004
      San Francisco, CA

      "There is no doubt that over time, people are going to rely less and less on passwords. People use the same password on different systems, they write them down and they just don't meet the challenge for anything you really want to secure."
      Bill Gates

      What about "strong" passwords?

      There has been a password arms race going on since 1988

      A massive worm attack against ARPANET prompted the initial research into password strength

      Password strength can be expressed as a function of randomness or entropy. The greater the entropy the harder for an attacker to guess the password.

      This is an image of Table 1 from Google Cloud Solutions Architects.  it shows the number of bits of entropy for a number of Charsets.

      Table: Modern password security for users
      Ian Maddox and Kyle Moschetto, Google Cloud Solutions Architects

      From this research, increasing password complexity (length, special characters, etc.) became the "best practice" to secure critical systems.

      How many passwords??

      XKCD Comic #936 (published in 2011)

      This is an image of XKCD Comic # 936.

      Image courtesy of Randall Munroe XKCD Comics (CC BY-NC 2.5)

      It turns out that humans however are really bad at remembering complex passwords.

      An Intel study (2016) suggested that the average enterprise employee needed to remember 27 passwords. A more recent study from LastPass puts that number closer to 191.

      PEBKAC
      Problem Exists Between Keyboard and Chair

      Increasing entropy is the wrong way to fight this battle – which is good because we'd lose anyway.

      Over the course of a single year, researchers at the University of California, Berkeley identified and tracked nearly 2 billion compromised credentials.

      3.8 million were obtained via social engineering, another 788K from keyloggers. That's approx. 250,000 clear text credentials harvested every week!

      The entirety of the password ecosystem has significant vulnerabilities in multiple areas:

      • Unencrypted server- and client-side storage
      • Sharing
      • Reuse
      • Phishing
      • Keylogging
      • Question-based resets

      Even the 36M encrypted credentials compromised every week are just going to be stored and cracked later.

      Source: Google, University of California, Berkeley, International Computer Science Institute

       data-verified=22B hash/s">

      Image courtesy of NVIDIA, NVIDIA Grace

      • Current GPUs (2021) have 200+ times more cracking power than CPU systems.

      <8h 2040-bit RSA Key

      Image: IBM Quantum System One (CES 2020) by IBM Research is licensed under CC BY-ND 2.0

      • Quantum computing can smash current encryption methods.
      • Google engineers have demonstrated techniques that reduce the number of qubits required from 1B to a mere 20 million

      Enabling Technologies

      "Give me a place to stand, and a lever long enough, and I will move the world."
      Archimedes

      Technology gives us (too many) options

      The time to prototype is NOW!

      Chances are you are already paying for one or more of these technologies from a current vendor:

      • SSO, password managers
      • Conditional access
      • Multifactor
      • Hardware tokens
      • Biometrics
      • PINs

      Address all three factors of authentication

      • Something the user knows
      • Something the user has
      • Something the user is

      Global Market of $12.8B
      ~16.7% CAGR
      Source: Report Linker, 2022.

      Focus your prototype efforts in four key testing areas

      • Deployment
      • User adoption/training
      • Architecture (points of failure)
      • Disaster recovery

      Three factors for positive identification

      Passwordless technologies focus on alternate authentication factors to supplement or replace shared secrets.

      Knows: A secret shared between the user and the system; Has: A token possessed by the user and identifiable as unique by the system; Is: A distinctive and repeatable attribute of the user sampled by the system

      Something you know

      Shared secrets have well-known significant modern-day problems, but only when used in isolation. For end users, consider time-limited single use options, password managers, rate-limited login attempts, and reset rather than retrieval requests. On the system side, never forget strong cryptographic hashing along with a side of salt and pepper when storing passwords.

      Something you have

      A token (now known as a cryptographic identification device) such as a pass card, fob, smartphone, or USB key that is expected to be physically under the control of the user and is uniquely identifiable by the system. Easily decoupled in the event the token is lost, but potentially expensive and time-consuming to reprovision.

      Something you are or do

      Commonly referred to as biometrics, there are two primary classes. The first is measurable physical characteristics of the user such as a fingerprint, facial image, or retinal scan. The second class is a series of behavioral traits such as expected location, time of day, or device. These traits can be linked together in a conditional access policy.

      Unlike other authentication factors, biometrics DO NOT provide for exact matches and instead rely on a confidence interval. A balance must be struck against the user experience of false negatives and the security risk of a false positive.

      Prototype testing criteria

      Deployment

      Does the solution support the full variety of end-user devices you have in use?

      Can the solution be configured with your existing single sign-on or central identity broker?

      User Experience

      Users already want a better experience than passwords.

      What new behavior are you expecting (compelling) from the user?

      How often and under what conditions will that behavior occur?

      Architecture

      Where are the points of failure in the solution?

      Consider technical elements like session thresholds for reauthorization, but also elements like automation and self-service.

      Disaster Recovery

      Understand the exact responsibilities Infra&Ops have in the event of a system or user failure.

      As many solutions are based in the public cloud, manage stakeholder expectations accordingly.

      Next Steps

      "Move the goalposts…and declare victory."
      Informal Fallacy (yet very effective…)

      It is more a direction than a destination…

      Get the easy wins in the bank and then lay the groundwork for the long campaign ahead.

      You're not going to get to a passwordless world overnight. You might not even get there for many years. But an agile approach to the journey ensures you will realize value every step of the way:

      • Start in the cloud:
      • Choose a single sign-on platform such as Azure Active Directory, Okta, Auth0, AWS IAM, TruSONA, HYPR, or others. Document Your Cloud Strategy.
      • Integrate the SaaS applications from your portfolio with your chosen platform.
      • Establish visibility and rationalize identity management:
        • Accounts with elevated privileges present the most risk – evaluate your authentication factors for these accounts first.
        • There is elegance (and deployment success) in Simplifying Identity & Access Management.
      • Pay your tech debt:

      Fast IDentity Online (2) is now part of the web's DNA and is critical for digital transformation

      • IoT
      • Anywhere remote work
      • Government identity services
      • Digital wallets

      Bibliography

      "Backup Vs. Archiving: Know the Difference." Open-E. Accessed 05 Mar 2022.Web.
      G, Denis. "How to Build Retention Policy." MSP360, Jan 3, 2020. Accessed 10 Mar 2022.
      Ipsen, Adam. "Archive Vs. Backup: What's the Difference? A Definition Guide." BackupAssist, 28 Mar 2017. Accessed 04 Mar 2022.
      Kang, Soo. "Mitigating the Expense of E-Discovery; Recognizing the Difference Between Back-Ups and Archived Data." Zasio Enterprises, 08 Oct 2015. Accessed 3 Mar 2022.
      Mayer, Alex. "The 3-2-1 Backup Rule – An Efficient Data Protection Strategy." Naviko. Accessed 12 Mar 2022.
      Steel, Amber. "LastPass Reveals 8 Truths about Passwords in the New Password Exposé." LastPass Blog, 1 Nov. 2017. Web.
      "The Global Passwordless Authentication Market Size Is Estimated to Be USD 12.79 Billion in 2021 and Is Predicted to Reach USD 53.64 Billion by 2030 With a CAGR of 16.7% From 2022-2030." Report Linker, 9 June 2022. Web.
      "What Is Data-Archiving?" Proofpoint. Accessed 07 Mar 2022.

      Deliver Digital Products at Scale

      • Buy Link or Shortcode: {j2store}156|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $86,499 Average $ Saved
      • member rating average days saved: 53 Average Days Saved
      • Parent Category Name: Development
      • Parent Category Link: /development
      • Products are the lifeblood of an organization. They provide the capabilities the business needs to deliver value to both internal and external customers and stakeholders.
      • Product organizations are expected to continually deliver evolving value to the overall organization as they grow.
      • You need to clearly convey the direction and strategy of a broad product portfolio to gain alignment, support, and funding from your organization.

      Our Advice

      Critical Insight

      • Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that improve end-user value and enterprise alignment.
      • Your organizational goals and strategy are achieved through capabilities that deliver value. Your product hierarchy is the mechanism to translate enterprise goals, priorities, and constraints down to the product level where changes can be made.
      • Recognize that each product owner represents one of three primary perspectives: business, technical, and operational. Although all share the same capabilities, how they approach their responsibilities is influenced by their perspective.
      • The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.
      • Your product family roadmap and product roadmap tell different stories. The product family roadmap represents the overall connection of products to the enterprise strategy, while the product roadmap focuses on the fulfillment of the product’s vision.
      • Although products can be delivered with any software development lifecycle, methodology, delivery team structure, or organizational design, high-performing product teams optimize their structure to fit the needs of product and product family delivery.

      Impact and Result

      • Understand the importance of product families for scaling product delivery.
      • Define products in your context and organize products into operational families.
      • Use product family roadmaps to align product roadmaps to enterprise goals and priorities.
      • Evaluate the different approaches to improve your product family delivery pipelines and milestones.

      Deliver Digital Products at Scale Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should define enterprise product families to scale your product delivery capability, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Become a product-centric organization

      Define products in your organization’s context and explore product families as a way to organize products at scale.

      • Deliver Digital Products at Scale – Phase 1: Become a Product-Centric Organization
      • Deliver Digital Products at Scale Workbook
      • Digital Product Family Strategy Playbook

      2. Organize products into product families

      Identify an approach to group the inventory of products into one or more product families.

      • Deliver Digital Products at Scale – Phase 2: Organize Products Into Product Families

      3. Ensure alignment between products and families

      Confirm alignment between your products and product families via the product family roadmap and a shared definition of delivered value.

      • Deliver Digital Products at Scale – Phase 3: Ensure Alignment Between Products and Families

      4. Bridge the gap between product families and delivery

      Agree on a delivery approach that best aligns with your product families.

      • Deliver Digital Products at Scale – Phase 4: Bridge the Gap Between Product Families and Delivery
      • Deliver Digital Products at Scale Readiness Assessment

      5. Build your transformation roadmap and communication plan

      Define your communication plan and transformation roadmap for transitioning to delivering products at the scale of your organization.

      • Deliver Digital Products at Scale – Phase 5: Transformation Roadmap and Communication

      Infographic

      Workshop: Deliver Digital Products at Scale

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Become a Product-Centric Organization

      The Purpose

      Define products in your organization’s context and explore product families as a way to organize products at scale.

      Key Benefits Achieved

      An understanding of the case for product practices

      A concise definition of products and product families

      Activities

      1.1 Understand your organizational factors driving product-centric delivery.

      1.2 Establish your organization’s product inventory.

      1.3 Determine your approach to scale product families.

      Outputs

      Organizational drivers and goals for a product-centric delivery

      Definition of product

      Product scaling principles

      Scaling approach and direction

      Pilot list of products to scale

      2 Organize Products Into Product Families

      The Purpose

      Identify a suitable approach to group the inventory of products into one or more product families.

      Key Benefits Achieved

      A scaling approach for products that fits your organization

      Activities

      2.1 Define your product families.

      Outputs

      Product family mapping

      Enabling applications

      Dependent applications

      Product family canvas

      3 Ensure Alignment Between Products and Families

      The Purpose

      Confirm alignment between your products and product families via the product family roadmap and a shared definition of delivered value.

      Key Benefits Achieved

      Recognition of the product family roadmap and a shared definition of value as key concepts to maintain alignment between your products and product families

      Activities

      3.1 Leverage product family roadmaps.

      3.2 Use stakeholder management to improve roadmap communication.

      3.3 Configure your product family roadmaps.

      3.4 Confirm product family to product alignment.

      Outputs

      Current approach for communication of product family strategy

      List of product family stakeholders and a prioritization plan for communication

      Defined key pieces of a product family roadmap

      An approach to confirming alignment between products and product families through a shared definition of business value

      4 Bridge the Gap Between Product Families and Delivery

      The Purpose

      Agree on the delivery approach that best aligns with your product families.

      Key Benefits Achieved

      An understanding of the team configuration and operating model required to deliver value through your product families

      Activities

      4.1 Assess your organization’s delivery readiness.

      4.2 Understand your delivery options.

      4.3 Determine your operating model.

      4.4 Identify how to fund product delivery.

      4.5 Learn how to introduce your digital product family strategy.

      4.6 Communicate changes on updates to your strategy.

      4.7 Determine your next steps.

      Outputs

      Assessment results on your organization’s delivery maturity

      A preferred approach to structuring product delivery

      Your preferred operating model for delivering product families

      Understanding of your preferred approach for product family funding

      Product family transformation roadmap

      Your plan for communicating your roadmap

      List of actionable next steps to start on your journey

      5 Advisory: Next Steps and Wrap-Up (offsite)

      The Purpose

      Implement your communication plan and transformation roadmap for transitioning to delivering products at the scale of your organization.

      Key Benefits Achieved

      New product family organization and supporting product delivery approach

      Activities

      5.1 Execute communication plan and product family changes.

      5.2 Review the pilot family implementation and update the transformation roadmap.

      5.3 Begin advisory calls for related blueprints.

      Outputs

      Organizational communication of product families and product family roadmaps

      Product family implementation and updated transformation roadmap

      Support for product owners, backlog and roadmap management, and other topics

      Further reading

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      Analyst Perspective

      Product families align enterprise goals to product changes and value realization.

      A picture of Info-Tech analyst Banu Raghuraman. A picture of Info-Tech analyst Ari Glaizel. A picture of Info-Tech analyst Hans Eckman

      Our world is changing faster than ever, and the need for business agility continues to grow. Organizations are shifting from long-term project delivery to smaller, iterative product delivery models to be able to embrace change and respond to challenges and opportunities faster.

      Unfortunately, many organizations focus on product delivery at the tactical level. Product teams may be individually successful, but how well are their changes aligned to division and enterprise goals and priorities?

      Grouping products into operationally aligned families is key to delivering the right value to the right stakeholders at the right time.

      Product families translate enterprise goals, constraints, and priorities down to the individual product level so product owners can make better decisions and more effectively manage their roadmaps and backlogs. By scaling products into families and using product family roadmaps to align product roadmaps, product owners can deliver the capabilities that allow organizations to reach their goals.

      In this blueprint, we’ll provide the tools and guidance to help you define what “product” means to your organization, use scaling patterns to build product families, align product and product family roadmaps, and identify impacts to your delivery and organizational design models.

      Banu Raghuraman, Ari Glaizel, and Hans Eckman

      Applications Practice

      Info-Tech Research Group

      Deliver Digital Products at Scale

      Deliver value at the scale of your organization through defining enterprise product families.

      EXECUTIVE BRIEF

      Executive Summary

      Your Challenge

      • Products are the lifeblood of an organization. They deliver the capabilities needed to deliver value to customers, internal users, and stakeholders.
      • The shift to becoming a product organization is intended to continually increase the value you provide to the broader organization as you grow and evolve.
      • You need to clearly convey the direction and strategy of your product portfolio to gain alignment, support, and funding from your organization.

      Common Obstacles

      • IT organizations are traditionally organized to deliver initiatives in specific periods of time. This conflicts with product delivery, which continuously delivers value over the lifetime of a product.
      • Delivering multiple products together creates additional challenges because each product has its own pedigree, history, and goals.
      • Product owners struggle to prioritize changes to deliver product value. This creates a gap and conflict between product and enterprise goals.

      Info-Tech’s Approach

      Info-Tech’s approach will guide you through:

      • Understanding the importance of product families in scaling product delivery.
      • Defining products in your context and organizing products into operational families.
      • Using product family roadmaps to align product roadmaps to enterprise goals and priorities.
      • Evaluating the different approaches to improve your product family delivery pipelines and milestones.

      Info-Tech Insight

      Changes can only be made at the individual product or service level. To achieve enterprise goals and priorities, organizations needed to organize and scale products into operational families. This structure allows product managers to translate goals and constraints to the product level and allows product owners to deliver changes that support enabling capabilities. In this blueprint, we’ll help you define your products, scale them using the best patterns, and align your roadmaps and delivery models to improve throughput and value delivery.

      Info-Tech’s approach

      Operationally align product delivery to enterprise goals

      A flowchart is shown on how to operationally align product delivery to enterprise goals.

      The Info-Tech difference:

      1. Start by piloting product families to determine which approaches work best for your organization.
      2. Create a common definition of what a product is and identify products in your inventory.
      3. Use scaling patterns to build operationally aligned product families.
      4. Develop a roadmap strategy to align families and products to enterprise goals and priorities.
      5. Use products and families to evaluate delivery and organizational design improvements.

      Deliver Digital Products at Scale via Enterprise Product Families

      An infographic on the Enterprise Product Families is shown.

      Product does not mean the same thing to everyone

      Do not expect a universal definition of products.

      Every organization and industry has a different definition of what a product is. Organizations structure their people, processes, and technologies according to their definition of the products they manage. Conflicting product definitions between teams increase confusion and misalignment of product roadmaps.

      “A product [is] something (physical or not) that is created through a process and that provides benefits to a market.”

      - Mike Cohn, Founding Member of Agile Alliance and Scrum Alliance

      “A product is something ... that is created and then made available to customers, usually with a distinct name or order number.”

      - TechTarget

      “A product is the physical object ... , software or service from which customer gets direct utility plus a number of other factors, services, and perceptions that make the product useful, desirable [and] convenient.”

      - Mark Curphey

      Organizations need a common understanding of what a product is and how it pertains to the business. This understanding needs to be accepted across the organization.

      “There is not a lot of guidance in the industry on how to define [products]. This is dangerous because what will happen is that product backlogs will be formed in too many areas. All that does is create dependencies and coordination across teams … and backlogs.”

      – Chad Beier, "How Do You Define a Product?” Scrum.org

      What is a product?

      “A tangible solution, tool, or service (physical or digital) that enables the long-term and evolving delivery of value to customers and stakeholders based on business and user requirements.”

      Info-Tech Insight

      A proper definition of product recognizes three key facts:

      1. Products are long-term endeavors that don’t end after the project finishes.
      2. Products are not just “apps” but can be software or services that drive the delivery of value.
      3. There is more than one stakeholder group that derives value from the product or service.

      Products and services share the same foundation and best practices

      For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. Product is used for consistency but would apply to services as well.

      Product = Service

      “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Recognize the different product owner perspectives

      Business:

      • Customer facing, revenue generating

      Technical:

      • IT systems and tools

      Operations:

      • Keep the lights on processes

      Info-Tech Best Practice

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Info-Tech Insight

      Recognize that product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their perspective.

      “A Product Owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The Product Owner is someone who really 'owns' the product.”

      – Robbin Schuurman, “Tips for Starting Product Owners”

      Identify the differences between a project-centric and a product-centric organization

      Project

      Product

      Fund projects

      Funding

      Fund products or teams

      Line of business sponsor

      Prioritization

      Product owner

      Makes specific changes to a product

      Product management

      Improve product maturity and support

      Assign people to work

      Work allocation

      Assign work to product teams

      Project manager manages

      Capacity management

      Team manages capacity

      Info-Tech Insight

      Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.

      Projects can be a mechanism for delivering product changes and improvements

      A flowchart is shown to demonstrate the difference between project lifecycle, hybrid lifecycle and product lifecycle.

      Projects within products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply. The purpose of projects is to deliver the scope of a product release. The shift to product delivery leverages a product roadmap and backlog as the mechanism for defining and managing the scope of the release. Eventually, teams progress to continuous integration/continuous delivery (CI/CD) where they can release on demand or as scheduled, requiring org change management.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      An image is shown to demonstrate the relationship between the product backlog and the product roadmap.

      Product roadmaps guide delivery and communicate your strategy

      In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.

      An example of a product roadmap is shown to demonstrate how it is the core to value realization.

      Adapted from: Pichler, "What Is Product Management?""

      Info-Tech Insight

      The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.

      Use Agile DevOps principles to expedite product-centric delivery and management

      Delivering products does not necessarily require an Agile DevOps mindset. However, Agile methods facilitate the journey because product thinking is baked into them.

      A flowchart is shown to demonstrate the product deliery maturity and the Agile DevOps used.
      Based on: Ambysoft, 2018

      Organizations start with Waterfall to improve the predictable delivery of product features.

      Iterative development shifts the focus from delivery of features to delivery of user value.

      Agile further shifts delivery to consider ROI. Often, the highest-value backlog items aren’t the ones with the highest ROI.

      Lean and DevOps improve your delivery pipeline by providing full integration between product owners, development teams, and operations.

      CI/CD reduces time in process by allowing release on demand and simplifying release and support activities.

      Although teams will adopt parts of all these stages during their journey, it isn’t until you’ve adopted a fully integrated delivery chain that you’ve become product centric.

      Scale products into related families to improve value delivery and alignment

      Defining product families builds a network of related products into coordinated value delivery streams.

      A flowchart is shown to demonstrate the relations between product family and the delivery streams.

      “As with basic product management, scaling an organization is all about articulating the vision and communicating it effectively. Using a well-defined framework helps you align the growth of your organization with that of the company. In fact, how the product organization is structured is very helpful in driving the vision of what you as a product company are going to do.”

      – Rich Mironov, Mironov Consulting

      Product families translate enterprise goals into value-enabling capabilities

      A flowchart is shown to demonstrate the relationship between enterprise strategy and enabling capabilities.

      Info-Tech Insight

      Your organizational goals and strategy are achieved through capabilities that deliver value. Your product hierarchy is the mechanism to translate enterprise goals, priorities, and constraints down to the product level where changes can be made.

      Arrange product families by operational groups, not solely by your org chart

      A flowchart is shown to demonstrate how to arrange product families by operational groups.

      1. To align product changes with enterprise goals and priorities, you need to organize your products into operational groups based on the capabilities or business functions the product and family support.

      2. Product managers translate these goals, priorities, and constraints into their product families, so they are actionable at the next level, whether that level is another product family or products implementing enhancements to meet these goals.

      3. The product family manager ensures that the product changes enhance the capabilities that allow you to realize your product family, division, and enterprise goals.

      4. Enabling capabilities realize value and help reach your goals, which then drives your next set of enterprise goals and strategy.

      Approach alignment from both directions, validating by the opposite way

      Defining your product families is not a one-way street. Often, we start from either the top or the bottom depending on our scaling principles. We use multiple patterns to find the best arrangement and grouping of our products and families.

      It may be helpful to work partway, then approach your scaling from the opposite direction, meeting in the middle. This way you are taking advantage of the strengths in both approaches.

      Once you have your proposed structure, validate the grouping by applying the principles from the opposite direction to ensure each product and family is in the best starting group.

      As the needs of your organization change, you may need to realign your product families into your new business architecture and operational structure.

      A top-down alignment example is shown.

      When to use: You have a business architecture defined or clear market/functional grouping of value streams.

      A bottom-up alignment example is shown.

      When to use: You are starting from an Application Portfolio Management application inventory to build or validate application families.

      Leverage patterns for scaling products

      Organizing your products and families is easier when leveraging these grouping patterns. Each is explained in greater detail on the following slides

      Value Stream Alignment

      Enterprise Applications

      Shared Services

      Technical

      Organizational Alignment

      • Business architecture
        • Value stream
        • Capability
        • Function
      • Market/customer segment
      • Line of business (LoB)
      • Example: Customer group > value stream > products
      • Enabling capabilities
      • Enterprise platforms
      • Supporting apps
      • Example: HR > Workday/Peoplesoft > ModulesSupporting: Job board, healthcare administrator
      • Organization of related services into service family
      • Direct hierarchy does not necessarily exist within the family
      • Examples: End-user support and ticketing, workflow and collaboration tools
      • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
      • Often used in combination with Shared Services grouping or LoB-specific apps
      • Examples: Java, .NET, low-code, database, network
      • Used at higher levels of the organization where products are aligned under divisions
      • Separation of product managers from organizational structure no longer needed because the management team owns product management role

      Leverage the product family roadmap for alignment

      It’s more than a set of colorful boxes. It’s the map to align everyone to where you are going.

      Your product family roadmap

        ✓ Lays out a strategy for your product family.

        ✓ Is a statement of intent for your family of products.

        ✓ Communicates direction for the entire product family and product teams.

        ✓ Directly connects to the organization’s goals.

      However, it is not:

        x Representative of a hard commitment.

        x A simple combination of your current product roadmaps.

      Before connecting your family roadmap to products, think about what each roadmap typically presents

      An example of a product family roadmap is shown and how it can be connected to the products.

      Info-Tech Insight

      Your product family roadmap and product roadmap tell different stories. The product family roadmap represents the overall connection of products to the enterprise strategy, while the product roadmap focuses on the fulfillment of the product’s vision.

      Product family roadmaps are more strategic by nature

      While individual product roadmaps can be different levels of tactical or strategic depending on a variety of market factors, your options are more limited when defining roadmaps for product families.

      Product

      TACTICAL

      A roadmap that is technical, committed, and detailed.

      Product Family

      STRATEGIC

      A roadmap that is strategic, goal based, high level, and flexible.

      Info-Tech Insight

      Roadmaps for your product family are, by design, less detailed. This does not mean they aren’t actionable! Your product family roadmap should be able to communicate clear intentions around the future delivery of value in both the near and long term.

      Consider volatility when structuring product family roadmaps

      A roadmap is shown without any changes.

      There is no such thing as a roadmap that never changes.

      Your product family roadmap represents a broad statement of intent and high-level tactics to get closer to the organization’s goals.

      A roadmap is shown with changes.

      All good product family roadmaps embrace change!

      Your strategic intentions are subject to volatility, especially those planned further in the future. The more costs you incur in planning, the more you leave yourself exposed to inefficiency and waste if those plans change.

      Info-Tech Insight

      A good product family roadmap is intended to manage and communicate the inevitable changes as a result of market volatility and changes in strategy.

      Product delivery realizes value for your product family

      While planning and analysis are done at the family level, work and delivery are done at the individual product level.

      PRODUCT STRATEGY

      What are the artifacts?

      What are you saying?

      Defined at the family level?

      Defined at the product level?

      Vision

      I want to...

      Strategic focus

      Delivery focus

      Goals

      To get there we need to...

      Roadmap

      To achieve our goals, we’ll deliver...

      Backlog

      The work will be done in this order...

      Release Plan

      We will deliver in the following ways...

      Typical elements of a product family roadmap

      While there are others, these represent what will commonly appear across most family-based roadmaps.

      An example is shown to highlight the typical elements of a product family roadmap.

      GROUP/CATEGORY: Groups are collections of artifacts. In a product family context, these are usually product family goals, value streams, or products.

      ARTIFACT: An artifact is one of many kinds of tangible by-products produced during the delivery of products. For a product family, the artifacts represented are capabilities or value streams.

      MILESTONE: Points in the timeline when established sets of artifacts are complete. This is a critical tool in the alignment of products in a given family.

      TIME HORIZON: Separated periods within the projected timeline covered by the roadmap.

      Connecting your product family roadmaps to product roadmaps

      Your product and product family roadmaps should be connected at an artifact level that is common between both. Typically, this is done with capabilities, but it can be done at a more granular level if an understanding of capabilities isn’t available.

      An example is shown on how the product family roadmpas can be connected to the product roadmaps.

      Multiple roadmap views can communicate differently, yet tell the same truth

      Audience

      Business/ IT Leaders

      Users/Customers

      Delivery Teams

      Roadmap View

      Portfolio

      Product Family

      Technology

      Objectives

      To provide a snapshot of the portfolio and priority products

      To visualize and validate product strategy

      To coordinate broad technology and architecture decisions

      Artifacts

      Line items or sections of the roadmap are made up of individual products, and an artifact represents a disposition at its highest level.

      Artifacts are generally grouped by product teams and consist of strategic goals and the features that realize those goals.

      Artifacts are grouped by the teams who deliver that work and consist of technical capabilities that support the broader delivery of value for the product family.

      Your communication objectives are linked to your audience; ensure you know your audience and speak their language

      I want to...

      I need to talk to...

      Because they are focused on...

      ALIGN PRODUCT TEAMS

      Get my delivery teams on the same page.

      Architects

      Products Owners

      PRODUCTS

      A product that delivers value against a common set of goals and objectives.

      SHOWCASE CHANGES

      Inform users and customers of product strategy.

      Bus. Process Owners

      End Users

      FUNCTIONALITY

      A group of functionality that business customers see as a single unit.

      ARTICULATE RESOURCE REQUIREMENTS

      Inform the business of product development requirements.

      IT Management

      Business Stakeholders

      FUNDING

      An initiative that those with the money see as a single budget.

      Assess the impacts of product-centric delivery on your teams and org design

      Product delivery can exist within any org structure or delivery model. However, when making the shift toward product management, consider optimizing your org design and product team structure to match your capacity and throughput needs.

      A flowchart is shown to see how the impacts of product-centric delivery can impact team and org designs.

      Determine which delivery team structure best fits your product pipeline

      Four delivery team structures are shown. The four are: functional roles, shared service and resource pools, product or system, and skills and competencies.

      Weigh the pros and cons of IT operating models to find the best fit

      There are many different operating models. LoB/Product Aligned and Hybrid Functional align themselves most closely with how products and product families are typically delivered.

      1. LoB/Product Aligned – Decentralized Model: Line of Business, Geographically, Product, or Functionally Aligned
      2. A decentralized IT operating model that embeds specific functions within LoBs/product teams and provides cross-organizational support for their initiatives.

      3. Hybrid Functional: Functional/Product Aligned
      4. A best-of-both-worlds model that balances the benefits of centralized and decentralized approaches to achieve both customer responsiveness and economies of scale.

      5. Hybrid Service Model: Product-Aligned Operating Model
      6. A model that supports what is commonly referred to as a matrix organization, organizing by highly related service categories and introducing the role of the service owner.

      7. Centralized: Plan-Build-Run
      8. A highly typical IT operating model that focuses on centralized strategic control and oversight in delivering cost-optimized and effective solutions.

      9. Centralized: Demand-Develop-Service
      10. A centralized IT operating model that lends well to more mature operating environments. Aimed at leveraging economies of scale in an end-to-end services delivery model.

      Consider how investment spending will differ in a product environment

      Reward for delivering outcomes, not features

      Autonomy

      Flexibility

      Accountability

      Fund what delivers value

      Allocate iteratively

      Measure and adjust

      Fund long-lived delivery of value through products (not projects).

      Give autonomy to the team to decide exactly what to build.

      Allocate to a pool based on higher-level business case.

      Provide funds in smaller amounts to different product teams and initiatives based on need.

      Product teams define metrics that contribute to given outcomes.

      Track progress and allocate more (or less) funds as appropriate.

      Adapted from Bain, 2019

      Info-Tech Insight

      Changes to funding require changes to product and Agile practices to ensure product ownership and accountability.

      Why is having a common value measure important?

      CIO-CEO Alignment Diagnostic

      A stacked bar graph is shown to demonstrate CIO-CEO Alignment Diagnostic. A bar titled: Business Value Metrics is highlighted. 51% had some improvement necessary and 32% had significant improvement necessary.

      Over 700 Info-Tech members have implemented the Balanced Value Measurement Framework.

      “The cynic knows the price of everything and the value of nothing.”

      – Oscar Wilde

      “Price is what you pay. Value is what you get.”

      – Warren Buffett

      Understanding where you derive value is critical to building solid roadmaps.

      Measure delivery and success

      Metrics and measurements are powerful tools to drive behavior change and decision making in your organization. However, metrics are highly prone to creating unexpected outcomes, so use them with great care. Use metrics judiciously to uncover insights but avoid gaming or ambivalent behavior, productivity loss, and unintended consequences.

      Build good practices in your selection and use of metrics:

      • Choose the metrics that are as close to measuring the desired outcome as possible.
      • Select the fewest metrics possible and ensure they are of the highest value to your team, the safest from gaming behaviors and unintended consequences, and the easiest to gather and report.
      • Never use metrics for reward or punishment; use them to develop your team.
      • Automate as much metrics gathering and reporting as possible.
      • Focus on trends rather than precise metrics values.
      • Review and change your metrics periodically.

      Executive Brief Case Study

      INDUSTRY: Public Sector & Financial Services

      SOURCE: Info-Tech Interviews

      A tale of two product transformations

      Two of the organizations we interviewed shared the challenges they experienced defining product families and the impact these challenges had on their digital transformations.

      A major financial services organization (2,000+ people in IT) had employed a top-down line of business–focused approach and found itself caught in a vicious circle of moving applications between families to resolve cross-LoB dependencies.

      A similarly sized public sector organization suffered from a similar challenge as grouping from the bottom up based on technology areas led to teams fragmented across multiple business units employing different applications built on similar technology foundations.

      Results

      Both organizations struggled for over a year to structure their product families. This materially delayed key aspects of their product-centric transformation, resulting in additional effort and expenditure delivering solutions piecemeal as opposed to as a part of a holistic product family. It took embracing a hybrid top-down and bottom-up approach and beginning with pilot product families to make progress on their transformation.

      A picture of Cole Cioran is shown.

      Cole Cioran

      Practice Lead,

      Applications Practice

      Info-Tech Research Group

      There is no such thing as a perfect product-family structure. There will always be trade-offs when you need to manage shifting demand from stakeholder groups spanning customers, business units, process owners, and technology owners.

      Focusing on a single approach to structure your product families inevitably leads to decisions that are readily challenged or are brittle in the face of changing demand.

      The key to accelerating a product-centric transformation is to build a hybrid model that embraces top-down and bottom-up perspectives to structure and evolve product families over time. Add a robust pilot to evaluate the structure and you have the key to unlocking the potential of product delivery in your organization.

      Info-Tech’s methodology for Deliver Digital Products at Scale

      1. Become a Product-Centric Organization

      2. Organize Products Into Product Families

      3. Ensure Alignment Between Products and Families

      4. Bridge the Gap Between Product Families and Delivery

      5. Build Your Transformation Roadmap and Communication Plan

      Phase Steps

      1.1 Understand the organizational factors driving product-centric delivery

      1.2 Establish your organization’s product inventory

      2.1 Determine your approach to scale product families

      2.2 Define your product families

      3.1 Leverage product family roadmaps

      3.2 Use stakeholder management to improve roadmap communication

      3.3 Configure your product family roadmaps

      3.4 Confirm goal and value alignment of products and their product families

      4.1 Assess your organization’s delivery readiness

      4.2 Understand your delivery options

      4.3 Determine your operating model

      4.4 Identify how to fund product family delivery

      5.1 Introduce your digital product family strategy

      5.2 Communicate changes on updates to your strategy

      5.3 Determine your next steps

      Phase Outcomes
      • Organizational drivers and goals for a product-centric delivery
      • Definition of product
      • Pilot list of products to scale
      • Product scaling principles
      • Scaling approach and direction
      • Product family mapping
      • Enabling applications
      • Dependent applications
      • Product family canvas
      • Approach for communication of product family strategy
      • Stakeholder management plan
      • Defined key pieces of a product family roadmap
      • An approach to confirming alignment between products and product families
      • Assessment of delivery maturity
      • Approach to structuring product delivery
      • Operating model for product delivery
      • Approach for product family funding
      • Product family transformation roadmap
      • Your plan for communicating your roadmap
      • List of actionable next steps to start on your journey

      Blueprint deliverables

      Each step of this blueprint is accompanied by supporting deliverables to help you accomplish your goals:

      Deliver Digital Products at Scale Workbook

      Use this supporting workbook to document interim results from a number of exercises that will contribute to your overall strategy.

      A screenshot of the Scale Workbook is shown.

      Deliver Digital Products at Scale Readiness Assessment

      Your strategy needs to encompass your approaches to delivery. Understand where you need to focus using this simple assessment.

      A screenshot of the Scale Readiness Assessment is shown.

      Key deliverable:

      Digital Product Family Strategy Playbook

      Record the results from the exercises to help you define, detail, and deliver digital products at scale.

      A screenshot of the Digital Product Family Strategy Playbook is shown.

      Blueprint benefits

      IT Benefits

      • Improved product delivery ROI.
      • Improved IT satisfaction and business support.
      • Greater alignment between product delivery and product family goals.
      • Improved alignment between product delivery and organizational models.
      • Better support for Agile/DevOps adoption.

      Business Benefits

      • Increased value realization across product families.
      • Faster delivery of enterprise capabilities.
      • Improved IT satisfaction and business support.
      • Greater alignment between product delivery and product family goals.
      • Uniform understanding of product and product family roadmaps and key milestones.

      Measure the value of this blueprint

      Align product family metrics to product delivery and value realization.

      Member Outcome Suggested Metric Estimated Impact

      Increase business application satisfaction

      Satisfaction with business applications (CIO Business Vision diagnostic)

      20% increase within one year after implementation

      Increase effectiveness of application portfolio management

      Effectiveness of application portfolio management (Management & Governance diagnostic)

      20% increase within one year after implementation

      Increase importance and effectiveness of application portfolio

      Importance and effectiveness to business ( Application Portfolio Assessment diagnostic)

      20% increase within one year after implementation

      Increase satisfaction of support of business operations

      Support to business (CIO Business Vision diagnostic.

      20% increase within one year after implementation

      Successfully deliver committed work (productivity)

      Number of successful deliveries; burndown

      20% increase within one year after implementation

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keeps us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1: Become a Product-Centric Organization

      Phase 2: Organize Products Into Product Families

      Phase 3: Ensure Alignment Between Products and Families

      Phase 4: Bridge the Gap Between Product Families and Delivery

      Call #1: Scope requirements, objectives, and your specific challenges.

      Call #2: Define products and product families in your context.

      Call #3: Understand the list of products in your context.

      Call #4: Define your scaling principles and goals.

      Call #5: Select a pilot and define your product families.

      Call #6: Understand the product family roadmap as a method to align products to families.

      Call #7: Define components of your product family roadmap and confirm alignment.

      Call #8: Assess your delivery readiness.

      Call #9: Discuss delivery, operating, and funding models relevant to delivering product families.

      Call #10: Wrap up.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization. A typical GI is between 8 to 12 calls over the course of 4 to 6 months.

      Workshop Overview

      Contact your account representative for more information.

      workshops@infotech.com 1-888-670-8889

      Day 1

      Become a Product-Centric Organization

      Day 2

      Organize Products Into Product Families

      Day 3

      Ensure Alignment Between Products and Families

      Day 4

      Bridge the Gap Between Product Families and Delivery

      Advisory

      Next Steps and Wrap-Up (offsite)

      Activities

      1.1 Understand your organizational factors driving product-centric delivery.

      1.2 Establish your organization’s product inventory.

      2.1 Determine your approach to scale product families.

      2.2 Define your product families.

      3.1 Leverage product family roadmaps.

      3.2 Use stakeholder management to improve roadmap communication.

      3.3 Configure your product family roadmaps.

      3.4 Confirm product family to product alignment.

      4.1 Assess your organization’s delivery readiness.

      4.2 Understand your delivery options.

      4.3 Determine your operating model.

      4.4 Identify how to fund product family delivery.

      5.1 Learn how to introduce your digital product family strategy.

      5.2 Communicate changes on updates to your strategy.

      5.3 Determine your next steps.

      1. Execute communication plan and product family changes.
      2. Review the pilot family implementation and update the transformation roadmap.
      3. Begin advisory calls for related blueprints.

      Key Deliverables

      1. Organizational drivers and goals for a product-centric delivery
      2. Definition of product
      3. Product scaling principles
      4. Scaling approach and direction
      5. Pilot list of products to scale
      1. Product family mapping
      2. Enabling applications
      3. Dependent applications
      4. Product family canvas
      1. Current approach for communication of product family strategy
      2. List of product family stakeholders and a prioritization plan for communication
      3. Defined key pieces of a product family roadmap
      4. An approach to confirming alignment between products and product families through a shared definition of business value
      1. Assessment results on your organization’s delivery maturity
      2. A preferred approach to structuring product delivery
      3. Your preferred operating model for delivering product families
      4. Understanding your preferred approach for product family funding
      5. Product family transformation roadmap
      6. Your plan for communicating your roadmap
      7. List of actionable next steps to start on your journey
      1. Organizational communication of product families and product family roadmaps
      2. Product family implementation and updated transformation roadmap
      3. Support for product owners, backlog and roadmap management, and other topics

      Phase 1

      Become a Product-Centric Organization

      Phase 1Phase 2Phase 3Phase 4Phase 5

      1.1 Understand the organizational factors driving product-centric delivery

      1.2 Establish your organization’s product inventory

      2.1 Determine your approach to scale product families

      2.2 Define your product families

      3.1 Leverage product family roadmaps

      3.2 Use stakeholder management to improve roadmap communication

      3.3 Configure your product family roadmaps

      3.4 Confirm product family to product alignment

      4.1 Assess your organization’s delivery readiness

      4.2 Understand your delivery options

      4.3 Determine your operating model

      4.4 Identify how to fund product family delivery

      5.1 Learn how to introduce your digital product family strategy

      5.2 Communicate changes on updates to your strategy

      5.3 Determine your next steps

      This phase will walk you through the following activities:

      1.1.1 Understand your drivers for product-centric delivery

      1.1.2 Identify the differences between project and product delivery

      1.1.3 Define the goals for your product-centric organization

      1.2.1 Define “product” in your context

      1.2.2 Identify and establish a pilot list of products

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Step 1.1

      Understand the organizational factors driving product-centric delivery

      Activities

      1.1.1 Understand your drivers for product-centric delivery

      1.1.2 Identify the differences between project and product delivery

      1.1.3 Define the goals for your product-centric organization

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Outcomes of this step

      • Organizational drivers to move to product-centric delivery
      • List of differences between project and product delivery
      • Goals for product-centric delivery

      1.1.1 Understand your drivers for product-centric delivery

      30-60 minutes

      1. Identify your pain points in the current delivery model.
      2. What is the root cause of these pain points?
      3. How will a product-centric delivery model fix the root cause?
      4. Record the results in the Deliver Digital Products at Scale Workbook.
      Pain Points Root Causes Drivers
      • Lack of ownership
      • Siloed departments
      • Accountability

      Output

      • Organizational drivers to move to product-centric delivery.

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      1.1.2 Identify the differences between project and product delivery

      30-60 minutes

      1. Consider project delivery and product delivery.
      2. Discuss what some differences are between the two.
      3. Note: This exercise is not about identifying the advantages and disadvantages of each style of delivery. This is to identify the variation between the two.

      4. Record the results in the Deliver Digital Products at Scale Workbook.
      Project Delivery Product Delivery
      Point in time What is changed
      Method of funding changes Needs an owner

      Output

      • List of differences between project and product delivery

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      Identify the differences between a project-centric and a product-centric organization

      Project Product
      Fund projects Funding Fund products or teams
      Line of business sponsor Prioritization Product owner
      Makes specific changes to a product Product management Improves product maturity and support
      Assignment of people to work Work allocation Assignment of work to product teams
      Project manager manages Capacity management Team manages capacity

      Info-Tech Insight

      Product delivery requires significant shifts in the way you complete development work and deliver value to your users. Make the changes that support improving end-user value and enterprise alignment.

      Projects can be a mechanism for funding product changes and improvements

      A flowchart is shown to demonstrate the difference between project lifecycle, hybrid lifecycle, and product lifecycle.

      Projects within products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

      The purpose of projects is to deliver the scope of a product release. The shift to product delivery leverages a product roadmap and backlog as the mechanism for defining and managing the scope of the release.

      Eventually, teams progress to continuous integration/continuous delivery (CI/CD) where they can release on demand or as scheduled, requiring org change management.

      Use Agile DevOps principles to expedite product-centric delivery and management

      Delivering products does not necessarily require an Agile DevOps mindset. However, Agile methods facilitate the journey because product thinking is baked into them.

      A flowchart is shown to demonstrate the product delivery maturity and the Agile DevOps used.

      Based on: Ambysoft, 2018

      Organizations start with Waterfall to improve the predictable delivery of product features.

      Iterative development shifts the focus from delivery of features to delivery of user value.

      Agile further shifts delivery to consider ROI. Often, the highest-value backlog items aren’t the ones with the highest ROI.

      Lean and DevOps improve your delivery pipeline by providing full integration between product owners, development teams, and operations.

      CI/CD reduces time in process by allowing release on demand and simplifying release and support activities.

      Although teams will adopt parts of all these stages during their journey, it isn’t until you’ve adopted a fully integrated delivery chain that you’ve become product centric.

      1.1.3 Define the goals for your product-centric organization

      30 minutes

      1. Review your list of drivers from exercise 1.1.1 and the differences between project and product delivery from exercise 1.1.2.
      2. Define your goals for achieving a product-centric organization.
      3. Note: Your drivers may have already covered the goals. If so, review if you would like to change the drivers based on your renewed understanding of the differences between project and product delivery.

      Pain PointsRoot CausesDriversGoals
      • Lack of ownership
      • Siloed departments
      • Accountability
      • End-to-end ownership

      Output

      • Goals for product-centric delivery

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      Step 1.2

      Establish your organization’s product inventory

      Activities

      1.2.1 Define “product” in your context

      1.2.2 Identify and establish a pilot list of products

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Outcomes of this step

      • Your organizational definition of products and services
      • A pilot list of active products

      Product does not mean the same thing to everyone

      Do not expect a universal definition of products.

      Every organization and industry has a different definition of what a product is. Organizations structure their people, processes, and technologies according to their definition of the products they manage. Conflicting product definitions between teams increase confusion and misalignment of product roadmaps.

      “A product [is] something (physical or not) that is created through a process and that provides benefits to a market.”

      - Mike Cohn, Founding Member of Agile Alliance and Scrum Alliance

      “A product is something ... that is created and then made available to customers, usually with a distinct name or order number.”

      - TechTarget

      “A product is the physical object ... , software or service from which customer gets direct utility plus a number of other factors, services, and perceptions that make the product useful, desirable [and] convenient.”

      - Mark Curphey

      Organizations need a common understanding of what a product is and how it pertains to the business. This understanding needs to be accepted across the organization.

      “There is not a lot of guidance in the industry on how to define [products]. This is dangerous because what will happen is that product backlogs will be formed in too many areas. All that does is create dependencies and coordination across teams … and backlogs.”

      – Chad Beier, "How Do You Define a Product?” Scrum.org

      Products and services share the same foundation and best practices

      For the purpose of this blueprint, product/service and product owner/service owner are used interchangeably. Product is used for consistency but would apply to services as well.

      Product = Service

      “Product” and “service” are terms that each organization needs to define to fit its culture and customers (internal and external). The most important aspect is consistent use and understanding of:

      • External products
      • Internal products
      • External services
      • Internal services
      • Products as a service (PaaS)
      • Productizing services (SaaS)

      Recognize the different product owner perspectives

      Business:

      • Customer facing, revenue generating

      Technical:

      • IT systems and tools

      Operations

      • Keep the lights on processes

      Info-Tech Best Practice

      Product owners must translate needs and constraints from their perspective into the language of their audience. Kathy Borneman, Digital Product Owner at SunTrust Bank, noted the challenges of finding a common language between lines of business and IT (e.g. what is a unit?).

      Info-Tech Insight

      Recognize that product owners represent one of three primary perspectives. Although all share the same capabilities, how they approach their responsibilities is influenced by their perspective.

      “A Product Owner in its most beneficial form acts like an Entrepreneur, like a 'mini-CEO'. The Product Owner is someone who really 'owns' the product.”

      – Robbin Schuurman, “Tips for Starting Product Owners”

      Your product definition should include everything required to support it, not just what users see.

      A picture of an iceburg is shown, showing the ice both above and below the water to demonstrate that the product definition should include everything, not just what users see. On top of the picture are various words to go with the product definition. They inlude: funding, external relationships, adoption, product strategy, stakeholder managment. The product defitions that may not be seen include: Product governance, business functionality, user support, managing and governing data, maintenance and enhancement, R-and-D, requirements analysis and design, code, and knowledge management.

      Establish where product management would be beneficial in the organization

      What does not need product ownership?

      • Individual features
      • Transactions
      • Unstructured data
      • One-time solutions
      • Non-repeatable processes
      • Solutions that have no users or consumers
      • People or teams

      Characteristics of a discrete product

      • Has end users or consumers
      • Delivers quantifiable value
      • Evolves or changes over time
      • Has predictable delivery
      • Has definable boundaries
      • Has a cost to produce and operate

      Product capabilities deliver value!

      These are the various facets of a product. As a product owner, you are responsible for managing these facets through your capabilities and activities.

      A flowchart is shown that demonstrates the various facets of a product.

      It is easy to lose sight of what matters when we look at a product from a single point of view. Despite what The Agile Manifesto says, working software is not valuable without the knowledge and support that people need in order to adopt, use, and maintain it. If you build it, they will not come. Product leaders must consider the needs of all stakeholders when designing and building products.

      Define product value by aligning backlog delivery with roadmap goals

      In each product plan, the backlogs show what you will deliver. Roadmaps identify when and in what order you will deliver value, capabilities, and goals.

      An image is shown to demonstrate the relationship between the product backlog and the product roadmap.

      Product roadmaps guide delivery and communicate your strategy

      In Deliver on Your Digital Product Vision, we demonstrate how the product roadmap is core to value realization. The product roadmap is your communicated path, and as a product owner, you use it to align teams and changes to your defined goals while aligning your product to enterprise goals and strategy.

      An example of a product roadmap is shown to demonstrate how it is the core to value realization.

      Info-Tech Insight

      The quality of your product backlog – and your ability to realize business value from your delivery pipeline – is directly related to the input, content, and prioritization of items in your product roadmap.

      What is a product?

      Not all organizations will define products in the same way. Take this as a general example:

      “A tangible solution, tool, or service (physical or digital) that enables the long-term and evolving delivery of value to customers and stakeholders based on business and user requirements.”

      Info-Tech Insight

      A proper definition of product recognizes three key facts:

      1. Products are long-term endeavors that don’t end after the project finishes.
      2. Products are not just “apps” but can be software or services that drive the delivery of value.
      3. There is more than one stakeholder group that derives value from the product or service.

      1.2.1 Define “product” in your context

      30-60 minutes

      1. Discuss what “product” means in your organization.
      2. Create a common, enterprise-wide definition for “product.”
      3. Record the results in the Deliver Digital Products at Scale Workbook.

      For example:

      • An application, platform, or application family.
      • Discrete items that deliver value to a user/customer.

      Output

      • Your enterprise/organizational definition of products and services

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      1.2.2 Identify and establish a pilot list of products

      1-2 hours

      1. Review any current documented application inventory. If you have these details in an existing document, share it with the team. Select the group of applications for your family scaling pilot.
      2. List your initial application inventory on the Product List tab of the Deliver Digital Products at Scale Workbook.
    • For each of the products listed, add the vision and goals of the product. Refer to Deliver on Your Digital Product Vision to learn more about identifying vision and goals or to complete the product vision canvas.
    • You’ll add business capabilities and vision in Phase 2, but you can add these now if they are available in your existing inventory.
    • Output

      • A pilot list of active products

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      Phase 2

      Organize Products Into Product Families

      Phase 1Phase 2Phase 3Phase 4Phase 5

      1.1 Understand the organizational factors driving product-centric delivery

      1.2 Establish your organization’s product inventory

      2.1 Determine your approach to scale product families

      2.2 Define your product families

      3.1 Leverage product family roadmaps

      3.2 Use stakeholder management to improve roadmap communication

      3.3 Configure your product family roadmaps

      3.4 Confirm product family to product alignment

      4.1 Assess your organization’s delivery readiness

      4.2 Understand your delivery options

      4.3 Determine your operating model

      4.4 Identify how to fund product family delivery

      5.1 Learn how to introduce your digital product family strategy

      5.2 Communicate changes on updates to your strategy

      5.3 Determine your next steps

      This phase will walk you through the following activities:

      2.1.1 Define your scaling principles and goals

      2.1.2 Define your pilot product family areas and direction

      2.2.1 Arrange your applications and services into product families

      2.2.2 Define enabling and supporting applications

      2.2.3 Build your product family canvas

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Step 2.1

      Determine your approach to scale product families

      Activities

      2.1.1 Define your scaling principles and goals

      2.1.2 Define your pilot product family areas and direction

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Outcomes of this step

      • List of product scaling principles
      • Scope of product scaling pilot and target areas
      • Scaling approach and direction

      Use consistent terminology for product and service families

      In this blueprint, we refer to any grouping of products or services as a “family.” Your organization may prefer other terms, such as product/service line, portfolio, group, etc. The underlying principles for grouping and managing product families are the same, so define the terminology that fits best with your culture. The same is true for “products” and “services,” which may also be referred to in different terms.

      An example flowchart is displayed to demonstrate the terminology for product and service families.

      A product family is a logical and operational grouping of related products or services. The grouping provides a scaled hierarchy to translate goals, priorities, strategy, and constraints down the grouping while aligning value realization upwards.

      Group product families by related purpose to improve business value

      Families should be scaled by how the products operationally relate to each other, with clear boundaries and common purpose.

      A product family contains...

      • Vision
      • Goals
      • Cumulative roadmap of the products within the family

      A product family can be grouped by...

      • Function
      • Value stream and capability
      • Customer segments or end-user group
      • Strategic purpose
      • Underlying architecture
      • Common technology or support structures
      • And many more
      A flowchart is shown to demonstrate the product family and product relations.

      Scale products into related families to improve value delivery and alignment

      Defining product families builds a network of related products into coordinated value delivery streams.

      A flowchart is shown to demonstrate the relations between product family and the delivery streams.

      “As with basic product management, scaling an organization is all about articulating the vision and communicating it effectively. Using a well-defined framework helps you align the growth of your organization with that of the company. In fact, how the product organization is structured is very helpful in driving the vision of what you as a product company are going to do.”

      – Rich Mironov, Mironov Consulting

      Product families translate enterprise goals into value-enabling capabilities

      A flowchart is shown to demonstrate the relationship between enterprise strategy and enabling capabilities.

      Info-Tech Insight

      Your organizational goals and strategy are achieved through capabilities that deliver value. Your product hierarchy is the mechanism to translate enterprise goals, priorities, and constraints down to the product level where changes can be made.

      Arrange product families by operational groups, not solely by your org chart

      A flowchart is shown to demonstrate how to arrange product families by operational groups.

      1. To align product changes with enterprise goals and priorities, you need to organize your products into operational groups based on the capabilities or business functions the product and family support.

      2. Product managers translate these goals, priorities, and constraints into their product families, so they are actionable at the next level, whether that level is another product family or products implementing enhancements to meet these goals.

      3. The product family manager ensures that the product changes enhance the capabilities that allow you to realize your product family, division, and enterprise goals.

      4. Enabling capabilities realize value and help reach your goals, which then drives your next set of enterprise goals and strategy.

      Product families need owners with a more strategic focus

      Product Owner

      (More tactical product delivery focus)

      • Backlog management and prioritization
      • Product vision and product roadmap
      • Epic/story definition, refinement in conjunction with business stakeholders
      • Sprint planning with Scrum Master and delivery team
      • Working with Scrum Master to minimize disruption to team velocity
      • Ensuring alignment between business and Scrum teams during sprints
      • Profit and loss (P&L) product analysis and monitoring

      Product Manager

      (More strategic product family focus)

      • Product strategy, positioning, and messaging
      • Product family vision and product roadmap
      • Competitive analysis and positioning
      • New product innovation/definition
      • Release timing and focus (release themes)
      • Ongoing optimization of product-related marketing and sales activities
      • P&L product analysis and monitoring

      Info-Tech Insight

      “Product owner” and “product manager” are terms that should be adapted to fit your culture and product hierarchy. These are not management relationships but rather a way to structure related products and services that touch the same end users. Use the terms that work best in your culture.

      Download Build a Better Product Owner for role support.

      2.1.1 Define your scaling principles and goals

      30-60 minutes

      1. Discuss the guiding principles for your product scaling model. Your guiding principles should consider key business priorities, organizational culture, and division/team objectives, such as improving:
      • Business agility and ability to respond to changes and needs.
      • Alignment of product roadmaps to enterprise goals and priorities.
      • Collaboration between stakeholders and product delivery teams.
      • Resource utilization and productivity.
      • The quality and value of products.
      • Coordination between related products and services.

      Output

      • List of product scaling principles

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      Start scaling with a pilot

      You will likely use a combination of patterns that work best for each product area. Pilot your product scaling with a domain, team, or functional area before organizing your entire portfolio.

      Learn more about each pattern.

      Discuss the pros and cons of each.

      Select a pilot product area.

      Select a pattern.

      Approach alignment from both directions, validating by the opposite way

      Defining your product families is not a one-way street. Often, we start from either the top or the bottom depending on our scaling principles. We use multiple patterns to find the best arrangement and grouping of our products and families.

      It may be helpful to work partway, then approach your scaling from the opposite direction, meeting in the middle. This way you are taking advantage of the strengths in both approaches.

      Once you have your proposed structure, validate the grouping by applying the principles from the opposite direction to ensure each product and family is in the best starting group.

      As the needs of your organization change, you may need to realign your product families into your new business architecture and operational structure.

      A top-down alignment example is shown.

      When to use: You have a business architecture defined or clear market/functional grouping of value streams.

      A bottom-up alignment example is shown.

      When to use: You are starting from an Application Portfolio Management application inventory to build or validate application families.

      Top-down examples: Start with your enterprise structure or market grouping

      A top-down example flowchart is shown.

      Examples:

      Market Alignment
      • Consumer Banking
        • DDA: Checking, Savings, Money Market
        • Revolving Credit: Credit Cards, Line of Credit
        • Term Credit: Mortgage, Auto, Boat, Installment
      Enterprise Applications
      • Human Resources
        • Benefits: Health, Dental, Life, Retirement
        • Human Capital: Hiring, Performance, Training
        • Hiring: Posting, Interviews, Onboarding
      Shared Service
      • End-User Support
        • Desktop: New Systems, Software, Errors
        • Security: Access Requests, Password Reset, Attestations
      Business Architecture
      • Value Stream
        • Capability
          • Applications
          • Services

      Bottom-up examples: Start with your inventory

      Based on your current inventory, start organizing products and services into related groups using one of the five scaling models discussed in the next step.

      A bottom-up example flowchart is shown.

      Examples:

      Technical Grouping
      • Custom Apps: Java, .NET, Python
      • Cloud: Azure, AWS, Virtual Environments
      • Low Code: ServiceNow, Appian
      Functional/Capability Grouping
      • CRM: Salesforce, Microsoft CRM
      • Security Platforms: IAM, SSO, Scanning
      • Workflow: Remedy, ServiceNow
      Shared Services Grouping
      • Workflow: Appian, Pega, ServiceNow
      • Collaboration: SharePoint, Teams
      • Data: Dictionary, Lake, BI/Reporting

      2.1.2 Define your pilot product family areas and direction

      30-60 minutes

      1. Using your inventory of products for your pilot, consider the top-down and bottom-up approaches.
      2. Identify areas where you will begin arranging your product into families.
      3. Prioritize these pilot areas into waves:
        1. First pilot areas
        2. Second pilot areas
        3. Third pilot areas
      4. Discuss and decide whether a top-down or bottom-up approach is the best place to start for each pilot group.
      5. Prioritize your pilot families in the order in which you want to organize them. This is a guide to help you get started, and you may change the order during the scaling pattern exercise.

      Output

      • Scope of product scaling pilot and target areas

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      Step 2.2

      Define your product families

      Activities

      2.2.1 Arrange your applications and services into product families

      2.2.2 Define enabling and supporting applications

      2.2.3 Build your product family canvas

      This step involves the following participants:

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers’
      • Business analysts

      Outcomes of this step

      • Product family mapping
      • Product families
      • Enabling applications
      • Dependent applications
      • Product family canvas

      Use three perspectives to guide scaling pattern selection

      • One size does not fit all. There is no single or static product model that fits all product teams.
      • Structure relationships based on your organizational needs and capabilities.
      • Be flexible. Product ownership is designed to enable value delivery.
      • Avoid structures that promote proxy product ownership.
      • Make decisions based on products and services, not people. Then assign people to the roles.
      Alignment perspectives:

      Value Stream

      Align products based on the defined sources of value for a collection of products or services.

      For example: Wholesale channel for products that may also be sold directly to consumers, such as wireless network service.

      Users/Consumers

      Align products based on a common group of users or product consumers.

      For example: Consumer vs. small business vs. enterprise customers in banking, insurance, and healthcare.

      Common Domain

      Align products based on a common domain knowledge or skill set needed to deliver and support the products.

      For example: Applications in a shared service framework supporting other products.

      Leverage patterns for scaling products

      Organizing your products and families is easier when leveraging these grouping patterns. Each is explained in greater detail on the following slides

      Value Stream AlignmentEnterprise ApplicationsShared ServicesTechnicalOrganizational Alignment
      • Business architecture
        • Value stream
        • Capability
        • Function
      • Market/customer segment
      • Line of business (LoB)
      • Example: Customer group > value stream > products
      • Enabling capabilities
      • Enterprise platforms
      • Supporting apps
      • Example: HR > Workday/Peoplesoft > ModulesSupporting: Job board, healthcare administrator
      • Organization of related services into service family
      • Direct hierarchy does not necessarily exist within the family
      • Examples: End-user support and ticketing, workflow and collaboration tools
      • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
      • Often used in combination with Shared Services grouping or LoB-specific apps
      • Examples: Java, .NET, low-code, database, network
      • Used at higher levels of the organization where products are aligned under divisions
      • Separation of product managers from organizational structure no longer needed because the management team owns product management role

      Select the best family pattern to improve alignment

      A flowchart is shown on how to select the best family pattern to improve alignment.

      Use scenarios to help select patterns

      Top-Down

      Bottom-Up

      We have a business architecture defined.

      (See Document Your Business Architecture and industry reference architectures for help.)

      Start with your business architecture

      Start with market segments

      We want to be more customer first or customer centric.

      Start with market segments

      Our organization has rigid lines of business and organizational boundaries.

      Start with LoB structure

      Most products are specific to a business unit or division. Start with LoB structure

      Products are aligned to people, not how we are operationally organized.

      Start with market or LoB structure

      We are focusing on enterprise or enabling applications.

      1. Start with enterprise app and service team

      2. Align supporting apps

      We already have applications and services grouped into teams but want to evaluate if they are grouped in the best families.

      Validate using multiple patterns

      Validate using multiple patterns

      Our applications and services are shared across the enterprise or support multiple products, value streams, or shared capabilities.

      Our applications or services are domain, knowledge, or technology specific.

      Start by grouping inventory

      We are starting from an application inventory. (See the APM Research Center for help.)

      Start by grouping inventory

      Pattern: Value Stream – Capability

      Grouping products into capabilities defined in your business architecture is recommended because it aligns people/processes (services) and products (tools) into their value stream and delivery grouping. This requires an accurate capability map to implement.

      Example:

      • Healthcare is delivered through a series of distinct value streams (top chevrons) and shared services supporting all streams.
      • Diagnosing Health Needs is executed through the Admissions, Testing, Imaging, and Triage capabilities.
      • Products and services are needed to deliver each capability.
      • Shared capabilities can also be grouped into families to better align capability delivery and maturity to ensure that the enterprise goals and needs are being met in each value stream the capabilities support.
      An example is shown to demonstrate how to group products into capabilities.

      Sample business architecture/ capability map for healthcare

      A sample business architecture/capability map for healthcare is shown.

      Your business architecture maps your value streams (value delivered to your customer or user personas) to the capabilities that deliver that value. A capability is the people, processes, and/or tools needed to deliver each value function.

      Defining capabilities are specific to a value stream. Shared capabilities support multiple value streams. Enabling capabilities are core “keep the lights on” capabilities and enterprise functions needed to run your organization.

      See Info-Tech’s industry coverage and reference architectures.

      Download Document Your Business Architecture

      Pattern: Value Stream – Market

      Market/Customer Segment Alignment focuses products into the channels, verticals, or market segments in the same way customers and users view the organization.

      An example is shown to demonstrate how products can be placed into channels, verticals, or market segments.

      Example:

      • Customers want one stop to solve all their issues, needs, and transactions.
      • Banking includes consumer, small business, and enterprise.
      • Consumer banking can be grouped by type of financial service: deposit accounts (checking, savings, money market), revolving credit (credit cards, lines of credit), term lending (mortgage, auto, installment).
      • Each group of services has a unique set of applications and services that support the consumer product, with some core systems supporting the entire relationship.

      Pattern: Value Stream – Line of Business (LoB)

      Line of Business Alignment uses the operational structure as the basis for organizing products and services into families that support each area.

      An example of the operational structure as the basis is shown.

      Example:

      • LoB alignment favors continuity of services, tools, and skills based on internal operations over unified customer services.
      • A hospital requires care and services from many different operational teams.
      • Emergency services may be internally organized by the type of care and emergency to allow specialized equipment and resources to diagnose and treat the patients, relying on support teams for imaging and diagnostics to support care.
      • This model may be efficient and logical from an internal viewpoint but can cause gaps in customer services without careful coordination between product teams.

      Pattern: Enterprise Applications

      A division or group delivers enabling capabilities, and the team’s operational alignment maps directly to the modules/components of an enterprise application and other applications that support the specific business function.

      An example flowchart is shown with enterprise applications.

      Example:

      • Human resources is one corporate function. Within HR, however, there are subfunctions that operate independently.
      • Each operational team is supported by one or more applications or modules within a primary HR system.
      • Even though the teams work independently, the information they manage is shared with or ties into processes used by other teams. Coordination of efforts helps provide a higher level of service and consistency.

      For additional information about HRMS, please download Get the Most Out of Your HRMS.

      Pattern: Shared Services

      Grouping by service type, knowledge area, or technology allows for specialization while families align service delivery to shared business capabilities.

      An example is shown with the shared services.

      Example:

      • Recommended for governance, risk, and compliance; infrastructure; security; end-user support; and shared platforms (workflow, collaboration, imaging/record retention). Direct hierarchies do not necessarily exist within the shared service family.
      • Service groupings are common for service owners (also known as support managers, operations managers, etc.).
      • End-user ticketing comes through a common request system, is routed to the team responsible for triage, and then is routed to a team for resolution.
      • Collaboration tools and workflow tools are enablers of other applications, and product families might support multiple apps or platforms delivering that shared capability.

      Pattern: Technical

      Technical grouping is used in Shared Services or as a family grouping method within a Value Stream Alignment (Capability, Market, LoB) product family.

      An example of technical grouping is shown.

      Example:

      • Within Shared Services, Technical product grouping focuses on domains requiring specific experience and knowledge not common to typical product teams. This can also support insourcing so other product teams do not have to build their own capacity.
      • Within a Market or LoB team, these same technical groups support specific tools and services within that product family only while also specializing in the business domain.
      • Alignment into tool, platform, or skill areas improves delivery capabilities and resource scalability.

      Pattern: Organizational Alignment

      Eventually in your product hierarchy, the management structure functions as the product management team.

      • When planning your product families, be careful determining when to merge product families into the management team structure.
      • Since the goal of scaling products into families is to align product delivery roadmaps to enterprise goals and enable value realization, the primary focus of scaling must be operational.
      • Alignment to the organizational chart should only occur when the product families report into an HR manager who has ownership for the delivery and value realization for all product and services within that family.
      Am example of organizational alignment is shown.

      Download Build a Better Product Owner for role support.

      2.2.1 Arrange your applications and services into product families

      1-4 hours

      1. (Optional but recommended) Define your value streams and capabilities on the App Capability List tab in the Deliver Digital Products at Scale Workbook.
      2. On the Product Families tab, build your product family hierarchy using the following structure:
      • Value Stream > Capability > Family 3 > Family 2 > Family 1 > Product/Service.
      • If you are not using a Value Stream > Capability grouping, you can leave these blank for now.
      A screenshot of the App Capability List in the Deliver Disital Products at Scale Workbook is shown.
    • If you previously completed an application inventory using one of our application portfolio management (APM) resources, you can paste values here. Do not paste cells, as Excel may create a cell reference or replace the current conditional formatting.
    • Output

      • Product family mapping

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      2.2.2 Define enabling and supporting applications

      1-4 hours

      1. Review your grouping from the reverse direction or with different patterns to validate the grouping. Consider each grouping.
      • Does it operationally align the products and families to best cascade enterprise goals and priorities while validating enabling capabilities?
      • In the next phase, when defining your roadmap strategy, you may wish to revisit this phase and adjust as needed.
    • Select and enter enabling or dependent applications to the right of each product.
    • A screenshot from the Deliver Digitial Products at Scale Workbook is shown.

      Output

      • Product families
      • Enabling applications
      • Dependent applications

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Record the results in the Deliver Digital Products at Scale Workbook.

      Use a product canvas to define key elements of your product family

      A product canvas is an excellent tool for quickly providing important information about a product family.

      Product owners/managers

      Provide target state to align child product and product family roadmaps.

      Stakeholders

      Communicate high-level concepts and key metrics with leadership teams and stakeholders.

      Strategy teams

      Use the canvas as a tool for brainstorming, scoping, and ideation.

      Operations teams

      Share background overview to align operational team with end-user value.

      Impacted users

      Refine communication strategy and support based on user impacts and value realization.

      Download Deliver on Your Digital Product Vision.

      Product Family Canvas: Define your core information

      A screenshot of the product family canvas is shown.

      Problem Statement: The problem or need the product family is addressing

      Business Goals: List of business objectives or goals for the product

      Personas/Customers/Users: List of groups who consume the product/service

      Vision: Vision, unique value proposition, elevator pitch, or positioning statement

      Child Product Families or Products: List of product families or products within this family

      Stakeholders: List of key resources, stakeholders, and teams needed to support the product or service

      Download Deliver on Your Digital Product Vision.

      2.2.3 Build your product family canvas

      30-60 minutes

      1. Complete the following fields to build your product family canvas in your Digital Product Family Strategy Playbook:
        1. Product family name
        2. Product family owner
        3. Parent product family name
        4. Problem that the family is intending to solve (For additional help articulating your problem statement, refer to Deliver on Your Digital Product Vision.)
        5. Product family vision/goals (For additional help writing your vision, refer to Deliver on Your Digital Product Vision..)
        6. Child product or product family name(s)
        7. Primary customers/users (For additional help with your product personas, download and complete Deliver on Your Digital Product Vision..)
        8. Stakeholders (If you aren’t sure who your stakeholders are, fill this in after completing the stakeholder management exercises in phase 3.)

      Output

      • Product family canvas

      Participants

      • Product owners
      • Product managers
      • Development team leads
      • Portfolio managers
      • Business analysts

      Record the results in the Digital Product Family Strategy Playbook.

      A screenshot of the Product Family Canvas is shown.

      Phase 3

      Ensure Alignment Between Products and Families

      Phase 1Phase 2Phase 3Phase 4Phase 5

      1.1 Understand the organizational factors driving product-centric delivery

      1.2 Establish your organization’s product inventory

      2.1 Determine your approach to scale product families

      2.2 Define your product families

      3.1 Leverage product family roadmaps

      3.2 Use stakeholder management to improve roadmap communication

      3.3 Configure your product family roadmaps

      3.4 Confirm product family to product alignment

      4.1 Assess your organization’s delivery readiness

      4.2 Understand your delivery options

      4.3 Determine your operating model

      4.4 Identify how to fund product family delivery

      5.1 Learn how to introduce your digital product family strategy

      5.2 Communicate changes on updates to your strategy

      5.3 Determine your next steps

      This phase will walk you through the following activities:

      • 3.1.1 Evaluate your current approach to product family communication
      • 3.2.1 Visualize interrelationships among stakeholders to identify key influencers
      • 3.2.2 Group stakeholders into categories
      • 3.2.3 Prioritize your stakeholders
      • 3.3.1 Define the communication objectives and audience of your product family roadmaps
      • 3.3.2 Identify the level of detail that you want your product family roadmap artifacts to represent
      • 3.4.1 Validate business value alignment between products and their product families

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Business analysts

      Step 3.1

      Leverage product family roadmaps

      Activities

      3.1.1 Evaluate your current approach to product family communication

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • Understanding of what a product family roadmap is
      • Comparison of Info-Tech’s position on product families to how you currently communicate about product families

      Aligning products’ goals with families

      Without alignment between product family goals and their underlying products, you aren’t seeing the full picture.

      An example of a product roadmap is shown to demonstrate how it is the core to value realization.

      Adapted from: Pichler," What Is Product Management?"

      • Aligning product strategy to enterprise goals needs to happen through the product family.
      • A product roadmap has traditionally been used to express the overall intent and visualization of the product strategy.
      • Connecting the strategy of your products with your enterprise goals can be done through the product family roadmap.

      Leveraging product family roadmaps

      It’s more than a set of colorful boxes.

        ✓ Lays out a strategy for your product family.

        ✓ Is a statement of intent for your family of products.

        ✓ Communicates direction for the entire product family and product teams.

        ✓ Directly connects to the organization’s goals.

      However, it is not:

        x Representative of a hard commitment.

        x A simple combination of your current product roadmaps.

        x A technical implementation plan.

      Product family roadmaps

      A roadmap is shown without any changes.

      There is no such thing as a roadmap that never changes.

      Your product family roadmap represents a broad statement of intent and high-level tactics to get closer to the organization’s goals.

      A roadmap is shown with changes.

      All good product family roadmaps embrace change!

      Your strategic intentions are subject to volatility, especially those planned further in the future. The more costs you incur in planning, the more you leave yourself exposed to inefficiency and waste if those plans change.

      Info-Tech Insight

      A good product family roadmap is intended to manage and communicate the inevitable changes as a result of market volatility and changes in strategy.

      Product family roadmaps are more strategic by nature

      While individual product roadmaps can be different levels of tactical or strategic depending on a variety of market factors, your options are more limited when defining roadmaps for product families.

      An image is displayed to show the relationships between product and product family, and how the roadmaps could be tactical or strategic.

      Info-Tech Insight

      Roadmaps for your product family are, by design, less detailed. This does not mean they aren’t actionable! Your product family roadmap should be able to communicate clear intentions around the future delivery of value in both the near and long term.

      Reminder: Your enterprise vision provides alignment for your product family roadmaps

      Not knowing the difference between enterprise vision and goals will prevent you from both dreaming big and achieving your dream.

      Your enterprise vision represents your “north star” – where you want to go. It represents what you want to do.

      • Your enterprise goals represent what you need to achieve in order to reach your enterprise vision.
      • A key element of operationalizing your vision.
      • Your strategy, initiatives, and features will align with one or more goals.

      Download Deliver on Your Digital Product Vision for support.

      Multiple roadmap views can communicate differently, yet tell the same truth

      Audience

      Business/ IT Leaders

      Users/Customers

      Delivery Teams

      Roadmap View

      Portfolio

      Product Family

      Technology

      Objectives

      To provide a snapshot of the portfolio and priority products

      To visualize and validate product strategy

      To coordinate broad technology and architecture decisions

      Artifacts

      Line items or sections of the roadmap are made up of individual products, and an artifact represents a disposition at its highest level.

      Artifacts are generally grouped by product teams and consist of strategic goals and the features that realize those goals.

      Artifacts are grouped by the teams who deliver that work and consist of technical capabilities that support the broader delivery of value for the product family.

      Typical elements of a product family roadmap

      While there are others, these represent what will commonly appear across most family-based roadmaps.

      An example is shown to highlight the typical elements of a product family roadmap.

      GROUP/CATEGORY: Groups are collections of artifacts. In a product family context, these are usually product family goals, value streams, or products.

      ARTIFACT: An artifact is one of many kinds of tangible by-products produced during the delivery of products. For a product family, the artifacts represented are capabilities or value streams.

      MILESTONE: Points in the timeline when established sets of artifacts are complete. This is a critical tool in the alignment of products in a given family.

      TIME HORIZON: Separated periods within the projected timeline covered by the roadmap.

      3.1.1 Evaluate your current approach to product family communication

      1-2 hours

      1. Write down how you currently communicate your intentions for your products and family of products.
      2. Compare and contrast this to how this blueprint defines product families and product family roadmaps.
      3. Consider the similarities and the key gaps between your current approach and Info-Tech’s definition of product family roadmaps.

      Output

      • Your documented approach to product family communication

      Participants

      • Product owners
      • Stakeholders

      Record the results in the Deliver Digital Products at Scale Workbook.

      Step 3.2

      Use stakeholder management to improve roadmap communication

      Activities

      3.2.1 Visualize interrelationships among stakeholders to identify key influencers

      3.2.2 Group stakeholders into categories

      3.2.3 Prioritize your stakeholders

      Info-Tech Note

      If you have done the stakeholder exercises in Deliver on Your Digital Product Vision or Build a Better Product Owner u don’t need to repeat the exercises from scratch.

      You can bring the results forward and update them based on your prior work.

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • Relationships among stakeholders and influencers
      • Categorization of stakeholders and influencers
      • Stakeholder and influencer prioritization

      Reminder: Not everyone is a user!

      USERS

      Individuals who directly obtain value from usage of the product.

      STAKEHOLDERS

      Represent individuals who provide the context, alignment, and constraints that influence or control what you will be able to accomplish.

      FUNDERS

      Individuals both external and internal that fund the product initiative. Sometimes they are lumped in as stakeholders. However, motivations can be different.

      For more information, see Deliver on Your Digital Product Vision.

      A stakeholder strategy is a key part of product family attainment

      A roadmap is only “good” when it effectively communicates to stakeholders. Understanding your stakeholders is the first step in delivering great product family roadmaps.

      A picture is shown that has 4 characters with puzzle pieces, each repersenting a key to product family attainment. The four keys are: Stakeholder management, product lifecycle, project delivery, and operational support.

      Create a stakeholder network map for product roadmaps and prioritization

      Follow the trail of breadcrumbs from your direct stakeholders to their influencers to uncover hidden stakeholders.

      An example stakeholder network map is displayed.

      Legend

      Black arrows: indicate the direction of professional influence

      Dashed green arrows: indicate bidirectional, informal influence relationships

      Info-Tech Insight

      Your stakeholder map defines the influence landscape your product family operates in. It is every bit as important as the teams who enhance, support, and operate your product directly.

      Use connectors to determine who may be influencing your direct stakeholders. They may not have any formal authority within the organization, but they may have informal yet substantial relationships with your stakeholders.

      3.2.1 Visualize interrelationships among stakeholders to identify key influencers

      60 minutes

      1. List direct stakeholders for your product.
      2. Determine the stakeholders of your stakeholders and consider adding each of them to the stakeholder list.
      3. Assess who has either formal or informal influence over your stakeholders; add these influencers to your stakeholder list.
      4. Construct a diagram linking stakeholders and their influencers together.
      • Use black arrows to indicate the direction of professional influence.
      • Use dashed green arrows to indicate bidirectional, informal influence relationships.

      Output

      • Relationships among stakeholders and influencers

      Participants

      • Product owners
      • Stakeholders

      Record the results in the Deliver Digital Products at Scale Workbook.

      Categorize your stakeholders with a prioritization map

      A stakeholder prioritization map helps product leaders categorize their stakeholders by their level of influence and ownership in the product and/or teams.

      An example stakeholder prioritization map is shown.

      There are four areas in the map, and the stakeholders within each area should be treated differently.

      Players – players have a high interest in the initiative and the influence to effect change over the initiative. Their support is critical, and a lack of support can cause significant impediment to the objectives.

      Mediators – mediators have a low interest but significant influence over the initiative. They can help to provide balance and objective opinions to issues that arise.

      Noisemakers – noisemakers have low influence but high interest. They tend to be very vocal and engaged, either positively or negatively, but have little ability to enact their wishes.

      Spectators – generally, spectators are apathetic and have little influence over or interest in the initiative.

      3.2.2 Group stakeholders into categories

      30-60 minutes

      1. Identify your stakeholders’ interest in and influence on your product as high, medium, or low by rating the attributes below.
      2. Map your results to the model below to determine each stakeholder’s category.
      Level of Influence
      • Power: Ability of a stakeholder to effect change.
      • Urgency: Degree of immediacy demanded.
      • Legitimacy: Perceived validity of stakeholder’s claim.
      • Volume: How loud their “voice” is or could become.
      • Contribution: What they have that is of value to you.
      Level of Interest

      How much are the stakeholder’s individual performance and goals directly tied to the success or failure of the product?

      The example stakeholder prioritization map is shown with the stakeholders grouped into the categories.

      Output

      • Categorization of stakeholders and influencers

      Participants

      • Product owners
      • Stakeholders

      Record the results in the Deliver Digital Products at Scale Workbook.

      Prioritize your stakeholders

      There may be too many stakeholders to be able to manage them all. Focus your attention on the stakeholders that matter most.

      Level of Support

      Stakeholder Category

      Supporter

      Evangelist

      Neutral Blocker

      Player

      Critical

      High

      High

      Critical

      Mediator

      Medium

      Low

      Low

      Medium

      Noisemaker

      High

      Medium

      Medium

      High

      Spectator

      Low

      Irrelevant

      Irrelevant

      Low

      Consider the three dimensions for stakeholder prioritization: influence, interest, and support. Support can be determined by answering the following question: How likely is it that this stakeholder would recommend your product?

      These parameters are used to prioritize which stakeholders are most important and should receive your focused attention.

      3.2.3 Prioritize your stakeholders

      30 minutes

      1. Identify the level of support of each stakeholder by answering the following question: How likely is it that this stakeholder would endorse your product?
      2. Prioritize your stakeholders using the prioritization scheme on the previous slide.

      Stakeholder

      Category

      Level of Support

      Prioritization

      CMO

      Spectator

      Neutral

      Irrelevant

      CIO

      Player

      Supporter

      Critical

      Output

      • Stakeholder and influencer prioritization

      Participants

      • Product owners
      • Stakeholders

      Record the results in the Deliver Digital Products at Scale Workbook.

      Define strategies for engaging stakeholders by type

      An example is shown to demonstrate how to define strategies to engage staeholders by type.

      Type

      Quadrant

      Actions

      Players

      High influence, high interest – actively engage

      Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success.

      Mediators

      High influence, low interest – keep satisfied

      They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.

      Noisemakers

      Low influence, high interest – keep informed

      Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.

      Spectators

      Low influence, low interest – monitor

      They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      Info-Tech Insight

      Each group of stakeholders draws attention and resources away from critical tasks. By properly identifying your stakeholder groups, the product owner can develop corresponding actions to manage stakeholders in each group. This can dramatically reduce wasted effort trying to satisfy Spectators and Noisemakers, while ensuring the needs of Mediators and Players are met.

      Step 3.3

      Configure your product family roadmaps

      Activities

      3.3.1 Define the communication objectives and audience of your product family roadmaps

      3.3.2 Identify the level of detail that you want your product family roadmap artifacts to represent

      Info-Tech Note

      If you are unfamiliar with product roadmaps, Deliver on Your Digital Product Vision contains more detailed exercises we recommend you review before focusing on product family roadmaps.

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • An understanding of the key communication objectives and target stakeholder audience for your product family roadmaps
      • A position on the level of detail you want your product family roadmap to operate at

      Your communication objectives are linked to your audience; ensure you know your audience and speak their language

      I want to... I need to talk to... Because they are focused on...
      ALIGN PRODUCT TEAMS Get my delivery teams on the same page. Architects Products Owners PRODUCTS A product that delivers value against a common set of goals and objectives.
      SHOWCASE CHANGES Inform users and customers of product strategy. Bus. Process Owners End Users FUNCTIONALITY A group of functionality that business customers see as a single unit.
      ARTICULATE RESOURCE REQUIREMENTS Inform the business of product development requirements. IT Management Business Stakeholders FUNDING An initiative that those with the money see as a single budget.

      3.3.1 Define the communication objectives and audience of your product family roadmaps

      30-60 minutes

      1. Explicitly state the communication objectives and audience of your roadmap.
      • Think of finishing this sentence: This roadmap is designed for … in order to …
    • You may want to consider including more than a single audience or objective.
    • Example:
    • Roadmap

      Audience

      Statement

      Internal Strategic Roadmap

      Internal Stakeholders

      This roadmap is designed to detail the strategy for delivery. It tends to use language that represents internal initiatives and names.

      Customer Strategic Roadmap

      External Customers

      This roadmap is designed to showcase and validate future strategic plans and internal teams to coordinate the development of features and enablers.

      Output

      • Roadmap list with communication objectives and audience

      Participants

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Record the results in the Deliver Digital Products at Scale Workbook.

      The length of time horizons on your roadmap depend on the needs of the underlying products or families

      Info-Tech InsightAn example timeline is shown.

      Given the relationship between product and product family roadmaps, the product family roadmap needs to serve the time horizons of its respective products.

      This translates into product family roadmaps with timelines that, at a minimum, cover the full scope of the respective product roadmaps.

      Based on your communication objectives, consider different ways to visualize your product family roadmap

      Swimline/Stream-Based roadmap example.

      Swimlane/Stream-Based – Understanding when groups of items intend to be delivered.

      An example is shown that has an overall plan with rough intentions around delivery.

      Now, Next, Later – Communicate an overall plan with rough intentions around delivery without specific date ranges.

      An example of a sunrise roadmap is shown.

      Sunrise Roadmap – Articulate the journey toward a given target state across multiple streams.

      Before connecting your family roadmap to products, think about what each roadmap typically presents

      An example of a product family roadmap is shown and how it can be connected to the products.

      Info-Tech Insight

      Your product family roadmap and product roadmap tell different stories. The product family roadmap represents the overall connection of products to the enterprise strategy, while the product roadmap focuses on the fulfillment of the product’s vision.

      Example: Connecting your product family roadmaps to product roadmaps

      Your roadmaps should be connected at an artifact level that is common between both. Typically, this is done with capabilities, but you can do it at a more granular level if an understanding of capabilities isn’t available.

      Example is shown connecting product family roadmaps to product roadmaps.

      3.3.2 Identify the level of detail that you want your product family roadmap artifacts to represent

      30-60 minutes

      1. Consider the different available artifacts for a product family (goals, value stream, capabilities).
      2. List the roadmaps that you wish to represent.
      3. Based on how you currently articulate details on your product families, consider:
      • What do you want to use as the level of granularity for the artifact? Consider selecting something that has a direct connection to the product roadmap itself (for example, capabilities).
      • For some roadmaps you will want to categorize your artifacts – what would work best in those cases?

      Examples

      Level of Hierarchy

      Artifact Type

      Roadmap 1

      Goals

      Capability

      Roadmap 2

      Roadmap 3

      Output

      • Details on your roadmap granularity

      Participants

      • Product owners
      • Product managers
      • Portfolio managers

      Record the results in the Deliver Digital Products at Scale Workbook.

      Step 3.4

      Confirm goal and value alignment of products and their product families

      Activities

      3.4.1 Validate business value alignment between products and their product families

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Business analysts

      Outcomes of this step

      • Validation of the alignment between your product families and products

      Confirming product to family value alignment

      It isn’t always obvious whether you have the right value delivery alignment between products and product families.

      An example is shown to demonstrate product-to-family-alignment.

      Product-to-family alignment can be validated in two different ways:

      1. Initial value alignment
      2. Confirm the perceived business value at a family level is aligned with what is being delivered at a product level.

      3. Value measurement during the lifetime of the product
      4. Validate family roadmap attainment through progression toward the specified product goals.

      For more detail on calculating business value, see Build a Value Measurement Framework.

      To evaluate a product family’s contribution, you need a common definition of value

      Why is having a common value measure important?

      CIO-CEO Alignment Diagnostic

      A stacked bar graph is shown to demonstrate CIO-CEO Alignment Diagnostic. A bar titled Business Value Metrics is highlighted. 51% had some improvement necessary and 32% had significant improvement necessary.

      Over 700 Info-Tech members have implemented the Balanced Value Measurement Framework.

      “The cynic knows the price of everything and the value of nothing.”

      – Oscar Wilde

      “Price is what you pay. Value is what you get.”

      – Warren Buffett

      Understanding where you derive value is critical to building solid roadmaps.

      All value in your product family is not created equal

      Business value is the value of the business outcome the application produces and how effective the product is at producing that outcome. Dissecting value by the benefit type and the value source allows you to see the many ways in which a product or service brings value to your organization. Capture the value of your products in short, concise statements, like an elevator pitch.

      A business value matrix is shown.

      Increase Revenue

      Product or service functions that are specifically related to the impact on your organization’s ability to generate revenue.

      Reduce Costs

      Reduction of overhead. The ways in which your product limits the operational costs of business functions.

      Enhance Services

      Functions that enable business capabilities that improve the organization’s ability to perform its internal operations.

      Reach Customers

      Application functions that enable and improve the interaction with customers or produce market information and insights.

      Financial Benefits vs. Improved Capabilities

      • Financial Benefit refers to the degree to which the value source can be measured through monetary metrics and is often quite tangible.
      • Human Benefit refers to how a product or service can deliver value through a user’s experience.

      Inward vs. Outward Orientation

      • Inward refers to value sources that have an internal impact and improve your organization’s effectiveness and efficiency in performing its operations.
      • Outward refers to value sources that come from your interaction with external factors, such as the market or your customers.

      3.4.1 Validate business value alignment between products and their product families

      30-60 minutes

      1. Draw the 2x2 Business Value Matrix on a flip chart or open the Business Value Matrix tab in the Deliver Digital Products at Scale Workbook to use in this exercise.
      2. Brainstorm and record the different types of business value that your product and product family produce on the sticky notes (one item per sticky note).
      3. As a team, evaluate how the product value delivered contributes to the product family value delivered. Note any gaps or differences between the two.

      Download and complete Build a Value Measurement Framework for full support in focusing product delivery on business value–driven outcomes.

      A business value matrix is shown.

      Output

      • Confirmation of value alignment between product families and their respective products

      Participants

      • Product owners
      • Product managers

      Record the results in the Deliver Digital Products at Scale Workbook.

      Example: Validate business value alignment between products and their product families

      An example of a business value matrix is shown.

      Measure product value with metrics tied to your business value sources and objectives

      Assign metrics to your business value sources

      Business Value Category

      Source Examples

      Metric Examples

      Profit Generation

      Revenue

      Customer Lifetime Value (LTV)

      Data Monetization

      Average Revenue per User (ARPU)

      Cost Reduction

      Reduce Labor Costs

      Contract Labor Cost

      Reduce Overhead

      Effective Cost per Install (eCPI)

      Service Enablement

      Limit Failure Risk

      Mean Time to Mitigate Fixes

      Collaboration

      Completion Time Relative to Deadline

      Customer and Market Reach

      Customer Satisfaction

      Net Promoter Score

      Customer Trends

      Number of Customer Profiles

      The importance of measuring business value through metrics

      The better an organization is at using business value metrics to evaluate IT’s performance, the more satisfied the organization is with IT’s performance as a business partner. In fact, those that say they’re effective at business value metrics have satisfaction scores that are 30% higher than those that believe significant improvements are necessary (Info-Tech’s IT diagnostics).

      Assigning metrics to your prioritized values source will allow you to more accurately measure a product’s value to the organization and identify optimization opportunities. See Info-Tech’s Related Research: Value, Delivery Metrics, Estimation blueprint for more information.

      Your product delivery pipeline connects your roadmap with business value realization

      The effectiveness of your product roadmap needs to be evaluated based on delivery capacity and throughput.

      A product roadmap is shown with additional details to demonstrate delivery capacity and throughput.

      When thinking about product delivery metrics, be careful what you ask for…

      As the saying goes “Be careful what you ask for, because you will probably get it.”

      Metrics are powerful because they drive behavior.

      • Metrics are also dangerous because they often lead to unintended negative outcomes.
      • Choose your metrics carefully to avoid getting what you asked for instead of what you intended.

      It’s a cautionary tale that also offers a low-risk path through the complexities of metrics use.

      For more information on the use (and abuse) of metrics, see Select and Use SDLC Metrics Effectively.

      Measure delivery and success

      Metrics and measurements are powerful tools to drive behavior change and decision making in your organization. However, metrics are highly prone to creating unexpected outcomes, so use them with great care. Use metrics judiciously to uncover insights but avoid gaming or ambivalent behavior, productivity loss, and unintended consequences.

      Build good practices in your selection and use of metrics:

      • Choose the metrics that are as close to measuring the desired outcome as possible.
      • Select the fewest metrics possible and ensure they are of the highest value to your team, the safest from gaming behaviors and unintended consequences, and the easiest to gather and report.
      • Never use metrics for reward or punishment; use them to develop your team.
      • Automate as much metrics gathering and reporting as possible.
      • Focus on trends rather than precise metrics values.
      • Review and change your metrics periodically.

      Phase 4

      Bridge the Gap Between Product Families and Delivery

      Phase 1Phase 2Phase 3Phase 4Phase 5

      1.1 Understand the organizational factors driving product-centric delivery

      1.2 Establish your organization’s product inventory

      2.1 Determine your approach to scale product families

      2.2 Define your product families

      3.1 Leverage product family roadmaps

      3.2 Use stakeholder management to improve roadmap communication

      3.3 Configure your product family roadmaps

      3.4 Confirm product family to product alignment

      4.1 Assess your organization’s delivery readiness

      4.2 Understand your delivery options

      4.3 Determine your operating model

      4.4 Identify how to fund product family delivery

      5.1 Learn how to introduce your digital product family strategy

      5.2 Communicate changes on updates to your strategy

      5.3 Determine your next steps

      This phase will walk you through the following activities:

      4.1.1 Assess your organization’s readiness to deliver digital product families

      4.2.1 Consider pros and cons for each delivery model relative to how you wish to deliver

      4.3.1 Understand the relationships between product management, delivery teams, and stakeholders

      4.4.1 Discuss traditional vs. product-centric funding methods

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Delivery managers

      Assess the impacts of product-centric delivery on your teams and org design

      Product delivery can exist within any org structure or delivery model. However, when making the shift toward product management, consider optimizing your org design and product team structure to match your capacity and throughput needs.

      A flowchart is shown to see how the impacts of product-centric delivery can impact team and org designs.

      Info-Tech Note

      Realigning your delivery pipeline and org design takes significant effort and time. Although we won’t solve these questions here, it’s important to identify factors in your current or future models that improve value delivery.

      Step 4.1

      Assess your organization’s delivery readiness

      Activities

      4.1.1 Assess your organization’s readiness to deliver digital product families

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Delivery managers

      Outcomes of this step

      • An understanding of the group’s maturity level when it comes to product delivery

      Maturing product practices enables delivery of product families, not just products or projects

      A flowchart is shown to demonstrate the differences between project lifecycle, hybrid lifecycle, and product lifecycle.

      Just like product owners, product family owners are needed to develop long-term product value, strategy, and delivery. Projects can still be used as the source of funding and change management; however, the product family owner must manage product releases and operational support. The focus of this section will be on aligning product families to one or more releases.

      4.1.1 Assess your organization’s readiness to deliver digital product families

      30-60 minutes

      1. For each question in the Deliver Digital Products at Scale Readiness Assessment, ask yourself which of the five associated maturity statements most closely describes your organization.
      2. As a group, agree on your organization’s current readiness score for each of the six categories.

      A screenshot of the Deliver Digital Products at Scale Readiness Assessment is shown.

      Output

      • Product delivery readiness score

      Participants

      • Product managers
      • Product owners

      Download the Deliver Digital Products at Scale Readiness Assessment.

      Value realization is constrained by your product delivery pipeline

      Value is realized through changes made at the product level. Your pipeline dictates the rate, quality, and prioritization of your backlog delivery. This pipeline connects your roadmap goals to the value the goals are intended to provide.

      An example of a product roadmap is shown with the additional details of the product delivery pipeline being highlighted.

      Product delivery realizes value for your product family

      While planning and analysis are done at the family level, work and delivery are done at the individual product level.

      PRODUCT STRATEGY

      What are the artifacts?

      What are you saying?

      Defined at the family level?

      Defined at the product level?

      Vision

      I want to...

      Strategic focus

      Delivery focus

      Goals

      To get there we need to...

      Roadmap

      To achieve our goals, we’ll deliver...

      Backlog

      The work will be done in this order...

      Release Plan

      We will deliver in the following ways...

      Step 4.2

      Understand your delivery options

      Activities

      4.2.1 Consider pros and cons for each delivery model relative to how you wish to deliver

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Delivery managers

      Outcomes of this step

      • An understanding of the different team configuration options when it comes to delivery and their relevance to how you currently work

      Define the scope of your product delivery strategy

      The goal of your product delivery strategy is to establish streamlined, enforceable, and standardized product management and delivery capabilities that follow industry best practices. You will need to be strategic in how and where you implement your changes because this will set the stage for future adoption. Strategically select the most appropriate products, roles, and areas of your organization to implement your new or enhanced capabilities and establish a foundation for scaling.

      Successful product delivery requires people who are knowledgeable about the products they manage and have a broad perspective of the entire delivery process, from intake to delivery, and of the product portfolio. The right people also have influence with other teams and stakeholders who are directly or indirectly impacted by product decisions. Involve team members who have expertise in the development, maintenance, and management of your selected products and stakeholders who can facilitate and promote change.

      Learn about different patterns to structure and resource your product delivery teams

      The primary goal of any product delivery team is to improve the delivery of value for customers and the business based on your product definition and each product’s demand. Each organization will have different priorities and constraints, so your team structure may take on a combination of patterns or may take on one pattern and then transform into another.

      Delivery Team Structure Patterns

      How Are Resources and Work Allocated?

      Functional Roles

      Teams are divided by functional responsibilities (e.g. developers, testers, business analysts, operations, help desk) and arranged according to their placement in the software development lifecycle (SDLC).

      Completed work is handed off from team to team sequentially as outlined in the organization’s SDLC.

      Shared Service and Resource Pools

      Teams are created by pulling the necessary resources from pools (e.g. developers, testers, business analysts, operations, help desk).

      Resources are pulled whenever the work requires specific skills or pushed to areas where product demand is high.

      Product or System

      Teams are dedicated to the development, support, and management of specific products or systems.

      Work is directly sent to the teams who are directly managing the product or directly supporting the requester.

      Skills and Competencies

      Teams are grouped based on skills and competencies related to technology (e.g. Java, mobile, web) or familiarity with business capabilities (e.g. HR, finance).

      Work is directly sent to the teams who have the IT and business skills and competencies to complete the work.

      See the flow of work through each delivery team structure pattern

      Four delivery team structures are shown. The four are: functional roles, shared service and resource pools, product or system, and skills and competencies.

      Staffing models for product teams

      Functional Roles Shared Service and Resource Pools Product or System Skills and Competencies
      A screenshot of the functional roles from the flow of work example is shown. A screenshot of the shared service and resource pools from the flow of work example is shown. A screenshot of the product or system from the flow of work example is shown. A screenshot of skills and competencies from the flow of work example is shown.
      Pros
        ✓ Specialized resources are easier to staff

        ✓ Product knowledge is maintained

        ✓ Flexible demand/capacity management

        ✓ Supports full utilization of resources

        ✓ Teams are invested in the full life of the product

        ✓ Standing teams enable continuous improvement

        ✓ Teams are invested in the technology

        ✓ Standing teams enable continuous improvement

      Cons
        x Demand on specialists can create bottlenecks

        x Creates barriers to collaboration

        x Unavailability of resources can lead to delays

        x Product knowledge can be lost as resources move

        x Changes in demand can lead to downtime

        x Cross-functional skills make staffing a challenge

        x Technology bias can lead to the wrong solution

        x Resource contention when team supports multiple solutions

      Considerations
        ! Product owners must break requests down into very small components to support Agile delivery as mini-Waterfalls
        ! Product owners must identify specialist requirements in the roadmap to ensure resources are available
        ! Product owners must ensure that there is a sufficient backlog of valuable work ready to keep the team utilized
        ! Product owners must remain independent of technology to ensure the right solution is built
      Use Case
      • When you lack people with cross-functional skills
      • When you have specialists such as those skilled in security and operations who will not have full-time work on the product
      • When you have people with cross-functional skills who can self-organize around the request
      • When you have a significant investment in a specific technology stack

      4.2.1 Consider pros and cons for each delivery model relative to how you wish to deliver

      1. Document your current staffing model for your product delivery teams.
      2. Evaluate the pros and cons of each model, as specified on the previous slide, relative to how you currently work.
      3. What would be the ideal target state for your team? If one model does not completely fit, is there a hybrid option worth considering? For example: Product-Based combined with Shared Service/Resource Pools for specific roles.

      Functional Roles

      Teams are divided by functional responsibilities (e.g. developers, testers, business analysts, operations, help desk) and arranged according to their placement in the software development lifecycle (SDLC).

      Shared Service and Resource Pools

      Teams are created by pulling the necessary resources from pools (e.g. developers, testers, business analysts, operations, help desk).

      Product or System

      Teams are dedicated to the development, support, and management of specific products or systems.

      Skills and Competencies

      Teams are grouped based on skills and competencies related to technology (e.g. Java, mobile, web) or familiarity with business capabilities (e.g. HR, finance).

      Output

      • An understanding of pros and cons for each delivery model and the ideal target state for your team

      Participants

      • Product managers
      • Product owners

      Record the results in the Digital Product Family Strategy Playbook.

      Step 4.3

      Determine your operating model

      Activities

      4.3.1 Understand the relationships between product management, delivery teams, and stakeholders

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Delivery managers

      Outcomes of this step

      • An understanding of the potential operating models and what will work best for your organization

      Reminder: Patterns for scaling products

      The alignment of your product families should be considered in your operating model.

      Value Stream Alignment

      Enterprise Applications

      Shared Services

      Technical

      Organizational Alignment

      • Business architecture
        • Value stream
        • Capability
        • Function
      • Market/customer segment
      • Line of business (LoB)
      • Example: Customer group > value stream > products
      • Enabling capabilities
      • Enterprise platforms
      • Supporting apps
      • Example: HR > Workday/Peoplesoft > ModulesSupporting: Job board, healthcare administrator
      • Organization of related services into service family
      • Direct hierarchy does not necessarily exist within the family
      • Examples: End-user support and ticketing, workflow and collaboration tools
      • Domain grouping of IT infrastructure, platforms, apps, skills, or languages
      • Often used in combination with Shared Services grouping or LoB-specific apps
      • Examples: Java, .NET, low-code, database, network
      • Used at higher levels of the organization where products are aligned under divisions
      • Separation of product managers from organizational structure no longer needed because the management team owns product management role

      Ensure consistency in the application of your design principles with a coherent operating model

      What is an operating model?

      An operating model is an abstract visualization, used like an architect’s blueprint, that depicts how structures and resources are aligned and integrated to deliver on the organization’s strategy. It ensures consistency of all elements in the organizational structure through a clear and coherent blueprint before embarking on detailed organizational design

      The visual should highlight which capabilities are critical to attaining strategic goals and clearly show the flow of work so that key stakeholders can understand where inputs flow in and outputs flow out of the IT organization.

      An example of an operating model is shown.

      For more information, see Redesign Your IT Organizational Structure.

      Weigh the pros and cons of IT operating models to find the best fit

      1. LoB/Product Aligned – Decentralized Model: Line of Business, Geographically, Product, or Functionally Aligned
      2. A decentralized IT operating model that embeds specific functions within LoBs/product teams and provides cross-organizational support for their initiatives.

      3. Hybrid Functional: Functional/Product Aligned
      4. A best-of-both-worlds model that balances the benefits of centralized and decentralized approaches to achieve both customer responsiveness and economies of scale.

      5. Hybrid Service Model: Product-Aligned Operating Model
      6. A model that supports what is commonly referred to as a matrix organization, organizing by highly related service categories and introducing the role of the service owner.

      7. Centralized: Plan-Build-Run
      8. A highly typical IT operating model that focuses on centralized strategic control and oversight in delivering cost-optimized and effective solutions.

      9. Centralized: Demand-Develop-Service
      10. A centralized IT operating model that lends well to more mature operating environments. Aimed at leveraging economies of scale in an end-to-end services delivery model.

      There are many different operating models. LoB/Product Aligned and Hybrid Functional align themselves most closely with how products and product families are typically delivered.

      Decentralized Model: Line of Business, Geographically, Product, or Functionally Aligned

      An example of a decentralized model is shown.

      BENEFITS

      DRAWBACKS

      • Organization around functions (FXN) allows for diversity in approach in how areas are run to best serve specific business units needs.
      • Each functional line exists largely independently, with full capacity and control to deliver service at the committed service level agreements.
      • Highly responsive to shifting needs and demands with direct connection to customers and all stages of the solution development lifecycle.
      • Accelerates decision making by delegating authority lower into the FXN.
      • Promotes a flatter organization with less hierarchy and more direct communication with the CIO.
      • Less synergy and integration across what different lines of business are doing can result in redundancies and unnecessary complexity.
      • Higher overall cost to the IT group due to role and technology duplication across different FXN.
      • Inexperience becomes an issue; requires more competent people to be distributed across the FXN.
      • Loss of sight of the big picture – difficult to enforce standards around people/process/technology with solution ownership within the FXN.

      For more information, see Redesign your IT Organizational Structure.

      Hybrid Model: Functional/Product Aligned

      An example of a hybrid model: functional/product aligned is shown.

      BENEFITS

      DRAWBACKS

      • Best of both worlds of centralization and decentralization; attempts to channel benefits from both centralized and decentralized models.
      • Embeds key IT functions that require business knowledge within functional areas, allowing for critical feedback.
      • Balances a holistic IT strategy and architecture with responsiveness to needs of the organization.
      • Achieves economies of scale where necessary through the delivery of shared services that can be requested by the function.
      • May result in excessive cost through role and system redundancies across different functions
      • Business units can have variable levels of IT competence; may result in different levels of effectiveness.
      • No guaranteed synergy and integration across functions; requires strong communication, collaboration, and steering.
      • Cannot meet every business unit’s needs – can cause tension from varying effectiveness of the IT functions placed within the functional areas.

      For more information, see Redesign your IT Organizational Structure.

      Hybrid Model: Product-Aligned Operating Model

      An example of a hybrid model: product-aligned operating model.

      BENEFITS

      DRAWBACKS

      • Focus is on the full lifecycle of a product – takes a strategic view of how technology enables the organization.
      • Promotes centralized backlog around a specific value creator, rather than traditional project focus, which is more transactional.
      • Dedicated teams around the product family ensure that you have all of the resources required to deliver on your product roadmap.
      • Reduces barriers between IT and business stakeholders, focuses on technology as a key strategic enabler.
      • Delivery is largely done through a DevOps methodology.
      • Significant business involvement is required for success within this model, with business stakeholders taking an active role in product governance and potentially product management as well.
      • Strong architecture standards and practices are required to make this successful because you need to ensure that product families are building in a consistent manner and limiting application sprawl.
      • Introduced the need for practice standards to drive consistency in quality of delivered services.
      • May result in increased cost through role redundancies across different squads.

      For more information, see Redesign your IT Organizational Structure.

      Centralized: Plan-Build-Run

      An example of a centralized: Plan-Build-Run is shown.

      BENEFITS

      DRAWBACKS

      • Effective at implementing long-term plans efficiently, separates maintenance and projects to allow each to have the appropriate focus.
      • More oversight over financials; better suited for fixed budgets.
      • Works across centralized technology domains to better align with the business's strategic objectives – allows for a top-down approach to decision making.
      • Allows for economies of scale and expertise pooling to improve IT’s efficiency.
      • Well suited for a project-driven environment that employs Waterfall or a hybrid project management methodology that is less iterative.
      • Not optimized for unpredictable/shifting project demands, as decision making is centralized in the plan function.
      • Less agility to deliver new features or solutions to the customer in comparison to decentralized models.
      • Build (developers) and run (operations staff) are far removed from the business, resulting in lower understanding of business needs (as well as “passing the buck” – from development to operations).
      • Requires strong hand-off processes to be defined and strong knowledge transfer from build to run functions in order to be successful.

      For more information, see Redesign your IT Organizational Structure.

      Centralized: Demand-Develop-Service

      An example of a centralized: Demand-Develop-Service model is shown.

      BENEFITS

      DRAWBACKS

      • Aligns well with an end-to-end services model; constant attention to customer demand and service supply.
      • Centralizes service operations under one functional area to serve shared needs across lines of business.
      • Allows for economies of scale and expertise pooling to improve IT’s efficiency.
      • Elevates sourcing and vendor management as its own strategic function; lends well to managed service and digital initiatives.
      • Development and operations housed together; lends well to DevOps-related initiatives.
      • Can be less responsive to business needs than decentralized models due to the need for portfolio steering to prioritize initiatives and solutions.
      • Requires a higher level of operational maturity to succeed; stable supply functions (service mgmt., operations mgmt., service desk, security, data) are critical to maintaining business satisfaction.
      • Requires highly effective governance around project portfolio, services, and integration capabilities.
      • Effective feedback loop highly dependent on accurate performance measures.

      For more information, see Redesign your IT Organizational Structure.

      Assess how your product scaling pattern impacts your resource delivery model

      Value Stream Alignment

      Enterprise Applications

      Shared Services

      Technical

      Plan-Build-Run:
      Centralized

      Pro: Supports established and stable families.

      Con: Command-and-control nature inhibits Agile DevOps and business agility.

      Pro: Supports established and stable families.

      Con: Command-and-control nature inhibits Agile DevOps and business agility.

      Pro: Can be used to align high-level families.

      Con: Lacks flexibility at the product level to address shifting priorities in product demand.

      Pro: Supports a factory model.

      Con: Lacks flexibility at the product level to address shifting priorities in product demand.

      Centralized Model 2:
      Demand-Develop-
      Service

      Pro: Supports established and stable families.

      Con: Command-and-control nature inhibits Agile DevOps and business agility.

      Pro: Supports established and stable families.

      Con: Command-and-control nature inhibits Agile DevOps and business agility.

      Pro: Recommended for aligning high-level service families based on user needs.

      Con: Reduces product empowerment, prioritizing demand. Slow.

      Pro: Supports factory models.

      Con: Reduces product empowerment, prioritizing demand. Slow.

      Decentralized Model:
      Line of Business, Product, Geographically, or

      Functionally Aligned

      Pro: Aligns product families to value streams, capabilities, and organizational structure.

      Con: Reduces shared solutions and may create duplicate apps and services.

      Pro: Enterprise apps treated as distinct LoB groups.

      Con: Reduces shared solutions and may create duplicate apps and services.

      Pro: Complements value stream alignment by consolidating shared apps and services.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Fits within other groupings where technical expertise is needed.

      Con: Creates redundancy between localized and shared technical teams.

      Hybrid Model:
      Functional/Product

      Aligned

      Pro: Supports multiple patterns of product grouping.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Supports multiple patterns of product grouping.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Supports multiple patterns of product grouping.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Supports multiple patterns of product grouping.

      Con: Creates redundancy between localized and shared technical teams.

      Hybrid Model:

      Product-Aligned Operating Model

      Pro: Supports multiple patterns of product grouping.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Supports multiple patterns of product grouping.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Supports multiple patterns of product grouping.

      Con: Requires additional effort to differentiate local vs. shared solutions.

      Pro: Supports multiple patterns of product grouping.

      Con: Creates redundancy between localized and shared technical teams.

      4.3.1 Understand the relationships between product management, delivery teams, and stakeholders

      30-60 minutes

      1. Discuss the intake sources of product work.
      2. Trace the flow of requests down to the functional roles of your delivery team (e.g., developer, QA, operations).
      3. Indicate where key deliverables are produced, particularly those that are built in collaboration.
      4. Discuss the five operating models relative to your current operating model choice. How aligned are you?
      5. Review Info-Tech’s recommendation on the best-aligned operating models for product family delivery. Do you agree or disagree?
      6. Evaluate recommendations against how you operate/work.

      Output

      • Understanding of the relationships between key groups
      • A preferred operating model

      Participants

      • Product owners
      • Product managers
      • Delivery managers

      Record the results in the Digital Product Family Strategy Playbook.

      4.3.1 Understand the relationships between product management, delivery teams, and stakeholders

      An example of activity 4.3.1 to understand the relationships between product management, delivery teams, and stakeholders is shown.

      Output

      • Understanding of the relationships between key groups
      • A preferred operating model

      Participants

      • Product owners
      • Product managers
      • Delivery managers

      Step 4.4

      Identify how to fund product family delivery

      Activities

      4.4.1 Discuss traditional vs. product-centric funding methods

      This step involves the following participants:

      • Product owners
      • Product managers
      • Portfolio managers
      • Delivery managers

      Outcomes of this step

      • An understanding of the differences between product-based and traditional funding methods

      Why is funding so problematic?

      We often still think about funding products like construction projects.

      Three models are shown on the various options to fund projects.

      These models require increasing accuracy throughout the project lifecycle to manage actuals vs. estimates.

      "Most IT funding depends on one-time expenditures or capital-funding mechanisms that are based on building-construction funding models predicated on a life expectancy of 20 years or more. Such models don’t provide the stability or flexibility needed for modern IT investments." – EDUCAUSE

      Reminder: Projects don’t go away. The center of the conversation changes.

      A flowchart is shown to demonstrate the difference between project lifecycle, hybrid lifecycle, and product lifecycle.

      Projects within products

      Regardless of whether you recognize yourself as a product-based or project-based shop, the same basic principles should apply.

      The purpose of projects is to deliver the scope of a product release. The shift to product delivery leverages a product roadmap and backlog as the mechanism for defining and managing the scope of the release.

      Eventually, teams progress to continuous integration/continuous delivery (CI/CD) where they can release on demand or as scheduled, requiring org change management.

      Planning and budgeting for products and families

      Reward for delivering outcomes, not features

      AutonomyFlexibilityAccountability
      Fund what delivers valueAllocate iterativelyMeasure and adjust

      Fund long-lived delivery of value through products (not projects).

      Give autonomy to the team to decide exactly what to build.

      Allocate to a pool based on higher-level business case.

      Provide funds in smaller amounts to different product teams and initiatives based on need.

      Product teams define metrics that contribute to given outcomes.

      Track progress and allocate more (or less) funds as appropriate.

      Info-Tech Insight

      Changes to funding require changes to product and Agile practices to ensure product ownership and accountability.

      The Lean Enterprise Funding Model is an example of a different approach

      An example of the lean enterprise funding model is shown.
      From: Implement Agile Practices That Work

      A flexible funding pool akin to venture capital models is maintained to support innovative ideas and fund proofs of concept for product and process improvements.

      Proofs of concept (POCs) are run by standing innovation teams or a reserve of resources not committed to existing products, projects, or services.

      Every product line has funding for all changes and ongoing operations and support.

      Teams are funded continuously so that they can learn and improve their practices as much as possible.

      Budgeting approaches must evolve as you mature your product operating environment

      TRADITIONAL PROJECTS WITH WATERFALL DELIVERY

      TRADITIONAL PROJECTS WITH AGILE DELIVERY

      PRODUCTS WITH AGILE PROJECT DELIVERY

      PRODUCTS WITH AGILE DELIVERY

      WHEN IS THE BUDGET TRACKED?

      Budget tracked by major phases

      Budget tracked by sprint and project

      Budget tracked by sprint and project

      Budget tracked by sprint and release

      HOW ARE CHANGES HANDLED?

      All change is by exception

      Scope change is routine, budget change is by exception

      Scope change is routine, budget change is by exception

      Budget change is expected on roadmap cadence

      WHEN ARE BENEFITS REALIZED?

      Benefits realization after project completion

      Benefits realization is ongoing throughout the life of the project

      Benefits realization is ongoing throughout the life of the product

      Benefits realization is ongoing throughout life of the product

      WHO “DRIVES”?

      Project Manager

      • Project team delivery role
      • Refines project scope, advocates for changes in the budget
      • Advocates for additional funding in the forecast

      Product Owner

      • Project team delivery role
      • Refines project scope, advocates for changes in the budget
      • Advocates for additional funding in the forecast

      Product Manager

      • Product portfolio team role
      • Forecasting new initiatives during delivery to continue to drive value throughout the life of the product

      Product Manager

    • Product family team role
    • Forecasting new initiatives during delivery to continue to drive value throughout the life of the product
    • Info-Tech Insight

      As you evolve your approach to product delivery, you will be decoupling the expected benefits, forecast, and budget. Managing them independently will improve your ability to adapt to change and drive the right outcomes!

      Your strategy must include the cost to build and operate

      Most investment happens after go-live, not in the initial build!

      An example strategy is displayed that incorporates the concepts of cost to build and operate.

      Adapted from: LookFar

      Info-Tech Insight

      While the exact balance point between development or implementation costs varies from application to application, over 80% of the cost is accrued after go-live.

      Traditional accounting leaves software development CapEx on the table

      Software development costs have traditionally been capitalized, while research and operations are operational expenditures.

      The challenge has always been the myth that operations are only bug fixes, upgrades, and other operational expenditures. Research shows that most post-release work on developed solutions is the development of new features and changes to support material changes in the business. While projects could bundle some of these changes into capital expenditure, much of the business-as-usual work that goes on leaves capital expenses on the table because the work is lumped together as maintenance-related OpEx.

      From “How to Stop Leaving Software CapEx on the Table With Agile and DevOps”

      4.4.1 Discuss traditional vs. product-centric funding methods

      30-60 minutes

      1. Discuss how products and product families are currently funded.
      2. Review how the Agile/product funding models differ from how you currently operate.
      3. What changes do you need to consider in order to support a product delivery model?
      4. For each change, identify the key stakeholders and list at least one action to take.
      5. Record the results in the Digital Product Family Strategy Playbook.

      Output

      • Understanding of funding principles and challenges

      Participants

      • Product owners
      • Product managers
      • Delivery managers

      Record the results in the Digital Product Family Strategy Playbook.

      Phase 5

      Build Your Transformation Roadmap and Communication Plan

      Phase 1Phase 2Phase 3Phase 4Phase 5

      1.1 Understand the organizational factors driving product-centric delivery

      1.2 Establish your organization’s product inventory

      2.1 Determine your approach to scale product families

      2.2 Define your product families

      3.1 Leverage product family roadmaps

      3.2 Use stakeholder management to improve roadmap communication

      3.3 Configure your product family roadmaps

      3.4 Confirm product family to product alignment

      4.1 Assess your organization’s delivery readiness

      4.2 Understand your delivery options

      4.3 Determine your operating model

      4.4 Identify how to fund product family delivery

      5.1 Learn how to introduce your digital product family strategy

      5.2 Communicate changes on updates to your strategy

      5.3 Determine your next steps

      This phase will walk you through the following activities:

      5.1.1 Introduce your digital product family strategy

      5.2.1 Define your communication cadence for your strategy updates

      5.2.2 Define your messaging for each stakeholder

      5.3.1 How do we get started?

      This phase involves the following participants:

      • Product owners
      • Product managers
      • Application leaders
      • Stakeholders

      Step 5.1

      Introduce your digital product family strategy

      Activities

      5.1.1 Introduce your digital product family strategy

      This step involves the following participants:

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Outcomes of this step

      • A completed executive summary presenting your digital product strategy

      Product decisions are traditionally made in silos with little to no cross-functional communication and strategic oversight

      Software delivery teams and stakeholders traditionally make plans, strategies, and releases within their silos and tailor their decisions based on their own priorities. Interactions are typically limited to hand-offs (such as feature requests) and routing of issues and defects back up the delivery pipeline. These silos likely came about through well-intentioned training, mandates, and processes, but they do not sufficiently support today’s need to rapidly release and change platforms.

      Siloed departments often have poor visibility into the activities of other silos, and they may not be aware of the ramifications their decisions have on teams and stakeholders outside of their silo.

      • Silos may make choices that are optimal largely for themselves without thinking of the holistic impact on a platform’s structure, strategy, use cases, and delivery.
      • The business may approve platform improvements without the consideration of the delivery team’s current capacity or the system’s complexity, resulting in unrealistic commitments.
      • Quality standards may be misinterpreted and inconsistently enforced across the entire delivery pipeline.

      In some cases, the only way to achieve greater visibility and communication for all roles across a platform’s lifecycle is implementing an overarching role or team.

      “The majority of our candid conversations with practitioners and project management offices indicate that the platform ownership role is poorly defined and poorly executed.”

      – Barry Cousins

      Practice Lead, Applications – Project & Portfolio Management

      Info-Tech Research Group

      Use stakeholder management and roadmap views to improve communication

      Proactive, clear communication with stakeholders, SMEs, and your product delivery team can significantly improve alignment and agreement with your roadmap, strategy, and vision.

      When building your communication strategy, revisit the work you completed in phase 3 developing your:

      • Roadmap types
      • Stakeholder strategy

      Type

      Quadrant

      Actions

      Players

      High influence, high interest – actively engage

      Keep them updated on the progress of the project. Continuously involve Players in the process and maintain their engagement and interest by demonstrating their value to its success.

      Mediators

      High influence, low interest – keep satisfied

      They can be the game changers in groups of stakeholders. Turn them into supporters by gaining their confidence and trust and including them in important decision-making steps. In turn, they can help you influence other stakeholders.

      Noisemakers

      Low influence, high interest – keep informed

      Try to increase their influence (or decrease it if they are detractors) by providing them with key information, supporting them in meetings, and using Mediators to help them.

      Spectators

      Low influence, low interest – monitor

      They are followers. Keep them in the loop by providing clarity on objectives and status updates.

      5.1.1 Introduce your digital product family strategy

      30-60 minutes

      This exercise is intended to help you lay out the framing of your strategy and the justification for the effort. A lot of these items can be pulled directly from the product canvas you created in phase 2. This is intended to be a single slide to frame your upcoming discussions.

      1. Update your vision, goals, and values on your product canvas. Determine which stakeholders may be impacted and what their concerns are. If you have many stakeholders, limit to Players and Influencers.
      2. Identify what you need from the stakeholders as a result of this communication.
      3. Keeping in mind the information gathered in steps 1 and 2, describe your product family strategy by answering three questions:
      1. Why do we need product families?
      2. What is in our way?
      3. Our first step will be... ?

      Output

      • An executive summary that introduces your product strategy

      Participants

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Record the results in the Digital Product Family Strategy Playbook.

      Example: Scaling delivery through product families

      Why do we need product families?

      • The growth of our product offerings and our company’s movement into new areas of growth mean we need to do a better job scaling our offerings to meet the needs of the organization.

      What is in our way?

      • Our existing applications and services are so dramatically different we are unsure how to bring them together.

      Our first step will be...

      • Taking a full inventory of our applications and services.

      Step 5.2

      Communicate changes on updates to your strategy

      Activities

      5.2.1 Define your communication cadence for your strategy updates

      5.2.2 Define your messaging for each stakeholder

      This step involves the following participants:

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Outcomes of this step

      • A communication plan for when strategy updates need to be given

      5.2.1 Define your communication cadence for your strategy updates

      30 minutes

      Remember the role of different artifacts when it comes to your strategy. The canvas contributes to the What, and the roadmap addresses the How. Any updates to the strategy are articulated and communicated through your roadmap.

      1. Review your currently defined roadmaps, their communication objectives, update frequency, and updates.
      2. Consider the impacted stakeholders and the strategies required to communicate with them.
      3. Fill in your communication cadence and communication method.

      EXAMPLE:

      Roadmap Name

      Audience/Stakeholders

      Communication Cadence

      External Customer Roadmap

      Customers and External Users

      Quarterly (Website)

      Product Delivery Roadmap

      Development Teams, Infrastructure, Architects

      Monthly (By Email)

      Technology Roadmap

      Development Teams, Infrastructure, Architects

      Biweekly (Website)

      Output

      • Clear communication cadence for your roadmaps

      Participants

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Record the results in the Digital Product Family Strategy Playbook.

      The “what” behind the communication

      Leaders of successful change spend considerable time developing a powerful change message, i.e. a compelling narrative that articulates the desired end state and makes the change concrete and meaningful to staff.

      The change message should:

      • Explain why the change is needed.
      • Summarize what will stay the same.
      • Highlight what will be left behind.
      • Emphasize what is being changed.
      • Explain how change will be implemented.
      • Address how change will affect various roles in the organization.
      • Discuss the staff’s role in making the change successful.

      Five elements of communicating change

      1. What is the change?
      2. Why are we doing it?
      3. How are we going to go about it?
      4. How long will it take us to do it?
      5. What is the role for each department and individual?

      Source: Cornelius & Associates

      How we engage with the message is just as important as the message itself

      Why are we here?

      Speak to what matters to them

      Sell the improvement

      Show real value

      Discuss potential fears

      Ask for their support

      Be gracious

      5.2.2 (Optional) Define your messaging for each stakeholder

      30 minutes

      It’s one thing to communicate the strategy, it’s another thing to send the right message to your stakeholders. Some of this will depend on the kind of news given, but the majority of this is dependent on the stakeholder and the cadence of communication.

      1. From exercise 5.2.1, take the information on the specific roadmaps, target audience, and communication cadence.
      2. Based on your understanding of the audience’s needs, what would the specific update try to get across?
      3. Pick a specific typical example of a change in strategy that you have gone through. (e.g. Product will be delayed by a quarter; key feature is being substituted for another.)

      EXAMPLE:

      Roadmap Name

      Audience/ Stakeholder

      Communication Cadence

      Messaging

      External Customer Roadmap

      Customers and External Users

      Quarterly (Website)

      Output

      • Messaging plan for each roadmap type

      Participants

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Record the results in the Digital Product Family Strategy Playbook.

      Step 5.3

      Determine your next steps

      Activities

      5.3.1 How do we get started?

      This step involves the following participants:

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Outcomes of this step

      • Understanding the steps to get started in your transformation

      Make a plan in order to make a plan!

      Consider some of the techniques you can use to validate your strategy.

      Learning Milestones

      Sprint Zero (AKA Project-before-the-project)

      The completion of a set of artifacts dedicated to validating business opportunities and hypotheses.

      Possible areas of focus:

      Align teams on product strategy prior to build

      Market research and analysis

      Dedicated feedback sessions

      Provide information on feature requirements

      The completion of a set of key planning activities, typically the first sprint.

      Possible areas of focus:

      Focus on technical verification to enable product development alignment

      Sign off on architectural questions or concerns

      An image showing the flowchart of continuous delivery of value is shown.

      Go to your backlog and prioritize the elements that need to be answered sooner rather than later.

      Possible areas of focus:

      Regulatory requirements or questions to answer around accessibility, security, privacy.

      Stress testing any new processes against situations that may occur.

      The “Now, Next, Later” roadmap

      Use this when deadlines and delivery dates are not strict. This is best suited for brainstorming a product plan when dependency mapping is not required.

      Now: What are you going to do now?

      Next: What are you going to do very soon?

      Later: What are you going to do in the future?

      An example of a now, next, later roadmap is shown.

      Source: “Tips for Agile product roadmaps & product roadmap examples,” Scrum.org, 2017

      5.3.1 How do we get started?

      30-60 minutes

      1. Identify what the critical steps are for the organization to embrace product-centric delivery.
      2. Group each critical step by how soon you need to address it:
      • Now: Let’s do this ASAP.
      • Next: Sometime very soon, let’s do these things.
      • Later: Much further off in the distance, let’s consider these things.
    • Record the group results in the Deliver Digital Products at Scale Workbook.
    • Record changes for your product and product family in the Digital Product Family Strategy Playbook.
    • An example of a now, next, later roadmap is shown.

      Source: “Tips for Agile product roadmaps & product roadmap examples,” Scrum.org, 2017

      Output

      • Product family transformation critical steps and basic roadmap

      Participants

      • Product owners and product managers
      • Application leaders
      • Stakeholders

      Record the results in the Digital Product Family Strategy Playbook.

      Record the results in the Deliver Digital Products at Scale Workbook.

      Summary of Accomplishment

      Problem Solved

      The journey to become a product-centric organization is not short or easy. Like with any improvement or innovation, teams need to continue to evolve and mature with changes in their operations, teams, tools, and user needs.You’ve taken a big step completing your product family alignment. This provides a backbone for aligning all aspects of your organization to your enterprise goals and strategy while empowering product teams to find solutions closer to the problem. Continue to refine your model and operations to improve value realization and your product delivery pipelines to embrace business agility. Organizations that are most responsive to change will continue to outperform command-and-control leadership.

      If you would like additional support, have our analysts guide you through other phases as part of an Info-Tech workshop.

      Contact your account representative for more information.

      workshops@infotech.com

      1-888-670-8889

      Research Contributors and Experts

      Photo of Emily Archer.

      Emily Archer

      Lead Business Analyst,

      Enterprise Consulting, authentic digital agency

      Emily Archer is a consultant currently working with Fortune 500 clients to ensure the delivery of successful projects, products, and processes. She helps increase the business value returned for organizations’ investments in designing and implementing enterprise content hubs and content operations, custom web applications, digital marketing, and e-commerce platforms.

      Photo of David Berg

      Founder & CTO

      Strainprint Technologies Inc.

      David Berg is a product commercialization expert that has spent the last 20 years of his career delivering product management and business development services across a broad range of industries. Early in his career, David worked with product management and engineering teams to build core network infrastructure products that secure and power the internet we benefit from today. David’s experience also includes working with clean technologies in the area of clean power generation, agritech, and Internet of Things infrastructure. Over the last five years, David has been focused on his latest venture, Strainprint Technologies, a data and analytics company focused on the medical cannabis industry. Strainprint has built the largest longitudinal medical cannabis dataset in the world with the goal to develop an understanding of treatment behavior, interactions, and chemical drivers to guide future product development.

      Kathy Borneman

      Digital Product Owner, SunTrust Bank

      Kathy Borneman is a senior product owner who helps people enjoy their jobs again by engaging others in end-to-end decision making to deliver software and operational solutions that enhance the client experience and allow people to think and act strategically.

      Photro of Charlie Campbell

      Charlie Campbell

      Product Owner, Merchant e-Solutions

      Charlie Campbell is an experienced problem solver with the ability to quickly dissect situations and recommend immediate actions to achieve resolution, liaise between technical and functional personnel to bridge the technology and communication gap, and work with diverse teams and resources to reach a common goal.

      Photo of Yarrow Diamond

      Yarrow Diamond

      Sr. Director, Business Architecture

      Financial Services

      Yarrow Diamond is an experienced professional with expertise in enterprise strategy development, project portfolio management, and business process reengineering across financial services, healthcare and insurance, hospitality, and real estate environments. She has a master’s in Enterprise Architecture from Penn State University, LSSMBB, PMP, CSM, ITILv3.

      Photo of Cari J. Faanes-Blakey

      Cari J. Faanes-Blakey, CBAP, PMI-PBA

      Enterprise Business Systems Analyst,

      Vertex, Inc.

      Cari J. Faanes-Blakey has a history in software development and implementation as a Business Analyst and Project Manager for financial and taxation software vendors. Active in the International Institute of Business Analysis (IIBA), Cari participated on the writing team for the BA Body of Knowledge 3.0 and the certification exam.

      Photo of Kieran Gobey

      Kieran Gobey

      Senior Consultant Professional Services

      Blueprint Software Systems

      Kieran Gobey is an IT professional with 24 years of experience, focused on business, technology, and systems analysis. He has split his career between external and internal customer-facing roles, and this has resulted in a true understanding of what is required to be a Professional Services Consultant. His problem-solving skills and ability to mentor others have resulted in successful software implementations. Kieran’s specialties include deep system troubleshooting and analysis skills, facilitating communications to bring together participants effectively, mentoring, leadership, and organizational skills.

      Photo of Rupert Kainzbauer

      Rupert Kainzbauer

      VP Product, Digital Wallets

      Paysafe Group

      Rupert Kainzbauer is an experienced senior leader with a passion for defining and delivering products that deliver real customer and commercial benefit. Together with a team of highly experienced and motivated product managers, he has successfully led highly complex, multi-stakeholder payments initiatives, from proposition development and solution design through to market delivery. Their domain experience is in building online payment products in high-risk and emerging markets, remittance, prepaid cards, and mobile applications.

      Photo of Saeed Khan

      Saeed Khan

      Founder,

      Transformation Labs

      Saeed Khan has been working in high tech for 30 years in both Canada and the US and has held a number of leadership roles in Product Management over that time. He speaks regularly at conferences and has been writing publicly about technology product management since 2005. Through Transformation Labs, Saeed helps companies accelerate product success by working with product teams to improve their skills, practices, and processes. He is a cofounder of ProductCamp Toronto and currently runs a Meetup group and global Slack community called Product Leaders; the only global community of senior level product executives.

      Photo of Hoi Kun Lo

      Hoi Kun Lo

      Product Owner

      Nielsen

      Hoi Kun Lo is an experienced change agent who can be found actively participating within the IIBA and WITI groups in Tampa, FL and a champion for Agile, architecture, diversity, and inclusion programs at Nielsen. She is currently a Product Owner in the Digital Strategy team within Nielsen Global Watch Technology.

      Photo of Abhishek Mathur

      Abhishek Mathur

      Sr Director, Product Management

      Kasisto, Inc.

      Abhishek Mathur is a product management leader, an artificial intelligence practitioner, and an educator. He has led product management and engineering teams at Clarifai, IBM, and Kasisto to build a variety of artificial intelligence applications within the space of computer vision, natural language processing, and recommendation systems. Abhishek enjoys having deep conversations about the future of technology and helping aspiring product managers enter and accelerate their careers.

      Photo of Jeff Meister

      Jeff Meister

      Technology Advisor and Product Leader

      Jeff Meister is a technology advisor and product leader. He has more than 20 years of experience building and operating software products and the teams that build them. He has built products across a wide range of industries and has built and led large engineering, design, and product organizations. Jeff most recently served as Senior Director of Product Management at Avanade, where he built and led the product management practice. This involved hiring and leading product managers, defining product management processes, solution shaping and engagement execution, and evangelizing the discipline through pitches, presentations, and speaking engagements. Jeff holds a Bachelor’s of Applied Science (Electrical Engineering) and a Bachelor’s of Arts from the University of Waterloo, an MBA from INSEAD (Strategy), and certifications in product management, project management, and design thinking.

      Photo of Vincent Mirabelli

      Vincent Mirabelli

      Principal,

      Global Project Synergy Group

      With over 10 years of experience in both the private and public sectors, Vincent Mirabelli possesses an impressive track record of improving, informing, and transforming business strategy and operations through process improvement, design and re-engineering, and the application of quality to business analysis, project management, and process improvement standards.

      Photo of Oz Nazili

      Oz Nazili

      VP, Product & Growth

      TWG

      Oz Nazili is a product leader with a decade of experience in both building products and product teams. Having spent time at funded startups and large enterprises, he thinks often about the most effective way to deliver value to users. His core areas of interest include Lean MVP development and data-driven product growth.

      Photo of Mark Pearson

      Mark Pearson

      Principal IT Architect, First Data Corporation

      Mark Pearson is an executive business leader grounded in the process, data, technology, and operations of software-driven business. He knows the enterprise software landscape and is skilled in product, technology, and operations design and delivery within information technology organizations, outsourcing firms, and software product companies.

      Photo of Brenda Peshak

      Brenda Peshak

      Product Owner,

      Widget Industries, LLC

      Brenda Peshak is skilled in business process, analytical skills, Microsoft Office Suite, communication, and customer relationship management (CRM). She is a strong product management professional with a Master’s focused in Business Leadership (MBL) from William Penn University.

      Photo of Mike Starkey

      Mike Starkey

      Director of Engineering

      W.W. Grainger

      Mike Starkey is a Director of Engineering at W.W. Grainger, currently focusing on operating model development, digital architecture, and building enterprise software. Prior to joining W.W. Grainger, Mike held a variety of technology consulting roles throughout the system delivery lifecycle spanning multiple industries such as healthcare, retail, manufacturing, and utilities with Fortune 500 companies.

      Photo of Anant Tailor

      Anant Tailor

      Cofounder & Head of Product

      Dream Payments Corp.

      Anant Tailor is a cofounder at Dream Payments where he currently serves as the COO and Head of Product, having responsibility for Product Strategy & Development, Client Delivery, Compliance, and Operations. He has 20+ years of experience building and operating organizations that deliver software products and solutions for consumers and businesses of varying sizes. Prior to founding Dream Payments, Anant was the COO and Director of Client Services at DonRiver Inc, a technology strategy and software consultancy that he helped to build and scale into a global company with 100+ employees operating in seven countries. Anant is a Professional Engineer with a Bachelor’s degree in Electrical Engineering from McMaster University and a certificate in Product Strategy & Management from the Kellogg School of Management at Northwestern University.

      Photo of Angela Weller

      Angela Weller

      Scrum Master, Businessolver

      Angela Weller is an experienced Agile business analyst who collaborates with key stakeholders to attain their goals and contributes to the achievement of the company’s strategic objectives to ensure a competitive advantage. She excels when mediating or facilitating teams.

      Related Info-Tech Research

      Product Delivery

      Deliver on Your Digital Product Vision

      • Build a product vision your organization can take from strategy through execution.

      Build a Better Product Owner

      • Strengthen the product owner role in your organization by focusing on core capabilities and proper alignment.

      Build Your Agile Acceleration Roadmap

      • Quickly assess the state of your Agile readiness and plan your path forward to higher value realization.

      Implement Agile Practices That Work

      • Improve collaboration and transparency with the business to minimize project failure.

      Implement DevOps Practices That Work

      • Streamline business value delivery through the strategic adoption of DevOps practices.

      Extend Agile Practices Beyond IT

      • Further the benefits of Agile by extending a scaled Agile framework to the business.

      Build Your BizDevOps Playbook

      • Embrace a team sport culture built around continuous business-IT collaboration to deliver great products.

      Embed Security Into the DevOps Pipeline

      • Shift security left to get into DevSecOps.

      Spread Best Practices With an Agile Center of Excellence

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Enable Organization-Wide Collaboration by Scaling Agile

      • Execute a disciplined approach to rolling out Agile methods in the organization.

      Application Portfolio Management

      APM Research Center

      • See an overview of the APM journey and how we can support the pieces in this journey.

      Application Portfolio Management for Small Enterprises

      • There is no one-size-fits-all rationalization. Tailor your framework to meet your goals.

      Streamline Application Maintenance

      • Effective maintenance ensures the long-term value of your applications.

      Build an Application Rationalization Framework

      • Manage your application portfolio to minimize risk and maximize value.

      Modernize Your Applications

      • Justify modernizing your application portfolio from both business and technical perspectives.

      Review Your Application Strategy

      • Ensure your applications enable your business strategy.

      Discover Your Applications

      • Most application strategies fail. Arm yourself with the necessary information and team structure for a successful application portfolio strategy.

      Streamline Application Management

      • Move beyond maintenance to ensuring exceptional value from your apps.

      Optimize Applications Release Management

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Embrace Business-Managed Applications

      • Empower the business to implement their own applications with a trusted business-IT relationship.

      Value, Delivery Metrics, Estimation

      Build a Value Measurement Framework

      • Focus product delivery on business value–driven outcomes.

      Select and Use SDLC Metrics Effectively

      • Be careful what you ask for, because you will probably get it.

      Application Portfolio Assessment: End User Feedback

      • Develop data-driven insights to help you decide which applications to retire, upgrade, re-train on, or maintain to meet the demands of the business.

      Create a Holistic IT Dashboard

      • Mature your IT department by measuring what matters.

      Refine Your Estimation Practices With Top-Down Allocations

      • Don’t let bad estimates ruin good work.

      Estimate Software Delivery With Confidence

      • Commit to achievable software releases by grounding realistic expectations.

      Reduce Time to Consensus With an Accelerated Business Case

      • Expand on the financial model to give your initiative momentum.

      Optimize Project Intake, Approval, and Prioritization

      • Deliver more projects by giving yourself the voice to say “no” or “not yet” to new projects.

      Enhance PPM Dashboards and Reports

      • Facilitate ongoing alignment between Agile teams and the business with a set of targeted service offerings.

      Org Design and Performance

      Redesign Your IT Organizational Structure

      • Focus product delivery on business value–driven outcomes.

      Build a Strategic Workforce Plan

      • Have the right people, in the right place, at the right time.

      Implement a New Organizational Structure

      • Reorganizations are inherently disruptive. Implement your new structure with minimal pain for staff while maintaining IT performance throughout the change.

      Improve Employee Engagement to Drive IT Performance

      • Don’t just measure engagement, act on it.

      Set Meaningful Employee Performance Measures

      • Set holistic measures to inspire employee performance.

      Master Organizational Change Management Practices

      • PMOs, if you don't know who is responsible for org change, it's you.

      Bibliography (Product Management)

      “12th Annual State of Agile Report.” VersionOne, 9 April 2018. Web.

      A, Karen. “20 Mental Models for Product Managers.” Product Management Insider, Medium, 2 Aug. 2018. Web.

      Adams, Paul. “Product Teams: How to Build & Structure Product Teams for Growth.” Inside Intercom, 30 Oct. 2019. Web.

      Agile Alliance. “Product Owner.” Agile Alliance. n.d. Web.

      Ambysoft. “2018 IT Project Success Rates Survey Results.” Ambysoft. 2018. Web.

      Banfield, Richard, et al. “On-Demand Webinar: Strategies for Scaling Your (Growing) Enterprise Product Team.” Pluralsight, 31 Jan. 2018. Web.

      Berez, Steve, et al. “How to Plan and budget for Agile at Scale.” Bain & Company, 08 Oct 2019. Web

      Blueprint. “10 Ways Requirements Can Sabotage Your Projects Right From the Start.” Blueprint. 2012. Web.

      Breddels, Dajo, and Paul Kuijten. “Product Owner Value Game.” Agile2015 Conference, Agile Alliance 2015. Web.

      Cagan, Martin. “Behind Every Great Product.” Silicon Valley Product Group. 2005. Web.

      Cohn, Mike. “What Is a Product?” Mountain Goat Software. 6 Sept. 2016. Web.

      Connellan, Thomas K. Inside the Magic Kingdom, Bard Press, 1997.

      Curphey, Mark. “Product Definition.” SlideShare, 25 Feb. 2007. Web.

      “Delegation Poker Product Image.” Management 3.0, n.d. Web.

      Distel, Dominic, et al. “Finding the sweet spot in product-portfolio management.’ McKinsey, 4 Dec. 2020. Web

      Eringa, Ron. “Evolution of the Product Owner.” RonEringa.com, 12 June 2016. Web.

      Fernandes, Thaisa. “Spotify Squad Framework - Part I.” PM101, Medium, 6 Mar. 2017. Web.

      Galen, Robert. “Measuring Product Ownership – What Does ‘Good’ Look Like?” RGalen Consulting, 5 Aug. 2015. Web.

      Halisky, Merland, and Luke Lackrone. “The Product Owner’s Universe.” Agile2016 Conference, Agile Alliance, 2016. Web.

      Kamer, Jurriaan. “How to Build Your Own ‘Spotify Model’.” The Ready, Medium, 9 Feb. 2018. Web.

      Kendis Team. “Exploring Key Elements of Spotify’s Agile Scaling Model.” Scaled Agile Framework, Medium, 23 Jul. 2018. Web.

      Lindstrom, Lowell. “7 Skills You Need to Be a Great Product Owner.” Scrum Alliance, n.d. Web.

      Lukassen, Chris. “The Five Belts Of The Product Owner.” Xebia.com, 20 Sept. 2016. Web.

      McCloskey, Heather. “Scaling Product Management: Secrets to Defeating Common Challenges.” ProductPlan, 12 July 2019. Web.

      McCloskey, Heather. “When and How to Scale Your Product Team.” UserVoice, 21 Feb. 2017. Web.

      Mironov, Rich. “Scaling Up Product Manager/Owner Teams.” Rich Mironov's Product Bytes, Mironov Consulting, 12 Apr. 2014 . Web.

      Overeem, Barry. “A Product Owner Self-Assessment.” Barry Overeem, 6 Mar. 2017. Web.

      Overeem, Barry. “Retrospective: Using the Team Radar.” Barry Overeem, 27 Feb. 2017. Web.

      Pichler, Roman. “How to Scale the Scrum Product Owner.” Roman Pichler, 28 June 2016 . Web.

      Pichler, Roman. “Product Management Framework.” Pichler Consulting Limited, 2014. Web.

      Pichler, Roman. “Sprint Planning Tips for Product Owners.” LinkedIn, 4 Sept. 2018. Web.

      Pichler, Roman. “What Is Product Management?” Pichler Consulting Limited, 26 Nov. 2014. Web.

      Radigan, Dan. “Putting the ‘Flow' Back in Workflow With WIP Limits.” Atlassian, n.d. Web.

      Rouse, Margaret. “Definition: product.” TechTarget, Sept. 2005. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on (Business) Value.” Scrum.org, 30 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Agile Product Management.” Scrum.org, 28 Nov. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on Product Backlog Management.” Scrum.org, 5 Dec. 2017. Web.

      Schuurman, Robbin. “10 Tips for Product Owners on the Product Vision.” Scrum.org, 29 Nov. 2017. Web.

      Schuurman, Robbin. “Tips for Starting Product Owners.” Scrum.org, 27 Nov. 2017. Web.

      Sharma, Rohit. “Scaling Product Teams the Structured Way.” Monetary Musings, 28 Nov. 2016. Web.

      Shirazi, Reza. “Betsy Stockdale of Seilevel: Product Managers Are Not Afraid To Be Wrong.” Austin Voice of Product, 2 Oct. 2018. Web.

      Steiner, Anne. “Start to Scale Your Product Management: Multiple Teams Working on Single Product.” Cprime, 6 Aug. 2019. Web.

      “The Qualities of Leadership: Leading Change.” Cornelius & Associates, 2016. Web.

      “The Standish Group 2015 Chaos Report.” The Standish Group. 2015. Web.

      Theus, Andre. “When Should You Scale the Product Management Team?” ProductPlan, 7 May 2019. Web.

      Tolonen, Arto. “Scaling Product Management in a Single Product Company.” Smartly.io, 26 Apr. 2018. Web.

      Ulrich, Catherine. “The 6 Types of Product Managers. Which One Do You Need?” Medium, 19 Dec. 2017. Web.

      Verwijs, Christiaan. “Retrospective: Do The Team Radar.” The Liberators, Medium, 10 Feb. 2017. Web.

      Vlaanderen, Kevin. “Towards Agile Product and Portfolio Management”. Academia.edu. 2010. Web.

      Bibliography (Roadmap)

      Bastow, Janna. “Creating Agile Product roadmaps Everyone Understands.” ProdPad, 22 Mar. 2017. Accessed Sept. 2018.

      Bastow, Janna. “The Product Tree Game: Our Favorite Way To Prioritize Features.” ProdPad, 21 Feb. 2016. Accessed Sept. 2018.

      Chernak, Yuri. “Requirements Reuse: The State of the Practice.” 2012 IEEE International Conference, 12 June 2012, Herzliya, Israel. Web.

      Fowler, Martin. “Application Boundary.” MartinFowler.com, 11 Sept. 2003. Accessed 20 Nov. 2017.

      Harrin, Elizabeth. “Learn What a Project Milestone Is.” The Balance Careers, 10 May 2018. Accessed Sept. 2018.

      “How to create a product roadmap.” Roadmunk, n.d. Accessed Sept. 2018.

      Johnson, Steve. “How to Master the 3 Horizons of Product Strategy.” Aha!, 24 Sept. 2015. Accessed Sept. 2018.

      Johnson, Steve. “The Product Roadmap vs. the Technology Roadmap.” Aha!, 23 June 2016. Accessed Sept. 2018

      Juncal, Shaun. “How Should You Set Your Product Roadmap Timeframes?” ProductPlan, Web. Sept. 2018.

      Leffingwell, Dean. “SAFe 4.0.” Scaled Agile, 2017. Web.

      Maurya, Ash. “What is a Minimum Viable Product (MVP).” Leanstack, 12 June 2017. Accessed Sept. 2018.

      Pichler, Roman. “10 Tips for Creating an Agile Product Roadmap.” Roman Pichler, 20 July 2016. Accessed Sept. 2018.

      Pichler, Roman. Strategize: Product Strategy and Product Roadmap Practices for the Digital Age. Pichler Consulting, 2016.

      “Product Roadmap Contents: What Should You Include?” ProductPlan, n.d. Accessed 20 Nov. 2017.

      Saez, Andrea. “Why Your Roadmap Is Not a Release Plan.” ProdPad, 23 October 2015. Accessed Sept. 2018.

      Schuurman, Robbin. “Tips for Agile product roadmaps & product roadmap examples.” Scrum.org, 7 Dec. 2017. Accessed Sept. 2018.

      Bibliography (Vision and Canvas)

      Adams, Paul. “The Future Product Canvas.” Inside Intercom, 10 Jan. 2014. Web.

      “Aligning IT Funding Models to the Pace of Technology Change.” EDUCAUSE, 14 Dec. 2015. Web.

      Altman, Igor. “Metrics: Gone Bad.” OpenView, 10 Nov. 2009. Web.

      Barry, Richard. “The Product Vision Canvas – a Strategic Tool in Developing a Successful Business.” Polymorph, 2019. Web.

      “Business Canvas – Business Models & Value Propositions.” Strategyzer, 2019. Web.

      “Business Model Canvas.” Wikipedia: The Free Encyclopedia, 4 Aug. 2019. Web.

      Charak, Dinker. “Idea to Product: The Working Model.” ThoughtWorks, 13 July 2017. Web.

      Charak, Dinker. “Product Management Canvas - Product in a Snapshot.” Dinker Charak, 29 May 2017. Web.

      Chudley, James. “Practical Steps in Determining Your Product Vision (Product Tank Bristol, Oct. 2018).” LinkedIn SlideShare. Uploaded by cxpartners, 2 Nov. 2018. Web.

      Cowan, Alex. “The 20 Minute Business Plan: Business Model Canvas Made Easy.” COWAN+, 2019. Web.

      Craig, Desiree. “So You've Decided To Become A Product Manager.” Start it up, Medium, 2 June 2019. Web.

      Create an Aha! Business Model Canvas Strategic Model.” Aha! Support, 2019. Web.

      Eick, Stephen. “Does Code Decay? Assessing the Evidence from Change Management Data.” IEEE Transactions on Software Engineering, vol. 27, no. 1, Jan. 2001, pp. 1-12. Web.

      Eriksson, Martin. “The next Product Canvas.” Mind the Product, 22 Nov. 2013. Web.

      “Experience Canvas: a Lean Approach: Atlassian Team Playbook.” Atlassian, 2019. Web.

      Freeman, James. “How to Make a Product Canvas – Visualize Your Product Plan.” Edraw, 23 Dec. 2019. Web.

      Fuchs, Danny. “Measure What Matters: 5 Best Practices from Performance Management Leaders.” OpenGov, 8 Aug. 2018. Web.

      Gorisse, Willem. “A Practical Guide to the Product Canvas.” Mendix, 28 Mar. 2017. Web.

      Gothelf, Jeff. “The Lean UX Canvas.” Jeff Gothelf, 15 Dec. 2016. Web.

      Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product: Getting Started.” EBG Consulting, 15 Jan. 2019. Web.

      Gottesdiener, Ellen. “Using the Product Canvas to Define Your Product's Core Requirements.” EBG Consulting, 4 Feb. 2019. Web.

      Gray, Mark Krishan. “Should I Use the Business Model Canvas or the Lean Canvas?” Emergn, 2019. Web.

      Hanby, Jeff. "Software Maintenance: Understanding and Estimating Costs." LookFar, 21 Oct. 2016. Web.

      “How do you define a product?” Scrum.org, 4 Apr 2017, Web

      Juncal, Shaun. “How to Build a Product Roadmap Based on a Business Model Canvas.” ProductPlan, 19 June 2019. Web.

      “Lean Canvas Intro - Uber Example.” YouTube, uploaded by Railsware Product Academy, 12 Oct. 2018. Web.

      “Lesson 6: Product Canvas.” ProdPad Help Center, 2019. Web.

      Lucero, Mario. “The Product Canvas.” Agilelucero.com, 22 June 2015. Web.

      Maurya, Ash. “Create a New Lean Canvas.” Canvanizer, 2019. Web.

      Maurya, Ash. “Don't Write a Business Plan. Create a Lean Canvas Instead.” LEANSTACK, 2019. Web.

      Maurya, Ash. “Why Lean Canvas vs Business Model Canvas?” Medium, 27 Feb. 2012. Web.

      Mirabelli, Vincent. “The Project Value Canvas.” Vincent Mirabelli, 2019. Web.

      Mishra, LN. “Business Analysis Canvas – The Ultimate Enterprise Architecture.” BA Times, 19 June 2019. Web.

      Muller. Jerry Z. “Why performance metrics isn’t always the best way to judge performance.” Fast Company, 3 April 2019. Web.

      Perri, Melissa. “What Is Good Product Strategy?” Melissa Perri, 14 July 2016. Web.

      Pichler, Roman. “A Product Canvas for Agile Product Management, Lean UX, Lean Startup.” Roman Pichler, 16 July 2012. Web.

      Pichler, Roman. “Introducing the Product Canvas.” JAXenter, 15 Jan. 2013. Web.

      Pichler, Roman. “Roman's Product Canvas: Introduction.” YouTube, uploaded by Roman Pichler, 3 Mar. 2017. Web.

      Pichler, Roman. “The Agile Vision Board: Vision and Product Strategy.” Roman Pichler, 10 May 2011. Web.

      Pichler, Roman. “The Product Canvas – Template.” Roman Pichler, 11 Oct. 2016. Web.

      Pichler, Roman. “The Product Canvas Tutorial V1.0.” LinkedIn SlideShare. Uploaded by Roman Pichler, 14 Feb. 2013. Web.

      Pichler, Roman. “The Product Vision Board: Introduction.” YouTube uploaded by Roman Pichler, 3 Mar. 2017. Web.

      “Product Canvas PowerPoint Template.” SlideModel, 2019. Web.

      Product Canvas.” SketchBubble, 2019, Web.

      “Product Canvas.” YouTube, uploaded by Wojciech Szramowski, 18 May 2016. Web.

      “Product Roadmap Software to Help You Plan, Visualize, and Share Your Product Roadmap.” Productboard, 2019. Web.

      Roggero, Giulio. “Product Canvas Step-by-Step.” LinkedIn SlideShare, uploaded by Giulio Roggero, 18 May 2013. Web.

      Royce, Dr. Winston W. “Managing the Development of Large Software Systems.” Scf.usc.edu, 1970. Web.

      Ryan, Dustin. “The Product Canvas.” Qdivision, Medium, 20 June 2017. Web.

      Snow, Darryl. “Product Vision Board.” Medium, 6 May 2017. Web.

      Stanislav, Shymansky. “Lean Canvas – a Tool Your Startup Needs Instead of a Business Plan.” Railsware, 12 Oct. 2018. Web.

      Stanislav, Shymansky. “Lean Canvas Examples of Multi-Billion Startups.” Railsware, 20 Feb. 2019. Web.

      “The Product Vision Canvas.” YouTube, Uploaded by Tom Miskin, 20 May 2019. Web.

      Tranter, Leon. “Agile Metrics: the Ultimate Guide.” Extreme Uncertainty, n.d. Web.

      “Using Business Model Canvas to Launch a Technology Startup or Improve Established Operating Model.” AltexSoft, 27 July 2018. Web.

      Veyrat, Pierre. “Lean Business Model Canvas: Examples + 3 Pillars + MVP + Agile.” HEFLO BPM, 10 Mar. 2017. Web.

      “What Are Software Metrics and How Can You Track Them?” Stackify, 16 Sept. 2017. Web

      “What Is a Product Vision?” Aha!, 2019. Web.

      Improve Security Governance With a Security Steering Committee

      • Buy Link or Shortcode: {j2store}373|cart{/j2store}
      • member rating overall impact: 9.5/10 Overall Impact
      • member rating average dollars saved: $10,000 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance
      • Security is still seen as an IT problem rather than a business risk, resulting in security governance being relegated to the existing IT steering committee.
      • Security is also often positioned in the organization where they are not privy to the details of the organization’s overall strategy. Security leaders struggle to get the full enterprise picture.

      Our Advice

      Critical Insight

      • Work to separate the Information Security Steering Committee (ISSC) from the IT Steering Committee (ITSC). Security transcends the boundaries of IT and needs an independent, eclectic approach to make strategic decisions.
      • Be the lawyer, not the cop. Ground your communications in business terminology to facilitate a solution that makes sense to the entire organization.
      • Develop and stick to the agenda. Continued engagement from business stakeholders requires sticking to a strategic level-focused agenda. Dilution of purpose will lead to dilution in attendance.

      Impact and Result

      • Define a clear scope of purpose and responsibilities for the ISSC to gain buy-in and consensus for security governance receiving independent agenda time from the broader IT organization.
      • Model the information flows necessary to provide the steering committee with the intelligence to make strategic decisions for the enterprise.
      • Determine membership and responsibilities that shift with the evolving security landscape to ensure participation reflects interested parties and that money being spent on security mitigates risk across the enterprise.
      • Create clear presentation material and strategically oriented meeting agendas to drive continued participation from business stakeholders and executive management.

      Improve Security Governance With a Security Steering Committee Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out how to improve your security governance with a security steering committee, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define committee purpose and responsibilities

      Identify the purpose of your committee, determine the capabilities of the committee, and define roles and responsibilities.

      • Improve Security Governance With a Security Steering Committee – Phase 1: Define Committee Purpose and Responsibilities
      • Information Security Steering Committee Charter

      2. Determine information flows, membership & accountabilities

      Determine how information will flow and the process behind that.

      • Improve Security Governance With a Security Steering Committee – Phase 2: Determine Information Flows, Membership & Accountabilities

      3. Operate the Information Security Steering Committee

      Define your meeting agendas and the procedures to support those meetings. Hold your kick-off meeting. Identify metrics to measure the committee’s success.

      • Improve Security Governance With a Security Steering Committee – Phase 3: Operate the Information Security Steering Committee
      • Security Metrics Summary Document
      • Information Security Steering Committee Stakeholder Presentation
      [infographic]

      Further reading

      Improve Security Governance With a Security Steering Committee

      Build an inclusive committee to enable holistic strategic decision making.

      ANALYST PERSPECTIVE

      "Having your security organization’s steering committee subsumed under the IT steering committee is an anachronistic framework for today’s security challenges. Conflicts in perspective and interest prevent holistic solutions from being reached while the two permanently share a center stage.

      At the end of the day, security is about existential risks to the business, not just information technology risk. This focus requires its own set of business considerations, information requirements, and delegated authorities. Without an objective and independent security governance body, organizations are doomed to miss the enterprise-wide nature of their security problems."

      – Daniel Black, Research Manager, Security Practice, Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • CIOs
      • CISOs
      • IT/Security Leaders

      This Research Will Help You:

      • Develop an effective information security steering committee (ISSC) that ensures the right people are involved in critical decision making.
      • Ensure that business and IT strategic direction are incorporated into security decisions.

      This Research Will Also Assist:

      • Information Security Steering Committee (ISSC) members

      This Research Will Help Them:

      • Formalize roles and responsibilities.
      • Define effective security metrics.
      • Develop a communication plan to engage executive management in the organization’s security planning.

      Executive summary

      Situation

      • Successful information security governance requires a venue to address security concerns with participation from across the entire business.
      • Without access to requisite details of the organization – where we are going, what we are trying to do, how the business expects to use its technology – security can not govern its strategic direction.

      Complication

      • Security is still seen as an IT problem rather than a business risk, resulting in security governance being relegated to the existing IT steering committee.
      • Security is also often positioned in the organization where they are not privy to the details of the organization’s overall strategy. Security leaders struggle to get the full enterprise picture.

      Resolution

      • Define a clear scope of purpose and responsibilities for the Information Security Steering Committee to gain buy-in and consensus for security governance receiving independent agenda time from the broader IT organization.
      • Model the information flows necessary to provide the steering committee with the intelligence to make strategic decisions for the enterprise.
      • Determine membership and responsibilities that shift with the evolving security landscape to ensure participation reflects interested parties and that money being spent on security mitigates risk across the enterprise.
      • Create security metrics that are aligned with committee members’ operational goals to incentivize participation.
      • Create clear presentation material and strategically oriented meeting agendas to drive continued participation from business stakeholders and executive management.

      Info-Tech Insight

      1. Work to separate the ISSC from the IT Steering Committee (ITSC). Security transcends the boundaries of IT and needs an independent, eclectic approach to make strategic decisions.
      2. Be the lawyer, not the cop. Ground your communications in business terminology to facilitate a solution that make sense to the entire organization.
      3. Develop and stick to the agenda. Continued engagement from business stakeholders requires sticking to a strategic level-focused agenda. Dilution of purpose will lead to dilution in attendance.

      Empower your security team to act strategically with an ISSC

      Establishing an Information Security Steering Committee (ISSC)

      Even though security is a vital consideration of any IT governance program, information security has increasingly become an important component of the business, moving beyond the boundaries of just the IT department.

      This requires security to have its own form of steering, beyond the existing IT Steering Committee, that ensures continual alignment of the organization’s security strategy with both IT and business strategy.

      An ISSC should have three primary objectives:

      • Direct Strategic Planning The ISSC formalizes organizational commitments to strategic planning, bringing visibility to key issues and facilitating the integration of security controls that align with IT and business strategy.
      • Institute Clear Accountability The ISSC facilitates the involvement and commitment of executive management through clearly defined roles and accountabilities for security decisions, ensuring consistency in participation as the organization’s strategies evolve.
      • Optimize Security Resourcing The ISSC maximizes security by monitoring the implementation of the security strategic plan, making recommendations on prioritization of effort, and securing necessary resources through the planning and budgeting processes, as necessary.

      What does the typical ISSC do?

      Ensuring proper governance over your security program is a complex task that requires ongoing care and feeding from executive management to succeed.

      Your ISSC should aim to provide the following core governance functions for your security program:

      1. Define Clarity of Intent and Direction How does the organization’s security strategy support the attainment of the business and IT strategies? The ISSC should clearly define and communicate strategic linkage and provide direction for aligning security initiatives with desired outcomes.
      2. Establish Clear Lines of Authority Security programs contain many important elements that need to be coordinated. There needs to be clear and unambiguous authority, accountability, and responsibility defined for each element so lines of reporting/escalation are clear and conflicting objectives can be mediated.
      3. Provide Unbiased Oversight The ISSC should vet the organization’s systematic monitoring processes to make certain there is adherence to defined risk tolerance levels and ensure that monitoring is appropriately independent from the personnel responsible for implementing and managing the security program.
      4. Optimize Security Value Delivery Optimized value delivery occurs when strategic objectives for security are achieved and the organization’s acceptable risk posture is attained at the lowest possible cost. This requires constant attention to ensure controls are commensurate with any changes in risk level or appetite.

      Formalize the most important governance functions for your organization

      Creation of an ISSC is deemed the most important governance and oversight practice that a CISO can implement, based on polling of IT security leaders analyzing the evolving role of the CISO.

      Relatedly, other key governance practices reported – status updates, upstream communications, and executive-level sponsorship – are within the scope of what organizations traditionally formalize when establishing their ISSC.

      Vertical bar chart highlighting the most important governance functions according to respondents. The y axis is labelled 'Percentage of Respondents' with the values 0%-60%, and the x axis is labelled 'Governance and Oversight Practices'. Bars are organized from highest percentage to lowest with 'Creation of cross-functional committee to oversee security strategy' at 56%, 'Regularly scheduled reporting on the state of security to stakeholders' at 55%, 'Upstream communication channel from security leadership to CEO' at 46%, and 'Creation of program charter approved by executive-level sponsor' at 37%. Source: Ponemon Institute, 2017; N=184 organizations; 660 respondents.

      Despite the clear benefits of an ISSC, organizations are still falling short

      83% of organizations have not established formal steering committees to evaluate the business impact and risks associated with security decisions. (Source: 2017 State of Cybersecurity Metrics Report)

      70% of organizations have delegated cybersecurity oversight to other existing committees, providing security limited agenda time. (Source: PwC 2017 Annual Corporate Director Survey)

      "This is a group of risk managers an institution would bring together to deal with a response anyway. Having them in place to do preventive discussions and formulate policy to mitigate the liability sets and understand compliance obligations is just powerful." (Kirk Bailey, CISO, University of Washington)

      Prevent the missteps that make 9 out of 10 steering committees unsuccessful

      Why Do Steering Committees Fail?

      1. A lack of appetite for a steering committee from business partners. An effective ISSC requires participation from core members of the organization’s leadership team. The challenge is that most business partners don’t understand the benefits of an ISSC and the responsibilities aren’t tailored to participants’ needs or interests. It’s the CISO’s (or senior IT/security leader’s) responsibility to make this case to stakeholders and right-size the committee responsibilities and membership.
      2. ISSC committees are given inappropriate responsibilities. The steering committee is fundamentally about decision making; it’s not a working committee. Security leadership typically struggles with clarifying these responsibilities on two fronts: either the responsibilities are too vague and there is no clear way to execute on them within a meeting or responsibilities are too tactical and require knowledge that participants do not have. Responsibilities should determine who is on the ISSC, not the other way around.
      3. Lack of process around execution. An ISSC is only valuable if members are able to successfully execute on its mandate. Without well-defined processes it becomes nearly impossible for the ISSC to be actionable. As a result, participants lack the information they need to make critical decisions, agendas are unmet, and meetings are seen as a waste of time.

      Use these icons to help direct you as you navigate this research

      Use these icons to help guide you through each step of the blueprint and direct you to content related to the recommended activities.

      A small monochrome icon of a wrench and screwdriver creating an X.

      This icon denotes a slide where a supporting Info-Tech tool or template will help you perform the activity or step associated with the slide. Refer to the supporting tool or template to get the best results and proceed to the next step of the project.

      A small monochrome icon depicting a person in front of a blank slide.

      This icon denotes a slide with an associated activity. The activity can be performed either as part of your project or with the support of Info-Tech team members, who will come onsite to facilitate a workshop for your organization.

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      Guided Implementation

      Workshop

      Consulting

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks used throughout all four options

      Improve Security Governance With a Security Steering Committee – project overview

      1. Define Committee Purpose and Responsibilities

      2. Determine Information Flows, Membership & Accountabilities

      3. Operate the Information Security Steering Committee

      Supporting Tool icon

      Best-Practice Toolkit

      1.1 Tailor Info-Tech’s Information Security Steering Committee Charter Template to define terms of reference for the ISSC

      1.2 Conduct a SWOT analysis of your information security governance capabilities

      1.3 Identify the responsibilities and duties of the ISSC

      1.4 Draft the committee purpose statement of your ISSC

      2.1 Define your SIPOC model for each of the ISSC responsibilities

      2.2 Identify committee participants and responsibility cadence

      2.3 Define ISSC participant RACI for each of the responsibilities

      3.1 Define the ISSC meeting agendas and procedures

      3.2 Define which metrics you will report to the ISSC

      3.3 Hold a kick-off meeting with your ISSC members to explain the process, responsibilities, and goals

      3.4 Tailor the Information Security Steering Committee Stakeholder Presentation template

      3.5 Present the information to the security leadership team

      3.6 Schedule your first meeting of the ISSC

      Guided Implementations

      • Identify the responsibilities and duties of the ISSC.
      • Draft the committee purpose of the ISSC.
      • Determine SIPOC modeling of information flows.
      • Determine accountabilities and responsibilities.
      • Set operational standards.
      • Determine effectiveness metrics.
      • Steering committee best practices.
      Associated Activity icon

      Onsite Workshop

      This blueprint can be combined with other content for onsite engagements, but is not a standalone workshop.
      Phase 1 Outcome:
      • Determine the purpose and responsibilities of your information security steering committee.
      Phase 2 Outcome:
      • Determine membership, accountabilities, and information flows to enable operational excellence.
      Phase 3 Outcome:
      • Define agendas and standard procedures to operate your committee.
      • Design an impactful stakeholder presentation.

      Improve Security Governance With a Security Steering Committee

      PHASE 1

      Define Committee Purpose and Responsibilities

      Phase 1: Define Committee Purpose and Responsibilities

      ACTIVITIES:

      • 1.1 Tailor Info-Tech’s Information Security Steering Committee Charter Template to define terms of reference for the ISSC
      • 1.2 Conduct a SWOT analysis of your information security governance capabilities
      • 1.3 Identify the responsibilities and duties of the ISSC
      • 1.4 Draft the committee purpose statement for your ISSC

      OUTCOMES:

      • Conduct an analysis of your current information security governance capabilities and identify opportunities and weaknesses.
      • Define a clear scope of purpose and responsibilities for your ISSC.
      • Begin to customize your ISSC charter.

      Info-Tech Insight

      Balance vision with direction. Purpose and responsibilities should be defined so that they encompass your mission and objectives to the enterprise in clear terms, but provide enough detail that you can translate the charter into operational plans for the security team.

      Tailor Info-Tech’s Information Security Steering Committee Charter Template to define terms of reference for the ISSC

      Supporting Tool icon 1.1

      A charter is the organizational mandate that outlines the purpose, scope, and authority of the ISSC. Without a charter, the steering committee’s value, scope, and success criteria are unclear to participants, resulting in unrealistic stakeholder expectations and poor organizational acceptance.

      Start by reviewing Info-Tech’s template. Throughout the next two sections we will help you to tailor its contents.

      • Committee Purpose: The rationale, benefits of, and overall function of the committee.
      • Organization and Membership: Who is on the committee and how is participation measured against organizational need.
      • Responsibilities and Duties: What tasks/decisions the accountable committee is making.
      • RACI: Who is accountable, responsible, consulted, and informed regarding each responsibility.
      • Committee Procedures and Agendas: Includes how the committee will be organized and how the committee will interact and communicate with interested parties.
      Sample of the Info-Tech deliverable 'Information Security Steering Committee Charter Template'.

      Download the Information Security Steering Committee Charter to customize your organization’s charter

      Conduct a SWOT analysis of your information security governance capabilities

      Associated Activity icon 1.2

      INPUT: Survey outcomes, Governance overview handouts

      OUTPUT: SWOT analysis, Top identified challenges and opportunities

      1. Hold a meeting with your IT leadership team to conduct a SWOT analysis on your current information security governance capabilities.
      2. In small groups, or individually, have each group complete a SWOT analysis for one of the governance areas. For each consider:
        • Strengths: What is currently working well in this area?
        • Weaknesses: What could you improve? What are some of the challenges you’re experiencing?
        • Opportunities: What are some organizational trends that you can leverage? Consider whether your strengths or weaknesses could create opportunities.
        • Threats: What are some key obstacles across people, process, and technology?
      3. Have each team or individual rotate until each person has contributed to each SWOT. Add comments from the stakeholder survey to the SWOT.
      4. As a group, rank the inputs from each group and highlight the top five challenges and the top five opportunities you see for improvement.

      Identify the responsibilities and duties of the ISSC

      Associated Activity icon 1.3

      INPUT: SWOT analysis, Survey reports

      OUTPUT: Defined ISSC responsibilities

      1. With your security leadership team, review the typical responsibilities of the ISSC on the following slides (also included in the templated text of the charter linked below).
      2. Print off the following two slides, and in small teams or individually, identify which responsibilities the ISSC should have in your organization, brainstorm any additional responsibilities, and document reasoning.
      3. Have each team present to the larger group, track the similarities and differences between each of the groups, and come to consensus on the list of categories and responsibilities.
      4. Complete a sanity check: review your SWOT analysis. Do the responsibilities you’ve identified resolve the critical challenges or weaknesses?
      5. As a group, consider the responsibilities and whether you can reasonably implement those in one year or if there are any that will need to wait until year two of the committee.

      Add or modify responsibilities in Info-Tech’s Information Security Steering Committee Charter.

      Typical ISSC responsibilities and duties

      Use the following list of responsibilities to customize the list of responsibilities your ISSC may take on. These should link directly to the Responsibilities and Duties section of your ISSC charter.

      Strategic Oversight

      • Provide oversight and ensure alignment between information security strategy and company objectives.
      • Assess the adequacy of resources and funding to sustain and advance successful security programs and practices for identifying, assessing, and mitigating cybersecurity risks across all business functions.
      • Review controls to prevent, detect, and respond to cyber-attacks or information or data breaches involving company electronic information, intellectual property, data, or connected devices.
      • Review the company’s cyberinsurance policies to ensure appropriate coverage.
      • Provide recommendations, based on security best practices, for significant technology investments.

      Policy Governance

      • Review company policies pertaining to information security and cyberthreats, taking into account the potential for external threats, internal threats, and threats arising from transactions with trusted third parties and vendors.
      • Review privacy and information security policies and standards and the ramifications of updates to policies and standards.
      • Establish standards and procedures for escalating significant security incidents to the ISSC, board, other steering committees, government agencies, and law enforcement, as appropriate.

      Typical ISSC responsibilities and duties (continued)

      Use the following list of responsibilities to customize the list of responsibilities your ISSC may take on. These should link directly to the Responsibilities and Duties section of your ISSC charter.

      Risk Governance

      • Review and approve the company’s information risk governance structure and key risk management processes and capabilities.
      • Assess the company’s high-risk information assets and coordinate planning to address information privacy and security needs.
      • Provide input to executive management regarding the enterprise’s information risk appetite and tolerance.
      • Review the company’s cyber-response preparedness, incident response plans, and disaster recovery capabilities as applicable to the organization’s information security strategy.
      • Promote an open discussion regarding information risk and integrate information risk management into the enterprise’s objectives.

      Monitoring & Reporting

      • Receive periodic reports and coordinate with management on the metrics used to measure, monitor, and manage cyber and IT risks posed to the company and to review periodic reports on selected risk topics as the Committee deems appropriate.
      • Review reports provided by the IT organization regarding the status of and plans for the security of the company’s data stored on internal resources and with third-party providers.
      • Monitor and evaluate the quality and effectiveness of the company’s technology security, capabilities for disaster recovery, data protection, cyberthreat detection and cyber incident response, and management of technology-related compliance risks.

      Review the organization’s security strategy to solidify understanding of the ISSC’s purpose

      The ISSC should consistently evolve to reflect the strategic purpose of the security program. If you completed Info-Tech’s Security Strategy methodology, review the results to inform the scope of your committee. If you have not completed Info-Tech’s methodology, determining these details should be achieved through iterative stakeholder consultations.

      Strategy Components

      ISSC Considerations

      Security Pressure Analysis

      Review the ten security domains and your organization’s pressure levels to review the requisite maturity level of your security program. Consider how this may impact the focus of your ISSC.

      Security Drivers/Obligations

      Review how your security program supports the attainment of the organization’s business objectives. By what means should the ISSC support these objectives? This should inform the rationale, benefits, and overall function of the committee.

      Security Strategy Scope and Boundaries

      Consider the scope and boundaries of your security program to reflect on what the program is responsible for securing. Is this reflected adequately in the language of the committee’s purpose? Should components be added or redacted?

      Draft the committee purpose statement of your ISSC

      Associated Activity icon 1.4

      INPUT: SWOT Analysis, Security Strategy

      OUTPUT: ISSC Committee Purpose

      1. In a meeting with your IT leadership team – and considering the organization’s security strategy, defined responsibilities, and opportunities and threats identified – review the example goal statement in the Information Security Steering Committee Charter, and identify whether any of these statements apply to your organization. Select the statements that apply and collaboratively make any changes needed.
      2. Define unique goal statements by considering the following questions:
        • What three things would you realistically list for the ISSC to achieve?
        • If you were to accomplish three things in the next year, what would those be?
      3. With those goal statements in mind, consider the overall purpose of the committee. The purpose statement should be a reflection of what the committee does, why, and the goals.
      4. Have each individual review the example purpose statement and draft what they think a good purpose statement would be.
      5. Present each statement, and work together to determine a best-of-breed statement.

      Alter the Committee Purpose section in the Information Security Steering Committee Charter.

      Achieve Digital Resilience by Managing Digital Risk

      • Buy Link or Shortcode: {j2store}375|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: $123,999 Average $ Saved
      • member rating average days saved: 4 Average Days Saved
      • Parent Category Name: Governance, Risk & Compliance
      • Parent Category Link: /governance-risk-compliance

      Businesses are expected to balance achieving innovation through initiatives that transform the organization with effective risk management. While this is nothing new, added challenges arise due to:

      • An increasingly large vendor ecosystem within which to manage risk.
      • A fragmented approach to risk management that separates cyber and IT risk from enterprise risk.
      • A rapidly growing number of threat actors and a larger attack surface.

      Our Advice

      Critical Insight

      • All risks are digital risks.
      • Manage digital risk with a collaborative approach that supports digital transformation, ensures digital resilience, and distributes responsibility for digital risk management across the organization.

      Impact and Result

      Address digital risk to build digital resilience. In the process, you will drive transformation and maintain digital trust among your employees, end users, and consumers by:

      • Defining digital risk, including primary risk categories and prevalent risk factors.
      • Leveraging industry examples to help identify external risk considerations.
      • Building a digital risk profile, addressing core risk categories, and creating a correlating plan for digital risk management.

      Achieve Digital Resilience by Managing Digital Risk Research & Tools

      Start here – read the Executive Brief

      Risk does not exist in isolation and must extend beyond your cyber and IT teams. Read our concise Executive Brief to find out how to manage digital risk to help drive digital transformation and build your organization's digital resilience.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Redefine digital risk and resilience

      Discover an overview of what digital risk is, learn how to assess risk factors for the five primary categories of digital risk, see several industry-specific scenarios, and explore how to plan for and mitigate identified risks.

      • Achieve Digital Resilience by Managing Digital Risk – Phases 1-2
      • Digital Risk Management Charter

      2. Build your digital risk profile

      Begin building the digital risk profile for your organization, identify where your key areas of risk exposure exist, and assign ownership and accountability among the organization’s business units.

      • Digital Risk Profile Tool
      • Digital Risk Management Executive Report
      [infographic]

      Workshop: Achieve Digital Resilience by Managing Digital Risk

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Scope and Define Digital Risk

      The Purpose

      Develop an understanding and standard definition of what digital risk is, who it impacts, and its relevance to the organization.

      Key Benefits Achieved

      Understand what digital risk means and how it differs from traditional enterprise or cybersecurity risk.

      Develop a definition of digital risk that recognizes the unique external and internal considerations of your organization.

      Activities

      1.1 Review the business context

      1.2 Review the current roles of enterprise, IT, and cyber risk management within the organization

      1.3 Define digital transformation and list transformation initiatives

      1.4 Define digital risk in the context of the organization

      1.5 Define digital resilience in the context of the organization

      Outputs

      Digital risk drivers

      Applicable definition of digital risk

      Applicable definition of digital resilience

      2 Make the Case for Digital Risk Management

      The Purpose

      Understand the roles digital risk management and your digital risk profile have in helping your organization achieve safe, transformative growth.

      Key Benefits Achieved

      An overview and understanding of digital risk categories and subsequent individual digital risk factors for the organization

      Industry considerations that highlight the importance of managing digital risk

      A structured approach to managing the categories of digital risk

      Activities

      2.1 Review and discuss industry case studies and industry examples of digital transformation and digital risk

      2.2 Revise the organization's list of digital transformation initiatives (past, current, and future)

      2.3 Begin to build your organization's Digital Risk Management Charter (with inputs from Module 1)

      2.4 Revise, customize, and complete a Digital Risk Management Charter for the organization

      Outputs

      Digital Risk Management Charter

      Industry-specific digital risks, factors, considerations, and scenarios

      The organization's digital risks mapped to its digital transformation initiatives

      3 Build Your Digital Risk Profile

      The Purpose

      Develop an initial digital risk profile that identifies the organization’s core areas of focus in managing digital risk.

      Key Benefits Achieved

      A unique digital risk profile for the organization

      Digital risk management initiatives that are mapped against the organization's current strategic initiatives and aligned to meet your digital resilience objectives and benchmarks

      Activities

      3.1 Review category control questions within the Digital Risk Profile Tool

      3.2 Complete all sections (tabs) within the Digital Risk Profile Tool

      3.3 Assess the results of your Digital Risk Profile Tool

      3.4 Discuss and assign initial weightings for ownership of digital risk among the organization's stakeholders

      Outputs

      Completion of all category tabs within the Digital Risk Profile Tool

      Initial stakeholder ownership assignments of digital risk categories

      4 Manage Your Digital Risk

      The Purpose

      Refine the digital risk management plan for the organization.

      Key Benefits Achieved

      A targeted, organization-specific approach to managing digital risk as a part of the organization's projects and initiatives on an ongoing basis

      An executive presentation that outlines digital risk management for your senior leadership team

      Activities

      4.1 Conduct brief information sessions with the relevant digital risk stakeholders identified in Module 3.

      4.2 Review and revise the organization's Digital Risk Profile as necessary, including adjusting weightings for the digital risk categories

      4.3 Begin to build an actionable digital risk management plan

      4.4 Present your findings to the organization's relevant risk leaders and executive team

      Outputs

      A finalized and assessed Digital Risk Profile Tool

      Stakeholder ownership for digital risk management

      A draft Digital Risk Management plan and Digital Risk Management Executive Report

      Develop a Security Operations Strategy

      • Buy Link or Shortcode: {j2store}264|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $79,249 Average $ Saved
      • member rating average days saved: 28 Average Days Saved
      • Parent Category Name: Security Processes & Operations
      • Parent Category Link: /security-processes-and-operations
      • There is an onslaught of security data – generating information in different formats, storing it in different places, and forwarding it to different locations.
      • The organization lacks a dedicated enterprise security team. There is limited resourcing available to begin or mature a security operations center.
      • Many organizations are developing ad hoc security capabilities that result in operational inefficiencies, the misalignment of resources, and the misuse of security technology investments.
      • It is difficult to communicate the value of a security operations program when trying to secure organizational buy-in to gain the appropriate resourcing.
      • There is limited communication between security functions due to a centralized security operations organizational structure.

      Our Advice

      Critical Insight

      1. Security operations is no longer a center, but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape.
      2. Functional threat intelligence is a prerequisite for effective security operations – without it, security operations will be inefficient and redundant. Eliminate false positives by contextualizing threat data, aligning intelligence with business objectives, and building processes to satisfy those objectives.
      3. If you are not communicating, you are not secure. Collaboration eliminates siloed decisions by connecting people, processes, and technologies. You leave less room for error, consume fewer resources, and improve operational efficiency with a transparent security operations process.

      Impact and Result

      • A unified security operations process actively transforms security events and threat information into actionable intelligence, driving security prevention, detection, analysis, and response processes, addressing the increasing sophistication of cyberthreats, and guiding continuous improvement.
      • This blueprint will walk through the steps of developing a flexible and systematic security operations program relevant to your organization.

      Develop a Security Operations Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should enhance your security operations program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Assess your current state

      Assess current prevention, detection, analysis, and response capabilities.

      • Develop a Security Operations Strategy – Phase 1: Assess Operational Requirements
      • Security Operations Preliminary Maturity Assessment Tool

      2. Develop maturity initiatives

      Design your optimized state of operations.

      • Develop a Security Operations Strategy – Phase 2: Develop Maturity Initiatives
      • Information Security Requirements Gathering Tool
      • Concept of Operations Maturity Assessment Tool

      3. Define operational interdependencies

      Identify opportunities for collaboration within your security program.

      • Develop a Security Operations Strategy – Phase 3: Define Operational Interdependencies
      • Security Operations RACI Chart & Program Plan
      • Security Operations Program Cadence Schedule Template
      • Security Operations Collaboration Plan
      • Security Operations Metrics Summary Document
      [infographic]

      Workshop: Develop a Security Operations Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Assess Operational Requirements

      The Purpose

      Determine current prevention, detection, analysis, and response capabilities, operational inefficiencies, and opportunities for improvement.

      Key Benefits Achieved

      Determine why you need a sound security operations program.

      Understand Info-Tech’s threat collaboration environment.

      Evaluate your current security operation’s functions and capabilities.

      Activities

      1.1 Understand the benefits of refining your security operations program.

      1.2 Gauge your current prevention, detection, analysis, and response capabilities.

      Outputs

      Security Operations Preliminary Maturity Assessment Tool

      2 Develop Maturity Initiatives

      The Purpose

      Begin developing and prioritizing gap initiatives in order to achieve the optimal state of operations.

      Key Benefits Achieved

      Establish your goals, obligations, scope, and boundaries.

      Assess your current state and define a target state.

      Develop and prioritize gap initiatives.

      Define the cost, effort, alignment, and security benefits of each initiative.

      Develop a security strategy operational roadmap.

      Activities

      2.1 Assess your current security goals, obligations, and scope.

      2.2 Design your ideal target state.

      2.3 Prioritize gap initiatives.

      Outputs

      Information Security Strategy Requirements Gathering Tool

      Security Operations Maturity Assessment Tool

      3 Define Operational Interdependencies

      The Purpose

      Identify opportunities for collaboration.

      Formalize your operational process flows.

      Develop a comprehensive and actionable measurement program.

      Key Benefits Achieved

      Understand the current security operations process flow.

      Define the security operations stakeholders and their respective deliverables.

      Formalize an internal information-sharing and collaboration plan.

      Activities

      3.1 Identify opportunities for collaboration.

      3.2 Formalize a security operations collaboration plan.

      3.3 Define operational roles and responsibilities.

      3.4 Develop a comprehensive measurement program.

      Outputs

      Security Operations RACI & Program Plan Tool

      Security Operations Collaboration Plan

      Security Operations Cadence Schedule Template

      Security Operations Metrics Summary

      Further reading

      INFO-TECH RESEARCH GROUP

      Develop a Security Operations Strategy

      Transition from a security operations center to a threat collaboration environment.

      Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.
      © 1997-2017 Info-Tech Research Group Inc.

      ANALYST PERSPECTIVE

      “A reactive security operations program is no longer an option. The increasing sophistication of threats demands a streamlined yet adaptable mitigation and remediation process. Protect your assets by preparing for the inevitable; unify your prevention, detection, analysis, and response efforts and provide assurance to your stakeholders that you are making information security a top priority.”

      Phot of Edward Gray, Consulting Analyst, Security, Risk & Compliance, Info-Tech Research Group.

      Edward Gray,
      Consulting Analyst, Security, Risk & Compliance
      Info-Tech Research Group



      Our understanding of the problem

      This Research Is Designed For:
      • Chief Information Officer (CIO)
      • Chief Information Security Officer (CISO)
      • Chief Operating Officer (COO)
      • Security / IT Management
      • Security Operations Director / Security Operations Center (SOC)
      • Network Operations Director / Network Operations Center (NOC)
      • Systems Administrator
      • Threat Intelligence Staff
      • Security Operations Staff
      • Security Incident Responders
      • Vulnerability Management Staff
      • Patch Management
      This Research Will Help You:
      • Enhance your security program by implementing and streamlining next-generation security operations processes.
      • Increase organizational situational awareness through active collaboration between core threat teams, enriching internal security events with external threat intelligence and enhancing security controls.
      • Develop a comprehensive threat analysis and dissemination process: align people, process, and technology to scale security to threats.
      • Identify the appropriate technological and infrastructure-based sourcing decisions.
      • Design a step-by-step security operations implementation process.
      • Pursue continuous improvement: build a measurement program that actively evaluates program effectiveness.
      This Research Will Also Assist:
      • Board / Chief Executive Officer
      • Information Owners (Business Directors/VP)
      • Security Governance and Risk Management
      • Fraud Operations
      • Human Resources
      • Legal and Public Relations
      This Research Will Help Them
      • Aid decision making by staying abreast of cyberthreats that could impact the business.
      • Increase visibility into the organization’s threat landscape to identify likely targets or identify exposed vulnerabilities.
      • Ensure the business is compliant with regularity, legal, and/or compliance requirements.
      • Understand the value and return on investment of security operations offerings.

      Executive summary

      Situation

      • Current security practices are disjointed, operating independently with a wide variety of processes and tools to conduct incident response, network defense, and threat analysis. These disparate mitigations leave organizations vulnerable to the increasing number of malicious events.
      • Threat management has become resource intensive, requiring continuous monitoring, collection, and analysis of massive volumes of security event data, while juggling business, compliance, and consumer obligations.

      Complication

      • There is an onslaught of security data – generating information in different formats, storing it in different places, and forwarding it to different locations.
      • The organization lacks a dedicated enterprise security team. There is limited resourcing available to begin or mature a security operations center.
      • Many organizations are developing ad hoc security capabilities that result in operational inefficiencies, the misalignment of resources, and the misuse of their security technology investments.
      • It is difficult to communicate the value of a security operations program when trying to secure organizational buy-in to gain the appropriate resourcing.
      • There is limited communication between security functions due to a centralized security operations organizational structure.

      Resolution

      • A unified security operations process actively transforms security events and threat information into actionable intelligence, driving security prevention, detection, analysis, and response processes, addressing the increasing sophistication of cyberthreats, and guiding continuous improvement.
      • This blueprint will walk through the steps of developing a flexible and systematic security operations program relevant to your organization.

      Info-Tech Insight

      1. Security operations is no longer a center, but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape.
      2. Functional threat intelligence is a prerequisite for effective security operations – without it, security operations will be inefficient and redundant. Eliminate false positives by contextualizing threat data, aligning intelligence with business objectives, and building processes to satisfy those objectives.
      3. If you are not communicating, you are not secure. Collaboration eliminates siloed decisions by connecting people, processes, and technologies. You leave less room for error, consume fewer resources, and improve operational efficiency with a transparent security operations process.

      Data breaches are resulting in major costs across industries

      Horizontal bar chart of 'Per capita cost by industry classification of benchmarked companies', with the highest cost attributed to 'Health', 'Pharmaceutical', 'Financial', 'Energy', and 'Transportation'.

      Average data breach costs per compromised record hit an all-time high of $217 (in 2015); $74 is direct cost (e.g. legal fees, technology investment) and $143 is indirect cost (e.g. abnormal customer churn). (Source: Ponemon Institute, “2015 Cost of Data Breach Study: United States”)

      '% of systems impacted by a data breach', '1% No Impact', '19% 1-10% impacted', '41% 11-30% impacted', '24% 31-50% impacted', '15% more than 50% impacted
      Divider line.
      '% of customers lost from a data breach', '61% Lost <20%', '21% Lost 20-40%', '8% Lost 40-60%', '6% Lost 60-80%', '4% Lost 80-100%'.
      Divider line.
      '% of business opportunity lost from a data breach', '58% Lost <20%', '25% Lost 20-40%', '9% Lost, 40-60%', '5% Lost 60-80%', '4% Lost 80-100%'.
      (Source: The Network, “ Cisco 2017 Security Capabilities Benchmark Study”)

      Persistent issues

      • Organizational barriers separating prevention, detection, analysis, and response efforts.
        Siloed operations limit collaboration and internal knowledge sharing.
      • Lack of knowledgeable security staff.
        Human capital is transferrable between roles and functions and must be cross-trained to wear multiple hats.
      • Failure to evaluate and improve security operations.
        The effectiveness of operations must be frequently measured and (re)assessed through an iterative system of continuous improvement.
      • Lack of standardization.
        Pre-established use cases and policies outlining tier-1 operational efforts will eliminate ad hoc remediation efforts and streamline operations.
      • Failure to acknowledge the auditor as a customer.
        Many compliance and regulatory obligations require organizations to have comprehensive documentation of their security operations practices.

      60% Of organizations say security operation teams have little understanding of each other’s requirements.

      40% Of executives report that poor coordination leads to excessive labor and IT operational costs.

      38-100% Increase in efficiency after closing operational gaps with collaboration.
      (Source: Forbes, “The Game Plan for Closing the SecOps Gap”)

      The solution

      Bar chart of the 'Benefits of Internal Collaboration' with 'Increased Operational Efficiency' and 'Increased Problem Solving' having the highest percentage.

      “Empower a few administrators with the best information to enable fast, automated responses.”
      – Ismael Valenzuela, IR/Forensics Technical Practice Manager, Foundstone® Services, Intel Security)

      Insufficient security personnel resourcing has been identified as the most prevalent challenge in security operations…

      When an emergency security incident strikes, weak collaboration and poor coordination among critical business functions will magnify inefficiencies in the incident response (IR) process, impacting the organization’s ability to minimize damage and downtime.

      The solution: optimize your SOC. Info-Tech has seen SOCs with five analysts outperform SOCs with 25 analysts through tools and process optimization.

      Sources:
      Ponemon. "2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB).”
      Syngress. Designing and Building a Security Operations Center.

      Maintain a holistic security operations program

      Legacy security operations centers (SOCs) fail to address gaps between data sources, network controls, and human capital. There is limited visibility and collaboration between departments, resulting in siloed decisions that do not support the best interests of the organization.
      Venn diagram of 'Next-Gen Security Operations' with four intersecting circles: 'Prevent', 'Detect', 'Analyze', and 'Respond'.

      Security operations is part of what Info-Tech calls a threat collaboration environment, where members must actively collaborate to address cyberthreats affecting the organization’s brand, business operations, and technology infrastructure on a daily basis.

      Prevent: Defense in depth is the best approach to protect against unknown and unpredictable attacks. Diligent patching and vulnerability management, endpoint protection, and strong human-centric security (amongst other tactics) are essential. Detect: There are two types of companies – those who have been breached and know it and those who have been breached and don’t know it. Ensure that monitoring, logging, and event detection tools are in place and appropriate to your organizational needs
      Analyze: Raw data without interpretation cannot improve security and is a waste of time, money, and effort. Establish a tiered operational process that not only enriches data but also provides visibility into your threat landscape. Respond: Organizations can’t rely on an ad hoc response anymore – don’t wait until a state of panic. Formalize your response processes in a detailed incident runbook in order to reduce incident remediation time and effort.

      Info-Tech’s security operations blueprint ties together various initiatives

      Stock image 1.

      Design and Implement a Vulnerability Management Program

      Vulnerability Management
      Vulnerability management revolves around the identification, prioritization, and remediation of vulnerabilities. Vulnerability management teams hunt to identify which vulnerabilities need patching and remediating.
      Deliverables
      • Vulnerability Tracking Tool
      • Vulnerability Scanning Tool RFP Template
      • Penetration Test RFP Template
      • Vulnerability Mitigation Process Template
      Stock image 2.

      Integrate Threat Intelligence Into Your Security Operations

      Threat Intelligence
      Threat intelligence addresses the collection, analysis, and dissemination of external threat data. Analysts act as liaisons to their peers, publishing actionable threat alerts, reports, and briefings. Threat intelligence proactively monitors and identifies whether threat indicators are impacting your organization.
      • Maturity Assessment Tool
      • Threat Intelligence RACI Tool
      • Management Plan Template
      • Threat Intelligence Policy Template
      • Alert Template
      • Alert and Briefing Cadence Schedule
      Stock image 3.

      Develop Foundational Security Operations Processes

      Operations
      Security operations include the real-time monitoring and analysis of events based on the correlation of internal and external data sources. This also includes incident escalation based on impact. Analysts are constantly tuning and tweaking rules and reporting thresholds to further help identify which indicators are most impactful during the analysis phase of operations.
      • Maturity Assessment Tool
      • Event Prioritization Tool
      • Efficiency Calculator
      • SecOps Policy Template
      • In-House vs. Outsourcing Decision-Making Tool
      • SecOps RACI Tool
      • TCO & ROI Comparison Calculator
      Stock image 4.

      Develop and Implement a Security Incident Management Program

      Incident Response
      Effective and efficient management of incidents involves a formal process of analysis, containment, eradication, recovery, and post-incident activities. IR teams coordinate root-cause analysis and incident gathering while facilitating post-incident lessons learned. Incident response can provide valuable threat data that ties specific indicators to threat actors or campaigns.
      • Incident Management Policy
      • Maturity Assessment Tool
      • Incident Management RACI Tool
      • Incident Management Plan
      • Incident Runbook Prioritization Tool
      • Various Incident Management Runbooks

      This blueprint will…

      …better protect your organization with an interdependent and collaborative security operations program.

      Phase 01

      Assess your operational requirements.

      Phase 02

      Optimize and further mature your security operations processes

      Phase 3a

      Develop the process flow and specific interaction points between functions

      Phase 3b

      Test your current capabilities with a table top exercise
      Briefly assess your current prevention, detection, analysis, and response capabilities.
      Highlight operational weak spots that should be addressed before progressing.
      Develop a prioritized list of security-focused operational initiatives.
      Conduct a holistic analysis of your operational capabilities.
      Define the operational interaction points between security-focused operational departments.
      Document the results in comprehensive operational interaction agreement.
      Test your operational processes with Info-Tech’s security operations table-top exercise.

      Info-Tech integrates several best practices to create a best-of-breed security framework

      Legend for the 'Information Security Framework' identifying blue best practices as 'In Scope' and white best practices as 'Out of Scope'. Info-Tech's 'Information Security Framework' of best practices with two main categories 'Governance' and 'Management', each with subcategories such as 'Context & Leadership' and 'Prevention', each with a group of best practices color-coded to the associated legend identifying them as 'In Scope' or 'Out of Scope'.

      Benefits of a collaborative and integrated operations program

      Effective security operations management will help you do the following:

      • Improve efficacy
        Develop structured processes to automate activities and increase process consistency across the security program. Expose operational weak points and transition teams from firefighting to an innovator role.
      • Improve threat protection
        Enhance network controls through the hardening of perimeter defenses, an intelligence-driven analysis process, and a streamlined incident remediation process.
      • Improve visibility and information sharing
        Promote both internal and external information sharing to enable good decision making.
      • Create and clarify accountability and responsibility
        Security operations management practices will set a clear level of accountability throughout the security program and ensure role responsibility for all tasks and processes involved in service delivery.
      • Control security costs
        Security operations management is concerned with delivering promised services in the most efficient way possible. Good security operations management practices will provide insight into current costs across the organization and present opportunities for cost savings.
      • Identify opportunities for continuous improvement
        Increased visibility into current performance levels and the ability to accurately identify opportunities for continuous improvement.

      Impact

      Short term:

      • Streamlined security operations program development process.
      • Completed comprehensive list of operational gaps and initiatives.
      • Formalized and structured implementation process.
      • Standardized operational use cases that predefine necessary operational protocol.

      Long term:

      • Enhanced visibility into immediate threat environment.
      • Improved effectiveness of internal defensive controls.
      • Increased operational collaboration between prevention, detection, analysis, and response efforts.
      • Enhanced security pressure posture.
      • Improved communication with executives about relevant security risks to the business.

      Understand the cost of not having a suitable security operations program

      A practical approach, justifying the value of security operations, is to identify the assets at risk and calculate the cost to the company should the information assets be compromised (i.e. assess the damage an attacker could do to the business).

      Cost Structure Cost Estimation ($) for SMB
      (Small and medium-sized business)
      Cost Estimation ($) for LE
      (Large enterprise)
      Security controls Technology investment: software, hardware, facility, maintenance, etc.
      Cost of process implementation: incident response, CMBD, problem management, etc.
      Cost of resource: salary, training, recruiting, etc.
      $0-300K/year $200K-2M/year
      Security incidents
      (if no security control is in place)
      Explicit cost:
      1. Incident response cost:
        • Remediation costs
        • Productivity: (number of employees impacted) × (hours out) × (burdened hourly rate)
        • Extra professional services
        • Equipment rental, travel expenses, etc.
        • Compliance fine
        • Cost of notifying clients
      2. Revenue loss: direct loss, the impact of permanent loss of data, lost future revenues
      3. Financial performance: credit rating, stock price
        Hidden cost:
        • Reputation, customer loyalty, etc.
      $15K-650K/year $270K-11M/year

      Workshop Overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities
      • Kick-off and introductions.
      • High-level overview of weekly activities and outcomes.
      • Activity: Define workshop objectives and current state of knowledge.
      • Understand the threat collaboration environment.
      • Understand the benefits of an optimized security operations.
      • Activity: Review preliminary maturity level.
      • Activity: Assess current people, processes, and technology capabilities.
      • Activity: Assess workflow capabilities.
      • Activity: Begin deep-dive into maturity assessment tool.
      • Discuss strategies to enhance the analysis process (ticketing, automation, visualization, use cases, etc.).
      • Activity: Design ideal target state.
      • Activity: Identify security gaps.
      • Build initiatives to bridge the gaps.
      • Activity: Estimate the resources needed.
      • Activity: Prioritize gap initiatives.
      • Activity: Develop dashboarding and visualization metrics.
      • Activity: Plan for a transition with the security roadmap and action plan.
      • Activity: Define and assign tier 1, 2 & 3 SOC roles and responsibilities.
      • Activity: Assign roles and responsibilities for each security operations initiative.
      • Activity: Develop a comprehensive measurement program.
      • Activity: Develop specific runbooks for your top-priority incidents (e.g. ransomware).
        • Detect the incident.
        • Analyze the incident.
        • Contain the incident.
        • Eradicate the root cause.
        • Recover from the incident.
        • Conduct post-incident analysis and communication.
      • Activity:Conduct attack campaign simulation.
      • Finalize main deliverables.
      • Schedule feedback call.
      Deliverables
      1. Security Operations Maturity Assessment Tool
      1. Target State and Gap Analysis (Security Operations Maturity Assessment Tool)
      1. Security Operations Role & Process Design
      2. Security Operations RACI Chart
      3. Security Operations Metrics Summary
      4. Security Operations Phishing Process Runbook
      5. Attack Campaign Simulation PowerPoint

      All Final Deliverables

      Develop a Security Operations Strategy

      PHASE 1

      Assess Operational Requirements

      1

      Assess Operational Requirements

      2

      Develop Maturity Initiatives

      3

      Define Interdependencies

      This step will walk you through the following activities:

      • Determine why you need a sound security operations program.
      • Understand Info-Tech’s threat collaboration environment.
      • Evaluate your current security operation’s functions and capabilities.

      Outcomes of this step

      • A defined scope and motive for completing this project.
      • Insight into your current security operations capabilities.
      • A prioritized list of security operations initiatives based on maturity level.

      Info-Tech Insight

      Security operations is no longer a center, but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape.

      Warm-up exercise: Why build a security operations program?

      Estimated time to completion: 30 minutes

      Discussion: Why are we pursuing this project?

      What are the objectives for optimizing and developing sound security operations?

      Stakeholders Required:

      • Key business executives
      • IT leaders
      • Security operations team members

      Resources Required

      • Sticky notes
      • Whiteboard
      • Dry-erase markers
      1. Briefly define the scope of security operations
        What people, processes, and technology fall within the security operations umbrella?
      2. Brainstorm the implications of not acting
        What does the status quo have in store? What are the potential risks?
      3. Define the goals of the project
        Clarify from the outset: what exactly do you want to accomplish from this project?
      4. Prioritize all brainstormed goals
        Classify the goals based on relevant prioritization criteria, e.g. urgency, impact, cost.

      Info-Tech Best Practice

      Don’t develop a security operations program with the objective of zero incidents. This reliance on prevention results in over-engineered security solutions that cost more than the assets being protected.

      Decentralizing the SOC: Security as a function

      Before you begin, remember that no two security operation programs are the same. While the end goal may be similar, the threat landscape, risk tolerance, and organizational requirements will differ from any other SOC. Determine what your DNA looks like before you begin to protect it.

      Security operations must provide several fundamental functions:
      • Real-time monitoring, detecting, and triaging of data from both internal and external sources.
      • In-depth analysis of indicators and incidents, leveraging malware analysis, correlation and rule tweaking, and forensics and eDiscovery techniques.
      • Network/host scanning and vulnerability patch management.
      • Incident response, remediation, and reporting. Security operations must disseminate appropriate information/intelligence to relevant stakeholders.
      • Comprehensive logging and ticketing capabilities that document and communicate events throughout the threat collaboration environment.
      • Tuning and tweaking of technologies to ingest collected data and enhance the analysis process.
      • Enhance overall organizational situational awareness by reporting on security trends, escalating incidents, and sharing adversary tools, tactics, and procedures.
      Venn diagram of 'Security Operations' with four intersecting circles: 'Prevent', 'Detect', 'Analyze', and 'Respond'.
      At its core, a security operations program is responsible for the prevention, detection, analysis, and response of security events.

      Optimized security operations can seamlessly integrate threat and incident management processes with monitoring and compliance workflows and resources. This integration unlocks efficiency.

      Understand the levels of security operations

      Take the time to map out what you need and where you should go. Security operations has to be more than just monitoring events – there must be a structured program.

      Foundational Arrow with a plus sign pointing right. Operational Arrow with a plus sign pointing right. Strategic
      • Intrusion Detection Management
      • Active Device and Event Monitoring
      • Log Collection and Retention
      • Reporting and Escalation Management
      • Incident Management
      • Audit Compliance
      • Vendor Management
      • Ticketing Processes
      • Packet Capture and Analysis
      • SIEM
      • Firewall
      • Antivirus
      • Patch Management
      • Event Analysis and Incident Triage
      • Security Log Management
      • Vulnerability Management
      • Host Hardening
      • Static Malware Analysis
      • Identity and Access Management
      • Change Management
      • Endpoint Management
      • Business Continuity Management
      • Encryption Management
      • Cloud Security (if applicable)
      • SIEM with Defined Use Cases
      • Big Data Security Analytics
      • Threat Intelligence
      • Network Flow Analysis
      • VPN Anomaly Detection
      • Dynamic Malware Analysis
      • Use-Case Management
      • Feedback and Continuous Improvement Management
      • Visualization and Dashboarding
      • Knowledge Portal Ticket Documentation
      • Advanced Threat Hunting
      • Control and Process Automation
      • eDiscovery and Forensics
      • Risk Management
      ——Security Operations Capabilities—–›

      Understand security operations: Establish a unified threat collaboration environment

      Stock image 1.

      Design and Implement a Vulnerability Management Program

      Security operations is part of what Info-Tech calls a threat collaboration environment, where members must actively collaborate to address threats impacting the organization’s brand, operations, and technology infrastructure.
      • Managing incident escalation and response.
      • Coordinating root-cause analysis and incident gathering.
      • Facilitating post-incident lessons learned.
      • Managing system patching and risk acceptance.
      • Conducting vulnerability assessment and penetration testing.
      • Monitoring in real-time and triaging of events.
      • Escalating events to incident management team.
      • Tuning and tweaking rules and reporting thresholds.
      • Gathering and analyzing external threat data.
      • Liaising with peers, industry, and government.
      • Publishing threat alerts, reports, and briefings.

      Info-Tech Best Practice

      Ensure that information flows freely throughout the threat collaboration environment – each function should serve to feed and enhance the next.

      Stock image 2.

      Integrate Threat Intelligence Into Your Security Operations

      Stock image 3.

      Develop Foundational Security Operations Processes

      Stock image 4.

      Develop and Implement a Security Incident Management Program

      The threat collaboration environment is comprised of three core elements

      Info-Tech Insight

      The value of a SOC can be achieved with fewer prerequisites than you think. While it is difficult to cut back on process and technology requirements, human capital is transferrable between roles and functions and can be cross-trained to satisfy operational gaps.

      Three hexes fitting together with the words 'People', 'Process', and 'Technology'. People. Effective human capital is fundamental to establishing an efficient security operations program, and if enabled correctly, can be the driving factor behind successful process optimization. Ensure you address several critical human capital components:
      • Who is responsible for each respective threat collaboration environment function?
      • What are the required operational roles, responsibilities, and competencies for each employee?
      • Are there formalized training procedures to onboard new employees?
      • Is there an established knowledge transfer and management program?
      Processes. Formal and informal mechanisms that bridge security throughout the collaboration environment and organization at large. Ask yourself:
      • Are there defined runbooks that clearly outline critical operational procedures and guidelines?
      • Is there a defined escalation protocol to transfer knowledge and share threats internally?
      • Is there a defined reporting procedure to share intelligence externally?
      • Are there formal and accessible policies for each respective security operations function?
      • Is there a defined measurement program to report on the performance of security operations?
      • Is there a continuous improvement program in place for all security operations functions?
      • Is there a defined operational vendor management program?
      Technology. The composition of all infrastructure, systems, controls, and tools that enable processes and people to operate and collaborate more efficiently. Determine:
      • Are the appropriate controls implemented to effectively prevent, detect, analyze, and remediate threats? Is each control documented with an assigned asset owner?
      • Can a solution integrate with existing controls? If so, to what extent?
      • Is there a centralized log aggregation tool such as a SIEM?
      • What is the operational cost to effectively manage each control?
      • Is the control the most up-to-date version? Have the most recent patches and configuration changes been applied? Can it be consolidated with or replaced by another control?

      Conduct a preliminary maturity assessment before tackling this project

      Stock image 1.

      Design and Implement a Vulnerability Management Program

      Sample of Info-Tech's Security Operations Preliminary Maturity Assessment

      At a high level, assess your organization’s operational maturity in each of the threat collaboration environment functions. Determine whether the foundational processes exist in order to mature and streamline your security operations.

      Stock image 2.

      Integrate Threat Intelligence Into Your Security Operations

      Stock image 3.

      Develop Foundational Security Operations Processes

      Stock image 4.

      Develop and Implement a Security Incident Management Program

      Assess the current maturity of your security operations program

      Prioritize the component most important to the development of your security operations program.

      Screenshot of a table from the Security Operations Preliminary Maturity Assessment presenting the 'Impact Sub-Weightings' of 'People', 'Process', 'Technology', and 'Policy'.
      Screenshot of a table from the Security Operations Preliminary Maturity Assessment assessing the 'Current State' and 'Target State' of different 'Security Capabilities'.
      Each “security capability” covers a component of the overarching “security function.” Assign a current and target maturity score to each respective security capability. (Note: The CMMI maturity scores are further explained on the following slide.) Document any/all comments for future Info-Tech analyst discussions.

      Assign each security capability a reflective and desired maturity score.

      Your current and target state maturity will be determined using the capability maturity model integration (CMMI) scale. Ensure that all participants understand the 1-5 scale.
      Two-way vertical arrow colored blue at the top and green at the bottom. Ad Hoc
      1 Arrow pointing right. Initial/Ad Hoc: Activity is not well defined and is ad hoc, e.g. no formal roles or responsibilities exist, de facto standards are followed on an individual-by-individual basis.
      2 Arrow pointing right. Developing: Activity is established and there is moderate adherence to its execution, e.g. while no formal policies have been documented, content management is occurring implicitly or on an individual-by-individual basis.
      3 Arrow pointing right. Defined: Activity is formally established, documented, repeatable, and integrated with other phases of the process, e.g. roles and responsibilities have been defined and documented in an accessible policy, however, metrics are not actively monitored and managed.
      4 Arrow pointing right. Managed and Measurable: Activity execution is tracked by gathering qualitative and quantitative feedback, e.g. metrics have been established to monitor the effectiveness of tier-1 SOC analysts.
      5 Arrow pointing right. Optimized: Qualitative and quantitative feedback is used to continually improve the execution of the activity, e.g. the organization is an industry leader in the respective field; research and development efforts are allocated in order to continuously explore more efficient methods of accomplishing the task at hand.
      Optimized

      Notes: Info-Tech seldom sees a client achieve a CMMI score of 4 or 5. To achieve a state of optimization there must be a subsequent trade-off elsewhere. As such, we recommend that organizations strive for a CMMI score of 3 or 4.

      Ensure that your threat collaboration environment is of a sufficient maturity before progressing

      Example report card from the maturity assessment. Functions are color-coded green, yellow, and red. Review the report cards for each of the respective threat collaboration environment functions.
      • A green function indicates that you have exceeded the operational requirements to proceed with the security operations initiative.
      • A yellow function indicates that your maturity score is below the recommended threshold; Info-Tech advises revisiting the attached blueprint. In the instance of a one-off case, the client can proceed with this security operations initiative.
      • A red function indicates that your maturity score is well below the recommended threshold; Info-Tech strongly advises to not proceed with the security operations initiative. Revisit the recommended blueprint and further mature the specific function.

      Are you ready to move on to the next phase?

      Self-Assessment Questions

      • Have you clearly defined the rationale for refining your security operations program?
      • Have you clearly defined and prioritized the goals and outcomes of optimizing your security operations program?
      • Have you assessed your respective people, process, and technological capabilities?
      • Have you completed the Security Operations Preliminary Maturity Assessment Tool?
      • Were all threat collaboration environment functions of a sufficient maturity level?

      If you answered “yes” to the questions, then you are ready to move on to Phase 2: Develop Maturity Initiatives

      Develop a Security Operations Strategy

      PHASE 2

      Develop Maturity Initiatives

      1

      Assess Operational Requirements

      2

      Develop Maturity Initiatives

      3

      Define Interdependencies

      This step will walk you through the following activities:

      • Establish your goals, obligations, scope, and boundaries.
      • Assess your current state and define a target state.
      • Develop and prioritize gap initiatives.
      • Define cost, effort, alignment, and security benefit of each initiative.
      • Develop a security strategy operational roadmap.

      Outcomes of this step

      • A formalized understanding of your business, customer, and regulatory obligations.
      • A comprehensive current and target state assessment.
      • A succinct and consolidated list of gap initiatives that will collectively achieve your target state.
      • A formally documented set of estimated priority variables (cost, effort, business alignment).
      • A fully prioritized security roadmap that is in alignment with business goals and informed by the organization’s needs and limitations.

      Info-Tech Insight

      Functional threat intelligence is a prerequisite for effective security operations – without it, security operations will be inefficient and redundant. Eliminate false positives by contextualizing threat data, aligning intelligence with business objectives, and building processes to satisfy those objectives

      Align your security operations program with corporate goals and obligations

      A common challenge for security leaders is learning to express their initiatives in terms that are meaningful to business executives.

      Frame the importance of your security operations program to
      align with that of the decision makers’ over-arching strategy.

      Oftentimes resourcing and funding is dependent on the
      alignment of security initiatives to business objectives.

      Corporate goals and objectives can be categorized into three major buckets:
      1. BUSINESS OBLIGATIONS
        The primary goals and functions of the organization at large. Examples include customer retention, growth, innovation, customer experience, etc.
      2. CONSUMER OBLIGATIONS
        The needs and demands of internal and external stakeholders. Examples include ease of use (external), data protection (external), offsite access (internal), etc.
      3. COMPLIANCE OBLIGATIONS
        The requirements of the organization to comply with mandatory and/or voluntary standards. Examples include HIPAA, PIPEDA, ISO 27001, etc.
      *Do not approach the above list with a security mindset – take a business perspective and align your security efforts accordingly.

      Info-Tech Best Practice

      Developing a security operations strategy is a proactive activity that enables you to get in front of any upcoming business projects or industry trends rather than having to respond reactively later on. Consider as many foreseeable variables as possible!

      Determine your security operations program scope and boundaries

      It is important to define all security-related areas of responsibility. Upon completion you should clearly understand what you are trying to secure.

      Ask yourself:
      Where does the onus of responsibility stop?

      The organizational scope and boundaries and can be categorized into four major buckets:
      1. PHYSICAL SCOPE
        The physical locations that the security operations program is responsible for. Examples include office locations, remote access, clients/vendors, etc.
      2. IT SYSTEMS
        The network systems that must be protected by the security operations program. Examples include fully owned systems, IaaS, PaaS, remotely hosted SaaS, etc.
      3. ORGANIZATIONAL SCOPE
        The business units, departments, or divisions that will be affected by the security operations program. Examples include user groups, departments, subsidiaries, etc.
      4. DATA SCOPE
        The data types that the business handles and the privacy/criticality level of each. Examples include top secret, confidential, private, public, etc.

      This also includes what is not within scope. For some outsourced services or locations you may not be responsible for security. For some business departments you may not have control of security processes. Ensure that it is made explicit at the outset, what will be included and what will be excluded from security considerations.

      Reference Info-Tech’s security strategy: goals, obligations, and scope activities

      Explicitly understanding how security aligns with the core business mission is critical for having a strategic plan and fulfilling the role of business enabler.

      Download and complete the information security goals, obligations and scope activities (Section 1.3) within the Info-Tech security strategy research publication. If previously completed, take the time to review your results.

      GOALS and OBLIGATIONS
      Proceed through each slide and brainstorm the ways that security operations supports business, customer, and compliance needs.

      Goals & Obligations
      Screenshots of slides from the information security goals, obligations and scope activities (Section 1.3) within the Info-Tech security strategy research publication.

      PROGRAM SCOPE & BOUNDARIES
      Assess your current organizational environment. Document current IT systems, critical data, physical environments, and departmental divisions.

      If a well-defined corporate strategy does not exist, these questions can help pinpoint objectives:

      • What is the message being delivered by the CEO?
      • What are the main themes of investments and projects?
      • What are the senior leaders measured on?
      Program Scope & Boundaries
      Screenshots of slides from the information security goals, obligations and scope activities (Section 1.3) within the Info-Tech security strategy research publication.

      INFO-TECH OPPORTUNITY

      For more information on how to complete the goals & obligations activity please reference Section 1.3 of Info-Tech’s Build an Information Security Strategy blueprint.

      Complete the Information Security Requirements Gathering Tool

      On tab 1. Goals and Obligations:
      • Document all business, customer, and compliance obligations. Ensure that each item is reflective of the over-arching business strategy and is not security focused.
      • In the second column, identify the corresponding security initiative that supports the obligation.
      Screenshot from tab 1 of Info-Tech's Information Security Requirements Gathering Tool. Columns are 'Business obligations', 'Security obligations to support the business (optional)', and 'Notes'.
      On tab 2. Scope and Boundaries:
      • Record all details for what is in and out of scope from physical, IT, organizational, and data perspectives.
      • Complete the affiliated columns for a comprehensive scope assessment.
      • As a discussion guide, refer to the considerations slides prior to this in phase 1.3.
      Screenshot from tab 2 of Info-Tech's Information Security Requirements Gathering Tool. Title is 'Physical Scope', Columns are 'Environment Name', 'Highest data criticality here', 'Is this in scope of the security strategy?', 'Are we accountable for security here?', and 'Notes'.
      For the purpose of this security operations initiative please IGNORE the risk tolerance activities on tab 3.

      Info-Tech Best Practice

      A common challenge for security leaders is expressing their initiatives in terms that are meaningful to business executives. This exercise helps make explicit the link between what the business cares about and what security is trying to do.

      Conduct a comprehensive security operations maturity assessment

      The following slides will walk you through the process below.

      Define your current and target state

      Self-assess your current security operations capabilities and determine your intended state.

      Create your gap initiatives

      Determine the operational processes that must be completed in order to achieve the target state.

      Prioritize your initiatives

      Define your prioritization criteria (cost, effort, alignment, security benefit) based on your organization

      Build a Gantt chart for your upcoming initiatives
      The final output will be a Gantt to action your prioritized initiatives

      Info-Tech Insight

      Progressive improvements provide the most value to IT and your organization. Leaping from pre-foundation to complete optimization is an ineffective goal. Systematic improvements to your security performance delivers value to your organization, each step along the way.

      Optimize your security operations workflow

      Info-Tech consulted various industry experts and consolidated their optimization advice.

      Dashboards: Centralized visibility, threat analytics, and orchestration enable faster threat detection with fewer resources.

      Adding more controls to a network never increases resiliency. Identify technological overlaps and eliminate unnecessary costs.

      Automation: There is shortfall in human capital in contrast to the required tools and processes. Automate the more trivial processes.

      SOCs with 900 employees are just as efficient as those with 35-40. There is an evident tipping point in marginal value.

      There are no plug-and-play technological solutions – each is accompanied by a growing pain and an affiliated human capital cost.

      Planning: Narrow the scope of operations to focus on protecting assets of value.

      Cross-train employees throughout different silos. Enable them to wear multiple hats.

      Practice: None of the processes happen in a vacuum. Make the most of tabletop exercises and other training exercises.

      Define appropriate use cases and explicitly state threat escalation protocol. Focus on automating the tier-1 analyst role.

      Self-assess your current-state capabilities and determine the appropriate target state

      1. Review:
      The heading in blue is the security domain, light blue is the subdomain and white is the specific control.
      2. Determine and Record:
      Ask participants to identify your organization’s current maturity level for each control. Next, determine a target maturity level that meets the requirements of the area (requirements should reflect the goals and obligations defined earlier).
      3.
      In small groups, have participants answer “what is required to achieve the target state?” Not all current/target state gaps will require additional description, explanation, or an associated imitative. You can generate one initiative that may apply to multiple line items.

      Screenshot of a table for assessing the current and target states of capabilities.

      Info-Tech Best Practice

      When customizing your gap initiatives consider your organizational requirements and scope while remaining realistic. Below is an example of lofty vs. realistic initiatives:
      Lofty: Perform thorough, manual security analysis. Realistic: Leverage our SIEM platform to perform more automated security analysis through the use of log information.

      Consolidate related gap initiatives to simplify and streamline your roadmap

      Identify areas of commonality between gap initiative in order to effectively and efficiently implement your new initiatives.

      Steps:
      1. After reviewing and documenting initiatives for each security control, begin sorting controls by commonality, where resources can be shared, or similar end goals and actions. Begin by copying all initiatives from tab 2. Current State Assessment into tab 5. Initiative List of the Security Operations Maturity Assessment Tool and then consolidating them.
      2. Initiatives Consolidated Initiatives
        Document data classification and handling in AUP —› Document data classification and handling in AUP Keep urgent or exceptional initiatives separate so they can be addressed appropriately.
        Document removable media in AUP —› Define and document an Acceptable Use Policy Other similar or related initiatives can be consolidated into one item.
        Document BYOD and mobile devices in AUP —›
        Document company assets in Acceptable Use Policy (AUP) —›

      3. Review grouped initiatives and identify specific initiatives should be broken out and defined separately.
      4. Record your consolidated gap initiatives in the Security Operations Maturity Assessment Tool, tab 6. Initiative Prioritization.

      Understand your organizational maturity gap

      After inputting your current and target scores and defining your gap initiatives in tab 2, review tab 3. Current Maturity and tab 4. Maturity Gap in Info-Tech’s Security Operations Maturity Assessment Tool.

      Automatically built charts and tables provide a clear visualization of your current maturity.

      Presenting these figures to stakeholders and management can help visually draw attention to high-priority areas and contextualize the gap initiatives for which you will be seeking support.

      Screenshot of tabs 3 and 4 from Info-Tech's Security Operations Maturity Assessment Tool. Bar charts titled 'Planning and Direction', 'Vulnerability Management', 'Threat Intelligence', and 'Security Maturity Level Gap Analysis'.

      Info-Tech Best Practice

      Communicate the value of future security projects to stakeholders by copying relevant charts and tables into an executive stakeholder communication presentation (ask an Info-Tech representative for further information).

      Define cost, effort, alignment, and security benefit

      Define low, medium, and high resource allocation, and other variables for your gap initiatives in the Concept of Operations Maturity Assessment Tool. These variables include:
      1. Define initial cost. One-time, upfront capital investments. The low cut-off would be a project that can be approved with little to no oversight. Whereas the high cut-off would be a project that requires a major approval or a formal capital investment request. Initial cost covers items such as appliance cost, installation, project based consulting fees, etc.
      2. Define ongoing cost. This includes any annually recurring operating expenses that are new budgetary costs, e.g. licensing or rental costs. Do not account for FTE employee costs. Generally speaking you can take 20-25% of initial cost as ongoing cost for maintenance and service.
      3. Define initial staffing in hours. This is total time in hours required to complete a project. Note: It is not total elapsed time, but dedicated time. Consider time required to research, document, implement, review, set up, fine tune, etc. Consider all staff hours required (2 staff at 8 hours means 16 hours total).
      4. Define ongoing staffing in hours. This is the ongoing average hours per week required to support that initiative. This covers all operations, maintenance, review, and support for the initiative. Some initiatives will have a week time commitment (e.g. perform a vulnerability scan using our tool once a week) versus others that may have monthly, quarterly, or annual time commitments that need to averaged out per week (e.g. perform annual security review requiring 0.4 hours/week (20 hours total based on 50 working weeks per year).
      Table relating the four definitions on the left, 'Initial Cost', 'Ongoing Cost (annual)', 'Initial Staffing in Hours', and 'Ongoing Staffing in Hours/Week'. Each row header is a definition and has four sub-rows 'High', 'Medium', 'Low', and 'Zero'.

      Info-Tech Best Practice

      When considering these parameters, aim to use already existing resource allocations.

      For example, if there is a dollar value that would require you to seek approval for an expense, this might be the difference between a medium and a high cost category.

      Define cost, effort, alignment, and security benefit

      1. Define Alignment with Business. This variable is meant to capture how well the gap initiative aligns with organizational goals and objectives. For example, something with high alignment usually can be tied to a specific organization initiative and will receive senior management support. You can either:
        • Set low, medium, and high based on levels of support the organization will provide (e.g. High – senior management support, Medium – VP/business unit head support, IT support only)
        • Attribute specific corporate goals or initiatives to the gap initiative (e.g. High – directly supports a customer requirement/key contract requirement; Medium – indirectly support customer requirement/key contract OR enables remote workforce; Low – security best practice).
      2. Define Security Benefit. This variable is meant to capture the relative security benefit or risk reduction being provided by the gap initiative. This can be represented through a variety of factors, such as:
        • Reduces compliance or regulatory risk by meeting a control requirement
        • Reduces availability and operational risk
        • Implements a non-existent control
        • Secures high-criticality data
        • Secures at-risk end users
      Table relating the two definitions on the left, 'Alignment with Business', and 'Security Benefit'. Each row header is a definition and has three sub-rows 'High', 'Medium', and 'Low'.

      Info-Tech Best Practice

      Make sure you consider the value of AND/OR. For either alignment with business or security benefit, the use of AND/OR can become useful thresholds to rank similar importance but different value initiatives.

      Example: with alignment with business, an initiative can indirectly support a key compliance requirement OR meet a key corporate goal.

      Info-Tech Insight

      You cannot do everything – and you probably wouldn’t want to. Make educated decisions about which projects are most important and why.

      Apply your variable criteria to your initiatives

      Identify easy-win tasks and high-value projects worth fighting for.
      Categorize the Initiative
      Select the gap initiative type from the down list. Each category (Must, Should, Could, and Won’t) is considered to be an “execution wave.” There is also a specific order of operations within each wave. Based on dependencies and order of importance, you will execute on some “must-do” items before others.
      Assign Criteria
      For each gap initiative, evaluate it based on your previously defined parameters for each variable.
      • Cost – initial and ongoing
      • Staffing – initial and ongoing
      • Alignment with business
      • Security benefit
      Overall Cost/Effort Rating
      An automatically generated score between 0 and 12. The higher the score attached to the initiative, the more effort required. The must-do, low-scoring items are quick wins and must be prioritized first.
      Screenshot of a table from Info-Tech's Concept of Operations Maturity Assessment Tool with all of the previous table row headers as column headers.

      A financial services organization defined its target security state and created an execution plan

      CASE STUDY
      Industry: Financial Services | Source: Info-Tech Research Group
      Framework Components
      Security Domains & Accompanied Initiatives
      (A portion of completed domains and initiatives)
      CSC began by creating over 100 gap initiatives across Info-Tech’s seven security domains.
      Current-State Assessment Context & Leadership Compliance, Audit & Review Security Prevention
      Gap Initiatives Created 12
      Initiatives
      14
      Initiatives
      45
      Initiatives
      Gap Initiative Prioritization
      Planned Initiative(s)* Initial Cost Ongoing Cost Initial Staffing Ongoing Staffing
      Document Charter Low - ‹$5K Low - ‹$1K Low - ‹1d Low - ‹2 Hour
      Document RACI Low - ‹$5K Low - ‹$1K Low - ‹1d Low - ‹2 Hour
      Expand IR processes Medium - $5K-$50K Low - ‹$1K High - ›2w Low - ‹2 Hour
      Investigate Threat Intel Low - ‹$5K Low - ‹$1K Medium - 1-10d Low - ‹2 Hour
      CSC’s defined low, medium, and high for cost and staffing are specific to the organization.

      CSC then consolidated its initiatives to create less than 60 concise tasks.

      *Initiatives and variables have been changed or modified to maintain anonymity

      Review your prioritized security roadmap

      Review the final Gantt chart to review the expected start and end dates for your security initiatives as part of your roadmap.

      In the Gantt chart, go through each wave in sequence and determine the planned start date and planned duration for each gap initiative. As you populate the planned start dates, take into consideration the resource constraints or dependencies for each project. Go back and revise the granular execution wave to resolve any conflicts you find.

      Screenshot of a 'Gantt Chart for Initiatives', a table with planned and actual start times and durations for each initiative, and beside it a roadmap with the dates from the Gantt chart plugged in.
      Review considerations
      • Does this roadmap make sense for our organization?
      • Do we focus too much on one quarter over others?
      • Will the business be going through any significant changes during the upcoming years that will directly impact this project?
      This is a living management document
      • You can use the same process on a per-case basis to decide where this new project falls in the priority list, and then add it to your Gantt chart.
      • As you make progress, check items off of the list, and periodically use this chart to retroactively update your progress towards achieving your overall target state.

      Consult an Info-Tech Analyst

      To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      Onsite workshops offer an easy way to accelerate your project. If a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to successfully complete your project.
      Photo of TJ Minichillo, Senior Director – Security, Risk & Compliance, Info-Tech Research Group. TJ Minichillo
      Senior Director – Security, Risk & Compliance
      Info-Tech Research Group
      Edward Gray, Consulting Analyst – Security, Risk & Compliance, Info-Tech Research Group. Edward Gray
      Consulting Analyst – Security, Risk & Compliance
      Info-Tech Research Group
      Photo of Celine Gravelines, Research Manager – Security, Risk & Compliance, Info-Tech Research Group. Celine Gravelines
      Research Manager – Security, Risk & Compliance
      Info-Tech Research Group
      If you are not communicating, then you are not secure.

      Call 1-888-670-8889 or email workshops@infotech.com for more information.

      Are you ready to move on to the next phase?

      Self-Assessment Questions

      • Have you identified your organization’s corporate goals along with your obligations?
      • Have you defined the scope and boundaries of your security program?
      • Have you determined your organization’s risk tolerance level?
      • Have you considered threat types your organization may face?
      • Are the above answers documented in the Security Requirements Gathering Tool?
      • Have you defined your maturity for both your current and target state?
      • Do you have clearly defined initiatives that would bridge the gap between your current and target state?
      • Are each of the initiatives independent, specific, and relevant to the associated control?
      • Have you indicated any dependencies between your initiatives?
      • Have you consolidated your gap initiatives?
      • Have you defined the parameters for each of the prioritization variables (cost, effort, alignment, and security benefit)?
      • Have you applied prioritization parameters to each consolidated initiative?
      • Have you recorded your final prioritized roadmap in the Gantt chart tab?
      • Have you reviewed your final Gantt chart to ensure it aligns to your security requirements?

      If you answered “yes” to the questions, then you are ready to move on to Phase 3: Define Operational Interdependencies

      Develop a Security Operations Strategy

      PHASE 3

      Define Operational Interdependencies

      1

      Assess Operational Requirements

      2

      Develop Maturity Initiatives

      3

      Define Interdependencies

      This step will walk you through the following activities:

      • Understand the current security operations process flow.
      • Define the security operations stakeholders and their respective deliverables.
      • Formalize an internal information sharing and collaboration plan.

      Outcomes of this step

      • A formalized security operations interaction agreement.
      • A security operations service and product catalog.
      • A structured operations collection plan.

      Info-Tech Insight

      If you are not communicating, you are not secure. Collaboration eliminates siloed decisions by connecting people, processes, and technologies. You leave less room for error, consume fewer resources, and improve operational efficiency with a transparent security operations process.

      Tie everything together with collaboration

      If you are not communicating, you are not secure. Collaboration eliminates siloed decisions by connecting people, processes, and technologies. You leave less room for error, consume fewer resources, and improve operational efficiency with a transparent security operations process.

      Define Strategic Needs and Requirements Participate in Information Sharing Communicate Clearly
      • Establish a channel to communicate management needs and requirements and define important workflow activities. Focus on operationalizing those components.
      • Establish a feedback loop to ensure your actions satisfied management’s criteria.
      • Consolidate critical security data within a centralized portal that is accessible throughout the threat collaboration environment, reducing the human capital resources required to manage that data.
      • Participate in external information sharing groups such as ISACs. Intelligence collaboration allows organizations to band together to decrease risk and protect one another from threat actors.
      • Disseminate relevant information in clear and succinct alerts, reports, or briefings.
      • Security operations analysts must be able to translate important technical security issues and provide in-depth strategic insights.
      • Define your audience before presenting information; various stakeholders will interpret information differently. You must present it in a format that appeals to their interests.
      • Be transparent in your communications. Holding back information will only serve to alienate groups and hinder critical business decisions.

      Info-Tech Best Practice

      Simple collaborative activities, such as a biweekly meeting, can unite prevention, detection, analysis, and response teams to help prevent siloed decision making.

      Understand the security operations process flow

      Process standardization and automation is critical to the effectiveness of security operations.

      Process flow for security operations with column headers 'Monitoring', 'Preliminary Analysis (Tier 1)', 'Triage', 'Investigation & Analysis (Tier 2)', 'Response', and 'Advanced Threat Detection (Tier 3)'. All processes begin with elements in the 'Monitoring' column and end up at 'Visualization & Dashboarding'.

      Document your security operations’ capabilities and tasks

      Table of capabilities and tasks for security operations.
      Document your security operations’ functional capabilities and operational tasks to satisfy each capability. What resources will you leverage to complete the specific task/capability? Identify your internal and external collection sources to satisfy the individual requirement. Identify the affiliated product, service, or output generated from the task/capability. Determine your escalation protocol. Who are the stakeholders you will be sharing this information with?
      Capabilities

      The major responsibilities of a specific function. These are the high-level processes that are expected to be completed by the affiliated employees and/or stakeholders.

      Tasks

      The specific and granular tasks that need to be completed in order to satisfy a portion of or the entire capability.

      Download Info-Tech’s Security Operations RACI Chart & Program Plan.

      Convert your results into actionable process flowcharts

      Map each functional task or capability into a visual process-flow diagram.

      • The title should reflect the respective capability and product output.
      • List all involved stakeholders (inputs and threat escalation protocol) along the left side.
      • Ensure all relevant security control inputs are documented within the body of the process-flow diagram.
      • Map out the respective processes in order to achieve the desired outcome.
      • Segment each process within its own icon and tie that back to the respective input.
      Example of a process flow made with sticky notes.

      Title: Output #1 Example of a process flow diagram with columns 'Stakeholders', 'Input Processes', 'Output Processes', and 'Threat Escalation Protocol'. Processes are mapped by which stakeholder and column they fall to.

      Download Info-Tech’s Security Operations RACI Chart & Program Plan.

      Formalize the opportunities for collaboration within your security operations program

      Security Operations Collaboration Plan

      Security operations provides a single pane of glass through which the threat collaboration environment can manage its operations.

      How to customize

      The security operations interaction agreement identifies opportunities for optimization through collaboration and cross-training. The document is composed of several components:

      • Security operations program scope and objectives
      • Operational capabilities and outputs on a per function basis
      • A needs and requirements collection plan
      • Escalation protocol and respective information-sharing guidance (i.e. a detailed cadence schedule)
      • A security operations RACI chart
      Sample of Info-Tech's Security Operations Collaboration Plan.

      Info-Tech Best Practice

      Understand the operational cut-off points. While collaboration is encouraged, understand when the onus shifts to the rest of the threat collaboration environment.

      Assign responsibilities for the threat management process

      Security Operations RACI Chart & Program Plan

      Formally documenting roles and responsibilities helps to hold those accountable and creates awareness as to everyone’s involvement in various tasks.

      How to customize
      • Customize the header fields with applicable stakeholders.
      • Identify stakeholders that are:
        • Responsible: The person(s) who does the work to accomplish the activity; they have been tasked with completing the activity and/or getting a decision made.
        • Accountable: The person(s) who is accountable for the completion of the activity. Ideally, this is a single person and is often an executive or program sponsor.
        • Consulted: The person(s) who provides information. This is usually several people, typically called subject matter experts (SMEs).
        • Informed: The person(s) who is updated on progress. These are resources that are affected by the outcome of the activities and need to be kept up to date.
      Sample of Info-Tech's Security Operations Collaboration Plan.

      Download Info-Tech’s Security Operations RACI Chart & Program Plan.

      Identify security operations consumers and their respective needs and requirements

      Ensure your security operations program is constantly working toward satisfying a consumer need or requirement.

      Internal Consumers External Consumers
      • Business Executives & Management (CIO, CISO, COO):
        • Inform business decisions regarding threats and their association with future financial risk, reputational risk, and continuity of operations.
      • Human Resources:
        • Security operations must directly work with HR to enforce tight device controls, develop processes, and set expectations.
      • Legal:
        • Security operations is responsible to notify the legal department of data breaches and the appropriate course of action.
      • Audit and Compliance:
        • Work with the auditing department to define additional audits or controls that must be measured.
      • Public Relations/Marketing Employees:
        • Employees must be educated on prevalent threats and how to avoid or mitigate them.

      Note: Your organization might not be the final target, but it could be a primary path for attackers. If you exist as a third-party partner to another organization, your responsibility in your technology ecosystem extends beyond your own product or service offerings.

      • Third-Party Contractors:
        • Identify relevant threats across industries – security operations is responsible for protecting more than just itself.
      • Commercial Vendors:
        • Identify commercial vendors of control failures and opportunities for operational improvement.
      • Suppliers:
        • Provide or maintain a certain level of security delivery.
        • Meet the same level of security that is expected of business units.
      • All End Users:
        • Be notified of any data breaches and potential violations of privacy.

      Info-Tech Best Practice

      “In order to support a healthy constituency, network operations and security operations should be viewed as equal partners, rather than one subordinate to the other.” (Mitre world-class CISO)

      Define the stakeholders, their respective outputs, and the underlying need

      Security Operations Program Service & Product Catalog

      Create an informal security operations program service and product catalog. Work your way backwards – map each deliverable to the respective stakeholders and functions.

      Action/Output Arrow pointing right. Frequency Arrow pointing right. Stakeholders/Function
      Document the key services and outputs produced by the security operations program. For example:
      • Real-time monitoring
      • Event analysis and incident coordination
      • Malware analysis
      • External information sharing
      • Published alerts, reports, and briefings
      • Metrics
      Define the frequency for which each deliverable or service is produced or conducted. Leverage this activity to establish a state of accountability within your threat collaboration environment. Identify the stakeholders or groups affiliated with each output. Remember to include potential MSSPs.
      • Vulnerability Management
      • Threat Intelligence
      • Tier 1, 2, and 3 Analysts
      • Incident Response
      • MSSP
      • Network Operations
      Remember to include any target-state outputs or services identified in the maturity assessment. Use this exercise as an opportunity to organize your security operations outputs and services.

      Info-Tech Best Practice

      Develop a central web/knowledge portal that is easily accessible throughout the threat collaboration environment.

      Internal information sharing helps to focus operational efforts

      Organizations must share information internally and through secure external information sharing and analysis centers (ISACs).

      Ensure information is shared in a format that relates to the particular end user. Internal consumers fall into two categories:

      • Strategic Users — Intelligence enables strategic stakeholders to better understand security trends, minimize risk, and make more educated and informed decisions. The strategic intelligence user often lacks technical security knowledge; bridge the communication gap between security and non-technical decision makers by clearly communicating the underlying value and benefits.
      • Operational Users — Operational users integrate information and indicators directly into their daily operations and as a result have more in-depth knowledge of the technical terms. Reports help to identify escalated alerts that are part of a bigger campaign, provide attribution and context to attacks, identify systems that have been compromised, block malicious URLs or malware signatures in firewalls, IDPS systems, and other gateway products, identify patches, reduce the number of incidents, etc.
      Collaboration includes the exchange of:
      • Contextualized threat indicators, threat actors, TTPs, and campaigns.
      • Attribution of the attack, motives of the attacker, victim profiles, and frequent exploits.
      • Defensive and mitigation strategies.
      • Best-practice incident response procedures.
      • Technical tools to help normalize threat intelligence formats or decode malicious network traffic.
      Collaboration can be achieved through:
      • Manual unstructured exchanges such as alerts, reports, briefings, knowledge portals, or emails.
      • Automated centralized platforms that allow users to privately upload, aggregate, and vet threat intelligence. Current players include commercial, government, and open-source information-sharing and analysis centers.
      Isolation prevents businesses from learning from each others’ mistakes and/or successes.

      Define the routine of your security operations program in a detailed cadence schedule

      Security Operations Program Cadence Schedule Template

      Design your meetings around your security operations program’s outputs and capabilities

      How to customize

      Don’t operate in a silo. Formalize a cadence schedule to develop a state of accountability, share information across the organization, and discuss relevant trends. A detailed cadence schedule should include the following:

      • Activity, output, or topic being discussed.
      • Participants and stakeholders involved.
      • Value and purpose of meeting.
      • Duration and frequency of each meeting.
      • Investment per participant per meeting.
      Sample of Info-Tech's Security Operations Program Cadence Schedule Template.

      Info-Tech Best Practice

      Schedule regular meetings composed of key members from different working groups to discuss concerns, share goals, and communicate operational processes pertaining to their specific roles.

      Apply a strategic lens to your security operations program

      Frame the importance of optimizing the security operations program to align with that of the decision makers’ overarching strategy.

      Strategies
      1. Bridge the communication gap between security and non-technical decision makers. Communicate concisely in business-friendly terms.
      2. Quantify the ROI for the given project.
      3. Educate stakeholders – if stakeholders do not understand what a security operations program encompasses, it will be hard for them to champion the initiative.
      4. Communicate the implications, value, and benefits of a security operations program.
      5. Frame the opportunity as a competitive advantage, e.g. proactive security measures as a client acquisition strategy.
      6. Address the increasing prevalence of threat actors. Use objective data to demonstrate the impact, e.g. through case studies, recent media headlines, or statistics.

      Defensive Strategy diagram with columns 'Adversaries', 'Defenses', 'Assets', and priority level.
      (Source: iSIGHT, “ Definitive Guide to Threat Intelligence”)

      Info-Tech Best Practice

      Refrain from using scare tactics such as fear, uncertainty, and doubt (FUD). While this may be a short-term solution, it limits the longevity of your operations as senior management is not truly invested in the initiative.

      Example: Align your strategic needs with that of management.

      Identify assets of value, current weak security measures, and potential adversaries. Demonstrate how an optimized security operations program can mitigate those threats.

      Develop a comprehensive measurement program to evaluate the effectiveness of your security operations

      There are three types of metrics pertaining to security operations:

      1) Operations-focused

      Operations-focused metrics are typically communicated through a centralized visualization such as a dashboard. These metrics guide operational efforts, identifying operational and control weak points while ensuring the appropriate actions are taken to fix them.

      Examples include, but are not limited to:

      • Ticketing metrics (e.g. average ticket resolution rate, ticketing status, number of tickets per queue/analyst).
      • False positive percentage per control.
      • Incident response metrics (e.g. mean time to recovery).
      • CVSS scores per vulnerability.

      2) Business-focused

      The evaluation of operational success from a business perspective.

      Example metrics include:

      • Return on investment.
      • Total cost of ownership (can be segregated by function: prevent, detect, analyze, and respond).
      • Saved costs from mitigated breaches.
      • Security operations budget as a percentage of the IT budget.

      3) Initiative-focused

      The measurement of security operations project progress. These are frequently represented as time, resource, or cost-based metrics.

      Note: Remember to measure end-user feedback. Asking stakeholders about their current expectations via a formal survey is the most effective way to kick-start the continuous improvement process.

      Info-Tech Best Practice

      Operational metrics have limited value beyond security operations – when communicating to management, focus on metrics that are actionable from a business perspective.

      Download Info-Tech’s Security Operations Metrics Summary Document.Sample of Info-Tech's Security Operations Metrics Summary Document.

      Identify the triggers for continual improvement

      Continual Improvement

      • Audits: Check for performance requirements in order to pass major audits.
      • Assessments: Variances in efficiency or effectiveness of metrics when compared to the industry standard.
      • Process maturity: Opportunity to increase efficiency of services and processes.
      • Management reviews: Routine reviews that reveal gaps.
      • Technology advances: For example, new security architecture/controls have been released.
      • Regulations: Compliance to new or changed regulations.
      • New staff or technology: Disruptive technology or new skills that allow for improvement.

      Conduct tabletop exercises with Info-Tech’s onsite workshop

      Assess your security operations capabilities

      Leverage Info-Tech’s Security Operations Tabletop Exercise to guide simulations to validate your operational procedures.

      How to customize
      • Use the templates to document actions and actors.
      • For each new injection, spend three minutes discussing the response as a group. Then spend two minutes documenting each role’s contribution to the response. After the time limit, proceed to the following injection scenario.
      • Review the responses only after completing the entire exercise.
      Sample of Info-Tech's Security Operations Tabletop Exercise.

      This tabletop exercise is available through an onsite workshop as we can help establish and design a tabletop capability for your organization.

      Are you ready to implement your security operations program?

      Self-Assessment Questions

      • Is there a formalized security operations collaboration plan?
      • Are all key stakeholders documented and acknowledged?
      • Have you defined your strategic needs and requirements in a formalized collection plan?
      • Is there an established channel for management to communicate needs and requirements to the security operation leaders?
      • Are all program outputs documented and communicated?
      • Is there an accessible, centralized portal or dashboard that actively aggregates and communicates key information?
      • Is there a formalized threat escalation protocol in order to facilitate both internal and external information sharing?
      • Does your organization actively participate in external information sharing through the use of ISACs?
      • Does your organization actively produce reports, alerts, products, etc. that feed into and influence the output of other functions’ operations?
      • Have you assigned program responsibilities in a detailed RACI chart?
      • Is there a structured cadence schedule for key stakeholders to actively communicate and share information?
      • Have you developed a structured measurement program on a per function basis?
      • Now that you have constructed your ideal security operations program strategy, revisit the question “Are you answering all of your objectives?”

      If you answered “yes” to the questions, then you are ready to implement your security operations program.

      Summary

      Insights

      1. Security operations is no longer a center, but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape.
      2. Functional threat intelligence is a prerequisite for effective security operations – without it, security operations will be inefficient and redundant. Eliminate false positives by contextualizing threat data, aligning intelligence with business objectives, and building processes to satisfy those objectives
      3. If you are not communicating, then you are not secure. Collaboration eliminates siloed decisions by connecting people, processes, and technologies. You leave less room for error, consume fewer resources, and improve operational efficiency with a transparent security operations process.

      Best Practices

      • Have a structured plan of attack. Define your unique threat landscape, as well as business, regulatory, and consumer obligations.
      • Foster both internal and external collaboration.
      • Understand the operational cut-off points. While collaboration is encouraged, understand when the onus shifts to the rest of the threat collaboration environment.
      • Do not bite off more than you can chew. Identify current people, processes, and technologies that satisfy immediate problems and enable future expansion.
      • Leverage threat intelligence to create a predictive and proactive security operations analysis process.
      • Formalize escalation procedures with logic and incident management flow.
      • Don’t develop a security operations program with the objective of zero incidents. This reliance on prevention results in over-engineered security solutions that cost more than the assets being protected.
      • Ensure that information flows freely throughout the threat collaboration environment – each function should serve to feed and enhance the next.
      • Develop a central web/knowledge portal that is easily accessible throughout the threat collaboration environment
      Protect your organization with an interdependent and collaborative security operations program.

      Bibliography

      “2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB).” Ponemon Institute, June 2016. Web. 10 Nov. 2016.

      Ahmad, Shakeel et al. “10 Tips to Improve Your Security Incident Readiness and Response.” RSA, n.d. Web. 12 Nov. 2016.

      Anderson, Brandie. “ Building, Maturing & Rocking a Security Operations Center.” Hewlett Packard, n.d. Web. 4 Nov. 2016.

      Barnum, Sean. “Standardizing cyber threat intelligence information with the structured threat information expression.” STIX, n.d. Web. 03 Oct. 2016.

      Bidou, Renaud. “Security Operation Center Concepts & Implementation.” IV2-Technologies, n.d. Web. 20 Nov. 2016.

      Bradley, Susan. “Cyber threat intelligence summit.” SANS Institute InfoSec Reading Room, n.d. Web. 03 Oct. 2016.

      “Building a Security Operations Center.” DEF CON Communications, Inc., 2015. Web. 14 Nov. 2016.

      “Building a Successful Security Operations Center.” ArcSight, 2015. Web. 21 Nov. 2016.

      “Building an Intelligence-Driven Security Operations Center.” RSA, June 2014. Web. 25 Nov. 2016.

      Caltagirone, Sergio, Andrew Pendergast, and Christopher Betz. “Diamond Model of Intrusion Analysis,” Center for Cyber Threat Intelligence and Threat Research, 5 July 2013. Web. 25 Aug. 2016.

      “Cisco 2017 Annual Cybersecurity Report: Chief Security Officers Reveal True Cost of Breaches and the Actions Organizations Are Taking.” The Network. Cisco, 31 Jan. 2017. Web. 11 Nov. 2017.

      “CITP Training and Education.” Carnegie Mellon University, 2015. Web. 03 Oct. 2016.

      “Creating and Maintaining a SOC.” Intel Security, n.d. Web. 14 Nov. 2016.

      “Cyber Defense.” Mandiant, 2015. Web. 10 Nov. 2016.

      “Cyber Security Operations Center (CSOC).” Northrop Grumman, 2014. Web. 14 Nov. 2016.

      Danyliw, Roman. “Observations of Successful Cyber Security Operations.” Carnegie Mellon, 12 Dec. 2016. Web. 14 Dec. 2016.

      “Designing and Building Security Operations Center.” SearchSecurity. TechTarget, Mar. 2016. Web. 14 Dec. 2016.

      EY. “Managed SOC.” EY, 2015. Web. 14 Nov. 2016.

      Fishbach, Nicholas. “How to Build and Run a Security Operations Center.” Securite.org, n.d. Web. 20 Nov. 2016.

      “Framework for improving critical infrastructure cybersecurity.” National Institute of Standards and Technology, 12 Feb. 2014. Web.

      Friedman, John, and Mark Bouchard. “Definitive Guide to Cyber Threat Intelligence.” iSIGHT, 2015. Web. 1 June 2015.

      Goldfarb, Joshua. “The Security Operations Hierarchy of Needs.” Securityweek.com, 10 Sept. 2015. Web. 14 Dec. 2016.

      “How Collaboration Can Optimize Security Operations.” Intel, n.d. Web. 2 Nov. 2016.

      Hslatman. “Awesome threat intelligence.” GitHub, 16 Aug. 2016. Web. 03 Oct. 2016.

      “Implementation Framework – Collection Management.” Carnegie Mellon University, 2015. Web.

      “Implementation Framework – Cyber Threat Prioritization.” Carnegie Mellon University, 03 Oct. 2016. Web. 03 Oct. 2016.

      “Intelligent Security Operations Center.” IBM, 25 Feb. 2015. Web. 15 Nov. 2016.

      Joshi Follow , Abhishek. “Best Practices for Security Operations Center.” LinkedIn, 01 Nov. 2015. Web. 14 Nov. 2016.

      Joshi. “Best Practices for a Security Operations Center.” Cybrary, 18 Sept. 2015. Web. 14 Dec. 2016.

      Kelley, Diana and Ron Moritz. “Best Practices for Building a Security Operations Center.” Information Security Today, 2006. Web. 10 Nov. 2016.

      Killcrece, Georgia, Klaus-Peter Kossakowski, Robin Ruefle, and Mark Zajicek. ”Organizational Models for Computer Security Incident Response Teams (CSIRTs).” Carnegie Mellon Software Engineering Institute, Dec. 2003. Carnegie Mellon. Web. 10 Nov. 2016.

      Kindervag , John. “SOC 2.0: Three Key Steps toward the Next-generation Security Operations Center.” SearchSecurity. TechTarget, Dec. 2010. Web. 14 Dec. 2016.

      Kvochko, Elena. “Designing the Next Generation Cyber Security Operations Center.” Forbes Magazine, 14 Mar. 2016. Web. 14 Dec. 2016.

      Lambert, P. “ Security Operations Center: Not Just for Huge Enterprises.” TechRepublic, 31 Jan. 2013. Web. 10 Nov. 2016.

      Lecky, M. and D. Millier. “Re-Thinking Security Operations.” SecTor Security Education Conference. Toronto, 2014.

      Lee, Michael. “Three Elements That Every Advanced Security Operations Center Needs.” CSO | The Resource for Data Security Executives, n.d. Web. 16 Nov. 2016.

      Linch, David and Jason Bergstrom. “Building a Culture of Continuous Improvement in an Age of Disruption.” Deloitte LLP, 2014.

      Lynch, Steve. “Security Operations Center.” InfoSec Institute, 14 May 2015. Web. 14 Dec. 2016.

      Macgregor, Rob. “Diamonds or chains – cyber security updates.” PwC, n.d. Web. 03 Oct. 2016.

      “Make Your Security Operations Center (SOC) More Efficient.” Making Your Data Center Energy Efficient (2011): 213-48. Intel Security. Web. 20 Nov. 2016.

      Makryllos, Gordon. “The Six Pillars of Security Operations.” CSO | The Resource for Data Security Executives, n.d. Web. 14 Nov. 2016.

      Marchany, R. “ Building a Security Operations Center.” Virginia Tech, 2015. Web. 8 Nov. 2016.

      Marty, Raffael. “Dashboards in the Security Operations Center (SOC).” Security Bloggers Network, 15 Jan. 2016. Web. 14 Nov. 2016.

      Minu, Adolphus. “Discovering the Value of Knowledge Portal.” IBM, n.d. Web. 1 Nov. 2016.

      Muniz, J., G. McIntyre, and N. AlFardan. “Introduction to Security Operations and the SOC.” Security Operations Center: Building, Operating, and Maintaining your SOC. Cisco Press, 29 Oct. 2015. Web. 14 Nov. 2016.

      Muniz, Joseph and Gary McIntyre. “ Security Operations Center.” Cisco, Nov. 2015. Web. 14 Nov. 2016.

      Muniz, Joseph. “5 Steps to Building and Operating an Effective Security Operations Center (SOC).” Cisco, 15 Dec. 2015. Web. 14 Dec. 2016.

      Nathans, David. Designing and Building a Security Operations Center. Syngress, 2015. Print.

      National Institute of Standards and Technology. “SP 800-61 Revision 2: Computer Security Incident Handling Guide.” 2012. Web.

      National Institute of Standards and Technology. “SP 800-83 Revision 1.” 2013. Web.

      National Institute of Standards and Technology. “SP 800-86: Guide to Integrating Forensic Techniques into Incident Response.” 2006. Web.

      F5 Networks. “F5 Security Operations Center.” F5 Networks, 2014. Web. 10 Nov. 2016.

      “Next Generation Security Operations Center.” DTS Solution, n.d. Web. 20 Nov. 2016.

      “Optimizing Security Operations.” Intel, 2015. Web. 4 Nov. 2016.

      Paganini, Pierluigi. “What Is a SOC ( Security Operations Center)?” Security Affairs, 24 May 2016. Web. 14 Dec. 2016.

      Ponemon Institute LLC. “Cyber Security Incident Response: Are we as prepared as we think?” Ponemon, 2014. Web.

      Ponemon Institute LLC. “The Importance of Cyber Threat Intelligence to a Strong Security Posture.” Ponemon, Mar. 2015. Web. 17 Aug. 2016.

      Poputa-Clean, Paul. “Automated defense – using threat intelligence to augment.” SANS Institute InfoSec Reading Room, 15 Jan. 2015. Web.

      Quintagroup. “Knowledge Management Portal Solution.” Quintagroup, n.d. Web.

      Rasche, G. “Guidelines for Planning an Integrated Security Operations Center.” EPRI, Dec. 2013. Web. 25 Nov. 2016.

      Rehman, R. “What It Really Takes to Stand up a SOC.” Rafeeq Rehman – Personal Blog, 27 Aug. 2015. Web. 14 Dec. 2016.

      Rothke, Ben. “Designing and Building Security Operations Center.” RSA Conference, 2015. Web. 14 Nov. 2016.

      Ruks, Martyn and David Chismon. “Threat Intelligence: Collecting, Analysing, Evaluating.” MWR Infosecurity, 2015. Web. 24 Aug. 2016.

      Sadamatsu, Takayoshi. “Practice within Fujitsu of Security Operations Center.” Fujitsu, July 2016. Web. 15 Nov. 2016.

      Sanders, Chris. “Three Useful SOC Dashboards.” Chris Sanders, 24 Oct. 2016. Web. 14 Nov. 2016.

      SANS Institute. “Incident Handler's Handbook.” 2011. Web.

      Schilling, Jeff. “5 Pitfalls to Avoid When Running Your SOC.” Dark Reading, 18 Dec. 2014. Web. 14 Nov. 2016.

      Schinagl, Stef, Keith Schoon, and Ronald Paans. “A Framework for Designing a Security Operations Centre (SOC).” 2015 48th Hawaii International Conference on System Sciences. Computer.org, 2015. Web. 20 Nov. 2016.

      “Security – Next Gen SOC or SOF.” InfoSecAlways.com, 31 Dec. 2013. Web. 14 Nov. 2016.

      “Security Operations Center Dashboard.” Enterprise Dashboard Digest, n.d. Web. 14 Dec. 2016.

      “Security Operations Center Optimization Services.” AT&T, 2015. Web. 5 Nov. 2016.

      “Security Operations Centers — Helping You Get Ahead of Cybercrime Contents.” EY, 2014. Web. 6 Nov. 2016.

      Sheikh, Shah. “DTS Solution - Building a SOC (Security Operations Center).” LinkedIn, 4 May 2013. Web. 20 Nov. 2016.

      Soto, Carlos. “ Security Operations Center (SOC) 101.” Tom's IT Pro, 28 Oct. 2015. Web. 14 Dec. 2016.

      “Standardizing and Automating Security Operations.” National Institute of Standards and Technology, 3 Sept. 2006. Web.

      “Strategy Considerations for Building a Security Operations Center.” IBM, Dec. 2013. Web. 5 Nov. 2016.

      “Summary of Key Findings.” Carnegie Mellon University, 03 Oct. 2016. Web. 03 Oct. 2016.

      “Sustainable Security Operations.” Intel, 2016. Web. 20 Nov. 2016.

      “The Cost of Malware Containment.” Ponemon Institute, Jan. 2015. Web.

      “The Game Plan for Closing the SecOps Gap.” BMC. Forbes Magazine, Jan. 2016. Web. 10 Jan. 2017.

      Veerappa Srinivas, Babu. “Security Operations Centre (SOC) in a Utility Organization.” GIAC, 17 Sept. 2014. Web. 5 Nov. 2016.

      Wang, John. “Anatomy of a Security Operations Center.” NASA, 2015. Web. 2 Nov. 2016.

      Weiss, Errol. “Statement for the Record.” House Financial Services Committee, 1 June 2012. Web. 12 Nov. 2016.

      Wilson, Tim. “SOC 2.0: A Crystal-Ball Glimpse of the Next-Generation Security Operations Center.” Dark Reading, 22 Nov. 2010. Web. 10 Nov. 2016.

      Zimmerman, Carson. “Ten Strategies of a World-Class Cybersecurity Operations Center.” Mitre, 2014. Web. 24 Aug. 2016.

      Create an Effective SEO Keyword Strategy

      • Buy Link or Shortcode: {j2store}568|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Marketing Solutions
      • Parent Category Link: /marketing-solutions

      Digital Marketers working with an outdated or bad SEO strategy often see:

      • Declining keyword ranking and traffic
      • Poor keyword strategy
      • On-page errors

      Our Advice

      Critical Insight

      Most marketers fail in their SEO efforts because they focus on creating content for computers, not people.

      Impact and Result

      Using the SoftwareReviews methodology, digital marketers are able to break up their SEO project and data into bite-sized, actionable steps that focus on long-term improvement. Our methodology includes:

      • Competitive keyword research and identification of opportunities
      • On-page keyword strategy

      Create an Effective SEO Keyword Strategy Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Create an Effective SEO Keyword Strategy

      Update your on-page SEO strategy with competitively relevant keywords.

      • Create an Effective SEO Keyword Strategy Storyboard
      [infographic]

      Further reading

      Create an Effective SEO Keyword Strategy
      Update your on-page SEO strategy with competitively relevant keywords.

      Analyst Perspective

      Most marketers fail in their SEO efforts because they focus on creating content for computers, not people.

      Leading search engine optimization methods focus on creating and posting relevant keyword-rich content, not just increasing page rank. Content and keywords should move a buyer along their journey, close a sale, and develop long-term relationships. Unfortunately, many SEO specialists focus on computers, not the buyer. What's even more concerning is that up to 70% of SaaS businesses have already been impacted by outdated and inefficient SEO techniques. Poor strategies often focus on ballooning SEO metrics in the short-term instead of building the company's long-term PageRank.

      Best-in-class digital marketers stop chasing the short-term highs and focus on long-term growth. This starts with developing a competitive keyword strategy and updating website content with the new keywords.

      SEO is a large topic, so we have broken the strategy into small, easy-to-implement steps, taking the guesswork out of how to use the data from SEO tools and giving CMOs a solid path to increase their SEO results.

      This is a picture of Terra Higginson

      Terra Higginson
      Marketing Research Director
      SoftwareReviews

      Executive Summary

      Your Challenge

      Digital marketers working with an outdated or bad SEO strategy often see:

      • Declining keyword ranking and traffic
      • Poor keyword strategy
      • On-page errors

      Search algorithms change all the time, which means that the strategy is often sitting on the sifting sands of technology, making SEO strategies quickly outdated.

      Common Obstacles

      Digital marketers are responsible for developing and implementing a competitive SEO strategy but increasingly encounter the following obstacles:

      • SEO practitioners that focus on gaming the system
      • Ever-changing SEO technology
      • Lack of understanding of the best SEO techniques
      • SEO techniques focus on the needs of computers, not people
      • Lack of continued investment

      SoftwareReviews' Approach

      Using the SoftwareReviews methodology, digital marketers are able to break up their SEO project and data into bite-sized, actionable steps that focus on long-term improvement. Our methodology includes:

      • Competitive keyword research and identification of opportunities
      • On-page keyword strategy

      Our methodology will take a focused step-by-step strategy in a series of phases that will increase PageRank and competitive positioning.

      SoftwareReviews' SEO Methodology

      In this blueprint, we will cover:

      Good SEO vs. Poor SEO Techniques

      The difference between good and bad SEO techniques.

      Common Good
      SEO Techniques

      Common Poor
      SEO Techniques

      • Writing content for people, not machines.
      • Using SEO tools to regularly adjust and update SEO content, keywords, and backlinks.
      • Pillar and content cluster strategy in addition to a basic on- and off-page strategy.
      • Keyword stuffing and content duplication.
      • A strategy that focuses on computers first and people second.
      • Low-quality or purchased backlinks.

      Companies With Great SEO…

      Keyword Strategy

      • Have identified a keyword strategy that carves out targets within the white space available between themselves and the competition.

      Error-Free Site

      • Have error-free sites without duplicate content. Their URLs and redirects are all updated. Their site is responsive, and every page loads in under two seconds.

      Pillar & Content Clusters

      • Employ a pillar and content cluster strategy to help move the buyer through their journey.

      Authentic Off-Page Strategy

      • Build an authentic backlink strategy that incorporates the right information on the right sites to move the buyer through their journey.

      SEO Terms Defined

      A glossary to define common Phase 1 SEO terms.

      Search Volume: this measures the number of times a keyword is searched for in a certain time period. Target keywords with a volume of between 100-100,000. A search volume greater than 100,000 will be increasingly difficult to rank (A Beginner's Guide to Keyword Search Volume, 2022, Semrush).

      Keyword Difficulty: the metric that quantifies how difficult it will be to rank for a certain keyword. The keyword difficulty percentage includes the number of competitors attempting to rank for the same keyword, the quality of their content, the search intent, backlinks, and domain authority (Keyword Difficulty: What Is It and Why Is It Important? 2022, Semrush).

      Intent: this metric focuses on the intent of the user's search. All search intent is categorized into Informational, Commercial, Navigational, and Transactional (What Is Search Intent? A Complete Guide, 2022, Semrush).

      On-Page SEO: refers to the practice of search engine optimizing elements of your site such as title tags, internal links, HTML code, URL optimization, on-page content, images, and user experience.

      Off-Page SEO: refers to the practice of optimizing brand awareness (What Is Off-Page SEO? A Comprehensive Guide, 2022, Semrush).

      H1: HTML code that tells a search engine the title of the page (neilpatel.com).

      SEO Tool: A subscription-based all-in-one search engine optimization MarTech tool.

      Google's mission is to organize the world's information and make it universally accessible and useful… We believe Search should deliver the most relevant and reliable information available.
      – An excerpt from Google's mission statement

      Your Challenge

      Google makes over 4.5k algorithm changes per year1, directly impacting digital marketing search engine optimization efforts.

      Digital marketers with SEO problems will often see the following issues:

      • Keyword ranking – A decline in keyword ranking is alarming and results in decreased PageRank.
      • Bounce rate – Attracting the wrong audience to your site will increase the bounce rate because the H1 doesn't resonate with your audience.
      • Outdated keywords – Many companies are operating on a poor keyword strategy, or even worse, no keyword strategy. In addition, many marketers haven't updated their strategy to include pillar and cluster content.
      • Errors – Neglected sites often have a large number of errors.
      • Bad backlinks – Neglected sites often have a large number of toxic backlinks.

      The best place to hide a dead body is on page two of the search results.
      – Huffington Post

      Common Obstacles

      Digital marketers are responsible for developing and executing a competitive SEO strategy but increasingly encounter the following obstacles:

      • Inefficient and ineffective SEO practitioners.
      • Changing SEO technology and search engine algorithms.
      • Lack of understanding of the best-in-class SEO techniques.
      • Lack of a sustainable plan to manage the strategy and invest in SEO.

      SEO is a helpful activity when it's applied to people-first content. However, content created primarily for search engine traffic is strongly correlated with content that searchers find unsatisfying.
      – Google Search Central Blog

      Benefits of Proper SEO

      A good SEO keyword strategy will create long-term, sustainable SEO growth:

      • Write content for people, not algorithms – Good SEO prioritizes the needs of humans over the needs of computers, being ever thoughtful of the meaning of content and keywords.
      • Content that aligns with intent – Content and keyword intent will align with the buyer journey to help move prospects through the funnel.
      • Competitive keyword strategy – Find keyword white space for your brand. Keywords will be selected to optimize your ranking among competition with reasonable and sustainable targets.
      • Actionable and impactful fixes – By following the SoftwareReviews phases of SEO, you will be able to take a very large task and divide it into conquerable actions. Small improvements everyday lead to very large improvements over time.

      Digital Marketing SEO Stats

      61%
      61% of marketers believe that SEO is the key to online success.
      Source: Safari Digital

      437%
      Updating an existing title tag with an SEO optimised one can increase page clicks by more than 437%.
      Source: Safari Digital

      Good SEO Aligns With Search Intent

      What type of content is the user searching for? Align your keyword to the logical search objective.

      Informational

      This term categorizes search intent for when a user wants to inform or educate themselves on a specific topic.

      Commercial

      This term categorizes search intent for when a user wants to do research before making a purchase.

      Transactional

      This term categorizes search intent for when a user wants to purchase something.

      Navigational

      This term categorizes search intent for when a user wants to find a specific page.

      SoftwareReviews' Methodology toCreate an Effective SEO Strategy

      1. Competitive Analysis & Keyword Discovery 2. On-Page Keyword Optimization
      Phase Steps
      1. Make a list of keywords in your current SEO strategy – including search volume, keyword difficulty percentage, intent.
      2. Research the keywords of top competitors.
      3. Make a list of target keywords you would like to own – including the search volume, keyword difficulty percentage, and intent. Make sure that these keywords align with your buyer persona.
      1. List product and service pages, along with the URL and current ranking(s) for the keyword(s) for that URL.
      2. Create a new individual page strategy for each URL. Record the current keyword, rank, title tag, H1 tag, and meta description. Then, with keyword optimization in mind, develop the new title tag, new H1 tag, and new meta description. Build the target keywords into the pages and tags.
      3. Record the current ranking for the pages' keywords then reassess after three to six months.
      Phase Outcomes
      • Understanding of competitive landscape for SEO
      • A list of target new keywords
      • Keyword optimized product and service pages

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2

      Call #1: Identify your current SEO keyword strategy.

      Call #2: Discuss how to start a competitive keyword analysis.

      Call #4: Discuss how to build the list of target keywords.

      Call #6: Discuss keyword optimization of the product & services pages.

      Call #8: (optional)

      Schedule a call to update every three to six months.

      Call #3: Discuss the results of the competitive keyword analysis.

      Call #5: Discuss which pages to update with new target keywords.

      Call #7: Review final page content and tags.

      Call #9: Schedule a call for SEO Phase 2: On-Page Technical Refinement.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 12 calls over the course of 1 to 2 months.

      Guided Implementation

      What does a typical GI on this topic look like?

      Phase 1 Phase 2

      Call #1: Identify your current SEO keyword strategy.

      Call #2: Discuss how to start a competitive keyword analysis.

      Call #4: Discuss how to build the list of target keywords.

      Call #6: Discuss keyword optimization of the product & services pages.

      Call #8: (optional)

      Schedule a call to update every three to six months.

      Call #3: Discuss the results of the competitive keyword analysis.

      Call #5: Discuss which pages to update with new target keywords.

      Call #7: Review final page content and tags.

      Call #9: Schedule a call for SEO Phase 2: On-Page Technical Refinement.

      A Guided Implementation (GI) is a series of calls with an Info-Tech analyst to help implement our best practices in your organization.

      A typical GI is between 8 to 12 calls over the course of 1 to 2 months.

      SoftwareReviews offers various levels of support to best suit your needs

      Included Within an Advisory Membership Optional Add-Ons
      DIY Toolkit Guided Implementation Workshop Consulting
      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful." "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track." "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place." "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Insight Summary

      People-First Content

      Best-in-class SEO practitioners focus on people-first content, not computer-first content. Search engine algorithms continue to focus on how to rank better content first, and a strategy that moves your buyers through the funnel in a logical and cohesive way will beat any SEO trick over the long run.

      Find White Space

      A good SEO strategy uses competitive research to carve out white space and give them a competitive edge in an increasingly difficult ranking algorithm. An understanding of the ideal client profile and the needs of their buyer persona(s) sit as a pre-step to any good SEO strategy.

      Optimize On-Page Keywords

      By optimizing the on-page strategy with competitively relevant keywords that target your ideal client profile, marketers are able to take an easy first step at improving the SEO content strategy.

      Understand the Strategy

      If you don't understand the strategy of your SEO practitioner, you are in trouble. Marketers need to work hand in hand with their SEO specialists to quickly uncover gaps, create a strategy that aligns with the buyer persona(s), and execute the changes.

      Quality Trumps Quantity

      The quality of the prospect that your SEO efforts bring to your site is more important than the number of people brought to your site.

      Stop Here and Ask Yourself:

      • Do I have an updated (completed within the last two years) buyer persona and journey?
      • Do I know who the ICP (ideal client profile) is for my product or company?

      If not, stop here, and we can help you define your buyer persona and journey, as well as your ideal client profile before moving forward with SEO Phase 1.

      The Steps to SEO Phase 1

      The Keyword Strategy

      1. Current Keywords
        • Identify the keywords your SEO strategy is currently targeting.
      2. Competitive Analysis
        • Research the keywords of competitor(s). Identify keyword whitespace.
      3. New Target Keywords
        • Identify and rank keywords that will result in more quality leads and less competition.
      4. Product & Service Pages
        • Identify your current product and service pages. These pages represent the easiest content to update on your site.
      5. Individual Page Update
        • Develop an SEO strategy for each of your product and service pages, include primary target keyword, H1, and title tags, as well as keyword-rich description.

      Resources Needed for Search Engine Optimization

      Consider the working skills required for search engine optimization.

      Required Skills/Knowledge

      • SEO
      • Web development
      • Competitive analysis
      • Content creation
      • Understanding of buyer persona and journey
      • Digital marketing

      Suggested Titles

      • SEO Analyst
      • Competitive Intelligence Analyst
      • Content Marketing Manager
      • Website Developer
      • Digital Marketing Manager

      Digital Marketing Software

      • CMS that allows you to easily access and update your content

      SEO Software

      • SEO tool

      Step 1: Current Keywords

      Use this sheet to record your current keyword research.

      Use your SEO tool to research keywords and find the following:
      Use a quality tool like SEMRush to obtain SEO data.

      1. Keyword difficulty
      2. Search volume
      3. Search intent

      This is a screenshot of the SEO tool SEMRush, which can be used to identify current keywords.

      Step 2: Competitive Analysis

      Use this sheet to guide the research on your competitors' keywords.

      Use your SEO tool to find the following:

      1. Top organic keywords
      2. Ranking of keywords
      3. Domain authority and trust
      4. Position changes

      This is a screenshot of the SEO tool SEMRush, which can be used to perform an competitive analysis

      Step 3: New Target Keywords

      Use this sheet to record target keywords that have a good volume but are less competitive. The new target keywords should align with your buyer persona and their journey.

      Use your SEO tool to research keywords and find the following:
      Use a quality tool like SEMRush to obtain SEO data.

      1. Keyword difficulty
      2. Search volume
      3. Search intent

      This is a screenshot of the SEO tool SEMRush, which can be used to identify new target keywords.

      Step 4: Product & Service Pages

      Duplicate this page so that you have a separate page for each URL from Step 4

      Use this sheet to identify your current product and service pages.

      Use your SEO tool to find the following:

      1. Current rank
      2. Current keywords

      This is a screenshot of the SEO tool SEMRush, showing where you can display product and service pages.

      Step 5: Individual Page Strategy

      Develop a keyword strategy for each of your product and service pages. Use a fresh page for each URL.

      Date last optimized:
      mm/dd/yyyy

      This is a screenshot of the SEO tool SEMRush, with an example of how you can use an individual page strategy to develop a keyword strategy.

      Bibliography

      Council, Y. "Council Post: The Rundown On Black Hat SEO Techniques And Why You Should Avoid Them." Forbes, 2022. Accessed September 2022.

      "Our approach – How Google Search works." Google Search. Accessed September 2022.

      "The Best Place to Hide a Dead Body is Page Two of Google." HuffPost, 2022. Accessed September 2022.

      Patel, Neil. "How to Create the Perfect H1 Tag for SEO." neilpatel.com. Accessed September 2022.

      Schwartz, B. "Google algorithm updates 2021 in review: Core updates, product reviews, page experience and beyond." Search Engine Land, 2022. Accessed September 2022.

      Schwartz, B. "Google algorithm updates 2021 in review: Core updates, product reviews, page experience and beyond." Search Engine Land, 2022. Accessed September 2022.

      Establish an Effective IT Steering Committee

      • Buy Link or Shortcode: {j2store}191|cart{/j2store}
      • member rating overall impact: 9.6/10 Overall Impact
      • member rating average dollars saved: $44,821 Average $ Saved
      • member rating average days saved: 11 Average Days Saved
      • Parent Category Name: IT Governance, Risk & Compliance
      • Parent Category Link: /it-governance-risk-and-compliance
      • Unfortunately, when CIOs implement IT steering committees, they often lack the appropriate structure and processes to be effective.
      • Due to the high profile of the IT steering committee membership, CIOs need to get this right – or their reputation is at risk.

      Our Advice

      Critical Insight

      • 88% of IT steering committees fail. The organizations that succeed have clearly defined responsibilities that are based on business needs.
      • Without a documented process your committee can’t execute on its responsibilities. Clearly define the flow of information to make your committee actionable.
      • Limit your headaches by holding your IT steering committee accountable for defining project prioritization criteria.

      Impact and Result

      Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction through an effective IT steering committee. This blueprint will provide three core customizable deliverables that you can use to launch or optimize your IT steering committee:

      • IT Steering Committee Charter: Use this template in combination with this blueprint to form a highly tailored committee.
      • IT Steering Committee Stakeholder Presentation: Build understanding around the goals and purpose of the IT steering committee, and generate support from your leadership team.
      • IT Steering Committee Project Prioritization Tool: Engage your IT steering committee participants in defining project prioritization criteria. Track project prioritization and assess your portfolio.

      Establish an Effective IT Steering Committee Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should establish an IT steering committee, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build the steering committee charter

      Build your IT steering committee charter using results from the stakeholder survey.

      • Establish an Effective IT Steering Committee – Phase 1: Build the Steering Committee Charter
      • IT Steering Committee Stakeholder Survey
      • IT Steering Committee Charter

      2. Define IT steering commitee processes

      Define your high level steering committee processes using SIPOC, and select your steering committee metrics.

      • Establish an Effective IT Steering Committee – Phase 2: Define ITSC Processes

      3. Build the stakeholder presentation

      Customize Info-Tech’s stakeholder presentation template to gain buy-in from your key IT steering committee stakeholders.

      • Establish an Effective IT Steering Committee – Phase 3: Build the Stakeholder Presentation
      • IT Steering Committee Stakeholder Presentation

      4. Define the prioritization criteria

      Build the new project intake and prioritization process for your new IT steering committee.

      • Establish an Effective IT Steering Committee – Phase 4: Define the Prioritization Criteria
      • IT Steering Committee Project Prioritization Tool
      • IT Project Intake Form
      [infographic]

      Workshop: Establish an Effective IT Steering Committee

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build the IT Steering Committee

      The Purpose

      Lay the foundation for your IT steering committee (ITSC) by surveying your stakeholders and identifying the opportunities and threats to implementing your ITSC.

      Key Benefits Achieved

       An understanding of the business environment affecting your future ITSC and identification of strategies for engaging with stakeholders

      Activities

      1.1 Launch stakeholder survey for business leaders.

      1.2 Analyze results with an Info-Tech advisor.

      1.3 Identify opportunities and threats to successful IT steering committee implementation.

      1.4 Develop the fit-for-purpose approach.

      Outputs

      Report on business leader governance priorities and awareness

      Refined workshop agenda

      2 Define the ITSC Goals

      The Purpose

      Define the goals and roles of your IT steering committee.

      Plan the responsibilities of your future committee members.

      Key Benefits Achieved

       Groundwork for completing the steering committee charter

      Activities

      2.1 Review the role of the IT steering committee.

      2.2 Identify IT steering committee goals and objectives.

      2.3 Conduct a SWOT analysis on the five governance areas

      2.4 Define the key responsibilities of the ITSC.

      2.5 Define ITSC participation.

      Outputs

      IT steering committee key responsibilities and participants identified

      IT steering committee priorities identified

      3 Define the ITSC Charter

      The Purpose

      Document the information required to create an effective ITSC Charter.

      Create the procedures required for your IT steering committee.

      Key Benefits Achieved

      Clearly defined roles and responsibilities for your steering committee

      Completed IT Steering Committee Charter document

      Activities

      3.1 Build IT steering committee participant RACI.

      3.2 Define your responsibility cadence and agendas.

      3.3 Develop IT steering committee procedures.

      3.4 Define your IT steering committee purpose statement and goals.

      Outputs

      IT steering committee charter: procedures, agenda, and RACI

      Defined purpose statement and goals

      4 Define the ITSC Process

      The Purpose

      Define and test your IT steering committee processes.

      Get buy-in from your key stakeholders through your stakeholder presentation.

      Key Benefits Achieved

      Stakeholder understanding of the purpose and procedures of IT steering committee membership

      Activities

      4.1 Define your high-level IT steering committee processes.

      4.2 Conduct scenario testing on key processes, establish ITSC metrics.

      4.3 Build your ITSC stakeholder presentation.

      4.4 Manage potential objections.

      Outputs

      IT steering committee SIPOC maps

      Refined stakeholder presentation

      5 Define Project Prioritization Criteria

      The Purpose

      Key Benefits Achieved

      Activities

      5.1 Create prioritization criteria

      5.2 Customize the project prioritization tool

      5.3 Pilot test the tool

      5.4 Define action plan and next steps

      Outputs

      IT Steering Committee Project Prioritization Tool

      Action plan

      Further reading

      Establish an Effective IT Steering Committee

      Have the right people making the right decisions to drive IT success.

      Our understanding of the problem

      This Research Is Designed For:

      • CIOs
      • IT Leaders

      This Research Will Also Assist:

      • Business Partners

      This Research Will Help You:

      • Structure an IT steering committee with the appropriate membership and responsibilities
      • Define appropriate cadence around business involvement in IT decision making
      • Define your IT steering committee processes, metrics, and timelines
      • Obtain buy-in for IT steering committee participations
      • Define the project prioritization criteria

      This Research Will Help Them:

      • Understand the importance of IT governance and their role
      • Identify and build the investment prioritization criteria

      Executive Summary

      Situation

      • An effective IT steering committee (ITSC) is one of the top predictors of value generated by IT, yet only 11% of CIOs believe their committees are effective.
      • An effective steering committee ensures that the right people are involved in critical decision making to drive organizational value.

      Complication

      • Unfortunately, when CIOs do implement IT steering committees, they often lack the appropriate structure and processes to be effective.
      • Due to the high profile of the IT steering committee membership, CIOs need to get this right – or their reputation is at risk.

      Resolution

      Leverage Info-Tech’s process and deliverables to see dramatic improvements in your business satisfaction through an effective IT steering committee. This blueprint will provide three core customizable deliverables that you can use to launch or optimize your IT steering committee. These include:

      1. IT Steering Committee Charter: Customizable charter complete with example purpose, goals, responsibilities, procedures, RACI, and processes. Use this template in combination with this blueprint to get a highly tailored committee.
      2. IT Stakeholder Presentation: Use our customizable presentation guide to build understanding around the goals and purpose of the IT steering committee and generate support from your leadership team.
      3. IT Steering Committee Project Prioritization Tool: Engage your IT steering committee participants in defining the project prioritization criteria. Use our template to track project prioritization and assess your portfolio.

      Info-Tech Insight

      1. 88% of IT steering committees fail. The organizations that succeed have clearly defined responsibilities that are based on business needs.
      2. Without a documented process your committee can’t execute on its responsibilities. Clearly define the flow of information to make your committee actionable.
      3. Limit your headaches by holding your IT steering committee accountable for defining project prioritization criteria.

      IT Steering Committee

      Effective IT governance critical in driving business satisfaction with IT. Yet 88% of CIOs believe that their governance structure and processes are not effective. The IT steering committee (ITSC) is the heart of the governance body and brings together critical organizational stakeholders to enable effective decision making (Info-Tech Research Group Webinar Survey).

      IT STEERING COMMITTEES HAVE 3 PRIMARY OBJECTIVES – TO IMPROVE:

      1. Alignment: IT steering committees drive IT and business strategy alignment by having business partners jointly accountable for the prioritization and selection of projects and investments within the context of IT capacity.
      2. Accountability: The ITSC facilitates the involvement and commitment of executive management through clearly defined roles and accountabilities for IT decisions in five critical areas: investments, projects, risk, services, and data.
      3. Value Generation: The ITSC is responsible for the ongoing evaluation of IT value and performance of IT services. The committee should define these standards and approve remediation plans when there is non-achievement.

      "Everyone needs good IT, but no one wants to talk about it. Most CFOs would rather spend time with their in-laws than in an IT steering-committee meeting. But companies with good governance consistently outperform companies with bad. Which group do you want to be in?"

      – Martha Heller, President, Heller Search Associates

      An effective IT steering committee improves IT and business alignment and increases support for IT across the organization

      CEOs’ PERCEPTION OF IT AND BUSINESS ALIGNMENT

      67% of CIOs/CEOs are misaligned on the target role for IT.

      47% of CEOs believe that business goals are going unsupported by IT.

      64% of CEOs believe that improvement is required around IT’s understanding of business goals.

      28% of business leaders are supporters of their IT departments.

      A well devised IT steering committee ensures that core business partners are involved in critical decision making and that decisions are based on business goals – not who shouts the loudest. Leading to faster decision-making time, and better-quality decisions and outcomes.

      Source: Info-Tech CIO/CEO Alignment data

      Despite the benefits, 9 out of 10 steering committees are unsuccessful

      WHY DO IT STEERING COMMITTEES FAIL?

      1. A lack of appetite for an IT steering committee from business partners
      2. An effective ITSC requires participation from core members of the organization’s leadership team. The challenge is that most business partners don’t understand the benefits of an ITSC and the responsibilities aren’t tailored to participants’ needs or interests. It’s the CIOs responsibility to make this case to stakeholders and right-size the committee responsibilities and membership.
      3. IT steering committees are given inappropriate responsibilities
      4. The IT steering committee is fundamentally about decision making; it’s not a working committee. CIOs struggle with clarifying these responsibilities on two fronts: either the responsibilities are too vague and there is no clear way to execute on them within a meeting, or responsibilities are too tactical and require knowledge that participants do not have. Responsibilities should determine who is on the ITSC, not the other way around.
      5. Lack of process around execution
      6. An ITSC is only valuable if members are able to successfully execute on the responsibilities. Without well defined processes it becomes nearly impossible for the ITSC to be actionable. As a result, participants lack the information they need to make critical decisions, agendas are unmet, and meetings are seen as a waste of time.

      GOVERNANCE and ITSC and IT Management

      Organizations often blur the line between governance and management, resulting in the business having say over the wrong things. Understand the differences and make sure both groups understand their role.

      The ITSC is the most senior body within the IT governance structure, involving key business executives and focusing on critical strategic decisions impacting the whole organization.

      Within a holistic governance structure, organizations may have additional committees that evaluate, direct, and monitor key decisions at a more tactical level and report into the ITSC.

      These committees require specialized knowledge and are implemented to meet specific organizational needs. Those operational committees may spark a tactical task force to act on specific needs.

      IT management is responsible for executing on, running, and monitoring strategic activities as determined by IT governance.

      RELATIONSHIP BETWEEN STRATEGIC, TACTICAL, AND OPERATIONAL GROUPS

      Strategic IT Steering Committee
      Tactical

      Project Governance Service Governance

      Risk Governance Information Governance

      IT Management
      Operational Risk Task Force

      This blueprint focuses exclusively on building the IT steering committee. For more information on IT governance see Info-Tech’s blueprint Tailor an IT Governance Plan to Fit Organizational Needs.

      1. Governance of the IT Portfolio & Investments: ensures that funding and resources are systematically allocated to the priority projects that deliver value
      2. Governance of Projects: ensures that IT projects deliver the expected value, and that the PM methodology is measured and effective.
      3. Governance of Risks: ensures the organization’s ability to assess and deliver IT projects and services with acceptable risk.
      4. Governance of Services: ensures that IT delivers the required services at the acceptable performance levels.
      5. Governance of Information and Data: ensures the appropriate classification and retention of data based on business need.

      If these symptoms resonate with you, it might be time to invest in building an IT steering committee

      SIGNS YOU MAY NEED TO BUILD AN IT STEERING COMMITTEE

      As CIO I find that there is a lack of alignment between business and IT strategies.
      I’ve noticed that projects are thrown over the fence by stakeholders and IT is expected to comply.
      I’ve noticed that IT projects are not meeting target project metrics.
      I’ve struggled with a lack of accountability for decision making, especially by the business.
      I’ve noticed that the business does not understand the full cost of initiatives and projects.
      I don’t have the authority to say “no” when business requests come our way.
      We lack a standardized approach for prioritizing projects.
      IT has a bad reputation within the organization, and I need a way to improve relationships.
      Business partners are unaware of how decisions are made around IT risks.
      Business partners don’t understand the full scope of IT responsibilities.
      There are no SLAs in place and no way to measure stakeholder satisfaction with IT.

      Info-Tech’s approach to implementing an IT steering committee

      Info-Tech’s IT steering committee development blueprint will provide you with the required tools, templates, and deliverables to implement a right-sized committee that’s effective the first time.

      • Measure your business partner level of awareness and interest in the five IT governance areas, and target specific responsibilities for your steering committee based on need.
      • Customize Info-Tech’s IT Steering Committee Charter Template to define and document the steering committee purpose, responsibilities, participation, and cadence.
      • Build critical steering committee processes to enable information to flow into and out of the committee to ensure that the committee is able to execute on responsibilities.
      • Customize Info-Tech’s IT Steering Committee Stakeholder Presentation template to make your first meeting a breeze, providing stakeholders with the information they need, with less than two hours of preparation time.
      • Leverage our workshop guide and prioritization tools to facilitate a meeting with IT steering committee members to define the prioritization criteria for projects and investments and roll out a streamlined process.

      Info-Tech’s Four-Phase Process

      Key Deliverables:
      1 2 3 4
      Build the Steering Committee Charter Define ITSC Processes Build the Stakeholder Presentation Define the Prioritization Criteria
      • IT Steering Committee Stakeholder Survey
      • IT Steering Committee Charter
        • Purpose
        • Responsibilities
        • RACI
        • Procedures
      • IT Steering Committee SIPOC (Suppliers, Inputs, Process, Outputs, Customers)
      • Defined process frequency
      • Defined governance metrics
      • IT Steering Committee Stakeholder Presentation template
        • Introduction
        • Survey outcomes
        • Responsibilities
        • Next steps
        • ITSC goals
      • IT project prioritization facilitation guide
      • IT Steering Committee Project Prioritization Tool
      • Project Intake Form

      Leverage both COBIT and Info-Tech-defined metrics to evaluate the success of your program or project

      COBIT METRICS Alignment
      • Percent of enterprise strategic goals and requirements supported by strategic goals.
      • Level of stakeholder satisfaction with scope of the planned portfolio of programs and services.
      Accountability
      • Percent of executive management roles with clearly defined accountabilities for IT decisions.
      • Rate of execution of executive IT-related decisions.
      Value Generation
      • Level of stakeholder satisfaction and perceived value.
      • Number of business disruptions due to IT service incidents.
      INFO-TECH METRICS Survey Metrics:
      • Percent of business leaders who believe they understand how decisions are made in the five governance areas.
      • Percentage of business leaders who believe decision making involved the right people.
      Value of Customizable Deliverables:
      • Estimated time to build IT steering committee charter independently X cost of employee
      • Estimated time to build and generate customer stakeholder survey and generate reports X cost of employee
      • # of project interruptions due to new or unplanned projects

      CASE STUDY

      Industry: Consumer Goods

      Source: Interview

      Situation

      A newly hired CIO at a large consumer goods company inherited an IT department with low maturity from her predecessor. Satisfaction with IT was very low across all business units, and IT faced a lot of capacity constraints. The business saw IT as a bottleneck or red tape in terms of getting their projects approved and completed.

      The previous CIO had established a steering committee for a short time, but it had a poorly established charter that did not involve all of the business units. Also the role and responsibilities of the steering committee were not clearly defined. This led the committee to be bogged down in politics.

      Due to the previous issues, the business was wary of being involved in a new steering committee. In order to establish a new steering committee, the new CIO needed to navigate the bad reputation of the previous CIO.

      Solution

      The CIO established a new steering committee engaging senior members of each business unit. The roles of the committee members were clearly established in the new steering committee charter and business stakeholders were informed of the changes through presentations.

      The importance of the committee was demonstrated through the new intake and prioritization process for projects. Business stakeholders were impressed with the new process and its transparency and IT was no longer seen as a bottleneck.

      Results

      • Satisfaction with IT increased by 12% after establishing the committee and IT was no longer seen as red tape for completing projects
      • IT received approval to hire two more staff members to increase capacity
      • IT was able to augment service levels, allowing them to reinvest in innovative projects
      • Project prioritization process was streamlined

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      “Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful.”

      Guided Implementation

      “Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keep us on track.”

      Workshop

      “We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place.”

      Consulting

      “Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project.”

      Diagnostics and consistent frameworks used throughout all four options

      Establish an Effective IT Steering Committee

      Build the Steering Committee Charter Define ITSC Processes Build the Stakeholder Presentation Define the Prioritization Criteria
      Best-Practice Toolkit

      1.1 Survey Your Steering Committee Stakeholders

      1.2 Build Your ITSC Charter

      2.1 Build a SIPOC

      2.2 Define Your ITSC Process

      3.1 Customize the Stakeholder Presentation

      4.1 Establish your Prioritization Criteria

      4.2 Customize the Project Prioritization Tool

      4.3 Pilot Test Your New Prioritization Criteria

      Guided Implementations
      • Launch your stakeholder survey
      • Analyze the results of the survey
      • Build your new ITSC charter
      • Review your completed charter
      • Build and review your SIPOC
      • Review your high-level steering committee processes
      • Customize the presentation
      • Build a script for the presentation
      • Practice the presentation
      • Review and select prioritization criteria
      • Review the Project Prioritization Tool
      • Review the results of the tool pilot test
      Onsite Workshop

      Module 1:

      Build a New ITSC Charter

      Module 2:

      Design Steering Committee Processes

      Module 3:

      Present the New Steering Committee to Stakeholders

      Module 4:

      Establish Project Prioritization Criteria

      Phase 1 Results:
      • Customized ITSC charter

      Phase 2 Results:

      • Completed SIPOC and steering committee processes
      Phase 3 Results:
      • Customized presentation deck and script
      Phase 4 Results:
      • Customized project prioritization tool

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information.

      Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
      Activities

      Build the IT Steering Committee

      1.1 Launch stakeholder survey for business leaders

      1.2 Analyze results with an Info-Tech Advisor

      1.3 Identify opportunities and threats to successful IT steering committee implementation.

      1.4 Develop the fit-for-purpose approach

      Define the ITSC Goals

      2.1 Review the role of the IT steering committee

      2.2 Identify IT steering committee goals and objectives

      2.3 Conduct a SWOT analysis on the five governance areas

      2.4 Define the key responsibilities of the ITSC 2.5 Define ITSC participation

      Define the ITSC Charter

      3.1 Build IT steering committee participant RACI

      3.2 Define your responsibility cadence and agendas

      3.3 Develop IT steering committee procedures

      3.4 Define your IT steering committee purpose statement and goals

      Define the ITSC Process

      4.1 Define your high-level IT steering committee processes

      4.2 Conduct scenario testing on key processes, establish ITSC metrics

      4.3 Build your ITSC stakeholder presentation

      4.4 Manage potential objections

      Define Project Prioritization Criteria

      5.1 Create prioritization criteria

      5.2 Customize the Project Prioritization Tool

      5.3 Pilot test the tool

      5.4 Define action plan and next steps

      Deliverables
      1. Report on business leader governance priorities and awareness
      2. Refined workshop agenda
      1. IT steering committee priorities identified
      2. IT steering committee key responsibilities and participants identified
      1. IT steering committee charter: procedures, agenda, and RACI
      2. Defined purpose statement and goals
      1. IT steering committee SIPOC maps
      2. Refined stakeholder presentation
      1. Project Prioritization Tool
      2. Action plan

      Phase 1

      Build the IT Steering Committee Charter

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Formalize the Security Policy Program

      Proposed Time to Completion: 1-2 weeks

      Select Your ITSC Members

      Start with an analyst kick-off call:

      • Launch your stakeholder survey

      Then complete these activities…

      • Tailor the survey questions
      • Identify participants and tailor email templates

      With these tools & templates:

      • ITSC Stakeholder Survey
      • ITSC Charter Template

      Review Stakeholder Survey Results

      Review findings with analyst:

      • Review the results of the Stakeholder Survey

      Then complete these activities…

      • Customize the ITSC Charter Template

      With these tools & templates:

      • ITSC Charter Template

      Finalize the ITSC Charter

      Finalize phase deliverable:

      • Review the finalized ITSC charter with an Info-Tech analyst

      Then complete these activities…

      • Finalize any changes to the ITSC Charter
      • Present it to ITSC Members

      With these tools & templates:

      • ITSC Charter Template

      Build the IT Steering Committee Charter

      This step will walk you through the following activities:

      • Launch and analyze the stakeholder survey
      • Define your ITSC goals and purpose statement
      • Determine ITSC responsibilities and participants
      • Determine ITSC procedures

      This step involves the following participants:

      • CIO
      • IT Steering Committee
      • IT Leadership Team
      • PMO

      Key Insight:

      Be exclusive with your IT steering committee membership. Determine committee participation based on committee responsibilities. Select only those who are key decision makers for the activities the committee is responsible for and, wherever possible, keep membership to 5-8 people.

      Tailor Info-Tech’s IT Steering Committee Charter Template to define terms of reference for the ITSC

      1.1

      A charter is the organizational mandate that outlines the purpose, scope, and authority of the ITSC. Without a charter, the steering committee’s value, scope, and success criteria are unclear to participants, resulting in unrealistic stakeholder expectations and poor organizational acceptance.

      Start by reviewing Info-Tech’s template. Throughout this section we will help you to tailor its contents.

      Committee Purpose: The rationale, benefits of, and overall function of the committee.

      Responsibilities: What tasks/decisions the accountable committee is making.

      Participation: Who is on the committee

      RACI: Who is accountable, responsible, consulted, and informed regarding each responsibility.

      Committee Procedures and Agendas: Includes how the committee will be organized and how the committee will interact and communicate with business units.

      A screenshot of Info-Tech's <em data-verified=IT Steering Committee Charter Template.">

      IT Steering Committee Charter

      Take a data-driven approach to build your IT steering committee based on business priorities

      1.2

      Leverage Info-Tech’s IT Steering Committee Stakeholder Surveyand reports to quickly identify business priorities and level of understanding of how decisions are made around the five governance areas.

      Use these insights to drive the IT steering committee responsibilities, participation, and communication strategy.

      The Stakeholder Survey consists of 17 questions on:

      • Priority governance areas
      • Desired level of involvement in decision making in the five governance areas
      • Knowledge of how decisions are made
      • Five open-ended questions on improvement opportunities

      To simplify your data collection and reporting, Info-Tech can launch a web-based survey, compile the report data and assist in the data interpretation through one of our guided implementations.

      Also included is a Word document with recommended questions, if you prefer to manage the survey logistics internally.

      A screenshot of Info-Tech's first page of the <em data-verified=IT Steering Committee Stakeholder Survey "> A screenshot of Info-Tech's survey.

      Leverage governance reports to define responsibilities and participants, and in your presentation to stakeholders

      1.3

      A screenshot is displayed. It advises that 72% of stakeholders do <strong data-verified= understand how decisions around IT services are made (quality, availability, etc.). Two graphs are included in the screenshot. One of the bar graphs shows the satisfaction with the quality of decisions and transparency around IT services. The other bar graph displays IT decisions around service delivery and quality that involve the right people.">

      OVERALL PRIORITIES

      You get:

      • A clear breakdown of stakeholders’ level of understanding on how IT decisions are made in the five governance areas
      • Stakeholder perceptions on the level of IT and business involvement in decision making
      • Identification of priority areas

      So you can:

      • Get an overall pulse check for understanding
      • Make the case for changes in decision-making accountability
      • Identify which areas the IT steering committee should focus on
      A screenshot is displayed. It advises that 80% of stakeholders do <strong data-verified=not understand how decisions around IT investments or project and service resourcing are made. Two bar graphs are displayed. One of the bar graphs shows the satisfaction with the quality of decisions made around IT investments. The other graph display IT decisions around spending priorities involving the right people.">

      GOVERNANCE AREA REPORTS

      You get:

      • Satisfaction score for decision quality in each governance area
      • Breakdown of decision-making accountability effectiveness
      • Identified level of understanding around decision making
      • Open-ended comments

      So you can:

      • Identify the highest priority areas to change.
      • To validate changes in decision-making accountability
      • To understand business perspectives on decision making.

      Conduct a SWOT analysis of the five governance areas

      1.4

      1. Hold a meeting with your IT leadership team to conduct a SWOT analysis on each of the five governance areas. Start by printing off the following five slides to provide participants with examples of the role of governance and the symptoms of poor governance in each area.
      2. In groups of 1-2 people, have each group complete a SWOT analysis for one of the governance areas. For each consider:
      • Strengths: What is currently working well in this area?
      • Weaknesses: What could you improve? What are some of the challenges you’re experiencing?
      • Opportunities: What are some organizational trends that you can leverage? Consider whether your strengths or weaknesses that could create opportunities?
      • Threats: What are some key obstacles across people, process, and technology?
    • Have each team or individual rotate until each person has contributed to each SWOT. Add comments from the stakeholder survey to the SWOT.
    • As a group rank each of the five areas in terms of importance for a phase one IT steering committee implementation, and highlight the top 10 challenges, and the top 10 opportunities you see for improvement.
    • Document the top 10 lists for use in the stakeholder presentation.
    • INPUT

      • Survey outcomes
      • Governance overview handouts

      OUTPUT

      • SWOT analysis
      • Ranked 5 areas
      • Top 10 challenges and opportunities identified.

      Materials

      • Governance handouts
      • Flip chart paper, pens

      Participants

      • IT leadership team

      Governance of RISK

      Governance of risk establishes the risk framework, establishes policies and standards, and monitors risks.

      Governance of risk ensures that IT is mitigating all relevant risks associated with IT investments, projects, and services.

      GOVERNANCE ROLES:

      1. Defines responsibility and accountability for IT risk identification and mitigation.
      2. Ensures the consideration of all elements of IT risk, including value, change, availability, security, project, and recovery
      3. Enables senior management to make better IT decisions based on the evaluation of the risks involved
      4. Facilitates the identification and analysis of IT risk and ensures the organization’s informed response to that risk.

      Symptoms of poor governance of risk

      • Opportunities for value creation are missed by not considering or assessing IT risk, or by completely avoiding all risk.
      • No formal risk management process or accountabilities exist.
      • There is no business continuity strategy.
      • Frequent security breaches occur.
      • System downtime occurs due to failed IT changes.

      Governance of PPM

      Governance of the IT portfolio achieves optimum ROI through prioritization, funding, and resourcing.

      PPM practices create value if they maximize the throughput of high-value IT projects at the lowest possible cost. They destroy value when they foster needlessly sophisticated and costly processes.

      GOVERNANCE ROLES:

      1. Ensures that the projects that deliver greater business value get a higher priority.
      2. Provides adequate funding for the priority projects and ensures adequate resourcing and funding balanced across the entire portfolio of projects.
      3. Makes the business and IT jointly accountable for setting project priorities.
      4. Evaluate, direct, and monitor IT value metrics and endorse the IT strategy and monitor progress.

      Symptoms of poor governance of PPM/investments

      • The IT investment mix is determined solely by Finance and IT.
      • It is difficult to get important projects approved.
      • Projects are started then halted, and resources are moved to other projects.
      • Senior management has no idea what projects are in the backlog.
      • Projects are approved without a valid business case.

      Governance of PROJECTS

      Governance of projects improves the quality and speed of decision making for project issues.

      Don’t confuse project governance and management. Governance makes the decisions regarding allocation of funding and resources and reviews the overall project portfolio metrics and process methodology.

      Management ensures the project deliverables are completed within the constraints of time, budget, scope, and quality.

      GOVERNANCE ROLES:

      1. Monitors and evaluates the project management process and critical project methodology metrics.
      2. Ensures review and mitigation of project issue and that management is aware of projects in crisis.
      3. Ensures that projects beginning to show characteristics of failure cannot proceed until issues are resolved.
      4. Endorses the project risk criteria, and monitors major risks to project completion.
      5. Approves the launch and execution of projects.

      Symptoms of poor governance of projects

      • Projects frequently fail or get cancelled.
      • Project risks and issues are not identified or addressed.
      • There is no formal project management process.
      • There is no senior stakeholder responsible for making project decisions.
      • There is no formal project reporting.

      Governance of SERVICES

      Governance of services ensures delivery of a highly reliable set of IT services.

      Effective governance of services enables the business to achieve the organization’s goals and strategies through the provision of reliable and cost-effective services.

      GOVERNANCE ROLES:

      1. Ensures the satisfactory performance of those services critical to achieving business objectives.
      2. Monitors and directs changes in service levels.
      3. Ensures operational and performance objectives for IT services are met.
      4. Approves policy and standards on the service portfolio.

      Symptoms of poor governance of service

      • There is a misalignment of business needs and expectations with IT capability.
      • No metrics are reported for IT services.
      • The business is unaware of the IT services available to them.
      • There is no accountability for service level performance.
      • There is no continuous improvement plan for IT services.
      • IT services or systems are frequently unavailable.
      • Business satisfaction with IT scores are low.

      Governance of INFORMATION

      Governance of information ensures the proper handling of data and information.

      Effective governance of information ensures the appropriate classification, retention, confidentiality, integrity, and availability of data in line with the needs of the business.

      GOVERNANCE ROLES:

      1. Ensures the information lifecycle owner and process are defined and endorse by business leadership.
      2. Ensures the controlled access to a comprehensive information management system.
      3. Ensures knowledge, information, and data are gathered, analyzed, stored, shared, used, and maintained.
      4. Ensures that external regulations are identified and met.

      Symptoms of poor governance of information

      • There is a lack of clarity around data ownership, and data quality standards.
      • There is insufficient understanding of what knowledge, information, and data are needed by the organization.
      • There is too much effort spent on knowledge capture as opposed to knowledge transfer and re-use.
      • There is too much focus on storing and sharing knowledge and information that is not up to date or relevant.
      • Personnel see information management as interfering with their work.

      Identify the responsibilities of the IT steering committee

      1.5

      1. With your IT leadership team, review the typical responsibilities of the IT steering committee on the following slide.
      2. Print off the following slide, and in your teams of 1-2 have each group identify which responsibilities they believe the IT steering committee should have, brainstorm any additional responsibilities, and document their reasoning.
      3. Note: The bolded responsibilities are the ones that are most common to IT steering committees, and greyed out responsibilities are typical of a larger governance structure. Depending on their level of importance to your organization, you may choose to include the responsibility.

      4. Have each team present to the larger group, track the similarities and differences between each of the groups, and come to consensus on the list of responsibilities.
      5. Complete a sanity check – review your swot analysis and survey results. Do the responsibilities you’ve identified resolve the critical challenges or weaknesses?
      6. As a group, consider the responsibilities and consider whether you can reasonably implement those in one year, or if there are any that will need to wait until year two of the IT steering committee.
      7. Modify the list of responsibilities in Info-Tech’s IT Steering Committee Charter by deleting the responsibilities you do not need and adding any that you identified in the process.

      INPUT

      • SWOT analysis
      • Survey reports

      OUTPUT

      • Defined ITSC responsibilities documented in the ITSC Charter

      Materials

      • Responsibilities handout
      • Voting dots

      Participants

      • IT leadership team

      Typical IT steering committee and governance responsibilities

      The bolded responsibilities are those that are most common to IT steering committees, and responsibilities listed in grey are typical of a larger governance structure.

      INVESTMENTS / PPM

      • Establish the target investment mix
      • Evaluate and select programs/projects to fund
      • Monitor IT value metrics
      • Endorse the IT budget
      • Monitor and report on program/project outcomes
      • Direct the governance optimization
      • Endorse the IT strategy

      PROJECTS

      • Monitor project management metrics
      • Approve launch of projects
      • Review major obstacles to project completion
      • Monitor a standard approach to project management
      • Monitor and direct project risk
      • Monitor requirements gathering process effectiveness
      • Review feasibility studies and formulate alternative solutions for high risk/high investment projects

      SERVICE

      • Monitor stakeholder satisfaction with services
      • Monitor service metrics
      • Approve plans for new or changed service requirements
      • Monitor and direct changes in service levels
      • Endorse the enterprise architecture
      • Approve policy and standards on the service portfolio
      • Monitor performance and capacity

      RISK

      • Monitor risk management metrics
      • Review the prioritized list of risks
      • Monitor changes in external regulations
      • Maintain risk profiles
      • Approve the risk management emergency action process
      • Maintain a mitigation plan to minimize risk impact and likelihood
      • Evaluate risk management
      • Direct risk management

      INFORMATION / DATA

      • Define information lifecycle process ownership
      • Monitor information lifecycle metrics
      • Define and monitor information risk
      • Approve classification categories of information
      • Approve information lifecycle process
      • Set policies on retirement of information

      Determine committee membership based on the committee’s responsibilities

      • One of the biggest benefits to an IT steering committee is it involves key leadership from the various lines of business across the organization.
      • However, in most cases, more people get involved than is required, and all the committee ends up accomplishing is a lot of theorizing. Participants should be selected based on the identified responsibilities of the IT steering committee.
      • If the responsibilities don’t match the participants, this will negatively impact committee effectiveness as leaders become disengaged in the process and don’t feel like it applies to them or accomplishes the desired goals. Once participants begin dissenting, it’s significantly more difficult to get results.
      • Be careful! When you have more than one individual in a specific role, select only the people whose attendance is absolutely critical. Don’t let your governance collapse under committee overload!

      LIKELY PARTICIPANT EXAMPLES:

      MUNICIPALITY

      • City Manager
      • CIO/IT Leader
      • CCO
      • CFO
      • Division Heads

      EDUCATION

      • Provost
      • Vice Provost
      • VP Academic
      • VP Research
      • VP Public Affairs
      • VP Operations
      • VP Development
      • Etc.

      HEALTHCARE

      • President/CEO
      • CAO
      • EVP/ EDOs
      • VPs
      • CIO
      • CMO

      PRIVATE ORGANIZATIONS

      • CEO
      • CFO
      • COO
      • VP Marketing
      • VP Sales
      • VP HR
      • VP Product Development
      • VP Engineering
      • Etc.

      Identify committee participants and responsibility cadence

      1.6

      1. In a meeting with your IT leadership team, review the list of committee responsibilities and document them on a whiteboard.
      2. For each responsibility, identify the individuals whom you would want to be either responsible or accountable for that decision.
      3. Repeat this until you’ve completed the exercise for each responsibility.
      4. Group the responsibilities with the same participants and highlight groupings with less than four participants. Consider the responsibility and determine whether you need to change the wording to make it more applicable or if you should remove the responsibility.
      5. Review the grouping, the responsibilities within them, and their participants, and assess how frequently you would like to meet about them – annually, quarterly, or monthly. (Note: suggested frequency can be found in the IT Steering Committee Charter.)
      6. Subdivide the responsibilities for the groupings to determine your annual, quarterly, and monthly meeting schedule.
      7. Validate that one steering committee is all that is needed, or divide the responsibilities into multiple committees.
      8. Document the committee participants in the IT Steering Committee Charter and remove any unneeded responsibilities identified in the previous exercise.

      INPUT

      • List of responsibilities

      OUTPUT

      • ITSC participants list
      • Meeting schedule

      Materials

      • Whiteboard
      • Markers

      Participants

      • IT leadership team

      Committees can only be effective if they have clear and documented authority

      It is not enough to participate in committee meetings; there needs to be a clear understanding of who is accountable, responsible, consulted, and informed about matters brought to the attention of the committee.

      Each committee responsibility should have one person who is accountable, and at least one person who is responsible. This is the best way to ensure that committee work gets done.

      An authority matrix is often used within organizations to indicate roles and responsibilities in relation to processes and activities. Using the RACI model as an example, there is only one person accountable for an activity, although several people may be responsible for executing parts of the activity. In this model, accountable means end-to-end accountability for the process.

      RESPONSIBLE: The one responsible for getting the job done.

      ACCOUNTABLE: Only one person can be accountable for each task.

      CONSULTED: Involvement through input of knowledge and information.

      INFORMED: Receiving information about process execution and quality.

      A chart is depicted to show an example of the authority matrix using the RACI model.

      Define IT steering committee participant RACI for each of the responsibilities

      1.7

      1. Use the table provided in the IT Steering Committee Charter and edit he list of responsibilities to reflect the chosen responsibilities of your ITSC.
      2. Along the top of the chart list the participant names, and in the right hand column of the table document the agreed upon timing from the previous exercise.
      3. For each of the responsibilities identify whether participants are Responsible, Accountable, Consulted, or Informed by denoting an R, A, C, I, or N/A in the table. Use N/A if this is a responsibility that the participant has no involvement in.
      4. Review your finalized RACI chart. If there are participants who are only consulted or informed about the majority of responsibilities, consider removing them from the IT steering committee. You only want the decision makers on the committee.

      INPUT

      • Responsibilities
      • Participants

      OUTPUT

      • RACI documented in the ITSC Charter

      Materials

      • ITSC RACI template
      • Projector

      Participants

      • IT leadership

      Building the agenda may seem trivial, but it is key for running effective meetings

      49% of people consider unfocused meetings as the biggest workplace time waster.*

      63% of the time meetings do not have prepared agendas.*

      80% Reduction of time spent in meetings by following a detailed agenda and starting on time.*

      *(Source: http://visual.ly/fail-plan-plan-fail).

      EFFECTIVE MEETING AGENDAS:

      1. Have clearly defined meeting objectives.
      2. Effectively time-boxed based on priority items.
      3. Defined at least two weeks prior to the meetings.
      4. Evaluated regularly – are not static.
      5. Leave time at the end for new business, thus minimizing interruptions.

      BUILDING A CONSENT AGENDA

      A consent agenda is a tool to free up time at meetings by combining previously discussed or simple items into a single item. Items that can be added to the consent agenda are those that are routine, noncontroversial, or provided for information’s sake only. It is expected that participants read this information and, if it is not pulled out, that they are in agreement with the details.

      Members have the option to pull items out of the consent agenda for discussion if they have questions. Otherwise these are given no time on the agenda.

      Define the IT steering committee meeting agendas and procedures

      1.8

      Agendas

      1. Review the listed responsibilities, participants, and timing as identified in a previous exercise.
      2. Annual meeting: Identify if all of the responsibilities will be included in the annual meeting agenda (likely all governance responsibilities).
      3. Quarterly Meeting Agenda: Remove the meeting responsibilities from the annual meeting agenda that are not required and create a list of responsibilities for the quarterly meetings.
      4. Monthly Meeting Agenda: Remove all responsibilities from the list that are only annual or quarterly and compile a list of monthly meeting responsibilities.
      5. Review each responsibility, and estimate the amount of time each task will take within the meeting. We recommend giving yourself at least an extra 10-20% more time for each agenda item for your first meeting. It’s better to have more time than to run out.
      6. Complete the Agenda Template in the IT Steering Committee Charter.

      Procedures:

      1. Review the list of IT steering committee procedures, and replace the grey text with the information appropriate for your organization.

      INPUT

      • Responsibility cadence

      OUTPUT

      • ITSC annual, quarterly, monthly meeting agendas & procedures

      Materials

      • ITSC Charter

      Participants

      • IT leadership team

      Draft your IT steering committee purpose statement and goals

      1.9

      1. In a meeting with your IT leadership team – and considering the defined responsibilities, participants, and opportunities and threats identified – review the example goal statement in the IT Steering Committee Charter, and first identify whether any of these statements apply to your organization. Select the statements that apply and collaboratively make any changes needed.
      2. Define unique goal statements by considering the following questions:
        1. What three things would you realistically list for the ITSC to achieve.
        2. If you were to accomplish three things in the next year, what would those be?
      3. Document those goals in the IT Steering Committee Charter.
      4. With those goal statements in mind, consider the overall purpose of the committee. The purpose statement should be a reflection of what the committee does, why it does it, and the goals.
      5. Have each individual review the example purpose statement, and draft what they think a good purpose statement would be.
      6. Present each statement, and work together to determine a best of breed statement.
      7. Document this in the IT Steering Committee Charter.

      INPUT

      • Responsibilities, participants, top 10 lists of challenges and opportunities.

      OUTPUT

      • ITSC goals and purpose statement

      Materials

      • ITSC Charter

      Participants

      • IT leadership team

      CASE STUDY

      "Clearly defined Committee Charter allows CIO to escape the bad reputation of previous committee."

      Industry: Consumer Goods

      Source: Interview

      CHALLENGE

      The new CIO at a large consumer goods company had difficulty generating interest in creating a new IT steering committee. The previous CIO had created a steering committee that was poorly organized and did not involve all of the pertinent members. This led to a committee focused on politics that would often devolve into gossip. Also, many members were dissatisfied with the irregular meetings that would often go over their allotted time.

      In order to create a new committee, the new CIO needed to dispel the misgivings of the business leadership.

      SOLUTION

      The new CIO decided to build the new steering committee from the ground up in a systematic way.

      She collected information from relevant stakeholders about what they know/how they feel about IT and used this information to build a detailed charter.

      Using this info she outlined the new steering committee charter and included in it the:

      1. Purpose
      2. Responsibilities
      3. RACI Chart
      4. Procedures

      OUTCOME

      The new steering committee included all the key members of business units, and each member was clear on their roles in the meetings. Meetings were streamlined and effective. The adjustments in the charter and the improvement in meeting quality played a role in improving the satisfaction scores of business leaders with IT by 21%.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1

      A screenshot of activity 1.1 is displayed. 1.1 is about surveying your ITSC stakeholders.

      Survey your ITSC stakeholders

      Prior to the workshop, Info-Tech’s advisors will work with you to launch the IT Steering Committee Stakeholder Survey to understand business priorities and level of understanding of how decisions are made. Using this data, we will create the IT steering committee responsibilities, participation, and communication strategy.

      1.7

      A screenshot of activity 1.7 is displayed. 1.7 is about defining a participant RACI for each of the responsibilities.

      Define a participant RACI for each of the responsibilities

      The analyst will facilitate several exercises to help you and your stakeholders create an authority matrix. The output will be defined responsibilities and authorities for members.

      Phase 2

      Build the IT Steering Committee Process

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Define your ITSC Processes
      Proposed Time to Completion: 2 weeks

      Review SIPOCs and Process Creation

      Start with an analyst kick-off call:

      • Review the purpose of the SIPOC and how to build one

      Then complete these activities…

      • Build a draft SIPOC for your organization

      With these tools & templates:

      Phase 2 of the Establish an Effective IT Steering Committee blueprint

      Finalize the SIPOC

      Review Draft SIPOC:

      • Review and make changes to the SIPOC
      • Discuss potential metrics

      Then complete these activities…

      • Test survey link
      • Info-Tech launches survey

      With these tools & templates:

      Phase 2 of the Establish an Effective IT Steering Committee blueprint

      Finalize Metrics

      Finalize phase deliverable:

      • Finalize metrics

      Then complete these activities…

      • Establish ITSC metric triggers

      With these tools & templates:

      Phase 2 of the Establish an Effective IT Steering Committee blueprint

      Build the IT Steering Committee Process

      This step will walk you through the following activities:

      • Define high-level steering committee processes using SIPOC
      • Select steering committee metrics

      This step involves the following participants:

      • CIO
      • IT Steering Committee
      • IT Leadership Team
      • PMO

      Key Insight:

      Building high-level IT steering committee processes brings your committee to life. Having a clear process will ensure that you have the right information from the right sources so that committees can operate and deliver the appropriate output to the customers who need it.

      Build your high-level IT steering committee processes to enable committee functionality

      The IT steering committee is only valuable if members are able to successfully execute on responsibilities.

      One of the most common mistakes organizations make is that they build their committee charters and launch into their first meeting. Without defined inputs and outputs, a committee does not have the needed information to be able to effectively execute on responsibilities and is unable to meet its stated goals.

      The arrows in this picture represent the flow of information between the IT steering committee, other committees, and IT management.

      Building high-level processes will define how that information flows within and between committees and will enable more rapid decision making. Participants will have the information they need to be confident in their decisions.

      Strategic IT Steering Committee
      Tactical

      Project Governance Service Governance

      Risk Governance Information Governance

      IT Management
      Operational Risk Task Force

      Define the high-level process for each of the IT steering committee responsibilities

      Info-Tech recommends using SIPOC as a way of defining how the IT steering committee will operate.

      Derived from the core methodologies of Six Sigma process management, SIPOC – a model of Suppliers, Inputs, Processes, Outputs, Customers – is one of several tools that organizations can use to build high level processes. SIPOC is especially effective when determining process scope and boundaries and to gain consensus on a process.

      By doing so you’ll ensure that:

      1. Information and documentation required to complete each responsibility is identified.
      2. That the results of committee meetings are distributed to those customers who need the information.
      3. Inputs and outputs are identified and that there is defined accountability for providing these.

      Remember: Your IT steering committee is not a working committee. Enable effective decision making by ensuring participants have the necessary information and appropriate recommendations from key stakeholders to make decisions.

      Supplier Input
      Who provides the inputs to the governance responsibility. The documented information, data, or policy required to effectively respond to the responsibility.
      Process
      In this case this represents the IT steering committee responsibility defined in terms of the activity the ITSC is performing.
      Output Customer
      The outcome of the meeting: can be approval, rejection, recommendation, request for additional information, endorsement, etc. Receiver of the outputs from the committee responsibility.

      Define your SIPOC model for each of the IT steering committee responsibilities

      2.1

      1. In a meeting with your IT leadership, draw the SIPOC model on a whiteboard or flip-chart paper. Either review the examples on the following slides or start from scratch.
      2. If you are adjusting the following slides, consider the templates you already have which would be appropriate inputs and make adjustments as needed.

      For atypical responsibilities:

      1. Start with the governance responsibility and identify what specifically it is that the IT steering committee is doing with regards to that responsibility. Write that in the center of the model.
      2. As a group, consider what information or documentation would be required by the participants to effectively execute on the responsibility.
      3. Identify which individual will supply each piece of documentation. This person will be accountable for this moving forward.
      4. Outputs: Once the committee has met about the responsibility, what information or documentation will be produced. List all of those documents.
      5. Identify the individuals who need to receive the outputs of the information.
      6. Repeat this for all of the responsibilities.
      7. Once complete, document the SIPOC models in the IT Steering Committee Charter.

      INPUT

      • List of responsibilities
      • Example SIPOCs

      OUTPUT

      • SIPOC model for all responsibilities.

      Materials

      • Whiteboard
      • Markers
      • ITSC Charter

      Participants

      • IT leadership team

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Establish the target investment mix
      Supplier Input
      CIO
      • Target investment mix and rationale
      Process
      Responsibility: The IT steering committee shall review and approve the target investment mix.
      Output Customer
      • Approval of target investment mix
      • Rejection of target investment mix
      • Request for additional information
      • CFO
      • CIO
      • IT leadership
      SIPOC: Endorse the IT budget
      Supplier Input
      CIO
      • Recommendations

      See Info-Tech’s blueprint IT Budget Presentation

      Process

      Responsibility: Review the proposed IT budget as defined by the CIO and CFO.

      Output Customer
      • Signed endorsement of the IT budget
      • Request for additional information
      • Recommendation for changes to the IT budget.
      • CFO
      • CIO
      • IT leadership

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Monitor IT value metrics
      Supplier Input
      CIO
      • IT value dashboard
      • Key metric takeaways
      • Recommendations
      CIO Business Vision
      Process

      Responsibility: Review recommendations and either accept or reject recommendations. Refine go-forward metrics.

      Output Customer
      • Launch corrective task force
      • Accept recommendations
      • Define target metrics
      • CEO
      • CFO
      • Business executives
      • CIO
      • IT leadership
      SIPOC: Evaluate and select programs/projects to fund
      Supplier Input
      PMO
      • Recommended project list
      • Project intake documents
      • Prioritization criteria
      • Capacity metrics
      • IT budget

      See Info-Tech’s blueprint

      Grow Your Own PPM Solution
      Process

      Responsibility: The ITSC will approve the list of projects to fund based on defined prioritization criteria – in line with capacity and IT budget.

      It is also responsible for identifying the prioritization criteria in line with organizational priorities.

      Output Customer
      • Approved project list
      • Request for additional information
      • Recommendation for increased resources
      • PMO
      • CIO
      • Project sponsors

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Endorse the IT strategy
      Supplier Input
      CIO
      • IT strategy presentation

      See Info-Tech’s blueprint

      IT Strategy and Roadmap
      Process

      Responsibility: Review, understand, and endorse the IT strategy.

      Output Customer
      • Signed endorsement of the IT strategy
      • Recommendations for adjustments
      • CEO
      • CFO
      • Business executives
      • IT leadership
      SIPOC: Monitor project management metrics
      Supplier Input
      PMO
      • Project metrics report with recommendations
      Process

      Responsibility: Review recommendations around PM metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

      Output Customer
      • Accept project metrics performance
      • Accept recommendations
      • Launch corrective task force
      • Define target metrics
      • PMO
      • Business executives
      • IT leadership

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Approve launch of planned and unplanned project
      Supplier Input
      CIO
      • Project list and recommendations
      • Resourcing report
      • Project intake document

      See Info-Tech’s Blueprint:

      Grow Your Own PPM Solution
      Process

      Responsibility: Review the list of projects and approve the launch or reprioritization of projects.

      Output Customer
      • Approved launch of projects
      • Recommendations for changes to project list
      • CFO
      • CIO
      • IT leadership
      SIPOC: Monitor stakeholder satisfaction with services and other service metrics
      Supplier Input
      Service Manager
      • Service metrics report with recommendations
      Info-Tech End User Satisfaction Report
      Process

      Responsibility: Review recommendations around service metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

      Output Customer
      • Accept service level performance
      • Accept recommendations
      • Launch corrective task force
      • Define target metrics
      • Service manager
      • Business executives
      • IT leadership

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Approve plans for new or changed service requirements
      Supplier Input
      Service Manager
      • Service change request
      • Project request and change plan
      Process

      Responsibility: Review IT recommendations, approve changes, and communicate those to staff.

      Output Customer
      • Approved service changes
      • Rejected service changes
      • Service manager
      • Organizational staff
      SIPOC: Monitor risk management metrics
      Supplier Input
      CIO
      • Risk metrics report with recommendations
      Process

      Responsibility: Review recommendations around risk metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

      Output Customer
      • Accept risk register and mitigation strategy
      • Launch corrective task force to address risks
      • Risk manager
      • Business executives
      • IT leadership

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Review the prioritized list of risks
      Supplier Input
      Risk Manager
      • Risk register
      • Mitigation strategies
      See Info-Tech’s risk management research to build a holistic risk strategy.
      Process

      Responsibility: Accept the risk registrar and define any additional action required.

      Output Customer
      • Accept risk register and mitigation strategy
      • Launch corrective task force to address risks
      • Risk manager
      • IT leadership
      • CRO
      SIPOC: Define information lifecycle process ownership
      Supplier Input
      CIO
      • List of risk owner options with recommendations
      See Info-Tech’s related blueprint: Information Lifecycle Management
      Process

      Responsibility: Define responsibility and accountability for information lifecycle ownership.

      Output Customer
      • Defined information lifecycle owner
      • Organization wide.

      SIPOC examples for typical ITSC responsibilities

      SIPOC: Monitor information lifecycle metrics
      Supplier Input
      Information lifecycle owner
      • Information metrics report with recommendations
      Process

      Responsibility: Review recommendations around information management metrics and define target metrics. Endorse current effectiveness levels or determine corrective action.

      Output Customer
      • Accept information management performance
      • Accept recommendations
      • Launch corrective task force to address challenges
      • Define target metrics
      • IT leadership

      Define which metrics you will report to the IT steering committee

      2.2

      1. Consider your IT steering committee goals and the five IT governance areas.
      2. For each governance area, identify which metrics you are currently tracking and determine whether these metrics are valuable to IT, to the business, or both. For metrics that are valuable to business stakeholders determine whether you have an identified target metric.

      New Metrics:

      1. For each of the five IT governance areas review your SWOT analysis and document your key opportunities and weaknesses.
      2. For each, brainstorm hypotheses around why the opportunity was weak or was a success. For each hypothesis identify if there are any clear ways to measure and test the hypothesis.
      3. Review the list of metrics and select 5-7 metrics to track for each prioritized governance area.

      INPUT

      • List of responsibilities
      • Example SIPOCs

      OUTPUT

      • SIPOC model for all responsibilities

      Materials

      • Whiteboard
      • Markers

      Participants

      • IT leadership team

      IT steering committee metric triggers to consider

      RISK

      • Risk profile % increase
      • # of actionable risks outstanding
      • # of issues arising not identified prior
      • # of security breaches

      SERVICE

      • Number of business disruptions due to IT service incidents
      • Number of service requests by department
      • Number of service requests that are actually projects
      • Causes of tickets overall and by department
      • Percentage of duration attributed to waiting for client response

      PROJECTS

      • Projects completed within budget
      • Percentage of projects delivered on time
      • Project completion rate
      • IT completed assigned portion to scope
      • Project status and trend dashboard

      INFORMATION / DATA

      • % of data properly classified
      • # of incidents locating data
      • # of report requests by complexity
      • # of open data sets

      PPM /INVESTMENTS

      • CIO Business Vision (an Info-Tech diagnostic survey that helps align IT strategy with business goals)
      • Level of stakeholder satisfaction and perceived value
      • Percentage of ON vs. OFF cycle projects by area/silo
      • Realized benefit to business units based on investment mix
      • Percent of enterprise strategic goals and requirements supported by strategic goals
      • Target vs. actual budget
      • Reasons for off-cycle projects causing delays to planned projects

      CASE STUDY

      Industry: Consumer Goods

      Source: Interview

      "IT steering committee’s reputation greatly improved by clearly defining its process."

      CHALLENGE

      One of the major failings of the previous steering committee was its poorly drafted procedures. Members of the committee were unclear on the overall process and the meeting schedule was not well established.

      This led to low attendance at the meetings and ineffective meetings overall. Since the meeting procedures weren’t well understood, some members of the leadership team took advantage of this to get their projects pushed through.

      SOLUTION

      The first step the new CIO took was to clearly outline the meeting procedures in her new steering committee charter. The meeting agenda, meeting goals, length of time, and outcomes were outlined, and the stakeholders signed off on their participation.

      She also gave the participants a SIPOC, which helped members who were unfamiliar with the process a high-level overview. It also reacquainted previous members with the process and outlined changes to the previous, out-of-date processes.

      OUTCOME

      The participation rate in the committee meetings improved from the previous rate of approximately 40% to 90%. The committee members were much more satisfied with the new process and felt like their contributions were appreciated more than before.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      An image of an Info-Tech analyst is depicted.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1

      A screenshot of activity 2.1 is depicted. Activity 2.1 is about defining a SIPOC for each of the ITSC responsibilities.

      Define a SIPOC for each of the ITSC responsibilities

      Create SIPOCs for each of the governance responsibilities with the help of an Info-Tech advisor.

      2.2

      A screenshot of activity 2.2 is depicted. Activity 2.2 is about establishing the reporting metrics for the ITSC.

      Establish the reporting metrics for the ITSC

      The analyst will facilitate several exercises to help you and your stakeholders define the reporting metrics for the ITSC.

      Phase 3

      Build the Stakeholder Presentation

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Build the Stakeholder Presentation
      Proposed Time to Completion: 1 week

      Customize the Presentation

      Start with an analyst kick-off call:

      • Review the IT Steering Committee Stakeholder Presentation with an analyst

      Then complete these activities…

      • Schedule the first meeting and invite the ITSC members
      • Customize the presentation template

      With these tools & templates:

      IT Steering Committee Stakeholder Presentation


      Review and Practice the Presentation

      Review findings with analyst:

      • Review the changes made to the template
      • Practice the presentation and create a script

      Then complete these activities…

      • Hold the ITSC meeting

      With these tools & templates:

      • IT Steering Committee Stakeholder Presentation
      Review the First ITSC Meeting

      Finalize phase deliverable:

      • Review the outcomes of the first ITSC meeting and plan out the next steps

      Then complete these activities…

      • Review the discussion and plan next steps

      With these tools & templates:

      Establish an Effective IT Steering Committee blueprint

      Build the Stakeholder Presentation

      This step will walk you through the following activities:

      • Organizing the first ITSC meeting
      • Customizing an ITSC stakeholder presentation
      • Determine ITSC responsibilities and participants
      • Determine ITSC procedures

      This step involves the following participants:

      • CIO
      • IT Steering Committee
      • IT Leadership Team
      • PMO

      Key Insight:

      Stakeholder engagement will be critical to your ITSC success, don't just focus on what is changing. Ensure stakeholders know why you are engaging them and how it will help them in their role.

      Hold a kick-off meeting with your IT steering committee members to explain the process, responsibilities, and goals

      3.1

      Don’t take on too much in your first IT steering committee meeting. Many participants may not have participated in an IT steering committee before, or some may have had poor experiences in the past.

      Use this meeting to explain the role of the IT steering committee and why you are implementing one, and help participants to understand their role in the process.

      Quickly customize Info-Tech’s IT Steering Committee Stakeholder Presentation template to explain the goals and benefits of the IT steering committee, and use your own data to make the case for governance.

      At the end of the meeting, ask committee members to sign the committee charter to signify their agreement to participate in the IT steering committee.

      A screenshot of IT Steering Committee: Meeting 1 is depicted. A screenshot of the IT Steering Committee Challenges and Opportunities for the organization.

      Tailor the IT Steering Committee Stakeholder Presentation template: slides 1-5

      3.2 Estimated Time: 10 minutes

      Review the IT Steering Committee Stakeholder Presentation template. This document should be presented at the first IT steering committee meeting by the assigned Committee Chair.

      Customization Options

      Overall: Decide if you would like to change the presentation template. You can change the color scheme easily by copying the slides in the presentation deck and pasting them into your company’s standard template. Once you’ve pasted them in, scan through the slides and make any additional changes needed to formatting.

      Slide 2-3: Review the text on each of the slides and see if any wording should be changed to better suite your organization.

      Slide 4: Review your list of the top 10 challenges and opportunities as defined in section 2 of this blueprint. Document those in the appropriate sections. (Note: be careful that the language is business-facing; challenges and opportunities should be professionally worded.)

      Slide 5: Review the language on slide 5 to make any necessary changes to suite your organization. Changes here should be minimal.

      INPUT

      • Top 10 list
      • Survey report
      • ITSC Charter

      OUTPUT

      • Ready-to-present presentation for defined stakeholders

      Materials

      • IT Steering Committee Stakeholder Presentation

      Participants

      • IT Steering Committee Chair/CIO

      Tailor the IT Steering Committee Stakeholder Presentation template: slides 6-10

      3.2 Estimated Time: 10 minutes

      Customization Options

      Slide 6: The goal of this slide is to document and share the names of the participants on the IT steering committee. Document the names in the right-hand side based on your IT Steering Committee Charter.

      Slides 7-9:

      • Review the agenda items as listed in your IT Steering Committee Charter. Document the annual, quarterly, and monthly meeting responsibilities on the left-hand side of slides 7-9.
      • Meeting Participants: For each slide, list the members who are required for that meeting.
      • Document the key required reading materials as identified in the SIPOC charts under “inputs.”
      • Document the key meeting outcomes as identified in the SIPOC chart under “outputs.”

      Slide 10: Review and understand the rollout timeline. Make any changes needed to the timeline.

      INPUT

      • Top 10 list
      • Survey report
      • ITSC Charter

      OUTPUT

      • Ready-to-present presentation for defined stakeholders

      Materials

      • IT Steering Committee Stakeholder Presentation

      Participants

      • IT Steering Committee Chair/CIO

      Present the information to the IT leadership team to increase your comfort with the material

      3.3 Estimated Time: 1-2 hours

      1. Once you have finished customizing the IT Steering Committee Stakeholder Presentation, practice presenting the material by meeting with your IT leadership team. This will help you become more comfortable with the dialog and anticipate any questions that might arise.
      2. The ITSC chair will present the meeting deck, and all parties should discuss what they think went well and opportunities for improvement.
      3. Each business relationship manager should document the needed changes in preparation for their first meeting.

      INPUT

      • IT Steering Committee Stakeholder Presentation - Meeting 1

      Participants

      • IT leadership team

      Schedule your first meeting of the IT steering committee

      3.4

      By this point, you should have customized the meeting presentation deck and be ready to meet with your IT steering committee participants.

      The meeting should be one hour in duration and completed in person.

      Before holding the meeting, identify who you think is going to be most supportive and who will be least. Consider meeting with those individuals independently prior to the group meeting to elicit support or minimize negative impacts on the meeting.

      Customize this calendar invite script to invite business partners to participate in the meeting.

      Hello [Name],

      As you may have heard, we recently went through an exercise to develop an IT steering committee. I’d like to take some time to discuss the results of this work with you, and discuss ways in which we can work together in the future to better enable corporate goals.

      The goals of the meeting are:

      1. Discuss the benefits of an IT steering committee
      2. Review the results of the organizational survey
      3. Introduce you to our new IT steering committee

      I look forward to starting this discussion with you and working with you more closely in the future.

      Warm regards,

      CASE STUDY

      Industry:Consumer Goods

      Source: Interview

      "CIO gains buy-in from the company by presenting the new committee to its stakeholders."

      CHALLENGE

      Communication was one of the biggest steering committee challenges that the new CIO inherited.

      Members were resistant to joining/rejoining the committee because of its previous failures. When the new CIO was building the steering committee, she surveyed the members on their knowledge of IT as well as what they felt their role in the committee entailed.

      She found that member understanding was lacking and that their knowledge surrounding their roles was very inconsistent.

      SOLUTION

      The CIO dedicated their first steering committee meeting to presenting the results of that survey to align member knowledge.

      She outlined the new charter and discussed the roles of each member, the goals of the committee, and the overarching process.

      OUTCOME

      Members of the new committee were now aligned in terms of the steering committee’s goals. Taking time to thoroughly outline the procedures during the first meeting led to much higher member engagement. It also built accountability within the committee since all members were present and all members had the same level of knowledge surrounding the roles of the ITSC.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1

      A screenshot of Activity 3.1 is depicted. Activity 3.1 is about creating a presentation for ITSC stakeholders to be presented at the first ITSC meeting.

      Create a presentation for ITSC stakeholders to be presented at the first ITSC meeting

      Work with an Info-Tech advisor to customize our IT Steering Committee Stakeholder Presentation template. Use this presentation to gain stakeholder buy-in by making the case for an ITSC.

      Phase 4

      Define the Prioritization Criteria

      Phase 4 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation : Define the Prioritization Criteria
      Proposed Time to Completion: 4 weeks

      Discuss Prioritization Criteria

      Start with an analyst kick-off call:

      • Review sample project prioritization criteria and discuss criteria unique to your organization

      Then complete these activities...

      • Select the criteria that would be most effective for your organization
      • Input these into the tool

      With these tools & templates:

      IT Steering Committee Project Prioritization Tool

      Customize the IT Steering Committee Project Prioritization Tool

      Review findings with analyst:

      • Review changes made to the tool
      • Finalize criteria weighting

      Then complete these activities…

      • Pilot test the tool using projects from the previous year

      With these tools & templates:

      IT Steering Committee Project Prioritization Tool

      Review Results of the Pilot Test

      Finalize phase deliverable:

      • Review the results of the pilot test
      • Make changes to the tool

      Then complete these activities…

      • Input your current project portfolio into the prioritization tool

      With these tools & templates:

      IT Steering Committee Project Prioritization Tool

      Define the Project Prioritization Criteria

      This step will walk you through the following activities:

      • Selecting the appropriate project prioritization criteria for your organization
      • Developing weightings for the prioritization criteria
      • Filling in Info-Tech’s IT Steering Committee Project Prioritization Tool

      This step involves the following participants:

      • CIO
      • IT Steering Committee
      • IT Leadership Team
      • PMO

      Key Insight:

      The steering committee sets and agrees to principles that guide prioritization decisions. The agreed upon principles will affect business unit expectations and justify the deferral of requests that are low priority. In some cases, we have seen the number of requests drop substantially because business units are reluctant to propose initiatives that do not fit high prioritization criteria.

      Understand the role of the IT steering committee in project prioritization

      One of the key roles of the IT steering committee is to review and prioritize the portfolio of IT projects.

      What is the prioritization based on? Info-Tech recommends selecting four broad criteria with two dimensions under each to evaluate the value of the projects. The criteria are aligned with how the project generates value for the organization and the execution of the project.

      What is the role of the steering committee in prioritizing projects? The steering committee is responsible for reviewing project criteria scores and making decisions about where projects rank on the priority list. Planning, resourcing, and project management are the responsibility of the PMO or the project owner.

      Info-Tech’s Sample Criteria

      Value

      Strategic Alignment: How much a project supports the strategic goals of the organization.

      Customer Satisfaction: The impact of the project on customers and how visible a project will be with customers.

      Operational Alignment: Whether the project will address operational issues or compliance.

      Execution

      Financial: Predicted ROI and cost containment strategies.

      Risk: Involved with not completing projects and strategies to mitigate it.

      Feasibility: How easy the project is to complete and whether staffing resources exist.

      Use Info-Tech’s IT Steering Committee Project Prioritization Tool to catalog and prioritize your project portfolio

      4.1

      • Use Info-Tech’s IT Steering Committee Project Prioritization Tool in conjunction with the following activities to catalog and prioritize all of the current IT projects in your portfolio.
      • Assign weightings to your selected criteria to prioritize projects based on objective scores assigned during the intake process and adjust these weightings on an annual basis to align with changing organizational priorities and goals.
      • Use this tool at steering committee meetings to streamline the prioritization process and create alignment with the PMO and project managers.
      • Monitor ongoing project status and build a communication channel between the PMO and project managers and the IT steering committee.
      • Adjusting the titles in the Settings tab will automatically adjust the titles in the Project Data tab.
      • Note: To customize titles in the document you must unprotect the content under the View tab. Be sure to change the content back to protected after making the changes.
      A screenshot of Info-Tech's IT Steering Committee Project Prioritization Tool is depicted. The first page of the tool is shown. A screenshot of Info-Tech's IT Steering Committee Project Prioritization Tool is depicted. The page depicted is on the Intake and Prioritization Tool Settings.

      Establish project prioritization criteria and build the matrix

      4.2 Estimated Time: 1 hour

      1. During the second steering committee meeting, discuss the criteria you will be basing your project prioritization scoring on.
      2. Review Info-Tech’s prioritization criteria matrix, located in the Prioritization Criteria List tab of the IT Steering Committee Project Prioritization Tool, to gain ideas for what criteria would best suit your organization.
      3. Write these main criteria on the whiteboard and brainstorm criteria that are more specific for your organization; include these on the list as well.
      4. Discuss the criteria. Eliminate criteria that won’t contribute strongly to the prioritization process and vote on the remaining. Select four main criteria from the list.
      5. After selecting the four main criteria, write these on the whiteboard and brainstorm the dimensions that fall under the criteria. These should be more specific/measurable aspects of the criteria. These will be the statements that values are assigned to for prioritizing projects so they should be clear. Use the Prioritization Criteria List in the tool to help generate ideas.
      6. After creating the dimensions, determine what the scoring statements will be. These are the statements that will be used to determine the score out of 10 that the different dimensions will receive.
      7. Adjust the Settings and Project Data tabs in the IT Steering Committee Project Prioritization Tool to reflect your selections.
      8. Edit Info-Tech’s IT Project Intake Form or the intake form that you currently use to contain these criteria and scoring parameters.

      INPUT

      • Group input
      • IT Steering Committee Project Prioritization Tool

      OUTPUT

      • Project prioritization criteria to be used for current and future projects

      Materials

      • Whiteboard and markers

      Participants

      • IT steering committee
      • CIO
      • IT leadership

      Adjust prioritization criteria weightings to reflect organizational needs

      4.3 Estimated Time: 1 hour

      1. In the second steering committee meeting, after deciding what the project prioritization criteria will be, you need to determine how much weight (the importance) each criteria will receive.
      2. Use the four agreed upon criteria with two dimensions each, determined in the previous activity.
      3. Perform a $100 test to assign proportions to each of the criteria dimensions.
        1. Divide the committee into pairs.
        2. Tell each pair that they have $100 divide among the 4 major criteria based on how important they feel the criteria is.
        3. After dividing the initial $100, ask them to divide the amount they allocated to each criteria into the two sub-dimensions.
        4. Next, ask them to present their reasoning for the allocations to the rest of the committee.
        5. Discuss the weighting allotments and vote on the best one (or combination).
        6. Input the weightings in the Settings tab of the IT Steering Committee Project Prioritization Tool and document the discussion.
      4. After customizing the chart establish the owner of the document. This person should be a member of the PMO or the most suitable IT leader if a PMO doesn’t exist.
      5. Only perform this adjustment annually or if a major strategic change happens within the organization.

      INPUT

      • Group discussion

      OUTPUT

      • Agreed upon criteria weighting
      • Complete prioritization tool

      Materials

      • IT Steering Committee Project Prioritization Tool
      • Whiteboard and sticky notes

      Participants

      • IT steering committee
      • IT leadership

      Document the prioritization criteria weightings in Info-Tech’s IT Steering Committee Project Prioritization Tool.

      Configure the prioritization tool to align your portfolio with business strategy

      4.4 Estimated Time: 60 minutes

      Download Info-Tech’s Project Intake and Prioritization Tool.

      A screenshot of Info-Tech's Project Intake and Prioritization Tool.

      Rank: Project ranking will dynamically update relative to your portfolio capacity (established in Settings tab) and the Size, Scoring Progress, Remove from Ranking, and Overall Score columns. The projects in green represent top priorities based on these inputs, while yellow projects warrant additional consideration should capacity permit.

      Scoring Progress: You will be able to determine some items on the scorecard earlier in the scoring progress (such as strategic and operational alignment). As you fill in scoring columns on the Project Data tab, the Scoring Progress column will dynamically update to track progress.

      The Overall Score will update automatically as you complete the scoring columns (refer to Activity 4.2).

      Days in Backlog: This column will help with backlog management, automatically tracking the number of days since an item was added to the list based on day added and current date.

      Validate your new prioritization criteria using previous projects

      4.5 Estimated Time: 2 hours

      1. After deciding on the prioritization criteria, you need to test their validity.
      2. Look at the portfolio of projects that were completed in the previous year.
      3. Go through each project and score it according to the criteria that were determined in the previous exercise.
      4. Enter the scores and appropriate weighting (according to goals/strategy of the previous year) into the IT Steering Committee Project Prioritization Tool.
      5. Look at the prioritization given to the projects in reference to how they were previously prioritized.
      6. Adjust the criteria and weighting to either align the new prioritization criteria with previous criteria or to align with desired outcomes.
      7. After scoring the old projects, pilot test the tool with upcoming projects.

      INPUT

      • Information on previous year’s projects
      • Group discussion

      OUTPUT

      • Pilot tested project prioritization criteria

      Materials

      • IT Steering Committee Project Prioritization Tool

      Participants

      • IT steering committee
      • IT leadership
      • PMO

      Pilot the scorecard to validate criteria and weightings

      4.6 Estimated Time: 60 minutes

      1. Pilot your criteria and weightings in the IT Steering Committee Project Prioritization Tool using project data from one or two projects currently going through approval process.
      2. For most projects, you will be able to determine strategic and operational alignment early in the scoring process, while the feasibility and financial requirements will come later during business case development. Score each column as you can. The tool will automatically track your progress in the Scoring Progress column on the Project Data tab.

      Projects that are scored but not prioritized will populate the portfolio backlog. Items in the backlog will need to be rescored periodically, as circumstances can change, impacting scores. Factors necessitating rescoring can include:

      • Assumptions in business case have changed.
      • Organizational change – e.g. a new CEO or a change in strategic objectives.
      • Major emergencies or disruptions – e.g. a security breach.

      Score projects using the Project Data tab in Info-Tech’s IT Steering Committee Project Prioritization Tool

      A screenshot of Info-Tech's <em data-verified=IT Steering Committee Project Prioritization Tool is depicted. The Data Tab is shown.">

      Use Info-Tech’s IT Project Intake Form to streamline the project prioritization and approval process

      4.7

      • Use Info-Tech’s IT Project Intake Form template to streamline the project intake and prioritization process.
      • Customize the chart on page 2 to include the prioritization criteria that were selected during this phase of the blueprint.
      • Including the prioritization criteria at the project intake phase will free up a lot of time for the steering committee. It will be their job to verify that the criteria scores are accurate.
      A screenshot of Info-Tech's IT Project Intake Form is depicted.

      After prioritizing and selecting your projects, determine how they will be resourced

      Consult these Info-Tech blueprints on project portfolio management to create effective portfolio project management resourcing processes.

      A Screenshot of Info-Tech's Create Project Management Success Blueprint is depicted. Create Project Management Success A Screenshot of Info-Tech's Develop a Project Portfolio Management Strategy Blueprint is depicted. Develop a Project Portfolio Management Strategy

      CASE STUDY

      Industry: Consumer Goods

      Source: Interview

      "Clear project intake and prioritization criteria allow for the new committee to make objective priority decisions."

      CHALLENGE

      One of the biggest problems that the previous steering committee at the company had was that their project intake and prioritization process was not consistent. Projects were being prioritized based on politics and managers taking advantage of the system.

      The procedure was not formalized so there were no objective criteria on which to weigh the value of proposed projects. In addition to poor meeting attendance, this led to the overall process being very inconsistent.

      SOLUTION

      The new CIO, with consultation from the newly formed committee, drafted a set of criteria that focused on the value and execution of their project portfolio. These criteria were included on their intake forms to streamline the rating process.

      All of the project scores are now reviewed by the steering committee, and they are able to facilitate the prioritization process more easily.

      The objective criteria process also helped to prevent managers from taking advantage of the prioritization process to push self-serving projects through.

      OUTCOME

      This was seen as a contributor to the increase in satisfaction scores for IT, which improved by 12% overall.

      The new streamlined process helped to reduce capacity constraints on IT, and it alerted the company to the need for more IT employees to help reduce these constraints further. The IT department was given permission to hire two new additional staff members.

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      4.1

      A screenshot of activity 4.1 is depicted. Activity 4.1 was about defining your prioritization criteria and customize our <em data-verified=IT Steering Committee Project Prioritization Tool.">

      Define your prioritization criteria and customize our IT Steering Committee Project Prioritization Tool

      With the help of Info-Tech advisors, create criteria for determining a project’s priority. Customize the tool to reflect the criteria and their weighting. Run pilot tests of the tool to verify the criteria and enter your current project portfolio.

      Research contributors and experts

      • Andy Lomasky, Manager, Technology & Management Consulting, McGladrey LLP
      • Angie Embree, CIO, Best Friends Animal Society
      • Corinne Bell, CTO and Director of IT Services, Landmark College
      • John Hanskenecht, Director of Technology, University of Detroit Jesuit High School and Academy
      • Lori Baker, CIO, Village of Northbrook
      • Lynne Allard, IT Supervisor, Nipissing Parry Sound Catholic School Board
      • Norman Allen, Senior IT Manager, Baker Tilly
      • Paul Martinello, VP, IT Services, Cambridge and North Dumfries Hydro Inc.
      • Renee Martinez, IT Director/CIO, City of Santa Fe
      • Sam Wong, Director, IT, Seneca College
      • Suzanne Barnes, Director, Information Systems, Pathfinder International
      • Walt Joyce, CTO, Peoples Bank

      Appendices

      GOVERNANCE & ITSC & IT Management

      Organizations often blur the line between governance and management, resulting in the business having say over the wrong things. Understand the differences and make sure both groups understand their role.

      The ITSC is the most senior body within the IT governance structure, involving key business executives and focusing on critical strategic decisions impacting the whole organization.

      Within a holistic governance structure, organizations may have additional committees that evaluate, direct, and monitor key decisions at a more tactical level and report into the ITSC.

      These committees require specialized knowledge and are implemented to meet specific organizational needs. Those operational committees may spark a tactical task force to act on specific needs.

      IT management is responsible for executing on, running, and monitoring strategic activities as determined by IT governance.

      Strategic IT Steering Committee
      Tactical

      Project Governance Service Governance

      Risk Governance Information Governance

      IT Management
      Operational Risk Task Force

      This blueprint focuses exclusively on building the IT Steering committee. For more information on IT governance see Info-Tech’s related blueprint: Tailor an IT Governance Plan to Fit Organizational Needs.

      IT steering committees play an important role in IT governance

      By bucketing responsibilities into these areas, you’ll be able to account for most key IT decisions and help the business to understand their role in governance, fostering ownership and joint accountability.

      The five governance areas are:

      Governance of the IT Portfolio and Investments: Ensures that funding and resources are systematically allocated to the priority projects that deliver value.

      Governance of Projects: Ensures that IT projects deliver the expected value, and that the PM methodology is measured and effective.

      Governance of Risks: Ensures the organization’s ability to assess and deliver IT projects and services with acceptable risk.

      Governance of Services: Ensures that IT delivers the required services at the acceptable performance levels.

      Governance of Information and Data: Ensures the appropriate classification and retention of data based on business need.

      A survey of stakeholders identified a need for increased stakeholder involvement and transparency in decision making

      A bar graph is depicted. The title is: I understand how decisions are made in the following areas. The areas include risk, services, projects, portfolio, and information. A circle graph is depicted. The title is: Do IT decisions involve the right people?

      Overall, survey respondents indicated a lack of understanding about how decisions are made around risk, services, projects, and investments, and that business involvement in decision making was too minimal.

      Satisfaction with decision quality around investments and PPM are uneven and largely not well understood

      72% of stakeholders do not understand how decisions around IT services are made (quality, availability, etc.).

      A bar graph is depicted. The title is: How satisfied are you with the quality of decisions and transparency around IT services? A bar graph is depicted. Title of the graph: IT decisions around service delivery and quality involve the right people?

      Overall, services were ranked #1 in importance of the 5 areas

      62% of stakeholders do not understand how decisions around IT services are made (quality, availability, etc.).

      A bar graph is depicted. The title is: How satisfied are you with the quality of decisions and transparency around IT services? A bar graph is depicted. Title of the graph: IT decisions around service delivery and quality involve the right people?

      Projects ranked as one of the areas with which participants are most satisfied with the quality of decisions

      70% of stakeholders do not understand how decisions around projects selection, success, and changes are made.

      A bar graph is depicted. The title is: How satisfied are you with the quality of decisions and transparency around IT services? A bar graph is depicted. The title is: IT decisions around project changes, delays, and metrics involve the right people?

      Stakeholders are largely unaware of how decisions around risk are made and believe business participation needs to increase

      78% of stakeholders do not understand how decisions around risk are made

      A bar graph is depicted. The title is: How satisfied are you with the quality of decisions made around risk? A bar graph is depicted. The title is: IT decisions around acceptable risk involve the right people?

      The majority of stakeholders believe that they are aware of how decisions around information are made

      67% of stakeholders believe they do understand how decisions around information (data) retention and classification are made.

      A bar graph is depicted. The title is: How satisfied are you with the quality of decisions around information governance? A bar graph is depicted. The title is: IT decisions around information retention and classification involve the right people?

      Accelerate Digital Transformation With a Digital Factory

      • Buy Link or Shortcode: {j2store}93|cart{/j2store}
      • member rating overall impact: 10.0/10 Overall Impact
      • member rating average dollars saved: $50,000 Average $ Saved
      • member rating average days saved: 20 Average Days Saved
      • Parent Category Name: Innovation
      • Parent Category Link: /innovation
      • Organizational challenges are hampering digital transformation (DX) initiatives.
      • The organization’s existing digital factory is failing to deliver value.
      • Designing a successful digital factory is a difficult process.

      Our Advice

      Critical Insight

      To remain competitive, enterprises must deliver products and services like a startup or a digital native enterprise. This requires enterprises to:

      • Understand how digital native enterprises are designed.
      • Understand the foundations of good design: purpose, organizational support, and leadership.
      • Understand the design of the operating model: structure and organization, management practices, culture, environment, teams, technology platforms, and meaningful metrics and KPIs.

      Impact and Result

      Organizations that implement this project will draw benefits in the following aspects:

      • Gain awareness and understanding of various aspects that hamper DX.
      • Set the right foundations by having clarity of purpose, alignment on organizational support, and the right leadership in place.
      • Design an optimal operating model by setting up the right organizational structures, management practices, lean and optimal governance, agile teams, and an environment that promotes productivity and wellbeing.
      • Finally, set the right measures and KPIs.

      Accelerate Digital Transformation With a Digital Factory Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to understand the importance of a well-designed digital factory.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Build the case

      Collect data and stats that will help build a narrative for digital factory.

      • Digital Factory Playbook

      2. Lay the foundation

      Discuss purpose, mission, organizational support, and leadership.

      3. Design the operating model

      Discuss organizational structure, management, culture, teams, environment, technology, and KPIs.

      [infographic]

      Workshop: Accelerate Digital Transformation With a Digital Factory

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Build the case

      The Purpose

      Understand and gather data and stats for factors impacting digital transformation.

      Develop a narrative for the digital factory.

      Key Benefits Achieved

      Identification of key pain points and data collected

      Narrative to support the digital factory

      Activities

      1.1 Understand the importance and urgency of digital transformation (DX).

      1.2 Collect data and stats on the progress of DX initiatives.

      1.3 Identify the factors that hamper DX and tie them to data/stats.

      1.4 Build the narrative for the digital factory (DF) using the data/stats.

      Outputs

      Identification of factors that hamper DX

      Data and stats on progress of DX

      Narrative for the digital factory

      2 Lay the foundation

      The Purpose

      Discuss the factors that impact the success of establishing a digital factory.

      Key Benefits Achieved

      A solid understanding and awareness that successful digital factories have clarity of purpose, organizational support, and sound leadership.

      Activities

      2.1 Discuss

      2.2 Discuss what organizational support the digital factory will require and align and commit to it.

      2.3 Discuss reference models to understand the dynamics and the strategic investment.

      2.4 Discuss leadership for the digital age.

      Outputs

      DF purpose and mission statements

      Alignment and commitment on organizational support

      Understanding of competitive dynamics and investment spread

      Develop the profile of a digital leader

      3 Design the operating model (part 1)

      The Purpose

      Understand the fundamentals of the operating model.

      Understand the gaps and formulate the strategies.

      Key Benefits Achieved

      Design of structure and organization

      Design of culture aligned with organizational goals

      Management practices aligned with the goals of the digital factory

      Activities

      3.1 Discuss structure and organization and associated organizational pathologies, with focus on hierarchy and silos, size and complexity, and project-centered mindset.

      3.2 Discuss the importance of culture and its impact on productivity and what shifts will be required.

      3.3 Discuss management for the digital factory, with focus on governance, rewards and compensation, and talent management.

      Outputs

      Organizational design in the context of identified pathologies

      Cultural design for the DF

      Management practices and governance for the digital factory

      Roles/responsibilities for governance

      4 Design the operating model (part 2)

      The Purpose

      Understand the fundamentals of the operating model.

      Understand the gaps and formulate the strategies.

      Key Benefits Achieved

      Discuss agile teams and the roles for DF

      Environment design that supports productivity

      Understanding of existing and new platforms

      Activities

      4.1 Discuss teams and various roles for the DF.

      4.2 Discuss the impact of the environment on productivity and satisfaction and discuss design factors.

      4.3 Discuss technology and tools, focusing on existing and future platforms, platform components, and organization.

      4.4 Discuss design of meaningful metrics and KPIs.

      Outputs

      Roles for DF teams

      Environment design factors

      Platforms and technology components

      Meaningful metrics and KPIs

      Applications Priorities 2023

      • Buy Link or Shortcode: {j2store}186|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • Economic, social, and regulatory conditions have changed livelihoods, businesses, and marketplaces. Modern tools and technologies have acted as lifelines by minimizing operating and delivery costs, and in the process, establishing a strong foundation for growth and maturity.
      • These tools and technologies must meet the top business goals of CXOs: ensure service continuity, improve customer experience, and make data-driven decisions.
      • While today’s business applications are good and well received, there is still room for improvement. The average business application satisfaction score among IT leadership was 72% (n=1582, CIO Business Vision).

      Our Advice

      Critical Insight

      • Applications are critical components in any business strategic plan. They can directly influence an organization’s internal and external brand and reputation, such as their uniqueness, competitiveness and innovativeness in the industry
      • Business leaders are continuously looking for innovative ways to better position their application portfolio to satisfy their goals and objectives, i.e., application priorities. Given the scope and costs often involved, these priorities must be carefully crafted to clearly state achievable business outcomes that satisfies the different needs very different customers, stakeholders, and users.
      • Unfortunately, expectations on your applications team have increased while the gap between how stakeholders and applications teams perceive effectiveness remains wide. This points to a need to clarify the requirements to deliver valuable and quality applications and address the pressures challenging your teams.

      Impact and Result

      Learn and explore the technology and practice initiatives in this report to determine which initiatives should be prioritized in your application strategy and align to your business organizational objectives:

      • Optimize the effectiveness of the IT organization.
      • Boost the productivity of the enterprise.
      • Enable business growth through technology.

      Applications Priorities 2023 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Applications Priorities Report 2023 – A report that introduces and describes five opportunities to prioritize in your 2023 application strategy.

      In this report, we explore five priorities for emerging and leading-edge technologies and practices that can improve on capabilities needed to meet the ambitions of your organization.

      • Applications Priorities 2023 Report

      Infographic

      Further reading

      Applications Priorities 2023

      Applications are the engine of the business: keep them relevant and modern

      What we are facing today is transforming the ways in which we work, live, and relate to one another. Applications teams and portfolios MUST change to meet this reality.

      Economic, social, and regulatory conditions have changed livelihoods, businesses, and marketplaces. Modern tools and technologies have acted as lifelines by minimizing operating and delivery costs, and in the process, establishing a strong foundation for growth and maturity.

      As organizations continue to strengthen business continuity, disaster recovery, and system resilience, activities to simply "keep the lights on" are not enough. Be pragmatic in the prioritization and planning of your applications initiatives, and use your technologies as a foundation for your growth.

      Your applications must meet the top business goals of your CXOs

      • Ensure service continuity
      • Improve customer experience
      • Make data-driven decisions
      • Maximize stakeholder value
      • Manage risk

      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022, n=568.

      Select and align your applications priorities to your business goals and objectives

      Applications are critical components in any business strategic plan. They can directly influence an organization's internal and external brand and reputation, such as their:

      • Uniqueness, competitiveness, and innovativeness in the industry.
      • Ability to be dynamic, flexible, and responsive to changing expectations, business conditions, and technologies.

      Therefore, business leaders are continuously looking for innovative ways to better position their application portfolios to satisfy their goals and objectives, i.e. applications priorities. Given the scope and costs often involved, these priorities must be carefully crafted to clearly state achievable business outcomes that satisfy
      the different needs of very different customers, stakeholders, and users.

      Today's business applications are good but leave room for improvement

      72%
      Average business application satisfaction score among IT leadership in 1582 organizations.

      Source: CIO Business Vision, August 2021 to July 2022, N=190.

      Five Applications Priorities for 2023

      In this report, we explore five priorities for emerging and leading-edge technologies and practices that can improve on capabilities needed to meet the Ambitions of your organization.

      this is an image of the Five Applications Priorities for which will be addressed in this blueprint.

      Strengthen your foundations to better support your applications priorities

      These key capabilities are imperative to the success of your applications strategy.

      KPI and Metrics

      Easily attainable and insightful measurements to gauge the progress of meeting strategic objectives and goals (KPIs), and the performance of individual teams, practices and processes (metrics).

      BUSINESS ALIGNMENT

      Gain an accurate understanding and interpretation of stakeholder, end-user, and customer expectations and priorities. These define the success of business products and services considering the priorities of individual business units and teams.

      EFFICIENT DELIVERY & SUPPORT PRACTICE

      Software delivery and support roles, processes, and tools are collaborative, well equipped and resourced, and optimized to meet changing stakeholder expectations.

      Data Management & Governance

      Ensuring data is continuously reliable and trustworthy. Data structure and integrations are defined, governed, and monitored.

      Product & Service Ownership

      Complete inventory and rationalization of the product and service portfolio, prioritized backlogs, roadmaps, and clear product and service ownership with good governance. This helps ensure this portfolio is optimized to meet its goals and objectives.

      Strengthen your foundations to better support your applications priorities (cont'd)

      These key capabilities are imperative to the success of your applications strategy.

      Organizational Change Management

      Manage the adoption of new and modified processes and technologies considering reputational, human, and operational concerns.

      IT Operational Management

      Continuous monitoring and upkeep of products and services to assure business continuity, and system reliability, robustness and disaster recovery.

      Architectural Framework

      A set of principles and standards that guides the consistent, sustainable and scalable growth of enterprise technologies. Changes to the architecture are made in collaboration with affected parties, such as security and infrastructure.

      Application Security

      The measures, controls, and tactics at the application layer that prevent vulnerabilities against external and internal threats and ensure compliance to industry and regulatory security frameworks and standards.

      There are many factors that can stand in your team's way

      Expectations on your applications team have increased, while the gap between how stakeholders and applications teams perceive effectiveness remains wide. This points to a need to clarify the requirements to deliver valuable and quality applications and address the pressures challenging your teams.

      1. Attracting and retaining talent
      2. Maximizing the return on technology
      3. Confidently shifting to digital
      4. Addressing competing priorities
      5. Fostering a collaborative culture
      6. Creating high-throughput teams

      CIOs agree that at least some improvement is needed across key IT activities

      A bar graph is depicted which shows the proportion of CIOs who believe that some, or significant improvement is necessary for the following categories: Measure IT Project Success; Align IT Budget; Align IT Project Approval Process; Measure Stakeholder Satisfaction With IT; Define and Align IT Strategy; Understand Business Goals

      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022, n=568.

      Pressure Point 1:
      Attracting and Retaining Talent

      Recent environmental pressures impacted traditional working arrangements and showed more workplace flexibility is often possible. At the same time, many employees' expectations about how, when, and where they choose to work have also evolved. Recruitment and retention are reflections of different sides of the same employee value proposition coin. Organizations that fail to reinvent their approach to attracting and retaining talent by focusing on candidate and employee experience risk turnover, vacancies, and lost opportunities that can negatively impact the bottom line.

      Address the underlying challenges

      • Lack of employee empowerment and few opportunities for learning and development.
      • Poor coworker and manager relationships.
      • Compensation and benefits are inadequate to maintain desired quality of life.
      • Unproductive work environment and conflicting balance of work and life.
      • Unsatisfactory employee experience, including lack of employee recognition
        and transparency of organizational change.

      While workplace flexibility comes with many benefits, longer work hours jeopardize wellbeing.
      62% of organizations reported increased working hours, while 80% reported an increase in flexibility.
      Source: McLean & Company, 2022; n=394.

      Be strategic in how you fill and train key IT skills and capabilities

      • Cybersecurity
      • Big Data/Analytics
      • Technical Architecture
      • DevOps
      • Development
      • Cloud

      Source: Harvey Nash Group, 2021; n=2120.

      Pressure Point 2:
      Maximizing the Return of Technology

      Recent environmental pressures impacted traditional working arrangements and showed more workplace flexibility is often possible. At the same time, many employees' expectations about how, when, and where they choose to work have also evolved. Recruitment and retention are reflections of different sides of the same employee value proposition coin. Organizations that fail to reinvent their approach to attracting and retaining talent by focusing on candidate and employee experience risk turnover, vacancies, and lost opportunities that can negatively impact the bottom line.

      Address the underlying challenges

      • Inability to analyze, propose, justify, and communicate modernization solutions in language the stakeholders understand and in a way that shows they clearly support business priorities and KPIs and mitigate risks.
      • Little interest in documenting and rationalizing products and services through business-IT collaboration.
      • Lack of internal knowledge of the system and loss of vendor support.
      • Undefined, siloed product and service ownership and governance, preventing solutions from working together to collectively deliver more value.
      • Little stakeholder appetite to invest in activities beyond "keeping the lights on."

      Only 64% of applications were identified as effective by end users.
      Effective applications are identified as at least highly important and have high feature and usability satisfaction.
      Source: Application Portfolio Assessment, August 2021 to July 2022; N=315.

      "Regardless of the many definitions of modernization floating around, the one characteristic that we should be striving for is to ensure our applications do an outstanding job of supporting the users and the business in the most effective and efficient manner possible."
      Source: looksoftware.

      Pressure Point 3:
      Confidently Shifting to Digital

      "Going digital" reshapes how the business operates and drives value by optimizing how digital and traditional technologies and tactics work together. This shift often presents significant business and technical risks to business processes, enterprise data, applications, and systems which stakeholders and teams are not aware of or prepared to accommodate.

      Address the underlying challenges

      • Differing perspectives on digital can lead to disjointed transformation initiatives, oversold benefits, and a lack of synergy among digital technologies and processes.
      • Organizations have difficulty adapting to new technologies or rethinking current business models, processes, and ways of working because of the potential human, ethical, and reputational impacts and restrictions from legacy systems.
      • Management lacks a framework to evaluate how their organization manages and governs business value delivery.
      • IT is not equipped or resourced to address these rapidly changing business, customer, and technology needs.
      • The wrong tools and technologies were chosen to support the shift to digital.

      The shift to digital processes is starting, but slowly.
      62% of respondents indicated that 1-20% of their processes were digitized during the past year.
      Source: Tech Trends and Priorities 2023; N=500

      Resistance to change and time/budget constraints are top barriers preventing companies from modernizing their applications.
      Source: Konveyor, 2022; n=600.

      Pressure Point 4:
      Addressing Competing Priorities

      Enterprise products and services are not used, operated, or branded in isolation. The various parties involved may have competing priorities, which often leads to disagreements on when certain business and technology changes should be made and how resources, budget, and other assets should be allocated. Without a broader product vision, portfolio vision, and roadmap, the various dependent or related products and services will not deliver the same level of value as if they were managed collectively.

      Address the underlying challenges

      • Undefined product and service ownership and governance, including escalation procedures when consensus cannot be reached.
      • Lack of a unified and grounded set of value and quality definitions, guiding principles, prioritization standards, and broad visibility across portfolios, business capabilities, and business functions.
      • Distrust between business units and IT teams, which leads to the scaling of unmanaged applications and fragmented changes and projects.
      • Decisions are based on opinions and experiences without supporting data.

      55% of CXOs stated some improvement is necessary in activities to understand business goals.
      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568.

      CXOs are moderately satisfied with IT's performance as a business partner (average score of 69% among all CXOs). This sentiment is similarly felt among CIOs (64%).
      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568.

      Pressure Point 5:
      Fostering a Collaborative Culture

      Culture impacts business results, including bottom-line revenue and productivity metrics. Leaders appreciate the impact culture can have on applications initiatives and wish to leverage this. How culture translates from an abstract concept to something that is measurable and actionable is not straightforward. Executives need to clarify how the desired culture will help achieve their applications strategy and need to focus on the items that will have the most impact.

      Address the underlying challenges

      • Broad changes do not consider the unique subcultures, personalities, and behaviors of the various teams and individuals in the organization.
      • Leaders mandate cultural changes without alleviating critical barriers and do not embody the principles of the target state.
      • Bureaucracy and politics restrict changes and encourage the status quo.
      • Industry standards, technologies, and frameworks do not support or cannot be tailored to fit the desired culture.
      • Some teams are deliberately excluded from the scoping, planning, and execution of key product and service delivery and management activities.

      Agile does not solve team culture challenges.
      43% of organizations cited organizational culture as a significant barrier to adopting and scaling Agile practices.
      Source: Digital.ai, 2021.

      "Providing a great employee experience" as the second priority (after recruiting) highlights the emphasis organizations are placing on helping employees adjust after having been forced to change the way work gets done.
      Source: McLean & Company, 2022; N=826.

      Use your applications priorities to help address your pressure points

      Success can be dependent on your ability to navigate around or alleviate your pressure points. Design and market your applications priorities to bring attention to your pressure points and position them as key risk factors to their success.

      Applications Priorities
      Digital Experience (DX) Intelligent Automation Proactive Application Management Multisource Systems Digital Organization as a Platform
      Attracting and Retaining Talent Enhance the employee experience Be transparent and support role changes Shift focus from maintenance to innovation Enable business-managed applications Promote and showcase achievements and successes
      Maximizing the Return on Technology Modernize or extend the use of existing investments Automate applications across multiple business functions Improve the reliability of mission-critical applications Enhance the functionality of existing applications Increase visibility of underused applications
      Confidently Shifting to Digital Prioritize DX in your shift to digital Select the capabilities that will benefit most from automation Prepare applications to support digital tools and technologies Use best-of-breed tools to meet specific digital needs Bring all applications up to a common digital standard
      Addressing Competing Priorities Ground your digital vision, goals, and objectives Recognize and evaluate the architectural impact Rationalize the health of the applications Agree on a common philosophy on system composition Map to a holistic platform vision, goals, and objectives
      Fostering a Collaborative Culture Involve all perspectives in defining and delivering DX Involve the end user in the delivery and testing of the automated process Include the technical perspective in the viability of future applications plans Discuss how applications can work together better in an ecosystem Ensure the platform is configured to meet the individual needs of the users
      Creating High-Throughput Teams Establish delivery principles centered on DX Remove manual, error-prone, and mundane tasks Simplify applications to ease delivery and maintenance Alleviate delivery bottlenecks and issues Abstract the enterprise system to expedite delivery

      Digital Experience (DX)

      PRIORITY 1

      • Deliver Valuable User, Customer, Employee, and Brand Experiences

      Delivering valuable digital experiences requires the adoption of good management, governance, and operational practices to accommodate stakeholder, employee, customer, and end-user expectations of digital experiences (e.g. product management, automation, and iterative delivery). Technologies are chosen based on what best enables, delivers, and supports these expectations.

      Introduction

      Digital transformation is not just about new tools and technologies. It is also about delivering a valuable digital experience

      What is digital experience (DX)?

      Digital experience (DX) refers to the interaction between a user and an organization through digital products and services. Digital products and services are tools, systems, devices, and resources that gather, store, and process data; are continuously modernized; and embody eight key attributes that are described on the following slide. DX is broken down into four distinct perspectives*:

      • Customer Experience – The immediate perceptions of transactions and interactions experienced through a customer's journey in the use of the organization's digital
        products and services.
      • End-User Experience – Users' emotions, beliefs, and physical and psychological responses
        that occur before, during, or after interacting with a digital product or service.
      • Brand Experience – The broader perceptions, emotions, thoughts, feelings and actions the public associate with the organization's brand and reputation or its products and services. Brand experience evolves over time as customers continuously engage with the brand.
      • Employee Experience – The satisfaction and experience of an employee through their journey with the organization, from recruitment and hiring to their departure. How an employee embodies and promotes the organization brand and culture can affect their performance, trust, respect, and drive to innovate and optimize.
      Digital Products and Services
      Customer Experience Brand Experience Employee Experience End-User Experience

      Digital products and services have a common set of attributes

      Digital transformation is not just about new tools and technologies. It is also about delivering a valuable digital experience

      • Digital products and services must keep pace with changing business and end-user needs as well as tightly supporting your maturing business model with continuous modernization. Focus your continuous modernization on the key characteristics that drive business value.
      • Fit for purpose: Functionalities are designed and implemented for the purpose of satisfying the end user's needs and solving their problems.
      • User-centric: End users see the product as rewarding, engaging, intuitive, and emotionally satisfying. They want to come back to it.
      • Adaptable: The product can be quickly tailored to meet changing end-user and technology needs with reusable and customizable components.
      • Accessible: The product is available on demand and on the end user's preferred interface.
        End users have a seamless experience across all devices.
      • Private and secured: The end user's activity and data are protected from unauthorized access.
      • Informative and insightful: The product delivers consumable, accurate, and trustworthy real-time data that is important to the end user.
      • Seamless application connection: The product facilitates direct interactions with one or more other products through an uninterrupted user experience.
      • Relationship and network building: The product enables and promotes the connection and interaction of people.

      The Business Value cycle of continuous modernization.

      Signals

      DX is critical for business growth and maturity, but the organization may not be ready

      A good DX has become a key differentiator that gives organizations an advantage over their competition and peers. Shifts in working environments; employee, customer, and stakeholder expectations; and the advancements in modern technologies have raised the importance of adopting and transitioning to digital processes and tools to stay relevant and responsive to changing business and technology conditions.

      Applications teams are critical to ensuring the successful delivery and operation of these digital processes and tools. However, they are often under-resourced and challenged to meet their DX goals.

      • 7% of both business and IT respondents think IT has the resources needed to keep up with digital transformation initiatives and meet deadlines (Cyara, 2021).
      • 43% of respondents said that the core barrier to digital transformation is a lack of skilled resources (Creatio, 2021).
      A circle graph is shown with 91% of the circle coloured in dark blue, with the number 91% in the centre.

      of organizations stated that at least 1% of processes were shifted from being manually completed to digitally completed in the last year. 29% of organizations stated at least 21% were shifted.

      Source: Tech Trends and Priorities 2023; N=500.

      A circle graph is shown with 98% of the circle coloured in dark blue, with the number 98% in the centre.

      of organizations recognized digital transformation is important for competitive advantage. 94% stated it is important to enhance customer experience, and 91% stated it will have a positive impact on revenue.

      Source: Cyara, 2021.

      Drivers

      Brand and reputation

      Customers are swayed by the innovations and advancements in digital technologies and expect your applications team to deliver and support them. Your leaders recognize the importance of these expectations and are integrating them into their business strategy and brand (how the organization presents itself to its customers, employees and the public). They hope that their actions will improve and shape the company's reputation (public perception of the company) as effective, customer-focused, and forward-thinking.

      Worker productivity

      As you evolve and adopt more complex tools and technology, your stakeholders will expect more from business units and IT teams. Unfortunately, teams employing manual processes and legacy systems will struggle to meet these expectations. Digital products and services promote the simplification of complex operations and applications and help the business and your teams better align operational practices with strategic goals and deliver valuable DX.

      Organization modernization

      Legacy processes, systems, and ways of working are no longer suitable for meeting the strategic digital objectives and DX needs stakeholders expect. They drive up operational costs without increased benefits, impede business growth and innovation, and consume scarce budgets that could be used for other priorities. Shifting to digital tools and technologies will bring these challenges to light and demonstrate how modernization is an integral part of DX success.

      Benefits & Risks

      Benefits

      • Flexibility & Satisfaction
      • Adoption
      • Reliability

      Employees and customers can choose how they want to access, modify, and consume digital products and services. They can be tailored to meet the specific functional needs, behaviors, and habits of the end user.

      The customer, end user, brand, and employee drive selection, design, and delivery of digital products and services. Even the most advanced technologies will fail if key roles do not see the value in their use.

      Digital products and services are delivered with technical quality built into them, ensuring they meet the industry, regulatory, and company standards throughout their lifespan and in various conditions.

      Risks

      • Legacy & Lore
      • Bureaucracy & Politics
      • Process Inefficiencies
      • No Quality Standards

      Some stakeholders may not be willing to change due to their familiarity and comfort of business practices.

      Competing and conflicting priorities of strategic products and services undermine digital transformation and broader modernization efforts.

      Business processes are often burdened by wasteful activities. Digital products and services are only as valuable as the processes they support.

      The performance and support of your digital products and services are hampered due to unmanageable technical debt because of a deliberate decision to bypass or omit quality good practices.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent

      Enhance the employee experience.

      Design the digital processes, tools, and technologies to meet the individual needs of the employee.

      Maximizing the Return on Technology

      Modernize or extend the use of existing investments.

      Drive higher adoption of applications and higher user value and productivity by implementing digital capabilities to the applications that will gain the most.

      Confidently Shifting to Digital

      Prioritize DX in your shift to digital. Include DX as part of your definition of success.

      Your products and services are not valuable if users, customers, and employees do not use them.

      Addressing Competing Priorities

      Ground your digital vision, goals, and objectives

      Establish clear ownership of DX and digital products and services with a cross-functional prioritization framework.

      Fostering a Collaborative Culture

      Involve all perspectives in defining and delivering DX.

      Maintain a committee of owners, stakeholders, and delivery teams to ensure consensus and discuss how to address cross-functional opportunities and risks.

      Creating High-Throughput Teams

      Establish delivery principles centered on DX.

      Enforce guiding principles to streamline and simplify DX delivery, such as plug-and-play architecture and quality standards.

      Recommendations

      Build a digital business strategy

      A digital business strategy clearly articulates the goals and ambitions of the business to adopt digital practices, tools, and technologies. This document:

      • Looks for ways to transform the business by identifying what technologies to embrace, what processes to automate, and what new business models to create.
      • Unifies digital possibilities with your customer experiences.
      • Establishes accountability with the executive leadership.
      • States the importance of cross-functional participation from senior management across the organization.

      Related Research:

      Learn, understand, and empathize with your users, employees, and customers

      • To create a better product, solution, or service, understanding those who use it, their needs, and their context is critical.
      • A great experience design practice can help you balance those goals so that they are in harmony with those of your users.
      • IT leaders must find ways to understand the needs of the business and develop empathy on a much deeper level. This empathy is the foundation for a thriving business partnership.

      Related Research:

      Recommendations

      Center product and service delivery decisions and activities on DX and quality

      User, customer, employee, and brand are integral perspectives on the software development lifecycle (SDLC) and the management and governance practices supporting digital products and services. It ensures quality standards and controls are consistently upheld while maintaining alignment with various needs and priorities. The goal is to come to a consensus on a universal definition and approach to embed quality and DX-thinking throughout the delivery process.

      Related Research:

      Instill collaborative delivery practices

      Today's rapidly scaling and increasingly complex digital products and services create mounting pressure on delivery teams to release new features and changes quickly and with sufficient quality. This pressure is further compounded by the competing priorities of individual stakeholders and the nuances among different personas of digital products and services.

      A collaborative delivery practice sets the activities, channels, and relationships needed to deliver a valuable and quality product or service with cross-functional awareness, accountability, and agreement.

      Related Research:

      Recommendations

      Continuously monitor and modernize your digital products and services

      Today's modern digital products and services are tomorrow's shelfware. They gradually lose their value, and the supporting technologies will become obsolete. Modernization is a continuous need.

      Data-driven insights help decision makers decide which products and services to retire, upgrade, retrain on, or maintain to meet the demands of the business.

      Enhancements focusing on critical business capabilities strengthen the case for investment and build trust with all stakeholders.

      Related Research:

      CASE STUDY
      Mastercard in Asia

      Focus on the customer journey

      Chief Marketing Officer M.V. Rajamannar (Raja) wanted to change Mastercard's iconic "Priceless" ad campaign (with the slogan "There are some things money can't buy. For everything else there's Mastercard."). The main reasons were that the campaign relied on one-way communication and targeted end customers, even though Mastercard doesn't issue cards directly to customers; partner banks do. To drive the change in campaign, Raja and his team created a digital engine that leveraged digital and social media. Digital engine is a seven-step process based on insights gleaned from data and real-time optimization.

      1. Emotional spark: Using data to understand customers' passion points, Mastercard builds videos and creatives to ignite an emotional spark and give customers a reason to engage. For example, weeks before New Year's Eve, Mastercard produced a video with Hugh Jackman to encourage customers to submit a story about someone who deeply mattered to them. The authors of the winning story would be flown to reunite with those both distant and dear.
      2. Engagement: Mastercard targets the right audience with a spark video through social media to encourage customers to share their stories.
      3. Offers: To help its partner banks and merchants in driving their business, the company identifies the best offers to match consumers' interests. In the above campaign, Mastercard's Asia-Pacific team found that Singapore was a favorite destination for Indian customers, so they partnered with Singapore's Resorts World Sentosa with an attractive offer.
      4. Real-time optimization: Mastercard optimizes, in real time, a portfolio of several offers through A/B testing and other analysis.
      5. Amplification: Real-time testing provides confidence to Mastercard about the potential success of these offers and encourages its bank and merchant partners to co-market and co-fund these campaigns.
      6. Network effects: A few weeks after consumers submitted their stories about distant loved ones, Mastercard selected winners, produced videos of them surprising their friends and families, and used these videos in social media to encourage sharing.
      7. Incremental transactions: These programs translate into incremental business for banks who issue cards, for merchants where customers spend money, and for Mastercard, which gets a portion of every transaction.

      Source: Harvard Business Review Press

      CASE STUDY
      Mastercard in Asia (cont'd)

      Focus on the customer journey

      1. Emotional Spark
        Drives genuine personal stories
      2. Engagement
        Through Facebook
        and social media
      3. Offers
        From merchants
        and Mastercard assets
      4. Optimization
        Real-time testing of offers and themes
      5. Amplification
        Paid and organic programmatic buying
      6. Network Effects
        Sharing and
        mass engagement
      7. Incremental Transactions
        Win-win for all parties

      CASE STUDY
      Mastercard in Asia (cont'd)

      The Mastercard case highlights important lessons on how to engage customers:

      • Have a broad message. Brands need to connect with consumers over how they live and spend their time. Organizations need to go beyond the brand or product message to become more relevant to consumers' lives. Dove soap was very successful in creating a conversation among consumers with its "Real Beauty" campaign, which focused not on the brand or even the product category, but on how women and society view beauty.
      • Shift from storytelling to story making. To break through the clutter of advertising, companies need to move from storytelling to story making. A broader message that is emotionally engaging allows for a two-way conversation.
      • Be consistent with the brand value. The brand needs to stand for something, and the content should be relevant to and consistent with the image of the brand. Pepsi announced an award of $20 million in grants to individuals, businesses, and nonprofits that promote a new idea to make a positive impact on community. A large number of submissions were about social causes that had nothing to do with Pepsi, and some, like reducing obesity, were in conflict with Pepsi's product.
      • Create engagement that drives business. Too much entertainment in ads may engage customers but detract from both communicating the brand message and increasing sales. Simply measuring the number of video views provides only a partial picture of a program's success.

      Intelligent Automation

      PRIORITY 2

      • Extend Automation Practices with AI and ML

      AI and ML are rapidly growing. Organizations see the value of machines intelligently executing high-performance and dynamic tasks such as driving cars and detecting fraud. Senior leaders see AI and ML as opportunities to extend their business process automation investments.

      Introduction

      Intelligent automation is the next step in your business process automation journey

      What is intelligent automation (IA)?

      Intelligent automation (IA) is the combination of traditional automation technologies, such as business process management (BPM) and robotic process automation (RPA), with AI and ML. The goal is to further streamline and scale decision making across various business processes by:

      • Removing human interactions.
      • Addressing decisions that involve complex variables.
      • Automatically adapting processes to changing conditions.
      • Bridging disparate automation technologies into an integrated end-to-end value delivery pipeline.

      "For IA to succeed, employees must be involved in the transformation journey so they can experience firsthand the benefits of a new way of working and creating business value," (Cognizant).

      What is the difference between IA and hyperautomation?

      "Hyperautomation is the act of automating everything in an organization that can be automated. The intent is to streamline processes across an organization using intelligent automation, which includes AI, RPA and other technologies, to run without human intervention. … Hyperautomation is a business-driven, disciplined approach that organizations use to rapidly identify, vet, and automate as many business and IT processes as possible" (IBM, 2021).

      Note that hyperautomation often enables IA, but teams solely adopting IA do not need to abide to its automation-first principles.

      IA is a combination of various tools and technologies

      What tools and technologies are involved in IA?

      • Artificial intelligence (AI) & Machine Learning (ML) – AI systems perform tasks mimicking human intelligence such as learning from experience and problem solving. AI is making its own decisions without human intervention. Machine learning systems learn from experience and without explicit instructions. They learn patterns from data then analyze and make predictions based on past behavior and the patterns learned. AI is a combination of technologies and can include machine learning.
      • Intelligent Business Process Management System (iBPMS) – Combination of BPM tools with AI and other intelligence capabilities.
      • Robotic Process Automation (RPA) – Robots leveraging an application's UI rather than programmatic access. Automate rules-based, repetitive tasks performed by human workers with AI/ML.
      • Process Mining & Discovery – Process mining involves reading system event logs and application transactions and applying algorithmic analysis to automatically identify and map inferred business processes. Process discovery involves unintrusive virtual agents that sit on a user's desktop and record and monitor how they interact with applications to perform tasks and processes. Algorithms are then used to map and analyze the processes.
      • Intelligent Document Processing – The conversion of physical or unstructured documents into a structured, digital format that can be used in automation solutions. Optical character recognition (OCR) and natural language processing (NPL) are common tools used to enable this capability.
      • Advanced Analytics – The gathering, synthesis, transformation, and delivery of insightful and consumable information that supports data-driven decision making. Data is queried from various disparate sources and can take on a variety of structured and unstructured formats.

      The cycle of IA technologies

      Signals

      Process automation is an executive priority and requires organizational buy-in

      Stakeholders recognize the importance of business process automation and AI and are looking for ways to deliver more value using these technologies.

      • 90% of executives stated automating business workflows post-COVID-19 will ensure business continuity (Kofax, 2022).
      • 88% of executives stated they need to fast-track their end-to-end digital transformation (Kofax, 2022).

      However, the advertised benefits to vendors of enabling these desired automations may not be easily achievable because of:

      • Manual and undocumented business processes.
      • Fragmented and inaccessible systems.
      • Poor data quality, insights, and security.
      • The lack of process governance and management practice.
      A circle graph is shown with 49% of the circle coloured in dark blue, with the number 49% in the centre.

      of CXOs stated staff sufficiency, skill and engagement issues as a minor IT pain point compared to 51% of CIOs stated this issue as a major pain point.

      Source: CEO-CIO Alignment Diagnostics, August 2021 to July 2022; n=568.

      A circle graph is shown with 36% of the circle coloured in dark blue, with the number 36% in the centre.

      of organizations have already invested in AI or machine learning.

      Source: Tech Trends and Priorities 2023; N=662

      Drivers

      Quality & throughput

      Products and services delivered through an undefined and manual process risk the creation of preventable and catchable defects, security flaws and holes, missing information, and other quality issues. IA solutions consistently reinforce quality standards the same way across all products and services while tailoring outputs to meet an individual's specific needs. Success is dependent on the accurate interpretation and application of quality standards and the user's expectations.

      Worker productivity

      IA removes the tedious, routine, and mundane tasks that distract and restrict employees from doing more valuable, impactful, and cognitively focused activities. Practical insights can also be generated through IA tools that help employees make data-driven decisions, evaluate problems from different angles, and improve the usability and value of the products and services they produce.

      Good process management practices

      Automation magnifies existing inefficiencies of a business process management practice, such as unclear and outdated process documentation and incorrect assumptions. IA reinforces the importance of good business process optimization practices, such as removing waste and inefficiencies in a thoughtful way, choosing the most appropriate automation solution, and configuring the process in the right way to maximize the solution's value.

      Benefits & Risks

      Benefits

      • Documentation
      • Hands-Off
      • Reusability

      All business processes must be mapped and documented to be automated, including business rules, data entities, applications, and control points.

      IA can be configured and orchestrated to automatically execute when certain business, process, or technology conditions are met in an unattended or attended manner.

      IA is applicable in use cases beyond traditional business processes, such as automated testing, quality control, audit, website scraping, integration platform, customer service, and data transfer.

      Risks

      • Data Quality & Bias
      • Ethics
      • Recovery & Security
      • Management

      The accuracy and relevance of the decisions IA makes are dependent on the overall quality of the data
      used to train it.

      Some decisions can have significant reputational, moral, and ethical impacts if made incorrectly.
      The question is whether it is appropriate for a non-human to make that decision.

      IA is composed of technologies that can be compromised or fail. Without the proper monitoring, controls,
      and recovery protocols, impacted IA will generate significant business and IT costs and can potentially harm customers, employees, and the organization.

      Low- and no-code capabilities ease and streamline IA development, which makes it susceptible to becoming unmanageable. Discipline is needed to ensure IA owners are aware of the size and health of the IA portfolio.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent

      Be transparent and support role changes.

      Plan to address the human sentiment with automation (e.g. job security) and the transition of the role to other activities.

      Maximizing the Return on Technology

      Automate applications across multiple business functions.

      Recognize the value opportunities of improving and automating the integration of cross-functional processes.

      Confidently Shifting to Digital

      Maximize the learning of automation fit.

      Select the right capabilities to demonstrate the value of IA while using lessons learned to establish the appropriate support.

      Addressing Competing Priorities

      Recognize automation opportunities with capability maps.

      Use a capability diagram to align strategic IA objectives with tactical and technical IA initiatives.

      Fostering a Collaborative Culture

      Involve the user in the delivery process.

      Maximize automation adoption by ensuring the user finds value in its use before deployment.

      Creating High-Throughput Teams

      Remove manual, error-prone, and mundane tasks.

      Look for ways to improve team throughput by removing wasteful activities, enforcing quality, and automating away tasks driving down productivity.

      Recommendations

      Build your business process automation playbook and practice

      Formalize your business process automation practice with a good toolkit and a repeatable set of tactics and techniques.

      • Clarify the problem being solved with IA.
      • Optimate your processes. Apply good practices to first optimize (opti-) and then automate (-mate) key business processes.
      • Deliver minimum viable automations (MVAs). Maximize the learning of automation solutions and business operational changes through small, strategic automation use cases.

      Related Research:

      Explore the various IA tooling options

      Each IA tool will address a different problem. Which tool to choose is dependent on a variety of factors, such as functional suitability, technology suitability, delivery and support capabilities, alignment to strategic business goals, and the value it is designed to deliver.

      Related Research:

      Recommendations

      Introduce AI and ML thoughtfully and with a plan

      Despite the many promises of AI, organizations are struggling to fully realize its potential. The reasons boil down to a lack of understanding of when these technologies should and shouldn't be used, as well as a fear of the unknown. The plan to adopt AI should include:

      • Understanding of what AI really means in practice.
      • Identifying specific applications of AI in the business.
      • Understanding the type of AI applicable for the situation.

      Related Research:

      Mitigate AI and ML bias

      Biases can be introduced into an IA system at any stage of the development process, from the data you collect, to the way you collect it, to which algorithms are used and what assumptions were made. In most cases, AI and ML bias is a is a social, political, and business problem.

      While bias may not be intentional nor completely prevented or eliminated, early detection, good design, and other proactive preventative steps can be taken to minimize its scope and impact.

      Related Research:

      CASE STUDY
      University Hospitals

      Challenge

      University Hospitals Cleveland (UH) faces the same challenge that every major hospital confronts regarding how to deliver increasingly complex, high-quality healthcare to a diverse population efficiently and economically. In 2017, UH embarked on a value improvement program aiming to improve quality while saving $400 million over a five-year period.

      In emergency department (ED) and inpatient units, leaders found anticipating demand difficult, and consequently units were often over-staffed when demand was low and under-staffed when demand was high. Hospital leaders were uncertain about how to reallocate resources based on capacity needs.

      Solution

      UH turned to Hospital IQ's Census Solution to proactively manage capacity, staff, and flow in the ED and inpatient areas.

      By applying AI, ML, and external data (e.g. weather forecasts) to the hospital's own data (including EMR data and hospital policies), the solution helped UH make two-day census forecasts that managers used to determine whether to open or close in-patient beds and, when necessary, divert low-acuity patients to other hospitals in the system to handle predicted patient volume.

      Source: University Hospitals

      Results

      ED boarding hours have declined by 10% and the hospital has seen a 50% reduction in the number of patients who leave the hospital without
      being seen.

      UH also predicts in advance patients ready for discharge and identifies roadblocks, reducing the average length of stay by 15%. UH is able to better manage staff, reducing overtime and cutting overall labor costs.

      The hospital has also increased staff satisfaction and improved patient safety by closing specific units on weekends and increasing the number of rooms that can be sterilized.

      Proactive Application Management

      PRIORITY 3

      • Strengthen Applications to Prevent and Minimize the Impact of Future Issues

      Application management is often viewed as a support function rather than an enabler of business growth. Focus and investments are only placed on application management when it becomes a problem. The lack of governance and practice accountability leaves this practice in a chaotic state: politics take over, resources are not strategically allocated, and customers are frustrated. As a result, application management is often reactive and brushed aside for new development.

      Introduction

      What is application management?

      Application management ensures valuable software is successfully delivered and is maintained for continuous and sustainable business operations. It contains a repeatable set of activities needed to rationalize and roadmap products and services while balancing priorities of new features and maintenance tasks.

      Unfortunately, application management is commonly perceived as a practice that solely addresses issues, updates, and incidents. However, application management teams are also tasked with new value delivery that was not part of the original release.

      Why is an effective application maintenance (reactive) practice not good enough?

      Application maintenance is the "process of modifying a software system or its components after delivery to correct faults, improve performance or other attributes, or adapt to a changed environment or business process," (IEEE, 1998). While it is critical to quickly fix defects and issues when they occur, reactively addressing them is more expensive than discovering them early and employing the practices to prevent them.

      Even if an application is working well, its framework, architecture, and technology may not be compatible with the possible upcoming changes stakeholders and vendors may want to undertake. Applications may not be problems now, but they soon can be.

      What motivates proactive application changes?

      This image shows the motivations for proactive application changes, sorted by external and internal sources.

      Proactive application management must be disciplined and applied strategically

      Proactive application management practices are critical to maintaining business continuity. They require continuous review and modification so that applications are resilient and can address current and future scenarios. Depending on the value of the application, its criticality to business operations, and its susceptibility to technology change, a more proactive management approach may be warranted. Stakeholders can then better manage resources and budget according to the needs of specific products.

      Reactive Management

      Run-to-Failure

      Fix and enhance the product when it breaks. In most cases, a plan is in place ahead of a failure, so that the problem can be addressed without significant disruption and costs.

      Preventive

      Regularly inspect and optimize the product to reduce the likelihood that it will fail in the future. Schedule inspections based on a specific timeframe or usage threshold.

      Predictive

      Predict failures before they happen using performance and usage data to alert teams when products are at risk of failure according to specified conditions.

      Reliability and Risk Based

      Analyze all possible failure scenarios for each component of the product and create tailored delivery plans to improve the stability, reliability, and value of each product.

      Proactive Management

      Signals

      Applications begin to degrade as soon as they are used

      Today's applications are tomorrow's shelfware. They gradually lose their value, stability, robustness, and compatibility with other enterprise technologies. The longer these applications are left unattended or simply "keeping the lights on," the more risks they will bring to the application portfolio, such as:

      • Discovery and exploitation of security flaws and gaps.
      • Increasing the lock-in to specific vendor technologies.
      • Inconsistent application performance across various workloads.

      These impacts are further compounded by the continuous work done on a system burdened with technical debt. Technical debt describes the result of avoided costs that, over time, cause ongoing business impacts. Left unaddressed, technical debt can become an existential threat that risks your organization's ability to effectively compete and serve its customers. Unfortunately, most organizations have a significant, growing, unmanageable technical debt portfolio.

      A circle graph is shown with 60% of the circle coloured in dark green, with the number 60% in the centre.

      of respondents stated they saw an increase in perceived change in technical debt during the past three years. A quarter of respondents indicated that it stayed the same.

      Source: McKinsey Digital, 2020.

      US
      $4.35
      Million

      is the average cost of a data breach in 2022. This figure represents a 2.6% increase from last year. The average cost has climbed 12.7% since 2020.

      Source: IBM, 2022; N=537.

      Drivers

      Technical debt

      Historical decisions to meet business demands by deferring key quality, architectural, or other software delivery activities often lead to inefficient and incomplete code, fragile legacy systems, broken processes, data quality problems, and the other contributors to technical debt. The impacts for this challenge is further heightened if organizations are not actively refactoring and updating their applications behind the scenes. Proactive application management is intended to raise awareness of application fragility and prioritize comprehensive refactoring activities alongside new feature development.

      Long-term application value

      Applications are designed, developed, and tested against a specific set of parameters which may become less relevant over time as the business matures, technology changes, and user behaviors and interactions shift. Continuous monitoring of the application system, regular stakeholder and user feedback, and active technology trend research and vendor engagement will reveal tasks to prepare an application for future value opportunities or stability and resilience concerns.

      Security and resiliency

      Innovative approaches to infiltrating and compromising applications are becoming prevailing stakeholder concerns. The loopholes and gaps in existing application security protocols, control points, and end-user training are exploited to gain the trust of unsuspecting users and systems. Proactive application management enforces continuous security reviews to determine whether applications are at risk. The goal is to prevent an incident from happening by hardening or complementing measures already in place.

      Benefits & Risks

      Benefits

      • Consistent Performance
      • Robustness
      • Operating Costs

      Users expect the same level of performance and experience from their applications in all scenarios. A proactive approach ensures the configurations meet the current needs of users and dependent technologies.

      Proactively managed applications are resilient to the latest security concerns and upcoming trends.

      Continuous improvements to the underlying architecture, codebase, and interfaces can minimize the cost to maintain and operate the application, such as the transition to a loosely coupled architecture and the standardization of REST APIs.

      Risks

      • Stakeholder Buy-In
      • Delayed Feature Releases
      • Team Capacity
      • Discipline

      Stakeholders may not see the association between the application's value and its technical quality.

      Updates and enhancements are system changes much like any application function. Depending
      on the priority of these changes, new functions may be pushed off to a future release cycle.

      Applications teams require dedicated capacity to proactively manage applications, but they are often occupied meeting other stakeholder demands.

      Overinvesting in certain application management activities (such as refactoring, re-architecture, and redesign) can create more challenges. Knowing how much to do is important.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent

      Shift focus from maintenance to innovation.

      Work on the most pressing and critical requests first, with a prioritization framework reflecting cross-functional priorities.

      Maximizing the Return on Technology

      Improve the reliability of mission-critical applications.

      Regularly verify and validate applications are up to date with the latest patches and fixes and comply with industry good practices and regulations.

      Confidently Shifting to Digital

      Prepare applications to support digital tools and technologies.

      Focus enhancements on the key components required to support the integration, performance, and security needs of digital.

      Addressing Competing Priorities

      Rationalize the health of the applications.

      Use data-driven, compelling insights to justify the direction and prioritization of applications initiatives.

      Fostering a Collaborative Culture

      Include the technical perspective in the viability of future applications plans.

      Demonstrate how poorly maintained applications impede the team's ability to deliver confidently and quickly.

      Creating High-Throughput Teams

      Simplify applications to ease delivery and maintenance.

      Refactor away application complexities and align the application portfolio to a common quality standard to reduce the effort to deliver and test changes.

      Recommendations

      Reinforce your application maintenance practice

      Maintenance is often viewed as a support function rather than an enabler of business growth. Focus and investments are only placed on maintenance when it becomes a problem.

      • Justify the necessity of streamlined maintenance.
      • Strengthen triaging and prioritization practices.
      • Establish and govern a repeatable process.

      Ensure product issues, incidents, defects, and change requests are promptly handled to minimize business and IT risks.

      Related Research:

      Build an application management practice

      Apply the appropriate management approaches to maintain business continuity and balance priorities and commitments among maintenance and new development requests.

      This practice serves as the foundation for creating exceptional customer experience by emphasizing cross-functional accountability for business value and product and service quality.

      Related Research:

      Recommendations

      Manage your technical debt

      Technical debt is a type of technical risk, which in turn is business risk. It's up to the business to decide whether to accept technical debt or mitigate it. Create a compelling argument to stakeholders as to why technical debt should be a business priority rather than just an IT one.

      • Define and identify your technical debt.
      • Conduct a business impact analysis.
      • Identify opportunities to better manage technical debt.

      Related Research:

      Gauge your application's health

      Application portfolio management is nearly impossible to perform without an honest and thorough understanding of your portfolio's alignment to business capabilities, business value, total cost of ownership, end-user reception and satisfaction, and technical health.

      Develop data-driven insights to help you decide which applications to retire, upgrade, retrain on, or maintain to meet the demands of the business.

      Related Research:

      Recommendations

      Adopt site reliability engineering (SRE) and DevOps practices

      Site reliability engineering (SRE) is an operational model for running online services more reliably by a team of dedicated reliability-focused engineers.

      DevOps, an operational philosophy promoting development and operations collaboration, can bring the critical insights to make application management practices through SRE more valuable.

      Related Research:

      CASE STUDY
      Government Agency

      Goal

      A government agency needed to implement a disciplined, sustainable application delivery, planning, and management process so their product delivery team could deliver features and changes faster with higher quality. The goal was to ensure change requests, fixes, and new features would relieve requester frustrations, reduce regression issues, and allow work to be done on agreeable and achievable priorities organization-wide. The new model needed to increase practice efficiency and visibility in order to better manage technical debt and focus on value-added solutions.

      Solution

      This organization recognized a number of key challenges that were inhibiting its team's ability to meet its goals:

      • The product backlog had become too long and unmanageable.
      • Delivery resources were not properly allocated to meet the skills and capabilities needed to successfully meet commitments.
      • Quality wasn't defined or enforced, which generated mounting technical debt.
      • There was a lack of clear metrics and defined roles and responsibilities.
      • The business had unrealistic and unachievable expectations.

      Source: Info-Tech Workshop

      Key practices implemented

      • Schedule quarterly business satisfaction surveys.
      • Structure and facilitate regular change advisory board meetings.
      • Define and enforce product quality standards.
      • Standardize a streamlined process with defined roles.
      • Configure management tools to better handle requests.

      Multisource Systems

      PRIORITY 4

      • Manage an Ecosystem Composed of In-House and Outsourced Systems

      Various market and company factors are motivating a review on resource and system sourcing strategies. The right sourcing model provides key skills, resources, and capabilities to meet innovation, time to market, financial, and quality goals of the business. However, organizations struggle with how best to support sourcing partners and to allocate the right number of resources to maximize success.

      Introduction

      A multisource system is an ecosystem of integrated internally and externally developed applications, data, and infrastructure. These technologies can be custom developed, heavily configured vendor solutions, or they may be commercial off-the-shelf (COTS) solutions. These systems can also be developed, supported, and managed by internal staff, in partnership with outsourced contractors, or be completely outsourced. Multisource systems should be configured and orchestrated in a way that maximizes the delivery of specific value drivers for the targeted audience.

      Successfully selecting a sourcing approach is not a simple RFP exercise to choose the lowest cost

      Defining and executing a sourcing approach can be a significant investment and risk because of the close interactions third-party services and partners will have with internal staff, enterprise applications and business capabilities. A careful selection and design is necessary.

      The selection of a sourcing partner is not simple. It involves the detailed inspection and examination of different candidates and matching their fit to the broader vision of the multisource system. In cases where control is critical, technology stack and resource sourcing consolidation to a few vendors and partners is preferred. In other cases, where worker productivity and system flexibility are highly prioritized, a plug-and-play best-of-breed approach is preferred.

      Typical factors involved in sourcing decisions.

      Sourcing needs to be driven by your department and system strategies

      How does the department want to be perceived?

      The image that your applications department and teams want to reflect is frequently dependent on the applications they deliver and support, the resources they are composed of, and the capabilities they provide.

      Therefore, choosing the right sourcing approach should be driven by understanding who the teams are and want to be (e.g. internal builder, an integrator, a plug-in player), what they can or want to do (e.g. custom-develop or implement), and what they can deliver or support (e.g. cloud or on-premises) must be established.

      What value is the system delivering?

      Well-integrated systems are the lifeblood of your organization. They provide the capabilities needed to deliver value to customers, employees, and stakeholders. However, underlying system components may not be sourced under a unified strategy, which can lead to duplicate vendor services and high operational costs.

      The right sourcing approach ensures your partners address key capabilities in your system's delivery and support, and that they are positioned to maximize the value of critical and high-impact components.

      Signals

      Business demand may outpace what vendors can support or offer

      Outsourcing and shifting to a buy-over-build applications strategy are common quick fixes to dealing with capacity and skills gaps. However, these quick fixes often become long-term implementations that are not accounted for in the sourcing selection process. Current application and resource sourcing strategies must be reviewed to ensure that vendor arrangements meet the current and upcoming demands and challenges of the business, customers, and enterprise technologies, such as:

      • Pressure from stakeholders to lower operating costs while maintaining or increasing quality and throughput.
      • Technology lock-in that addresses short-term needs but inhibits long-term growth and maturity.
      • Team capacity and talent acquisition not meeting the needs of the business.
      A circle graph is shown with 42% of the circle coloured in dark brown, with the number 42% in the centre.

      of respondents stated they outsourced software development fully or partly in the last 12 months (2021).

      Source: Coding Sans, 2021.

      A circle graph is shown with 65% of the circle coloured in dark brown, with the number 65% in the centre.

      of respondents stated they were at least somewhat satisfied with the result of outsourcing software development.

      Source: Coding Sans, 2021.

      Drivers

      Business-managed applications

      Employees are implementing and building applications without consulting, notifying, or heeding the advice of IT. IT is often ill-equipped and under-resourced to fight against shadow IT. Instead, organizations are shifting the mindset of "fight shadow IT" to "embrace business-managed applications," using good practices in managing multisource systems. A multisource approach strikes the right balance between user empowerment and centralized control with the solutions and architecture that can best enable it.

      Unique problems to solve

      Point solutions offer features to address unique use cases in uncommon technology environments. However, point solutions are often deployed in siloes with limited integration or overlap with other solutions. The right sourcing strategy accommodates the fragmented nature of point solutions into a broader enterprise system strategy, whether that be:

      • Multisource best of breed – integrate various technologies that provide subsets of the features needed for supporting business functions.
      • Multisource custom – integrate systems built in-house with technologies developed by external organizations.
      • Vendor add-ons and integrations – enhance an existing vendor's offering by using their system add-ons as upgrades, new add-ons, or integrations.

      Vendor services

      Some vendor services in a multisource environment may be redundant, conflicting, or incompatible. Given that multisource systems are regularly changing, it is difficult to identify what services are affected, what would be needed to fill the gap of the removed solution, or which redundant services should be removed.

      A multisource approach motivates the continuous rationalization of your vendor services and partners to determine the right mixture of in-house and outsourced resources, capabilities, and technologies.

      Benefits & Risks

      Benefits

      • Business-Focused Solution
      • Flexibility
      • Cost Optimization

      Multisource systems can be designed to support an employee's ability to select the tools they want and need.

      The environment is architected in a loosely coupled approach to allow applications to be easily added, removed, and modified with minimized impact to other integrated applications.

      Rather than investing in large solutions upfront, applications are adopted when they are needed and are removed when little value is gained. Disciplined application portfolio management is necessary to see the full value of this benefit.

      Risks

      • Manageable Sprawl
      • Policy Adherence
      • Integration & Compatibility

      The increased number and diversity of applications in multisource system environments can overwhelm system managers who do not have an effective application portfolio management practice.

      Fragmented application implementations risk inconsistent adherence to security and other quality policies, especially in situations where IT is not involved.

      Application integration can quickly become tangled, untraceable, and unmanageable because of varying team and vendor preferences for specific integration technologies and techniques.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent

      Enable business-managed applications.

      Create the integrations to enable the easy connection of desired tools to enterprise systems with the appropriate guardrails.

      Maximizing the Return on Technology

      Enhance the functionality of existing applications.

      Complement current application capability gaps with data, features, and services from third-party applications.

      Confidently Shifting to Digital

      Use best-of-breed tools to meet specific digital needs.

      Select the best tools to meet the unique and special functional needs of the digital vision.

      Addressing Competing Priorities

      Agree on a common philosophy on system composition.

      Establish an owner of the multisource system to guide how the system should mature as the organization grows.

      Fostering a Collaborative Culture

      Discuss how applications can work together better in an ecosystem.

      Build committees to discuss how applications can better support each other and drive more value.

      Creating High-Throughput Teams

      Alleviate delivery bottlenecks and issues.

      Leverage third-party sources to fill skills and capacity gaps until a long-term solution can be implemented.

      Recommendations

      Define the goals of your applications department and product vision

      Understanding the applications team's purpose and image is critical in determining how the system they are managing and the skills and capacities they need should be sourced.

      Changing and conflicting definitions of value and goals make it challenging to convey an agreeable strategy of the multisource system. An achievable vision and practical tactics ensure all parties in the multisource system are moving in the same direction.

      Related Research:

      Develop a sourcing partner strategy

      Almost half of all sourcing initiatives do not realize projected savings, and the biggest reason is the choice of partner (Zhang et al., 2018). Making the wrong choice means inferior products, higher costs and the loss of both clients and reputation.

      Choosing the right sourcing partner involves understanding current skills and capacities, finding the right matching partner based on a desired profile, and managing a good working relationship that sees short-term gains and supports long-term goals.

      Related Research:

      Recommendations

      Strengthen enterprise integration practices

      Integration strategies that are focused solely on technology are likely to complicate rather than simplify because little consideration is given on how other systems and processes will be impacted. Enterprise integration needs to bring together business process, applications, and data – in that order.

      Kick-start the process of identifying opportunities for improvement by mapping how applications and data are coordinated to support business activities.

      Related Research:

      Manage your solution architecture and application portfolio

      Haphazardly implementing and integrating applications can generate significant security, performance, and data risks. A well-thought-through solution architecture is essential in laying the architecture quality principles and roadmap on how the multisource system can grow and evolve in a sustainable and maintainable way.

      Good application portfolio management complements the solution architecture as it indicates when low-value and unused applications should be removed to reduce system complexity.

      Related Research:

      Recommendations

      Embrace business-managed applications

      Multisource systems bring a unique opportunity to support the business and end users' desire to implement and develop their own applications. However, traditional models of managing applications may not accommodate the specific IT governance and management practices required to operate business-managed applications:

      • A collaborative and trusting business-IT relationship is key.
      • The role of IT must be reimagined.
      • Business must be accountable for its decisions.

      Related Research:

      CASE STUDY
      Cognizant

      Situation

      • Strives to be primarily an industry-aligned organization that delivers multiple service lines in multiple geographies.
      • Cognizant seeks to carefully consider client culture to create a one-team environment.
      • Value proposition is a consultative approach bringing thought leadership and mutually adding value to the relationship vs. the more traditional order-taker development partner.
      • Wants to share in solution development to facilitate shared successes. Geographic alignment drives knowledge of the client and their challenges, not just about time zone and supportability.
      • Offers one of the largest offshore capabilities in the world, supported by local and nearshore resources to drive local knowledge.
      • Today's clients don't typically want a black box, they are sophisticated and want transparency around the process and solution, to have a partner.
      • Clients do want to know where the work is being delivered from, how it's being done.

      Source: interview with Jay MacIsaac, Cognizant.

      Approach

      • Best relationship comes where teams operate as one.
      • Clients are seeking value, not a development black box.
      • Clients want to have a partner they can engage with, not just an order taker.
      • Want to build a one-team culture with shared goals and deliver business value.
      • Seek a partner that will add to their thinking not echo it.

      Results

      • Cognizant is continuing to deliver double-digit growth and continues to strive for top quartile performance.
      • Growth in the client base has seen the company grow to over 340,000 associates worldwide.

      Digital Organization as a Platform

      PRIORITY 5

      • Create a Common Digital Interface to Access All Products and Services

      A digital platform enables organizations to leverage a flexible, reliable, and scalable foundation to create a valuable DX, ease delivery and management efforts, maximize existing investments, and motivate the broader shift to digital. This approach provides a standard to architect, integrate, configure, and modernize the applications that compose the platform.

      Introduction

      What is digital organization as a platform (DOaaP)?

      Digital organization as a platform (DOaaP) is a collection of integrated digital services, products, applications, and infrastructure that is used as a vehicle to meet and exceed an organization's digital strategies. It often serves as an accessible "place for exchanges of information, goods, or services to occur between producers and consumers as well as the community that interacts
      with said platform" (Watts, 2020).

      DOaaP involves a strategy that paves the way for organizations to be digital. It helps organizations use their assets (e.g. data, processes, products, services) in the most effective ways and become more open to cooperative delivery, usage, and management. This opens opportunities for innovation and cross-department collaborations.

      How is DOaaP described?

      1. Open and Collaborative
        • Open organization: open data, open APIs, transparency, and user participation.
        • Collaboration, co-creation, crowdsourcing, and innovation
      2. Accessible and Connected
        • Digital inclusion
        • Channel ubiquity
        • Integrity and interoperability
        • Digital marketplace
      3. Digital and Programmable
        • Digital identity
        • Policies and processes as code
        • Digital products and services
        • Enabling digital platforms

      Digital organizations follow a common set of principles and practices

      Customer-centricity

      Digital organizations are driven by customer focus, meeting and exceeding customer expectations. It must design its services with a "digital first" principle, providing access through every expected channel and including seamless integration and interoperability with various departments, partners, and third-party services. It also means creating trust in its ability to provide secure services and to keep privacy and ethics as core pillars.

      Leadership, management, and strategies

      Digital leadership brings customer focus to the enterprise and its structures and organizes efficient networks and ecosystems. Accomplishing this means getting rid of silos and a siloed mentality and aligning on a digital vision to design policies and services that are efficient, cost-effective, and provide maximum benefit to the user. Asset sharing, co-creation, and being open and transparent become cornerstones of a digital organization.

      Infrastructure

      Providing digital services across demographics and geographies requires infrastructure, and that in turn requires long-term vision, smart investments, and partnerships with various source partners to create the necessary foundational infrastructure upon which to build digital services.

      Digitization and automation

      Automation and digitization of processes and services, as well as creating digital-first products, lead to increased efficiency and reach of the organization across demographics and geographies. Moreover, by taking a digital-first approach, digital organizations future-proof their services and demonstrate their commitment to stakeholders.

      Enabling platforms

      DOaaP embraces open standards, designing and developing organizational platforms and ecosystems with a cloud-first mindset and sound API strategies. Developer experience must also take center stage, providing the necessary tools and embracing Agile and DevOps practices and culture become prerequisites. Cybersecurity and privacy are central to the digital platform; hence they must be part of the design and development principles and practices.

      Signals

      The business expects support for digital products and services

      Digital transformation continues to be a high-priority initiative for many organizations, and they see DOaaP as an effective way to enable and exploit digital capabilities. However, DOaaP unleashes new strategies, opportunities, and challenges that are elusive or unfamiliar to business leaders. Barriers in current business operating models may limit DOaaP success, such as:

      • Department and functional silos
      • Dispersed, fragmented and poor-quality data
      • Ill-equipped and under-skilled resources to support DOaaP adoption
      • System fragmentation and redundancies
      • Inconsistent integration tactics employed across systems
      • Disjointed user experience leading to low engagement and adoption

      DOaaP is not just about technology, and it is not the sole responsibility of either IT or business. It is the collective responsibility of the organization.

      A circle graph is shown with 47% of the circle coloured in dark blue, with the number 47% in the centre.

      of organizations plan to unlock new value through digital. 50% of organizations are planning major transformation over the next three years.

      Source: Nash Squared, 2022.

      A circle graph is shown with 70% of the circle coloured in dark blue, with the number 70% in the centre.

      of organizations are undertaking digital expansion projects focused on scaling their business with technology. This result is up from 57% in 2021.

      Source: F5 Inc, 2022.

      Drivers

      Unified brand and experience

      Users should have the same experience and perception of a brand no matter what product or service they use. However, fragmented implementation of digital technologies and inconsistent application of design standards makes it difficult to meet this expectation. DOaaP embraces a single design and DX standard for all digital products and services, which creates a consistent perception of your organization's brand and reputation irrespective of what products and services are being used and how they are accessed.

      Accessibility

      Rapid advancement of end-user devices and changes to end-user behaviors and expectations often outpace an organization's ability to meet these requirements. This can make certain organization products and services difficult to find, access and leverage. DOaaP creates an intuitive and searchable interface to all products and services and enables the strategic combination of technologies to collectively deliver more value.

      Justification for modernization

      Many opportunities are left off the table when legacy systems are abstracted away rather than modernized. However, legacy systems may not justify the investment in modernization because their individual value is outweighed by the cost. A DOaaP initiative motivates decision makers to look at the entire system (i.e. modern and legacy) to determine which components need to be brought up to a minimum digital state. The conversation has now changed. Legacy systems should be modernized to increase the collective benefit of the entire DOaaP.

      Benefits & Risks

      Benefits

      • Look & Feel
      • User Adoption
      • Shift to Digital

      A single, modern, customizable interface enables a common look and feel no matter what and how the platform is being accessed.

      Organizations can motivate and encourage the adoption and use of all products and services through the platform and increase the adoption of underused technologies.

      DOaaP motivates and supports the modernization of data, processes, and systems to meet the goals and objectives outlined in the broader digital transformation strategy.

      Risks

      • Data Quality
      • System Stability
      • Ability to Modernize
      • Business Model Change

      Each system may have a different definition of commonly used entities (e.g. customer), which can cause data quality issues when information is shared among these systems.

      DOaaP can stress the performance of underlying systems due to the limitations of some systems to handle increased traffic.

      Some systems cannot be modernized due to cost constraints, business continuity risks, vendor lock-in, legacy and lore, or other blocking factors.

      Limited appetite to make the necessary changes to business operations in order to maximize the value of DOaaP technologies.

      Address your pressure points to fully realize the benefits of this priority

      Success can be dependent on your ability to address your pressure points.

      Attracting and Retaining Talent Promote and showcase achievements and successes. Share the valuable and innovative work of your teams across the organization and with the public.
      Maximizing the Return on Technology Increase visibility of underused applications. Promote the adoption and use of all products and services through the platform and use the lessons learned to justify removal, updates or modernizations.
      Confidently Shifting to Digital Bring all applications up to a common digital standard. Define the baseline digital state all applications, data, and processes must be in to maximize the value of the platform.
      Addressing Competing Priorities Map to a holistic platform vision, goals and objectives. Work with relevant stakeholders, teams and end users to agree on a common directive considering all impacted perspectives.
      Fostering a Collaborative Culture Ensure the platform is configured to meet the individual needs of the users. Tailor the interface and capabilities of the platform to address users' functional and personal concerns.
      Creating High-Throughput Teams Abstract the enterprise system to expedite delivery. Use the platform to standardize application system access to simplify platform changes and quicken development and testing.

      Recommendations

      Define your platform vision

      Organizations realize that a digital model is the way to provide more effective services to their customers and end users in a cost-effective, innovative, and engaging fashion. DOaaP is a way to help support this transition.

      However, various platform stakeholders will have different interpretations of and preferences for what this platform is intended to solve, what benefits it is supposed to deliver, and what capabilities it will deliver. A grounded vision is imperative to steer the roadmap and initiatives.

      Related Research:

      Assess and modernize your applications

      Certain applications may not sufficiently support the compatibility, flexibility, and efficiency requirements of DOaaP. While workaround technologies and tactics can be employed to overcome these application challenges, the full value of the DOaaP may not be realized.

      Reviewing the current state of the application portfolio will indicate the functional and value limitations of what DOaaP can provide and an indication of the scope of investment needed to bring applications up to a minimum state.

      Related Research:

      Recommendations

      Understand and evaluate end-user needs

      Technology has reached a point where it's no longer difficult for teams to build functional and valuable digital platforms. Rather, the difficulty lies in creating an interface and platform that people want to use and use frequently.

      While it is important to increase the access and promotion of all products and services, orchestrating and configuring them in a way to deliver a satisfying experience is even more important. Applications teams must first learn about and empathize with the needs of end users.

      Related Research:

      Architect your platform

      Formalizing and constructing DOaaP just for the sake of doing so often results in an initiative that is lengthy and costly and ends up being considered a failure.

      The build and optimization of the platform must be predicated on a thorough understanding of the DOaaP's goals, objectives, and priorities and the business capabilities and process they are meant to support and enable. The appropriate architecture and delivery practices can then be defined and employed.

      Related Research:

      CASE STUDY
      e-Estonia

      Situation

      The digital strategy of Estonia resulted in e-Estonia, with the vision of "creating a society with more transparency, trust, and efficiency." Estonia has addressed the challenge by creating structures, organizations, and a culture of innovation, and then using the speed and efficiency of digital infrastructure, apps, and services. This strategy can reduce or eliminate bureaucracy through transparency and automation.

      Estonia embarked on its journey to making digital a priority in 1994-1996, focusing on a committed investment in infrastructure and digital literacy. With that infrastructure in place, they started providing digital services like an e-banking service (1996), e-tax and mobile parking (2002), and then went full steam ahead with a digital information interoperability platform in 2001, digital identity in 2002, e-health in 2008, and e-prescription in 2010. The government is now strategizing for AI.

      Results

      This image contains the results of the e-Estonia case study results

      Source: e-Estonia

      Practices employed

      The e-Estonia digital government model serves as a reference for governments across the world; this is acknowledged by the various awards it has received, like #2 in "internet freedom," awarded by Freedom House in 2019; #1 on the "digital health index," awarded by the Bertelsmann Foundation in 2019; and #1 on "start-up friendliness," awarded by Index Venture in 2018.

      References

      "15th State of Agile Report." Digital.ai, 2021. Web.
      "2022 HR Trends Report." McLean & Company, 2022.
      "2022: State of Application Strategy Report." F5 Inc, 2022.
      "Are Executives Wearing Rose-Colored Glasses Around Digital Transformation?" Cyara, 2021. Web.
      "Cost of a Data Breach Report 2022." IBM, 2022. Web.
      Dalal, Vishal, et al. "Tech Debt: Reclaiming Tech Equity." McKinsey Digital, Oct. 2020. Web.
      "Differentiating Between Intelligent Automation and Hyperautomation." IBM, 15 October 2021. Web.
      "Digital Leadership Report 2021." Harvey Nash Group, 2021.
      "Digital Leadership Report 2022: The State of Digital." Nash Squared, 2022. Web.
      Gupta, Sunil. "Driving Digital Strategy: A Guide to Reimagining Your Business." Harvard Business Review Press, 2018. Web.
      Haff, Gordon. "State of Application Modernization Report 2022." Konveyor, 2022. Web.
      "IEEE Standard for Software Maintenance: IEEE Std 1219-1998." IEEE Standard for Software Maintenance, 1998. Accessed Dec. 2015.
      "Intelligent Automation." Cognizant, n.d. Web.
      "Kofax 2022: Intelligent Automation Benchmark Study". Kofax, 2021. Web.
      McCann, Leah. "Barco's Virtual Classroom at UCL: A Case Study for the Future of All University Classrooms?" rAVe, 2 July 2020, Web.
      "Proactive Staffing and Patient Prioritization to Decompress ED and Reduce Length of Stay." University Hospitals, 2018. Web.
      "Secrets of Successful Modernization." looksoftware, 2013. Web.
      "State of Software Development." Coding Sans, 2021. Web.
      "The State of Low-Code/No-Code." Creatio, 2021. Web.
      "We Have Built a Digital Society and We Can Show You How." e-Estonia. n.d. Web.
      Zanna. "The 5 Types of Experience Series (1): Brand Experience Is Your Compass." Accelerate in Experience, 9 February 2020. Web.
      Zhang, Y. et al. "Effects of Risks on the Performance of Business Process Outsourcing Projects: The Moderating Roles of Knowledge Management Capabilities." International Journal of Project Management, 2018, vol. 36 no. 4, 627-639.

      Research Contributors and Experts

      This is a picture of Chris Harrington

      Chris Harrington
      Chief Technology Officer
      Carolinas Telco Federal Credit Union

      Chris Harrington is Chief Technology Officer (CTO) of Carolinas Telco Federal Credit Union. Harrington is a proven leader with over 20 years of experience developing and leading information technology and cybersecurity strategies and teams in the financial industry space.

      This is a picture of Benjamin Palacio

      Benjamin Palacio
      Senior Information Technology Analyst County of Placer

      Benjamin Palacio has been working in the application development space since 2007 with a strong focus on system integrations. He has seamlessly integrated applications data across multiple states into a single reporting solution for management teams to evaluate, and he has codeveloped applications to manage billions in federal funding. He is also a CSAC-credentialed IT Executive (CA, USA).

      This is a picture of Scott Rutherford

      Scott Rutherford
      Executive Vice President, Technology
      LGM Financial Services Inc.

      Scott heads the Technology division of LGM Financial Services Inc., a leading provider of warranty and financing products to automotive OEMs and dealerships in Canada. His responsibilities include strategy and execution of data and analytics, applications, and technology operations.

      This is a picture of Robert Willatts

      Robert Willatts
      IT Manager, Enterprise Business Solutions and Project Services
      Town of Newmarket

      Robert is passionate about technology, innovation, and Smart City Initiatives. He makes customer satisfaction as the top priority in every one of his responsibilities and accountabilities as an IT manager, such as developing business applications, implementing and maintaining enterprise applications, and implementing technical solutions. Robert encourages communication, collaboration, and engagement as he leads and guides IT in the Town of Newmarket.

      This is a picture of Randeep Grewal

      Randeep Grewal
      Vice President, Enterprise Applications
      Red Hat

      Randeep has over 25 years of experience in enterprise applications, advanced analytics, enterprise data management, and consulting services, having worked at numerous blue-chip companies. In his most recent role, he is the Vice President of Enterprise Applications at Red Hat. Reporting to the CIO, he is responsible for Red Hat's core business applications with a focus on enterprise transformation, application architecture, engineering, and operational excellence. He previously led the evolution of Red Hat into a data-led company by maturing the enterprise data and analytics function to include data lake, streaming data, data governance, and operationalization of analytics for decision support.

      Prior to Red Hat, Randeep was the director of global services strategy at Lenovo, where he led the strategy using market data to grow Lenovo's services business by over $400 million in three years. Prior to Lenovo, Randeep was the director of advanced analytics at Alliance One and helped build an enterprise data and analytics function. His earlier work includes seven years at SAS, helping SAS become a leader in business analytics, and at KPMG consulting, where he managed services engagements at Fortune 100 companies.

      Infrastructure & Operations Priorities 2022

      • Buy Link or Shortcode: {j2store}56|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Disruptive & Emerging Technologies
      • Parent Category Link: /disruptive-emerging-technologies
      • The expectation amongst IT professionals for permanent transformational change has gone up 30% year over year. Further, 47% expect a lot of permanent change in 2022.
      • We are experiencing a great rate of change concurrent with a low degree of predictability.
      • How do you translate a general trend into a specific priority you can work on?

      Our Advice

      Critical Insight

      • Trends don’t matter but pressure does: Trends can be analyzed based on the pressure they exert (or not) on your I&O practice. Organizing trends into categories based on source makes for a more successful and contextual analysis.
      • Different prioritization is being demanded in 2022. For the foreseeable future prioritization is about drawing a line, below which you can ignore items with a clean conscience.
      • The priorities you choose to advocate for will be how your leadership is evaluated in the upcoming year.

      Impact and Result

      • By reading through this publication, you will begin to address the age-old problem “You don’t know what you don’t know.”
      • More importantly you will have a framework to dive deeper into the trends most relevant to you and your organization.
      • Info-Tech can help you turn your strong opinion into a compelling case for your stakeholders.

      Infrastructure & Operations Priorities 2022 Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Infrastructure & Operations Priorities 2022 – A framework to dive deeper into the trends most relevant to you and your organization

      Discover Info-Tech's four trends for Infrastructure & Operations leaders.

      • Infrastructure & Operations Priorities Report for 2022

      Infographic

      Ensure Cloud Security in IaaS, PaaS, and SaaS Environments

      • Buy Link or Shortcode: {j2store}386|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Secure Cloud & Network Architecture
      • Parent Category Link: /secure-cloud-network-architecture
      • Security remains a large impediment to realizing cloud benefits. Numerous concerns still exist around the ability for data privacy, confidentiality, and integrity to be maintained in a cloud environment.
      • Even if adoption is agreed upon, it becomes hard to evaluate vendors that have strong security offerings and even harder to utilize security controls that are internally deployed in the cloud environment.

      Our Advice

      Critical Insight

      • The cloud can be secure despite unique security threats.
      • Securing a cloud environment is a balancing act of who is responsible for meeting specific security requirements.
      • Most security challenges and concerns can be minimized through our structured process (CAGI) of selecting a trusted cloud security provider (CSP) partner.

      Impact and Result

      • The business is adopting a cloud environment and it must be secured, which includes:
        • Ensuring business data cannot be leaked or stolen.
        • Maintaining privacy of data and other information.
        • Securing the network connection points.
      • Determine your balancing act between yourself and your CSP; through contractual and configuration requirements, determine what security requirements your CSP can meet and cover the rest through internal deployment.
      • This blueprint and associated tools are scalable for all types of organizations within various industry sectors.

      Ensure Cloud Security in IaaS, PaaS, and SaaS Environments Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should prioritize security in the cloud, review Info-Tech’s methodology, and understand the ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Determine your cloud risk profile

      Determine your organization’s rationale for cloud adoption and what that means for your security obligations.

      • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 1: Determine Your Cloud Risk Profile
      • Secure Cloud Usage Policy

      2. Identify your cloud security requirements

      Use the Cloud Security CAGI Tool to perform four unique assessments that will be used to identify secure cloud vendors.

      • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 2: Identify Your Cloud Security Requirements
      • Cloud Security CAGI Tool

      3. Evaluate vendors from a security perspective

      Learn how to assess and communicate with cloud vendors with security in mind.

      • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 3: Evaluate Vendors From a Security Perspective
      • IaaS and PaaS Service Level Agreement Template
      • SaaS Service Level Agreement Template
      • Cloud Security Communication Deck

      4. Implement your secure cloud program

      Turn your security requirements into specific tasks and develop your implementation roadmap.

      • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 4: Implement Your Secure Cloud Program
      • Cloud Security Roadmap Tool

      5. Build a cloud security governance program

      Build the organizational structure of your cloud security governance program.

      • Ensure Cloud Security in IaaS, PaaS, and SaaS Environments – Phase 5: Build a Cloud Security Governance Program
      • Cloud Security Governance Program Template
      [infographic]

      Prepare Your Application for PaaS

      • Buy Link or Shortcode: {j2store}181|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Architecture & Strategy
      • Parent Category Link: /architecture-and-strategy
      • The application may have been written a long time ago, and have source code, knowledge base, or design principles misplaced or lacking, which makes it difficult to understand the design and build.
      • The development team does not have a standardized practice for assessing cloud benefits and architecture, design principles for redesigning an application, or performing capacity for planning activities.

      Our Advice

      Critical Insight

      • An infrastructure-driven cloud strategy overlooks application specific complexities. Ensure that an application portfolio strategy is a precursor to determining the business value gained from an application perspective, not just an infrastructure perspective.
      • Business value assessment must be the core of your decision to migrate and justify the development effort.
      • Right-size your application to predict future usage and minimize unplanned expenses. This ensures that you are truly benefiting from the tier costing model that vendors offer.

      Impact and Result

      • Identify and evaluate what cloud benefits your application can leverage and the business value generated as a result of migrating your application to the cloud.
      • Use Info-Tech’s approach to building a robust application that can leverage scalability, availability, and performance benefits while maintaining the functions and features that the application currently supports for the business.
      • Standardize and strengthen your performance testing practices and capacity planning activities to build a strong current state assessment.
      • Use Info-Tech’s elaboration of the 12-factor app to build a clear and robust cloud profile and target state for your application.
      • Leverage Info-Tech’s cloud requirements model to assess the impact of cloud on different requirements patterns.

      Prepare Your Application for PaaS Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should build a right-sized, design-driven approach to moving your application to a PaaS platform, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      • Prepare Your Application for PaaS – Phases 1-2

      1. Create your cloud application profile

      Bring the business into the room, align your objectives for choosing certain cloud capabilities, and characterize your ideal PaaS environment as a result of your understanding of what the business is trying to achieve. Understand how to right-size your application in the cloud to maintain or improve its performance.

      • Prepare Your Application for PaaS – Phase 1: Create Your Cloud Application Profile
      • Cloud Profile Tool

      2. Evaluate design changes for your application

      Assess the application against Info-Tech’s design scorecard to evaluate the right design approach to migrating the application to PaaS. Pick the appropriate cloud path and begin the first step to migrating your app – gathering your requirements.

      • Prepare Your Application for PaaS – Phase 2: Evaluate Design Changes for Your Application
      • Cloud Design Scorecard Tool

      [infographic]

       
       

      Create a Work-From-Anywhere Strategy

      • Buy Link or Shortcode: {j2store}323|cart{/j2store}
      • member rating overall impact: 9.0/10 Overall Impact
      • member rating average dollars saved: 33 Average Days Saved
      • member rating average days saved: After each Info-Tech experience, we ask our members to quantify the real-time savings, monetary impact, and project improvements our research helped them achieve.
      • Parent Category Name: IT Strategy
      • Parent Category Link: /it-strategy

      Work-from-anywhere isn’t going anywhere. During the initial rush to remote work, tech debt was highlighted and the business lost faith in IT. IT now needs to:

      • Rebuild trust with the CXO.
      • Identify gaps created from the COVID-19 rush to remote work.
      • Identify how IT can better support remote workers.

      IT went through an initial crunch to enable remote work. It’s time to be proactive and learn from our mistakes.

      Our Advice

      Critical Insight

      • It’s not about embracing the new normal; it’s about resiliency and long-term success. Your strategy needs to not only provide short-term operational value but also make the organization more resilient for the unknown risks of tomorrow.
      • The nature of work has fundamentally changed. IT departments must ensure service continuity, not for how the company worked in 2019, but for how the company is working now and will be working tomorrow.
      • Ensure short-term survival. Don’t focus on becoming an innovator until you are no longer stuck in firefighting.
      • Aim for near-term innovation. Once you’re a trusted operator, become a business partner by helping the business better adapt business processes and operations to work-from-anywhere.

      Impact and Result

      Follow these steps to build a work-from-anywhere strategy that resonates with the business:

      • Identify a vision that aligns with business goals.
      • Design the work-from-anywhere value proposition for critical business roles.
      • Benchmark your current maturity.
      • Build a roadmap for bridging the gap.

      Benefit employees’ remote working experience while ensuring that IT heads in a strategic direction.

      Create a Work-From-Anywhere Strategy Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should create a work-from-anywhere strategy, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Define a target state

      Identify a vision that aligns with business goals, not for how the company worked in 2019, but for how the company is working now and will be working tomorrow.

      • Work-From-Anywhere Strategy Template
      • Work-From-Anywhere Value Proposition Template

      2. Analyze current fitness

      Don’t focus on becoming an innovator until you are no longer stuck in firefighting mode.

      3. Build a roadmap for improving enterprise apps

      Use these blueprints to improve your enterprise app capabilities for work-from-anywhere.

      • Microsoft Teams Cookbook – Sections 1-2
      • Rationalize Your Collaboration Tools – Phases 1-3
      • Adapt Your Customer Experience Strategy to Successfully Weather COVID-19 Storyboard
      • The Rapid Application Selection Framework Deck

      4. Build a roadmap for improving strategy, people & leadership

      Use these blueprints to improve IT’s strategy, people & leadership capabilities for work-from-anywhere.

      • Define Your Digital Business Strategy – Phases 1-4
      • Training Deck: Equip Managers to Effectively Manage Virtual Teams
      • Sustain Work-From-Home in the New Normal Storyboard
      • Develop a Targeted Flexible Work Program for IT – Phases 1-3
      • Maintain Employee Engagement During the COVID-19 Pandemic Storyboard
      • Adapt Your Onboarding Process to a Virtual Environment Storyboard
      • Manage Poor Performance While Working From Home Storyboard
      • The Essential COVID-19 Childcare Policy for Every Organization, Yesterday Storyboard

      5. Build a roadmap for improving infrastructure & operations

      Use these blueprints to improve infrastructure & operations capabilities for work-from-anywhere.

      • Stabilize Infrastructure & Operations During Work-From-Anywhere – Phases 1-3
      • Responsibly Resume IT Operations in the Office – Phases 1-5
      • Execute an Emergency Remote Work Plan Storyboard
      • Build a Digital Workspace Strategy – Phases 1-3

      6. Build a roadmap for improving IT security & compliance capabilities

      Use these blueprints to improve IT security & compliance capabilities for work-from-anywhere.

      • Cybersecurity Priorities in Times of Pandemic Storyboard
      • Reinforce End-User Security Awareness During Your COVID-19 Response Storyboard

      Infographic

      Workshop: Create a Work-From-Anywhere Strategy

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Define a Target State

      The Purpose

      Define the direction of your work-from-anywhere strategy and roadmap.

      Key Benefits Achieved

      Base your decisions on senior leadership and user needs.

      Activities

      1.1 Identify drivers, benefits, and challenges.

      1.2 Perform a goals cascade to align benefits to business needs.

      1.3 Define a vision and success metrics.

      1.4 Define the value IT brings to work-from-anywhere.

      Outputs

      Desired benefits for work-from-anywhere

      Vision statement

      Mission statement

      Success metrics

      Value propositions for in-scope user groups

      2 Review In-Scope Capabilities

      The Purpose

      Focus on value. Ensure that major applications and IT capabilities will relieve employees’ pains and provide them with gains.

      Key Benefits Achieved

      Learn from past mistakes and successes.

      Increase adoption of resulting initiatives.

      Activities

      2.1 Review work-from-anywhere framework and identify capability gaps.

      2.2 Review diagnostic results to identify satisfaction gaps.

      2.3 Record improvement opportunities for each capability.

      2.4 Identify deliverables and opportunities to provide value for each.

      2.5 Identify constraints faced by each capability.

      Outputs

      SWOT assessment of work-from-anywhere capabilities

      Projects and initiatives to improve capabilities

      Deliverables and opportunities to provide value for each capability

      Constraints with each capability

      3 Build the Roadmap

      The Purpose

      Build a short-term plan that allows you to iterate on your existing strengths and provide early value to your users.

      Key Benefits Achieved

      Provide early value to address operational pain points.

      Build a plan to provide near-term innovation and business value.

      Activities

      3.1 Organize initiatives into phases.

      3.2 Identify tasks for short-term initiatives.

      3.3 Estimate effort with Scrum Poker.

      3.4 Build a timeline and tie phases to desired business benefits.

      Outputs

      Prioritized list of initiatives and phases

      Profiles for short-term initiatives

      Identify and Manage Strategic Risk Impacts on Your Organization

      • Buy Link or Shortcode: {j2store}219|cart{/j2store}
      • member rating overall impact: N/A
      • member rating average dollars saved: N/A
      • member rating average days saved: N/A
      • Parent Category Name: Vendor Management
      • Parent Category Link: /vendor-management

      Moreso than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their strategic plans to accommodate risk on an unprecedented level.

      A new global change will impact your organizational strategy at any given time. So, make sure your plans are flexible enough to manage the inevitable consequences.

      Our Advice

      Critical Insight

      • Identifying and managing a vendor’s potential strategic impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes affect strategic plans.
      • Organizational leadership is often taken unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals.

      Impact and Result

      • Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Risk Impact Tool.

      Identify and Manage Strategic Risk Impacts on Your Organization Research & Tools

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Identify and Manage Strategic Risk Impacts to Your Organization Deck – Use the research to better understand the negative impacts of vendor actions on your strategic plans.

      Use this research to identify and quantify the potential strategic impacts caused by vendors. Use Info-Tech’s approach to look at the strategic impact from various perspectives to better prepare for issues that may arise.

      • Identify and Manage Strategic Risk Impacts on Your Organization Storyboard

      2. What If Vendor Strategic Impact Tool – Use this tool to help identify and quantify the strategic impacts of negative vendor actions

      By playing the “what if” game and asking probing questions to draw out – or eliminate – possible negative outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      • Strategic Risk Impact Tool
      [infographic]

      Further reading

      Identify and Manage Strategic Risk Impacts on Your Organization

      The world is in a perpetual state of change. Organizations need to build adaptive resiliency into their strategic plans to adjust to ever-changing market dynamics.

      Analyst perspective

      Organizations need to build flexible resiliency into their strategic plans to be able to adjust to ever-changing market dynamics.

      This is a picture of Frank Sewell, Research Director, Vendor Management at Info-Tech Research Group

      Like most people, organizations are poor at assessing the likelihood of risk. If the past few years have taught us anything, it is that the probability of a risk occurring is far more flexible in the formula Risk = Likelihood * Impact than we ever thought possible. The impacts of these risks have been catastrophic, and organizations need to be more adaptive in managing them to strengthen their strategic plans.

      Frank Sewell,
      Research Director, Vendor Management
      Info-Tech Research Group

      Executive Summary

      Your Challenge

      Moreso than any other time, our world is changing. As a result, organizations – and their vendors – need to be able to adapt their strategic plans to accommodate risk on an unprecedented level.

      A new global change will impact your organizational strategy at any given time. So, make sure your plans are flexible enough to manage the inevitable consequences.

      Common Obstacles

      Identifying and managing a vendor’s potential strategic impact on your organization requires multiple people in the organization across several functions. Those people all need coaching on the potential changes in the market and how these changes affect strategic plans.

      Organizational leadership is often taken unaware during crises, and their plans lack the flexibility needed to adjust to significant market upheavals.

      Info-Tech’s Approach

      Vendor management practices educate organizations on the different potential risks to vendors in your market and suggest creative and alternative ways to avoid and help manage them.

      Prioritize and classify your vendors with quantifiable, standardized rankings.

      Prioritize focus on your high-risk vendors.

      Standardize your processes for identifying and monitoring vendor risks to manage potential impacts on your strategic plan with our Strategic Impacts Tool.

      Info-Tech Insight

      Organizations must evolve their strategic risk assessments to be more adaptive to respond to global changes in the market. Ongoing monitoring of the market and the vendors tied to company strategies is imperative to achieving success.

      Info-Tech’s multi-blueprint series on vendor risk assessment

      There are many individual components of vendor risk beyond cybersecurity.

      This image depicts a cube divided into six different coloured sections. The sections are labeled: Financial; Reputational; Operational; Strategic; Security; Regulatory & Compliance.

      This series will focus on the individual components of vendor risk and how vendor management practices can facilitate organizations’ understanding of those risks.

      Out of Scope:

      This series will not tackle risk governance, determining overall risk tolerance and appetite, or quantifying inherent risk.

      Strategic risk impacts

      Potential losses to the organization due to risks to the strategic plan

      • In this blueprint, we’ll explore strategic risks (risks to the Strategic Plans of the organization) and their impacts.
      • Identify potentially disruptive events to assess the overall impact on organizations and implement adaptive measures to correct strategic plans.
      This image depicts a cube divided into six different coloured sections. The section labeled Strategic is highlighted.

      The world is constantly changing

      The IT market is constantly reacting to global influences. By anticipating changes, leaders can set expectations and work with their vendors to accommodate them.

      When the unexpected happens, being able to adapt quickly to new priorities ensures continued long-term business success.

      Below are some things no one expected to happen in the last few years:

      62%

      of IT professionals are more concerned about being a victim of ransomware than they were a year ago.

      82%

      of Microsoft’s non-essential employees shifted to working from home in 2020, joining the 18% already remote.

      89%

      of organizations invested in web conferencing technology to facilitate collaboration.

      Source: Info-Tech Tech Trends Survey 2022

      Strategic risks on a global scale

      Odds are at least one of these is currently affecting your strategic plans

      • Vendor Acquisitions
      • Global Pandemic
      • Global Shortages
      • Gas Prices
      • Poor Vendor Performance
      • Travel Bans
      • War
      • Natural Disasters
      • Supply Chain Disruptions
      • Security Incidents

      Make sure you have the right people at the table to identify and plan to manage impacts.

      Identify & manage strategic risks

      Global Pandemic

      Very few people could have predicted that a global pandemic would interrupt business on the scale experienced today. Organizations should look at their lessons learned and incorporate adaptable preparations into their strategic planning moving forward.

      Vendor Acquisitions

      The IT market is an ever-shifting environment. Larger companies often gobble up smaller ones to control their sectors. Incorporating plans to manage those shifts in ownership will be key to many strategic plans that depend on niche vendor solutions for success. Be sure to monitor the potentially affected markets on an ongoing cadence.

      Global Shortages

      Organizations need to accept that shortages will recur periodically and that preparing for them will significantly increase the success potential of long-term strategic plans. Understand what your business needs to stock for project needs and where those supplies are located, and plan how to rapidly access and distribute them as required if supply chain disruptions occur.

      What to look for in vendors

      Identify strategic risk impacts

      • A vendor acquires many smaller, seemingly irrelevant IT products. Suddenly their revenue model includes aggressive license compliance audits.
        • Ensure that your installed software meets license compliance requirements with good asset management practices.
        • Monitor the market for such acquisitions or news of audits hitting companies.
      • A vendor changes their primary business model from storage and hardware to becoming a self-proclaimed “professional services guru,” relying almost entirely on their name recognition to build their marketing.
        • Be wary of self-proclaimed experts and review their successes and failures with other organizations before adopting them into your business strategy.
        • Review the backgrounds their “experts” have and make sure they have the industry and technical skill sets to perform the services to the required level.

      Not preparing for your growth can delay your goals

      Why can’t I get a new laptop?

      For example:

      • An IT professional services organization plans to take advantage of the growing work-from-home trend to expand its staff by 30% over the coming year.
      • Logically, this should include a review of the necessary tasks involved, including onboarding.
        • Suppose the company does not order enough equipment in preparation to cover the new staff plus routine replacement. In that case, this will delay the output of the new team members immeasurably as they wait for their company equipment and will delay existing staff whose equipment breaks, preventing them from getting back to work efficiently.

      Sometimes an organization has the right mindset to take advantage of the changes in the market but can fail to plan for the particulars.

      When your strategic plan changes, you need to revisit all the steps in the processes to ensure a successful outcome.

      Strategic risks

      Poor or uninformed business decisions can lead to organizational strategic failures

      • Supply chain disruptions and global shortages
        • Geopolitical disruptions and natural disasters have caused unprecedented interruptions to business. Incorporate forecasting of product and ongoing business continuity planning into your strategic plans to adapt as events unfold.
      • Poor vendor performance
        • Consider the impact of a vendor that fails to perform midway through the implementation. Organizations need to be able to manage the impact of replacing that vendor and cutting their losses rather than continuing to throw good money away after bad performance.
      • Vendor acquisitions
        • A lot of acquisition is going on in the market today. Large companies are buying competitors and either imposing new terms on customers or removing the competing products from the market. Prepare options for any strategy tied to a niche product.

      It is important to identify potential risks to strategic plans to manage the risk and be agile enough in planning to adapt to the changing environments.

      Info-Tech Insight
      Few organizations are good at identifying risks to their strategic plan. As a result, almost none realistically plan to monitor, manage, and adapt their strategies to those risks.

      Prepare your strategic risk management for success

      Due diligence will enable successful outcomes

      1. Obtain top-level buy-in; it is critical to success.
      2. Build enterprise risk management (ERM) through incremental improvement.
      3. Focus initial efforts on the “big wins” to prove the process works.
      4. Use existing resources.
      5. Build on any risk management activities that already exist in the organization.
      6. Socialize ERM throughout the organization to gain additional buy‑in.
      7. Normalize the process long term with ongoing updates and continuing education for the organization.

      (Adapted from COSO)

      How to assess strategic risk

      1. Review Organizational Strategy
        Understand the organizational strategy to prepare for the “What If” game exercise.
      2. Identify & Understand Potential Strategic Risks
        Play the “What If” game with the right people at the table.
      3. Create a Risk Profile Packet for Leadership
        Pull all the information together in a presentation document.
      4. Validate the Risks
        Work with leadership to ensure that the proposed risks are in line with their thoughts.
      5. Plan to Manage the Risks
        Lower the overall risk potential by putting mitigations in place.
      6. Communicate the Plan
        It is important not only to have a plan but also to socialize it in the organization for awareness.
      7. Enact the Plan
        Once the plan is finalized and socialized, put it in place with continued monitoring for success.

      Insight summary

      Insight 1

      Organizations build portions of their strategies around chosen vendors and should protect those plans against the risks of unforeseen acquisitions in the market.
      Is your vendor solvent? Does it have enough staff to accommodate your needs? Has its long-term planning been affected by changes in the market? Is it unique in its space?

      Insight 2

      Organizations’ strategic plans need to be adaptable to avoid vendors’ negative actions causing an expedited shift in priorities.
      For example, Philip's recall of ventilators impacted its products and the availability of its competitor’s products as demand overwhelmed the market.

      Insight 3

      Organizations need to become better at risk assessment and actively manage the identified risks to their strategic plans.
      Few organizations are good at identifying risks to their strategic plan. As a result, almost none realistically plan to monitor, manage, and adapt their strategies to those risks.

      Strategic risk impacts are often unanticipated, causing unforeseen downstream effects. Anticipating the potential changes in the global IT market and continuously monitoring vendors’ risk levels can help organizations modify their strategic alignment with the new norms.

      Identifying strategic risk

      Who should be included in the discussion

      • While it is true that executive-level leadership defines the strategy for an organization, it is vital for those making decisions to make informed decisions.
      • Getting input from operational experts at your organization will enhance the long-term potential for success of your strategies.
      • Involving those who directly manage vendors and understand the market will aid operational experts in determining the forward path for relationships with your current vendors and identifying new emerging potential strategic partners.

      Review your strategic plans for new risks and evolving likelihood on a regular basis.

      Keep in mind Risk = Likelihood x Impact (R=L*I).

      Impact (I) tends to remain the same, while Likelihood (L) is a very flexible variable.

      See the blueprint Build an IT Risk Management Program

      Managing strategic risk impacts

      What can we realistically do about the risks?

      • Review business continuity plans and disaster recovery testing.
      • Institute proper contract lifecycle management.
      • Re-evaluate corporate policies frequently.
      • Develop IT governance and change control.
      • Ensure strategic alignment in contracts.
      • Introduce continual risk assessment to monitor the relevant vendor markets.
        • Regularly review your strategic plans for new risks and evolving likelihood.
        • Risk = Likelihood x Impact (R=L*I)
          • Impact (I) tends to remain the same and be well understood, while Likelihood (L) turns out to be highly variable.
      • Be adaptable and allow for innovations that arise from the current needs.
        • Capture lessons learned from prior incidents to improve over time, and adjust your strategy based on the lessons.

      Organizations need to be reviewing their strategic risk plans considering the likelihood of incidents in the global market.

      Pandemics, extreme weather, and wars that affect global supply chains are a current reality, not unlikely scenarios.

      Ongoing Improvement

      Incorporating lessons learned

      • Over time, despite everyone’s best observations and plans, incidents will catch us off guard.
      • When it happens, follow your incident response plans and act accordingly.
      • An essential step is to document what worked and what did not – collectively known as the “lessons learned.”
      • Use the lessons learned document to devise, incorporate, and enact a better risk management process.

      Sometimes disasters occur despite our best plans to manage them.

      When this happens, it is important to document the lessons learned and improve our plans going forward.

      The “what if” game

      1-3 hours

      Vendor management professionals are in an excellent position to help senior leadership identify and pull together resources across the organization to determine potential risks. By playing the "what if" game and asking probing questions to draw out – or eliminate – possible adverse outcomes, everyone involved adds their insight into parts of the organization to gather a comprehensive picture of potential impacts.

      1. Break into smaller groups (or if too small, continue as a single group).
      2. Use the Strategic Risk Impact Tool to prompt discussion on potential risks. Keep this discussion flowing organically to explore all potentials but manage the overall process to keep the discussion pertinent and on track.
      3. Collect the outputs and ask the subject matter experts (SMEs) for management options for each one in order to present a comprehensive risk strategy. You will use this to educate senior leadership so that they can make an informed decision to accept or reject the solution.

      Download the Strategic Risk Impact Tool

      Input Output
      • List of identified potential risk scenarios scored by likelihood and financial impact
      • List of potential management of the scenarios to reduce the risk
      • Comprehensive strategic risk profile on the specific vendor solution
      Materials Participants
      • Whiteboard/flip charts
      • Strategic Risk Impact Tool to help drive discussion
      • Vendor Management – Coordinator
      • Organizational Leadership
      • Operations Experts (SMEs)
      • Legal/Compliance/Risk Manager

      Case Study

      Airline Industry Strategic Adaptation

      Industry: Airline

      Impact categories: Pandemic, Lockdowns, Travel Bans, Increased Fuel Prices

      • In 2019 the airline industry yielded record profits of $35.5 billion.
      • In 2020 the pandemic devastated the industry with losses around $371 billion.
      • The industry leaders engaged experts to conduct a study on how the pandemic impacted them and propose measures to ensure the survival of their industry in the future after the pandemic.
      • They determined that “[p]recise decision-making based on data analytics is essential and crucial for an effective Covid-19 airline recovery plan.”

      Results

      The pandemic prompted systemic change to the overall strategic planning of the airline industry.

      Summary

      Be vigilant and adaptable to change

      • Organizations need to learn how to assess the likelihood of potential risks in the changing global world.
      • Those organizations that incorporate adaptive risk management processes can prepare their strategic plans for greater success.
      • Bring the right people to the table to outline potential risks in the market.
      • Socialize the risk management process throughout the organization to heighten awareness and enable employees to help protect the strategic plan.
      • Incorporate lessons learned from incidents into your risk management process to build better plans for future issues.

      Organizations must evolve their strategic risk assessments to be more adaptive to respond to global changes in the market.

      Ongoing monitoring of the market and the vendors tied to company strategies is imperative to achieving success.

      Related Info-Tech Research

      Identify and Manage Financial Risk Impacts on Your Organization

      This image contains a screenshot from Info-Tech's Identify and Manage Financial Risk Impacts on Your Organization.
      • Vendor management practices educate organizations on the different potential financial impacts that vendors may incur and suggest systems to help manage them.
      • Prioritize and classify your vendors with quantifiable, standardized rankings.
      • Prioritize focus on your high-risk vendors.
      • Standardize your processes for identifying and monitoring vendor risks to manage financial impacts with our Financial Risk Impact Tool.

      Identify and Reduce Agile Contract Risk

      This image contains a screenshot from Info-Tech's Identify and Reduce Agile Contract Risk
      • Customer maturity levels with Agile are low, with 67% of organizations using Agile for less than five years.
      • Customer competency levels with Agile are also low, with 84% of organizations stating they are below a high level of competency.
      • Contract disputes are the number one or two types of disputes faced by organizations across all industries.

      Build an IT Risk Management Program

      This image contains a screenshot from Info-Tech's Build an IT Risk Management Program
      • Transform your ad hoc IT risk management processes into a formalized, ongoing program, and increase risk management success.
      • Take a proactive stance against IT threats and vulnerabilities by identifying and assessing IT’s greatest risks before they occur.
      • Involve key stakeholders including the business senior management team to gain buy-in and to focus on IT risks most critical to the organization.

      Bibliography

      Olaganathan, Rajee. “Impact of COVID-19 on airline industry and strategic plan for its recovery with special reference to data analytics technology.” Global Journal of Engineering and Technology Advances, vol 7, no 1, 2021, pp. 033-046.

      Tonello, Matteo. “Strategic Risk Management: A Primer for Directors.” Harvard Law School Forum on Corporate Governance, 23 Aug. 2012.

      Frigo, Mark L., and Richard J. Anderson. “Embracing Enterprise Risk Management: Practical Approaches for Getting Started.” COSO, 2011.

      Research Contributors and Experts

      • Frank Sewell
        Research Director, Info-Tech Research Group
      • Steven Jeffery
        Principal Research Director, Info-Tech Research Group
      • Scott Bickley
        Practice Lead, Info-Tech Research Group
      • Donna Glidden
        Research Director, Info-Tech Research Group
      • Phil Bode
        Principal Research Director, Info-Tech Research Group
      • David Espinosa
        Senior Director, Executive Services, Info-Tech Research Group
      • Rick Pittman
        Vice President, Research, Info-Tech Research Group
      • Patrick Philpot
        CISSP
      • Gaylon Stockman
        Vice President, Information Security
      • Jennifer Smith
        Senior Director

      Microsoft Dynamics 365: Understand the Transition to the Cloud

      • Buy Link or Shortcode: {j2store}350|cart{/j2store}
      • member rating overall impact: 8.7/10 Overall Impact
      • member rating average dollars saved: $94,858 Average $ Saved
      • member rating average days saved: 4 Average Days Saved
      • Parent Category Name: Licensing
      • Parent Category Link: /licensing
      • Your on-premises Dynamics CRM or AX needs updating or replacing, and you’re not sure whether to upgrade or transition to the cloud with the new Microsoft Dynamics 365 platform. You’re also uncertain about what the cost might be or if there are savings to be had with a transition to the cloud for your enterprise resource planning system.
      • The new license model, Apps vs. Plans and Dual Use Rights in the cloud, includes confusing terminology and licensing rules that don’t seem to make sense. This makes it difficult to purchase proper licensing that aligns with your current on-premises setup and to maximize your choices in transition licenses.
      • There are different licensing programs for Dynamics 365 in the cloud. You need to decide on the most cost effective program for your company, for now and for the future.
      • Microsoft is constantly pressuring you to move to the cloud, but you don’t understand the why. You're uncertain if there's real value in such a strategic move right now, or if should you wait awhile.

      Our Advice

      Critical Insight

      • Focus on what’s best for you. Do a thorough current state assessment of your hardware and software needs and consider what will be required in the near future (one to four years).
      • Educate yourself. You should have a good understanding of your options from staying on-premises vs. an interim hybrid model vs. a lift and shift to the cloud.
      • Consider the overall picture. There might not be hard cost savings to be realized in the near term, given the potential increase in licensing costs over a CapEx to OpEx savings.

      Impact and Result

      • Understanding the best time to transition, from a licensing perspective, could save you significant dollars over the next one to four years.
      • Planning and effectively mapping your current licenses to the new cloud user model will maximize your current investment into the cloud and fully leverage all available Microsoft incentives in the process.
      • Gaining the knowledge required to make the most informed transition decision, based on best timing, most appropriate licensing program, and maximized cost savings in the near term.
      • Engaging effectively with Microsoft and a competent Dynamics partner for deployment or licensing needs.

      Microsoft Dynamics 365: Understand the Transition to the Cloud Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why you should learn about Microsoft Dynamics 365 user-based cloud licensing, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Timing

      Review to confirm if you are eligible for Microsoft cloud transition discounts and what is your best time to move to the cloud.

      • Microsoft Dynamics 365: Understand the Transition to the Cloud – Phase 1: Timing
      • Microsoft License Agreement Summary Tool
      • Existing CRM-AX License Summary Worksheet

      2. Licensing

      Begin with a review to understand user-based cloud licensing, then move to mapping your existing licenses to the cloud users and plans.

      • Microsoft Dynamics 365: Understand the Transition to the Cloud – Phase 2: Licensing
      • Microsoft Dynamics 365 On-Premises License Transition Mapping Tool
      • Microsoft Dynamics 365 User License Assignment Tool
      • Microsoft Licensing Programs Brief Overview

      3. Cost review

      Use your cloud mapping activity as well your eligible discounts to estimate your cloud transition licensing costs.

      • Microsoft Dynamics 365: Understand the Transition to the Cloud – Phase 3: Cost Review
      • Microsoft Dynamics 365 Cost Estimator

      4. Analyze and decide

      Start by summarizing your choice license program, decide on the ideal time, then move on to total cost review.

      • Microsoft Dynamics 365: Understand the Transition to the Cloud – Phase 4: Analyze and Decide
      [infographic]

      Workshop: Microsoft Dynamics 365: Understand the Transition to the Cloud

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand What You Own and What You Can Transition to the Cloud

      The Purpose

      Understand what you own and what you can transition to the cloud.

      Learn which new cloud user licenses to transition.

      Key Benefits Achieved

      All your licenses in one summary.

      Eligible transition discounts.

      Mapping of on-premises to cloud users.

      Activities

      1.1 Validate your discount availability.

      1.2 Summarize agreements.

      1.3 Itemize your current license ownership.

      1.4 Review your timing options.

      1.5 Map your on-premises licenses to the cloud-based, user-based model.

      Outputs

      Current agreement summary

      On-premises to cloud user mapping summary

      Understanding of cloud app and plan features

      2 Transition License Cost Estimate and Additional Costs

      The Purpose

      Estimate cloud license costs and other associated expenses.

      Summarize and decide on the best timing, users, and program.

      Key Benefits Achieved

      Good cost estimate of equivalent cloud user-based licenses.

      Understanding of when and how to move your on-premises licensing to the new Dynamics 365 cloud model.

      Activities

      2.1 Estimate cloud user license costs.

      2.2 Calculate additional costs related to license transitions.

      2.3 Review all activities.

      2.4 Summarize and analyze your decision.

      Outputs

      Cloud user licensing cost modeling

      Summary of total costs

      Validation of costs and transition choices

      An informed decision on your Dyn365 timing, licensing, and costs

      Create a Service Management Roadmap

      • Buy Link or Shortcode: {j2store}394|cart{/j2store}
      • member rating overall impact: 8.9/10 Overall Impact
      • member rating average dollars saved: $71,003 Average $ Saved
      • member rating average days saved: 24 Average Days Saved
      • Parent Category Name: Service Management
      • Parent Category Link: /service-management
      • Inconsistent adoption of holistic practices has led to a chaotic service delivery model that results in poor customer satisfaction.
      • There is little structure, formalization, or standardization in the way IT services are designed and managed, leading to diminishing service quality and low business satisfaction.

      Our Advice

      Critical Insight

      • Having effective service management practices in place will allow you to pursue activities, such as innovation, and drive the business forward.
      • Addressing foundational elements like business alignment and management practices will enable you to build effective core practices that deliver business value.
      • Providing consistent leadership support and engagement is essential to allow practitioners to focus on delivering expected outcomes.

      Impact and Result

      • Understand the foundational and core elements that allow you to build a successful service management practice focused on outcomes.
      • Use Info-Tech’s advice and tools to perform an assessment of your organization’s current state, identify the gaps, and create a roadmap for success.
      • Increase business and customer satisfaction by delivering services focused on creating business value.

      Create a Service Management Roadmap Research & Tools

      Start here – read the Executive Brief

      Read our concise Executive Brief to find out why many service management maturity projects fail to address foundational and core elements, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

      Besides the small introduction, subscribers and consulting clients within this management domain have access to:

      1. Launch the project

      Kick-off the project and complete the project charter.

      • Create a Service Management Roadmap – Phase 1: Launch Project
      • Service Management Roadmap Project Charter

      2. Assess the current state

      Determine the current state for service management practices.

      • Create a Service Management Roadmap – Phase 2: Assess the Current State
      • Service Management Maturity Assessment Tool
      • Organizational Change Management Capability Assessment Tool
      • Service Management Roadmap Presentation Template

      3. Build the roadmap

      Build your roadmap with identified initiatives.

      • Create a Service Management Roadmap – Phase 3: Identify the Target State

      4. Build the communication slide

      Create the communication slide that demonstrates how things will change, both short and long term.

      • Create a Service Management Roadmap – Phase 4: Build the Roadmap
      [infographic]

      Workshop: Create a Service Management Roadmap

      Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

      1 Understand Service Management

      The Purpose

      Understand service management.

      Key Benefits Achieved

      Gain a common understanding of service management, the forces that impact your roadmap, and the Info-Tech Service Management Maturity Model.

      Activities

      1.1 Understand service management.

      1.2 Build a compelling vision and mission.

      Outputs

      Constraints and enablers chart

      Service management vision, mission, and values

      2 Assess the Current State of Service Management

      The Purpose

      Assess the organization’s current service management capabilities.

      Key Benefits Achieved

      Understand attitudes, behaviors, and culture.

      Understand governance and process ownership needs.

      Understand strengths, weaknesses, opportunities, and threats.

      Defined desired state.

      Activities

      2.1 Assess cultural ABCs.

      2.2 Assess governance needs.

      2.3 Perform SWOT analysis.

      2.4 Define desired state.

      Outputs

      Cultural improvements action items

      Governance action items

      SWOT analysis action items

      Defined desired state

      3 Continue Current-State Assessment

      The Purpose

      Assess the organization’s current service management capabilities.

      Key Benefits Achieved

      Understand the current maturity of service management processes.

      Understand organizational change management capabilities.

      Activities

      3.1 Perform service management process maturity assessment.

      3.2 Complete OCM capability assessment.

      3.3 Identify roadmap themes.

      Outputs

      Service management process maturity activities

      OCM action items

      Roadmap themes

      4 Build Roadmap and Communication Tool

      The Purpose

      Use outputs from previous steps to build your roadmap and communication one-pagers.

      Key Benefits Achieved

      Easy-to-understand roadmap one-pager

      Communication one-pager

      Activities

      4.1 Build roadmap one-pager.

      4.2 Build communication one-pager.

      Outputs

      Service management roadmap

      Service management roadmap – Brought to Life communication slide

      Further reading

      Create a Service Management Roadmap

      Implement service management in an order that makes sense.

      ANALYST PERSPECTIVE

      "More than 80% of the larger enterprises we’ve worked with start out wanting to develop advanced service management practices without having the cultural and organizational basics or foundational practices fully in place. Although you wouldn’t think this would be the case in large enterprises, again and again IT leaders are underestimating the importance of cultural and foundational aspects such as governance, management practices, and understanding business value. You must have these fundamentals right before moving on."

      Tony Denford,

      Research Director – CIO

      Info-Tech Research Group

      Our understanding of the problem

      This Research Is Designed For:

      • CIO
      • Senior IT Management

      This Research Will Help You:

      • Create or maintain service management (SM) practices to ensure user-facing services are delivered seamlessly to business users with minimum interruption.
      • Increase the level of reliability and availability of the services provided to the business and improve the relationship and communication between IT and the business.

      This Research Will Also Assist

      • Service Management Process Owners

      This Research Will Help Them:

      • Formalize, standardize, and improve the maturity of service management practices.
      • Identify new service management initiatives to move IT to the next level of service management maturity.

      Executive summary

      Situation

      • Inconsistent adoption of holistic practices has led to a chaotic service delivery model that results in poor customer satisfaction.
      • There is little structure, formalization, or standardization in the way IT services are designed and managed, leading to diminishing service quality and low business satisfaction.

      Complication

      • IT organizations want to be seen as strategic partners, but they fail to address the cultural and organizational constraints.
      • Without alignment with the business goals, services often fail to provide the expected value.
      • Traditional service management approaches are not adaptable for new ways of working.

      Resolution

      • Follow Info-Tech’s methodology to create a service management roadmap that will help guide the optimization of your IT services and improve IT’s value to the business.
      • The blueprint will help you right-size your roadmap to best suit your specific needs and goals and will provide structure, ownership, and direction for service management.
      • This blueprint allows you to accurately identify the current state of service management at your organization. Customize the roadmap and create a plan to achieve your target service management state.

      Info-Tech Insight

      Having effective service management practices in place will allow you to pursue activities such as innovation and drive the business forward. Addressing foundational elements like business alignment and management practices will enable you to build effective core practices that deliver business value. Consistent leadership support and engagement is essential to allow practitioners to focus on delivering expected outcomes.

      Poor service management manifests in many different pains across the organization

      Immaturity in service management will not result in one pain – rather, it will create a chaotic environment for the entire organization, crippling IT’s ability to deliver and perform.

      Low Service Management Maturity

      These are some of the pains that can be attributed to poor service management practices.

      • Frequent service-impacting incidents
      • Low satisfaction with the service desk
      • High % of failed deployments
      • Frequent change-related incidents
      • Frequent recurring incidents
      • Inability to find root cause
      • No communication with the business
      • Frequent capacity-related incidents

      And there are many more…

      Mature service management practices are a necessity, not a nice-to-have

      Immature service management practices are one of the biggest hurdles preventing IT from reaching its true potential.

      In 2004, PwC published a report titled “IT Moves from Cost Center to Business Contributor.” However, the 2014-2015 CSC Global CIO Survey showed that a high percentage of IT is still considered a cost center.

      And low maturity of service management practices is inhibiting activities such as agility, DevOps, digitalization, and innovation.

      A pie chart is shown that is titled: Where does IT sit? The chart has 3 sections. One section represents IT and the business have a collaborative partnership 28%. The next section represents at 33% where IT has a formal client/service provider relationship with the business. The last section has 39% where IT is considered as a cost center.
      Source: CSC Global CIO Survey: 2014-2015 “CIOs Emerge as Disruptive Innovators”

      39%: Resources are primarily focused on managing existing IT workloads and keeping the lights on.

      31%: Too much time and too many resources are used to handle urgent incidents and problems.

      There are many misconceptions about what service management is

      Misconception #1: “Service management is a process”

      Effective service management is a journey that encompasses a series of initiatives that improves the value of services delivered.

      Misconception #2: “Service Management = Service Desk”

      Service desk is the foundation, since it is the main end-user touch point, but service management is a set of people and processes required to deliver business-facing services.

      Misconception #3: “Service management is about the ITSM tool”

      The tool is part of the overall service management program, but the people and processes must be in place before implementing.

      Misconception #4: “Service management development is one big initiative”

      Service management development is a series of initiatives that takes into account an organization’s current state, maturity, capacities, and objectives.

      Misconception #5: “Service management processes can be deployed in any order, assuming good planning and design”

      A successful service management program takes into account the dependencies of processes.

      Misconception #6: “Service management is resolving incidents and deploying changes”

      Service management is about delivering high-value and high-quality services.

      Misconception #7: “Service management is not the key determinant of success”

      As an organization progresses on the service management journey, its ability to deliver high-value and high-quality services increases.

      Misconception #8: “Resolving Incidents = Success”

      Preventing incidents is the name of the game.

      Misconception #9: “Service Management = Good Firefighter”

      Service management is about understanding what’s going on with user-facing services and proactively improving service quality.

      Misconception #10: “Service management is about IT and technical services (e.g. servers, network, database)”

      Service management is about business/user-facing services and the value the services provide to the business.

      Service management projects often don’t succeed because they are focused on process rather than outcomes

      Service management projects tend to focus on implementing process without ensuring foundational elements of culture and management practices are strong enough to support the change.

      1. Aligning your service management goals with your organizational objectives leads to better understanding of the expected outcomes.
      2. Understand your customers and what they value, and design your practices to deliver this value.

      3. IT does not know what order is best when implementing new practices or process improvements.
      4. Don't run before you can walk. Fundamental practices must reach the maturity threshold before developing advanced practices. Implement continuous improvement on your existing processes so they continue to support new practices.

      5. IT does not follow best practices when implementing a practice.
      6. Our best-practice research is based on extensive experience working with clients through advisory calls and workshops.

      Info-Tech can help you create a customized, low-effort, and high-value service management roadmap that will shore up any gaps, prove IT’s value, and achieve business satisfaction.

      Info-Tech’s methodology will help you customize your roadmap so the journey is right for you

      With Info-Tech, you will find out where you are, where you want to go, and how you will get there.

      With our methodology, you can expect the following:

      • Eliminate or reduce rework due to poor execution.
      • Identify dependencies/prerequisites and ensure practices are deployed in the correct order, at the correct time, and by the right people.
      • Engage all necessary resources to design and implement required processes.
      • Assess current maturity and capabilities and design the roadmap with these factors in mind.

      Doing it right the first time around

      You will see these benefits at the end

        ✓ Increase the quality of services IT provides to the business.

        ✓ Increase business satisfaction through higher alignment of IT services.

        ✓ Lower cost to design, implement, and manage services.

        ✓ Better resource utilization, including staff, tools, and budget.

      Focus on a strong foundation to build higher value service management practices

      Info-Tech Insight

      Focus on behaviors and expected outcomes before processes.

      Foundational elements

      • Operating model facilitates service management goals
      • Culture of service delivery
      • Governance discipline to evaluate, direct, and monitor
      • Management discipline to deliver

      Stabilize

      • Deliver stable, reliable IT services to the business
      • Respond to user requests quickly and efficiently
      • Resolve user issues in a timely manner
      • Deploy changes smoothly and successfully

      Proactive

      • Avoid/prevent service disruptions
      • Improve quality of service (performance, availability, reliability)

      Service Provider

      • Understand business needs
      • Ensure services are available
      • Measure service performance, based on business-oriented metrics

      Strategic Partner

      • Fully aligned with business
      • Drive innovation
      • Drive measurable value

      Info-Tech Insight

      Continued leadership support of the foundational elements will allow delivery teams to provide value to the business. Set the expectation of the desired maturity level and allow teams to innovate.

      Follow our model and get to your target state

      A model is depicted that shows the various target states. There are 6 levels showing in the example, and the example is made to look like a tree with a character watering it. In the roots, the level is labelled foundational. The trunk is labelled the core. The lowest hanging branches of the tree is the stabilize section. Above it is the proactive section. Nearing the top of the tree is the service provider. The canopy of the tree are labelled strategic partner.

      Before moving to advanced service management practices, you must ensure that the foundational and core elements are robust enough to support them. Leadership must nurture these practices to ensure they are sustainable and can support higher value, more mature practices.

      Each step along the way, Info-Tech has the tools to help you

      Phase 1: Launch the Project

      Assemble a team with the right talent and vision to increase the chances of project success.

      Phase 2: Assess Current State

      Understand where you are currently on the service management journey using the maturity assessment tool.

      Phase 3: Build Roadmap

      Based on the assessments, build a roadmap to address areas for improvement.

      Phase 4: Build Communication slide

      Based on the roadmap, define the current state, short- and long-term visions for each major improvement area.

      Info-Tech Deliverables:

      • Project Charter
      • Assessment Tools
      • Roadmap Template
      • Communication Template

      CIO call to action

      Improving the maturity of the organization’s service management practice is a big commitment, and the project can only succeed with active support from senior leadership.

      Ideally, the CIO should be the project sponsor, even the project leader. At a minimum, the CIO needs to perform the following activities:

      1. Walk the talk – demonstrate personal commitment to the project and communicate the benefits of the service management journey to IT and the steering committee.
      2. Improving or adopting any new practice is difficult, especially for a project of this size. Thus, the CIO needs to show visible support for this project through internal communication and dedicated resources to help complete this project.

      3. Select a senior, capable, and results-driven project leader.
      4. Most likely, the implementation of this project will be lengthy and technical in some nature. Therefore, the project leader must have a good understanding of the current IT structure, senior standing within the organization, and the relationship and power in place to propel people into action.

      5. Help to define the target future state of IT’s service management.
      6. Determine a realistic target state for the organization based on current capability and resource/budget restraints.

      7. Conduct periodic follow-up meetings to keep track of progress.
      8. Reinforce or re-emphasize the importance of this project to the organization through various communication channels if needed.

      Stabilizing your environment is a must before establishing any more-mature processes

      CASE STUDY

      Industry: Manufacturing

      Source: Engagement

      Challenge

      • The business landscape was rapidly changing for this manufacturer and they wanted to leverage potential cost savings from cloud-first initiatives and consolidate multiple, self-run service delivery teams that were geographically dispersed.

      Solution

      Original Plan

      • Consolidate multiple service delivery teams worldwide and implement service portfolio management.

      Revised Plan with Service Management Roadmap:

      • Markets around the world had very different needs and there was little understanding of what customers value.
      • There was also no understanding of what services were currently being offered within each geography.

      Results

      • Plan was adjusted to understand customer value and services offered.
      • Services were then stabilized and standardized before consolidation.
      • Team also focused on problem maturity and drove a continuous improvement culture and increasing transparency.

      MORAL OF THE STORY:

      Understanding the value of each service allowed the organization to focus effort on high-return activities rather than continuous fire fighting.

      Understand the processes involved in the proactive phase

      CASE STUDY

      Industry: Manufacturing

      Source: Engagement

      Challenge

      • Services were fairly stable, but there were significant recurring issues for certain services.
      • The business was not satisfied with the service quality for certain services, due to periodic availability and reliability issues.
      • Customer feedback for the service desk was generally good.

      Solution

      Original Plan

      • Review all service desk and incident management processes to ensure that service issues were handled in an effective manner.

      Revised Plan with Service Management Roadmap:

      • Design and deploy a rigorous problem management process to determine the root cause of recurring issues.
      • Monitor key services for events that may lead to a service outage.

      Results

      • Root cause of recurring issues was determined and fixes were deployed to resolve the underlying cause of the issues.
      • Service quality improved dramatically, resulting in high customer satisfaction.

      MORAL OF THE STORY:

      Make sure that you understand which processes need to be reviewed in order to determine the cause for service instability. Focusing on the proactive processes was the right answer for this company.

      Have the right culture and structure in place before you become a service provider

      CASE STUDY

      Industry: Healthcare

      Source:Journal of American Medical Informatics Association

      Challenge

      • The IT organization wanted to build a service catalog to demonstrate the value of IT to the business.
      • IT was organized in technology silos and focused on applications, not business services.
      • IT services were not aligned with business activities.
      • Relationships with the business were not well established.

      Solution

      Original Plan

      • Create and publish a service catalog.

      Revised Plan: with Service Management Roadmap:

      • Establish relationships with key stakeholders in the business units.
      • Understand how business activities interface with IT services.
      • Lay the groundwork for the service catalog by defining services from the business perspective.

      Results

      • Strong relationships with the business units.
      • Deep understanding of how business activities map to IT services.
      • Service definitions that reflect how the business uses IT services.

      MORAL OF THE STORY:

      Before you build and publish a service catalog, make sure that you understand how the business is using the IT services that you provide.

      Calculate the benefits of using Info-Tech’s methodology

      To measure the value of developing your roadmap using the Info-Tech tools and methodology, you must calculate the effort saved by not having to develop the methods.

      A. How much time will it take to develop an industry-best roadmap using Info-Tech methodology and tools?

      Using Info-Tech’s tools and methodology you can accurately estimate the effort to develop a roadmap using industry-leading research into best practice.

      B. What would be the effort to develop the insight, assess your team, and develop the roadmap?

      This metric represents the time your team would take to be able to effectively assess themselves and develop a roadmap that will lead to service management excellence.

      C. Cost & time saving through Info-Tech’s methodology

      Measured Value

      Step 1: Assess current state

      Cost to assess current state:

      • 5 Directors + 10 Managers x 10 hours at $X an hour = $A

      Step 2: Build the roadmap

      Cost to create service management roadmap:

      • 5 Directors + 10 Managers x 8 hours at $X an hour = $B

      Step 3: Develop the communication slide

      Cost to create roadmaps for phases:

      • 5 Directors + 10 Managers x 6 hours at $X an hour = $C

      Potential financial savings from using Info-Tech resources:

      Estimated cost to do “B” – (Step 1 ($A) + Step 2 ($B) + Step 3 ($C)) = $Total Saving

      Info-Tech offers various levels of support to best suit your needs

      DIY Toolkit

      "Our team has already made this critical project a priority, and we have the time and capability, but some guidance along the way would be helpful."

      Guided Implementation

      "Our team knows that we need to fix a process, but we need assistance to determine where to focus. Some check-ins along the way would help keeps us on track."

      Workshop

      "We need to hit the ground running and get this project kicked off immediately. Our team has the ability to take this over once we get a framework and strategy in place."

      Consulting

      "Our team does not have the time or the knowledge to take this project on. We need assistance through the entirety of this project."

      Diagnostics and consistent frameworks are used throughout all four options.

      Create a Service Management Roadmap – project overview


      Launch the project

      Assess the current state

      Build the roadmap

      Build communication slide

      Best-Practice Toolkit

      1.1 Create a powerful, succinct mission statement

      1.2 Assemble a project team with representatives from all major IT teams

      1.3 Determine project stakeholders and create a communication plan

      1.4 Establish metrics to track the success of the project

      2.1 Assess impacting forces

      2.2 Build service management vision, mission, and values

      2.3 Assess attitudes, behaviors, and culture

      2.4 Assess governance

      2.5 Perform SWOT analysis

      2.6 Identify desired state

      2.7 Assess SM maturity

      2.8 Assess OCM capabilities

      3.1 Document overall themes

      3.2 List individual initiatives

      4.1 Document current state

      4.2 List future vision

      Guided Implementations

      • Kick-off the project
      • Build the project team
      • Complete the charter
      • Understand current state
      • Determine target state
      • Build the roadmap based on current and target state
      • Build short- and long-term visions and initiative list

      Onsite Workshop

      Module 1: Launch the project

      Module 2: Assess current service management maturity

      Module 3: Complete the roadmap

      Module 4: Complete the communication slide

      Workshop overview

      Contact your account representative or email Workshops@InfoTech.com for more information

      Workshop Day 1

      Workshop Day 2

      Workshop Day 3

      Workshop Day 4

      Activities

      Understand Service Management

      1.1 Understand the concepts and benefits of service management.

      1.2 Understand the changing impacting forces that affect your ability to deliver services.

      1.3 Build a compelling vision and mission for your service management program.

      Assess the Current State of Your Service Management Practice

      2.1 Understand attitudes, behaviors, and culture.

      2.2 Assess governance and process ownership needs.

      2.3 Perform SWOT analysis.

      2.4 Define the desired state.

      Complete Current-State Assessment

      3.1 Conduct service management process maturity assessment.

      3.2 Identify organizational change management capabilities.

      3.3 Identify themes for roadmap.

      Build Roadmap and Communication Tool

      4.1 Build roadmap one-pager.

      4.2 Build roadmap communication one-pager.

      Deliverables

      1. Constraints and enablers chart
      2. Service management vision, mission, and values
      1. Action items for cultural improvements
      2. Action items for governance
      3. Identified improvements from SWOT
      4. Defined desired state
      1. Service Management Process Maturity Assessment
      2. Organizational Change Management Assessment
      1. Service management roadmap
      2. Roadmap Communication Tool in the Service Management Roadmap Presentation Template

      PHASE 1

      Launch the Project

      Launch the project

      This step will walk you through the following activities:

      • Create a powerful, succinct mission statement based on your organization’s goals and objectives.
      • Assemble a project team with representatives from all major IT teams.
      • Determine project stakeholders and create a plan to convey the benefits of this project.
      • Establish metrics to track the success of the project.

      Step Insights

      • The project leader should have a strong relationship with IT and business leaders to maximize the benefit of each initiative in the service management journey.
      • The service management roadmap initiative will touch almost every part of the organization; therefore, it is important to have representation from all impacted stakeholders.
      • The communication slide needs to include the organizational change impact of the roadmap initiatives.

      Phase 1 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 1: Launch the Project

      Step 1.1 – Kick-off the Project

      Start with an analyst kick-off call:

      • Identify current organization pain points relating to poor service management practices
      • Determine high-level objectives
      • Create a mission statement

      Then complete these activities…

      • Identify potential team members who could actively contribute to the project
      • Identify stakeholders who have a vested interest in the completion of this project

      With these tools & templates:

      • Service Management Roadmap Project Charter

      Step 1.2 – Complete the Charter

      Review findings with analyst:

      • Create the project team; ensure all major IT teams are represented
      • Review stakeholder list and identify communication messages

      Then complete these activities…

      • Establish metrics to complete project planning
      • Complete the project charter

      With these tools & templates:

      • Service Management Roadmap Project Charter

      Use Info-Tech’s project charter to begin your initiative

      1.1 Service Management Roadmap Project Charter

      The Service Management Roadmap Project Charter is used to govern the initiative throughout the project. It provides the foundation for project communication and monitoring.

      The template has been pre-populated with sample information appropriate for this project. Please review this sample text and change, add, or delete information as required.

      The charter includes the following sections:

      • Mission Statement
      • Goals & Objectives
      • Project Team
      • Project Stakeholders
      • Current State (from phases 2 & 3)
      • Target State (from phases 2 & 3)
      • Target State
      • Metrics
      • Sponsorship Signature
      A screenshot of Info-Tech's Service Management Roadmap Project Charter is shown.

      Use Info-Tech’s ready-to-use deliverable to customize your mission statement

      Adapt and personalize Info-Tech’s Service Management Roadmap Mission Statement and Goals & Objectives below to suit your organization’s needs.

      Goals & Objectives

      • Create a plan for implementing service management initiatives that align with the overall goals/objectives for service management.
      • Identify service management initiatives that must be implemented/improved in the short term before deploying more advanced initiatives.
      • Determine the target state for each initiative based on current maturity and level of investment available.
      • Identify service management initiatives and understand dependencies, prerequisites, and level of effort required to implement.
      • Determine the sequence in which initiatives should be deployed.
      • Create a detailed rollout plan that specifies initiatives, time frames, and owners.
      • Engage the right teams and obtain their commitment throughout both the planning and assessment of roadmap initiatives.
      • both the planning and assessment of roadmap initiatives. Obtain support for the completed roadmap from executive stakeholders.

      Example Mission Statement

      To help [Organization Name] develop a set of service management practices that will better address the overarching goals of the IT department.

      To create a roadmap that sequences initiatives in a way that incorporates best practices and takes into consideration dependencies and prerequisites between service management practices.

      To garner support from the right people and obtain executive buy-in for the roadmap.

      Create a well-balanced project team

      The project leader should be a member of your IT department’s senior executive team with goals and objectives that will be impacted by service management implementation. The project leader should possess the following characteristics:

      Leader

      • Influence and impact
      • Comprehensive knowledge of IT and the organization
      • Relationship with senior IT management
      • Ability to get things done

      Team Members

      Identify

      The project team members are the IT managers and directors whose day-to-day lives will be impacted by the service management roadmap and its implementation. The service management initiative will touch almost every IT staff member in the organization; therefore, it is important to have representatives from every single group, including those that are not mentioned. Some examples of individuals you should consider for your team:

      • Service Delivery Managers
      • Director/Manager of Applications
      • Director/Manager of Infrastructure
      • Director/Manager of Service Desk
      • Business Relationship Managers
      • Project Management Office

      Engage & Communicate

      You want to engage your project participants in the planning process as much as possible. They should be involved in the current-state assessment, the establishment of goals and objectives, and the development of your target state.

      To sell this project, identify and articulate how this project and/or process will improve the quality of their job. For example, a formal incident management process will benefit people working at the service desk or on the applications or infrastructure teams. Helping them understand the gains will help to secure their support throughout the long implementation process by giving them a sense of ownership.

      The project stakeholders should also be project team members

      When managing stakeholders, it is important to help them understand their stake in the project as well as their own personal gain that will come out of this project.

      For many of the stakeholders, they also play a critical role in the development of this project.

      Role & Benefits

      • CIO
      • The CIO should be actively involved in the planning stage to help determine current and target stage.

        The CIO also needs to promote and sell the project to the IT team so they can understand that higher maturity of service management practices will allow IT to be seen as a partner to the business, giving IT a seat at the table during decision making.

      • Service Delivery Managers/Process Owners
      • Service Delivery Managers are directly responsible for the quality and value of services provided to the business owners. Thus, the Service Delivery Managers have a very high stake in the project and should be considered for the role of project leader.

        Service Delivery Managers need to work closely with the process owners of each service management process to ensure clear objectives are established and there is a common understanding of what needs to be achieved.

      • IT Steering Committee
      • The Committee should be informed and periodically updated about the progress of the project.

      • Manager/Director – Service Desk
      • The Manager of the Service Desk should participate closely in the development of fundamental service management processes, such as service desk, incident management, and problem management.

        Having a more established process in place will create structure, governance, and reduce service desk staff headaches so they can handle requests or incidents more efficiently.

      • Manager/Director –Applications & Infrastructure
      • The Manager of Applications and Infrastructure should be heavily relied on for their knowledge of how technology ties into the organization. They should be consulted regularly for each of the processes.

        This project will also benefit them directly, such as improving the process to deploy a fix into the environment or manage the capacity of the infrastructure.

      • Business Relationship Manager
      • As the IT organization moves up the maturity ladder, the Business Relationship Manager will play a fundamental role in the more advanced processes, such as business relationship management, demand management, and portfolio management.

        This project will be an great opportunity for the Business Relationship Manager to demonstrate their value and their knowledge of how to align IT objectives with business vision.

      Ensure you get the entire IT organization on board for the project with a well-practiced change message

      Getting the IT team on board will greatly maximize the project’s chance of success.

      One of the top challenges for organizations embarking on a service management journey is to manage the magnitude of the project. To ensure the message is not lost, communicate this roadmap in two steps.

      1. Communicate the roadmap initiative

      The most important message to send to the IT organization is that this project will benefit them directly. Articulate the pains that IT is currently experiencing and explain that through more mature service management, these pains can be greatly reduced and IT can start to earn a place at the table with the business.

      2. Communicate the implementation of each process separately

      The communication of process implementation should be done separately and at the beginning of each implementation. This is to ensure that IT staff do not feel overwhelmed or overloaded. It also helps to keep the project more manageable for the project team.

      Continuously monitor feedback and address concerns throughout the entire process

      • Host lunch and learns to provide updates on the service management initiative to the entire IT team.
      • Understand if there are any major roadblocks and facilitate discussions on how to overcome them.

      Articulate the service management initiative to the IT organization

      Spread the word and bring attention to your change message through effective mediums and organizational changes.

      Key aspects of a communication plan

      The methods of communication (e.g. newsletters, email broadcast, news of the day, automated messages) notify users of implementation.

      In addition, it is important to know who will deliver the message (delivery strategy). You need IT executives to deliver the message – work hard on obtaining their support as they are the ones communicating to their staff and should be your project champions.

      Anticipate organizational changes

      The implementation of the service management roadmap will most likely lead to organizational changes in terms of structure, roles, and responsibilities. Therefore, the team should be prepared to communicate the value that these changes will bring.

      Communicating Change

      • What is the change?
      • Why are we doing it?
      • How are we going to go about it?
      • What are we trying to achieve?
      • How often will we be updated?

      The Qualities of Leadership: Leading Change

      Create a project communication plan for your stakeholders

      This project cannot be successfully completed without the support of senior IT management.

      1. After the CIO has introduced this project through management meetings or informal conversation, find out how each IT leader feels about this project. You need to make sure the directors and managers of each IT team, especially the directors of application and infrastructure, are on board.
      2. After the meeting, the project leader should seek out the major stakeholders (particularly the heads of applications and infrastructure) and validate their level of support through formal or informal meetings. Create a list documenting the major stakeholders, their level of support, and how the project team will work to gain their approval.
      3. For each identified stakeholder, create a custom communication plan based on their role. For example, if the director of infrastructure is not a supporter, demonstrate how this project will enable them to better understand how to improve service quality. Provide periodic reporting or meetings to update the director on project progress.

      INPUT

      • A collaborative discussion between team members

      OUTPUT

      • Thorough briefing for project launch
      • A committed team

      Materials

      • Communication message and plan
      • Metric tracking

      Participants

      • Project leader
      • Core project team

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.
      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      1.1

      A screenshot of activity 1.1 is shown.

      Create a powerful, succinct mission statement

      Using Info-Tech’s sample mission statement as a guide, build your mission statement based on the objectives of this project and the benefits that this project will achieve. Keep the mission statement short and clear.

      1.2

      A screenshot of activity 1.2 is shown.

      Assemble the project team

      Create a project team with representatives from all major IT teams. Engage and communicate to the project team early and proactively.

      1.3

      A screenshot of activity 1.3 is shown.

      Identify project stakeholders and create a communication plan

      Info-Tech will help you identify key stakeholders who have a vested interest in the success of the project. Determine the communication message that will best gain their support.

      1.4

      A screenshot of activity 1.4 is shown.

      Use metrics to track the success of the project

      The onsite analyst will help the project team determine the appropriate metrics to measure the success of this project.

      PHASE 2

      Assess Your Current Service Management State

      Assess your current state

      This step will walk you through the following activities:

      • Use Info-Tech’s Service Management Maturity Assessment Tool to determine your overall practice maturity level.
      • Understand your level of completeness for each individual practice.
      • Understand the three major phases involved in the service management journey; know the symptoms of each phase and how they affect your target state selection.

      Step Insights

      • To determine the real maturity of your service management practices, you should focus on the results and output of the practice, rather than the activities performed for each process.
      • Focus on phase-level maturity as opposed to the level of completeness for each individual process.

      Phase 2 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 2: Determine Your Service Management Current State

      Step 2.1 – Assess Impacting Forces

      Start with an analyst kick-off call:

      • Discuss the impacting forces that can affect the success of your service management program
      • Identify internal and external constraints and enablers
      • Review and interpret how to leverage or mitigate these elements

      Then complete these activities…

      • Present the findings of the organizational context
      • Facilitate a discussion and create consensus amongst the project team members on where the organization should start

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.2 – Build Vision, Mission, and Values

      Review findings with analyst:

      • Review your service management vision and mission statement and discuss the values

      Then complete these activities…

      • Socialize the vision, mission, and values to ensure they are aligned with overall organizational vision. Then, set the expectations for behavior aligned with the vision, mission, and values

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.3 – Assess Attitudes, Behaviors, and Culture

      Review findings with analyst:

      • Discuss tactics for addressing negative attitudes, behaviors, or culture identified

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.4 – Assess Governance Needs

      Review findings with analyst:

      • Understand the typical types of governance structure and the differences between management and governance
      • Choose the management structure required for your organization

      Then complete these activities…

      • Determine actions required to establish an effective governance structure and add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.5 – Perform SWOT Analysis

      Review findings with analyst:

      • Discuss SWOT analysis results and tactics for addressing within the roadmap

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.6 – Identify Desired State

      Review findings with analyst:

      • Discuss desired state and commitment needed to achieve aspects of the desired state

      Then complete these activities…

      • Use the desired state to critically assess the current state of your service management practices and whether they are achieving the desired outcomes
      • Prep for the SM maturity assessment

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 2.7 – Perform SM Maturity Assessment

      Review findings with analyst:

      • Review and interpret the output from your service management maturity assessment

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Service Management Maturity Assessment

      Step 2.8 – Review OCM Capabilities

      Review findings with analyst:

      • Review and interpret the output from your organizational change management maturity assessment

      Then complete these activities…

      • Add items to be addressed to roadmap

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Organizational Change Management Assessment

      Understand and assess impacting forces – constraints and enablers

      Constraints and enablers are organizational and behavioral triggers that directly impact your ability and approach to establishing Service Management practices.

      A model is shown to demonstrate the possibe constraints and enablers on your service management program. It incorporates available resources, the environment, management practices, and available technologies.

      Effective service management requires a mix of different approaches and practices that best fit your organization. There’s not a one-size-fits-all solution. Consider the resources, environment, emerging technologies, and management practices facing your organization. What items can you leverage or use to mitigate to move your service management program forward?

      Use Info-Tech’s “Organizational Context” template to list the constraints and enablers affecting your service management

      The Service Management Roadmap Presentation Template will help you understand the business environment you need to consider as you build out your roadmap.

      Discuss and document constraints and enablers related to the business environment, available resources, management practices, and emerging technologies. Any constraints will need to be addressed within your roadmap and enablers should be leveraged to maximize your results.


      Screenshot of Info-Tech's Service Management Roadmap Presentation Template is shown.

      Document constraints and enablers

      1. Discuss and document the constrains and enablers for each aspect of the management mesh: environment, resources, management practices, or technology.
      2. Use this as a thought provoker in later exercises.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Organizational context constraints and enablers

      Materials

      • Whiteboards or flip charts

      Participants

      • All stakeholders

      Build compelling vision and mission statements to set the direction of your service management program

      While you are articulating the vision and mission, think about the values you want the team to display. Being explicit can be a powerful tool to create alignment.

      A vision statement describes the intended state of your service management organization, expressed in the present tense.

      A mission statement describes why your service management organization exists.

      Your organizational values state how you will deliver services.

      Use Info-Tech’s “Vision, Mission, and Values” template to set the aspiration & purpose of your service management practice

      The Service Management Roadmap Presentation Template will help you document your vision for service management, the purpose of the program, and the values you want to see demonstrated.

      If the team cannot gain agreement on their reason for being, it will be difficult to make traction on the roadmap items. A concise and compelling statement can set the direction for desired behavior and help team members align with the vision when trying to make ground-level decisions. It can also be used to hold each other accountable when undesirable behavior emerges. It should be revised from time to time, when the environment changes, but a well-written statement should stand the test of time.

      A screenshot of the Service Management Roadmap Presentation Temaplate is shown. Specifically it is showing the section on the vision, mission, and values results.

      Document your organization’s vision, mission , and values

      1. Vision: Identify your desired target state, consider the details of that target state, and create a vision statement.
      2. Mission: Consider the fundamental purpose of your SM program and craft a statement of purpose.
      3. Values: As you work through the vision and mission, identify values that your organization prides itself in or has the aspiration for.
      4. Discuss common themes and then develop a concise vision statement and mission statement that incorporates the group’s ideas.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Vision statement
      • Mission statement
      • Organizational values

      Materials

      • Whiteboards or flip charts
      • Sample vision and mission statements

      Participants

      • All stakeholders
      • Senior leadership

      Understanding attitude, behavior, and culture

      Attitude

      • What people think and feel. It can be seen in their demeanor and how they react to change initiatives, colleagues, and users.

      Any form of organizational change involves adjusting people’s attitudes, creating buy-in and commitment. You need to identify and address attitudes that can lead to negative behaviors and actions or that are counter-productive. It must be made visible and related to your desired behavior.

      Behaviour

      • What people do. This is influenced by attitude and the culture of the organization.

      To implement change within IT, especially at a tactical level, both IT and organizational behavior needs to change. This is relevant because people don’t like to change and will resist in an active or passive way unless you can sell the need, value, and benefit of changing their behavior.

      Culture

      • The accepted and understood ways of working in an organization. The values and standards that people find normal and what would be tacitly identified to new resources.

      The organizational or corporate “attitude,” the impact on employee behavior and attitude is often not fully understood. Culture is an invisible element, which makes it difficult to identify, but it has a strong impact and must be addressed to successfully embed any organizational change or strategy.

      Culture is a critical and under-addressed success factor

      43% of CIOs cited resistance to change as the top impediment to a successful digital strategy.

      CIO.com

      75% of organizations cannot identify or articulate their culture or its impact.

      Info-Tech

      “Shortcomings in organizational culture are one of the main barriers to company success in the digital age.”

      McKinsey – “Culture for a digital age”

      Examples of how they apply

      Attitude

      • “I’ll believe that when I see it”
      • Positive outlook on new ideas and changes

      Behaviour

      • Saying you’ll follow a new process but not doing so
      • Choosing not to document a resolution approach or updating a knowledge article, despite being asked

      Culture

      • Hero culture (knowledge is power)
      • Blame culture (finger pointing)
      • Collaborative culture (people rally and work together)

      Why have we failed to address attitude, behavior, and culture?

        ✓ While there is attention and better understanding of these areas, very little effort is made to actually solve these challenges.

        ✓ The impact is not well understood.

        ✓ The lack of tangible and visible factors makes it difficult to identify.

        ✓ There is a lack of proper guidance, leadership skills, and governance to address these in the right places.

        ✓ Addressing these issues has to be done proactively, with intent, rigor, and discipline, in order to be successful.

        ✓ We ignore it (head in the sand and hoping it will fix itself).

      Avoidance has been a common strategy for addressing behavior and culture in organizations.

      Use Info-Tech’s “Culture and Environment” template to identify cultural constraints that should be addressed in roadmap

      The Service Management Roadmap Presentation Template will help you document attitude, behavior, and culture constraints.

      Discuss as a team attitudes, behaviors, and cultural aspects that can either hinder or be leveraged to support your vision for the service management program. Capture all items that need to be addressed in the roadmap.

      A screenshot of the Service Management Roadmap Presentation Template is shown. Specifically showing the culture and environment slide.

      Document your organization’s attitudes, behaviors, and culture

      1. Discuss and document positive and negative aspects of attitude, behavior, or culture within your organization.
      2. Identify the items that need to be addressed as part of your roadmap.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Culture and environment worksheet

      Materials

      • Whiteboards or flip charts

      Participants

      • All stakeholders

      The relationship to governance

      Attitude, behavior, and culture are still underestimated as core success factors in governance and management.

      Behavior is a key enabler of good governance. Leading by example and modeling behavior has a cascading impact on shifting culture, reinforcing the importance of change through adherence.

      Executive leadership and governing bodies must lead and support cultural change.

      Key Points

      • Less than 25% of organizations have formal IT governance in place (ITSM Tools).
      • Governance tends to focus on risk and compliance (controls), but forgets the impact of value and performance.

      Lack of oversight often limits the value of service management implementations

      Organizations often fail to move beyond risk mitigation, losing focus of the goals of their service management practices and the capabilities required to produce value.

      Risk Mitigation

      • Stabilize IT
      • Service Desk
      • Incident Management
      • Change Management

      Gap

      • Organizational alignment through governance
      • Disciplined focus on goals of SM

      Value Production

      • Value that meets business and consumer needs

      This creates a situation where service management activities and roadmaps focus on adjusting and tweaking process areas that no longer support how the organization needs to work.

      How does establishing governance for service management provide value?

      Governance of service management is a gap in most organizations, which leads to much of the failure and lack of value from service management processes and activities.

      Once in place, effective governance enables success for organizations by:

      1. Ensuring service management processes improve business value
      2. Measuring and confirming the value of the service management investment
      3. Driving a focus on outcome and impact instead of simply process adherence
      4. Looking at the integrated impact of service management in order to ensure focused prioritization of work
      5. Driving customer-experience focus within organizations
      6. Ensuring quality is achieved and addressing quality impacts and dependencies between processes

      Four common service management process ownership models

      Your ownership structure largely defines how processes will need to be implemented, maintained, and improved. It has a strong impact on their ability to integrate and how other teams perceive their involvement.

      An organizational structure is shown. In the image is an arrow, with the tip facing in the right direction. The left side of the arrow is labelled: Traditional, and the right side is labelled: Complex. The four models are noted along the arrow. Starting on the left side and going to the right are: Distributed Process Ownership, Centralized Process Ownership, Federated Process Ownership, and Service Management Office.

      Most organizations are somewhere within this spectrum of four core ownership models, usually having some combination of shared traits between the two models that are closest to them on the scale.

      Info-Tech Insight

      The organizational structure that is best for you depends on your needs, and one is not necessarily better than another. The next four slides describe when each ownership level is most appropriate.

      Distributed process ownership

      Distributed process ownership is usually evident when organizations initially establish their service management practices. The processes are assigned to a specific group, who assumes some level of ownership over its execution.

      The distributed process ownership model is shown. CIO is listed at the top with four branches leading out from below it. The four branches are labelled: Service Desk, Operations, Applications, and Security.

      Info-Tech Insight

      This model is often a suitable approach for initial implementations or where it may be difficult to move out of siloes within the organization’s structure or culture.

      Centralized process ownership

      Centralized process ownership usually becomes necessary for organizations as they move into a more functional structure. It starts to drive management of processes horizontally across the organization while still retaining functional management control.

      A centralized process ownership model is shown. The CIO is at the top and the following are branches below it: Service Manager, Support, Middleware, Development, and Infrastructure.

      Info-Tech Insight

      This model is often suitable for maturing organizations that are starting to look at process integration and shared service outcomes and accountability.

      Federated process ownership

      Federated process ownership allows for global control and regional variation, and it supports product orientation and Agile/DevOps principles

      A federated process ownership model is shown. The Sponsor/CIO is at the top, with the ITSM Executive below it. Below that level is the: Process Owner, Process Manager, and Process Manager.

      Info-Tech Insight

      Federated process ownership is usually evident in organizations that have an international or multi-regional presence.

      Service management office (SMO)

      SMO structures tend to occur in highly mature organizations, where service management responsibility is seen as an enterprise accountability.

      A service management office model is shown. The CIO is at the top with the following branches below it: SMO, End-User Services, Infra., Apps., and Architecture.

      Info-Tech Insight

      SMOs are suitable for organizations with a defined IT and organizational strategy. A SMO supports integration with other enterprise practices like enterprise architecture and the PMO.

      Determine which process ownership and governance model works best for your organization

      The Service Management Roadmap Presentation Template will help you document process ownership and governance model

      Example:

      Key Goals:

        ☐ Own accountability for changes to core processes

        ☐ Understand systemic nature and dependencies related to processes and services

        ☐ Approve and prioritize improvement and CSI initiatives related to processes and services

        ☐ Evaluate success of initiative outcomes based on defined benefits and expectations

        ☐ Own Service Management and Governance processes and policies

        ☐ Report into ITSM executive or equivalent body

      Membership:

        ☐ Process Owners, SM Owner, Tool Owner/Liaison, Audit

      Discuss as a team which process ownership model works for your organization. Determine who will govern the service management practice. Determine items that should be identified in your roadmap to address governance and process ownership gaps.

      Use Info-Tech’s “SWOT” template to identify strengths, weaknesses, opportunities & threats that should be addressed

      The Service Management Roadmap Presentation Template will help you document items from your SWOT analysis.

      A screenshot of the Service Management Roadmap Presentation Template is shown. Specifically the SWOT section is shown.

      Brainstorm the strengths, weaknesses, opportunities, and threats related to resources, environment, technology, and management practices. Add items that need to be addressed to your roadmap.

      Perform a SWOT analysis

      1. Brainstorm each aspect of the SWOT with an emphasis on:
      • Resources
      • Environment
      • Technologies
      • Management Practices
    • Record your ideas on a flip chart or whiteboard.
    • Add items to be addressed to the roadmap.
    • INPUT

      • A collaborative discussion

      OUTPUT

      • SWOT analysis
      • Priority items identified

      Materials

      • Whiteboards or flip charts

      Participants

      • All stakeholders

      Indicate desired maturity level for your service management program to be successful

      Discuss the various maturity levels and choose a desired level that would meet business needs.

      The desired maturity model is depicted.

      INPUT

      • A collaborative discussion

      OUTPUT

      • Desired state of service management maturity

      Materials

      • None

      Participants

      • All stakeholders

      Use Info-Tech’s Service Management Process Maturity Assessment Tool to understand your current state

      The Service Management Process Maturity Assessment Tool will help you understand the true state of your service management.

      A screenshot of Info-Tech's Service Management Process Assessment Tool is shown.

      Part 1, Part 2, and Part 3 tabs

      These three worksheets contain questions that will determine the overall maturity of your service management processes. There are multiple sections of questions focused on different processes. It is very important that you start from Part 1 and continue the questions sequentially.

      Results tab

      The Results tab will display the current state of your service management processes as well as the percentage of completion for each individual process.

      Complete the service management process maturity assessment

      The current-state assessment will be the foundation of building your roadmap, so pay close attention to the questions and answer them truthfully.

      1. Start with tab 1 in the Service Management Process Maturity Assessment Tool. Remember to read the questions carefully and always use the feedback obtained through the end-user survey to help you determine the answer.
      2. In the “Degree of Process Completeness” column, use the drop-down menu to input the results solicited from the goals and objectives meeting you held with your project participants.
      3. A screenshot of Info-Tech's Service Management Process Assessment Tool is shown. Tab 1 is shown.
      4. Host a meeting with all participants following completion of the survey and have them bring their results. Discuss in a round-table setting, keeping a master sheet of agreed upon results.

      INPUT

      • Service Management Process Maturity Assessment Tool questions

      OUTPUT

      • Determination of current state

      Materials

      • Service Management Process Maturity Assessment Tool

      Participants

      • Project team members

      Review the results of your current-state assessment

      At the end of the assessment, the Results tab will have action items you could perform to close the gaps identified by the process assessment tool.

      A screenshot of Info-Tech's Service Management Process Maturity Assessment Results is shown.

      INPUT

      • Maturity assessment results

      OUTPUT

      • Determination of overall and individual practice maturity

      Materials

      • Service Management Maturity Assessment Tool

      Participants

      • Project team members

      Use Info-Tech’s OCM Capability Assessment tool to understand your current state

      The Organizational Change Management Capabilities Assessment tool will help you understand the true state of your organizational change management capabilities.

      A screenshot of Info-Tech's Organizational Change Management Capabilities Assessment

      Complete the Capabilities tab to capture the current state for organizational change management. Review the Results tab for interpretation of the capabilities. Review the Recommendations tab for actions to address low areas of maturity.

      Complete the OCM capability assessment

      1. Open Organizational Change Management Capabilities Assessment tool.
      2. Come to consensus on the most appropriate answer for each question. Use the 80/20 rule.
      3. Review result charts and discuss findings.
      4. Identify roadmap items based on maturity assessment.

      INPUT

      • A collaborative discussion

      OUTPUT

      • OCM Assessment tool
      • OCM assessment results

      Materials

      • OCM Capabilities Assessment tool

      Participants

      • All stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      2.1

      A screenshot of activity 2.1 is shown.

      Create a powerful, succinct mission statement

      Using Info-Tech’s sample mission statement as a guide, build your mission statement based on the objectives of this project and the benefits that this project will achieve. Keep the mission statement short and clear.

      2.2

      A screenshot of activity 2.2 is shown.

      Complete the assessment

      With the project team in the room, go through all three parts of the assessment with consideration of the feedback received from the business.

      2.3

      A screenshot of activity 2.3 is shown.

      Interpret the results of the assessment

      The Info-Tech onsite analyst will facilitate a discussion on the overall maturity of your service management practices and individual process maturity. Are there any surprises? Are the results reflective of current service delivery maturity?

      PHASE 3

      Build Your Service Management Roadmap

      Build Roadmap

      This step will walk you through the following activities:

      • Document your vision and mission on the roadmap one-pager.
      • Using the inputs from the current-state assessments, identify the key themes required by your organization.
      • Identify individual initiatives needed to address key themes.

      Step Insights

      • Using the Info-Tech thought model, address foundational gaps early in your roadmap and establish the management methods to continuously make them more robust.
      • If any of the core practices are not meeting the vision for your service management program, be sure to address these items before moving on to more advanced service management practices or processes.
      • Make sure the story you are telling with your roadmap is aligned to the overall organizational goals.

      Phase 3 outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 3: Determine Your Service Management Target State

      Step 3.1 – Document the Overall Themes

      Start with an analyst kick-off call:

      • Review the outputs from your current-state assessments to identify themes for areas that need to be included in your roadmap

      Then complete these activities…

      • Ensure foundational elements are solid by adding any gaps to the roadmap
      • Identify any changes needed to management practices to ensure continuous improvement

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 3.2 – Determine Individual Initiatives

      Review findings with analyst:

      • Determine the individual initiatives needed to close the gaps between the current state and the vision

      Then complete these activities…

      • Finalize and document roadmap for executive socialization

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Focus on a strong foundation to build higher value service management practices

      Info-Tech Insight

      Focus on behaviors and expected outcomes before processes.

      Foundational elements

      • Operating model facilitates service management goals
      • Culture of service delivery
      • Governance discipline to evaluate, direct, and monitor
      • Management discipline to deliver

      Stabilize

      • Deliver stable, reliable IT services to the business
      • Respond to user requests quickly and efficiently
      • Resolve user issues in a timely manner
      • Deploy changes smoothly and successfully

      Proactive

      • Avoid/prevent service disruptions
      • Improve quality of service (performance, availability, reliability)

      Service Provider

      • Understand business needs
      • Ensure services are available
      • Measure service performance, based on business-oriented metrics

      Strategic Partner

      • Fully aligned with business
      • Drive innovation
      • Drive measurable value

      Info-Tech Insight

      Continued leadership support of the foundational elements will allow delivery teams to provide value to the business. Set the expectation of the desired maturity level and allow teams to innovate.

      Identify themes that can help you build a strong foundation before moving to higher level practices

      A model is depicted that shows the various target states. There are 6 levels showing in the example, and the example is made to look like a tree with a character watering it. In the roots, the level is labelled foundational. The trunk is labelled the core. The lowest hanging branches of the tree is the stabilize section. Above it is the proactive section. Nearing the top of the tree is the service provider. The top most branches of the tree is labelled strategic partner.

      Before moving to advanced service management practices, you must ensure that the foundational and core elements are robust enough to support them. Leadership must nurture these practices to ensure they are sustainable and can support higher value, more mature practices.

      Use Info-Tech’s “Service Management Roadmap” template to document your vision, themes and initiatives

      The Service Management Roadmap Presentation Template contains a roadmap template to help communicate your vision, themes to be addressed, and initiatives

      A screenshot of Info-Tech's Service Management Roadmap template is shown.

      Working from the lower maturity items to the higher value practices, identify logical groupings of initiatives into themes. This will aid in communicating the reasons for the needed changes. List the individual initiatives below the themes. Adding the service management vision and mission statements can help readers understand the roadmap.

      Document your service management roadmap

      1. Document the service management vision and mission on the roadmap template.
      2. Identify, from the assessments, areas that need to be improved or implemented.
      3. Group the individual initiatives into logical themes that can ease communication of what needs to happen.
      4. Document the individual initiatives.
      5. Document in terms that business partners and executive sponsors can understand.

      INPUT

      • Current-state assessment outputs
      • Maturity model

      OUTPUT

      • Service management roadmap

      Materials

      • Whiteboard
      • Roadmap template

      Participants

      • All stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      3.1

      A screenshot of activity 3.1 is shown.

      Identify themes to address items from the foundational level up to higher value service management practices

      Identify easily understood themes that will help others understand the expected outcomes within your organization.

      A screenshot of activity 3.2 is shown.

      Document individual initiatives that contribute to the themes

      Identify specific activities that will close gaps identified in the assessments.

      PHASE 2

      Build Communication Slide

      Complete your service management roadmap

      This step will walk you through the following activities:

      • Use the current-state assessment exercises to document the state of your service management practices. Document examples of the behaviors that are currently seen.
      • Document the expected short-term gains. Describe how you want the behaviors to change.
      • Document the long-term vision for each item and describe the benefits you expect to see from addressing each theme.

      Step Insights

      • Use the communication template to acknowledge the areas that need to be improved and paint the short- and long-term vision for the improvements to be made through executing the roadmap.
      • Write it in business terms so that it can be used widely to gain acceptance of the upcoming changes that need to occur.
      • Include specific areas that need to be fixed to make it more tangible.
      • Adding the values from the vision, mission, and values exercise can also help you set expectations about how the team will behave as they move towards the longer-term vision.

      Phase 4 Outline

      Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

      Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

      Guided Implementation 4: Build the Service Management Roadmap

      Step 4.1: Document the Current State

      Start with an analyst kick-off call:

      • Review the pain points identified from the current state analysis
      • Discuss tactics to address specific pain points

      Then complete these activities…

      • Socialize the pain points within the service delivery teams to ensure nothing is being misrepresented
      • Gather ideas for the future state

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Step 4.2: List the Future Vision

      Review findings with analyst:

      • Review short- and long-term vision for improvements for the pain points identified in the current state analysis

      Then complete these activities…

      • Prepare to socialize the roadmap
      • Ensure long-term vision is aligned with organizational objectives

      With these tools & templates:

      Service Management Roadmap Presentation Template

      Use Info-Tech’s “Service Management Roadmap – Brought to Life” template to paint a picture of the future state

      The Service Management Roadmap Presentation Template contains a communication template to help communicate your vision of the future state

      A screenshot of Info-Tech's Service Management Roadmap - Brought to Life template

      Use this template to demonstrate how existing pain points to delivering services will improve over time by painting a near- and long-term picture of how things will change. Also list specific initiatives that will be launched to affect the changes. Listing the values identified in the vision, mission, and values exercise will also demonstrate the team’s commitment to changing behavior to create better outcomes.

      Document your current state and list initiatives to address them

      1. Use the previous assessments and feedback from business or customers to identify current behaviors that need addressing.
      2. Focus on high-impact items for this document, not an extensive list.
      3. An example of step 1 and 2 are shown.
      4. List the initiatives or actions that will be used to address the specific pain points.

      An example of areas for improvement.

      INPUT

      • Current-state assessment outputs
      • Feedback from business

      OUTPUT

      • Service Management Roadmap Communication Tool, in the Service Management Roadmap Presentation

      Materials

      • Whiteboard
      • Roadmap template

      Participants

      • All stakeholders

      Document your future state

      An example of document your furture state is shown.

      1. For each pain point document the expected behaviors, both short term and longer term.
      2. Write in terms that allow readers to understand what to expect from your service management practice.

      INPUT

      • Current-state assessment outputs
      • Feedback from business

      OUTPUT

      • Service Management Roadmap Communication Tool, in the Service Management Roadmap Presentation Template

      Materials

      • Whiteboard
      • Roadmap template

      Participants

      • All stakeholders

      If you want additional support, have our analysts guide you through this phase as part of an Info-Tech workshop

      Book a workshop with our Info-Tech analysts:

      Photo of an Info-Tech analyst is shown.

      • To accelerate this project, engage your IT team in an Info-Tech workshop with an Info-Tech analyst team.
      • Info-Tech analysts will join you and your team onsite at your location or welcome you to Info-Tech’s historic Toronto office to participate in an innovative onsite workshop.
      • Contact your account manager (www.infotech.com/account), or email Workshops@InfoTech.com for more information.

      The following are sample activities that will be conducted by Info-Tech analysts with your team:

      4.1

      A screenshot of activity 4.1 is shown.

      Identify the pain points and initiatives to address them

      Identify items that the business can relate to and initiatives or actions to address them.

      4.2

      A screenshot of activity 4.2 is shown.

      Identify short- and long-term expectations for service management

      Communicate the benefits of executing the roadmap both short- and long-term gains.

      Research contributors and experts

      Photo of Valence Howden

      Valence Howden, Principal Research Director, CIO Practice

      Info-Tech Research Group

      Valence helps organizations be successful through optimizing how they govern, design, and execute strategies, and how they drive service excellence in all work. With 30 years of IT experience in the public and private sectors, he has developed experience in many information management and technology domains, with focus in service management, enterprise and IT governance, development and execution of strategy, risk management, metrics design and process design, and implementation and improvement.

      Photo of Graham Price

      Graham Price, Research Director, CIO Practice

      Info-Tech Research Group

      Graham has an extensive background in IT service management across various industries with over 25 years of experience. He was a principal consultant for 17 years, partnering with Fortune 500 clients throughout North America, leveraging and integrating industry best practices in IT service management, service catalog, business relationship management, IT strategy, governance, and Lean IT and Agile.

      Photo of Sharon Foltz

      Sharon Foltz, Senior Workshop Director

      Info-Tech Research Group

      Sharon is a Senior Workshop Director at Info-Tech Research Group. She focuses on bringing high value to members via leveraging Info-Tech’s blueprints and other resources enhanced with her breadth and depth of skills and expertise. Sharon has spent over 15 years in various IT roles in leading companies within the United States. She has strong experience in organizational change management, program and project management, service management, product management, team leadership, strategic planning, and CRM across various global organizations.

      Related Info-Tech Research

      Build a Roadmap for Service Management Agility

      Extend the Service Desk to the Enterprise

      Bibliography

      • “CIOs Emerge as Disruptive Innovators.” CSC Global CIO Survey: 2014-2015. Web.
      • “Digital Transformation: How Is Your Organization Adapting?” CIO.com, 2018. Web.
      • Goran, Julie, Laura LaBerge, and Ramesh Srinivasan. “Culture for a digital age.” McKinsey, July 2017. Web.
      • The Qualities of Leadership: Leading Change. Cornelius & Associates, 14 April 2012.
      • Wilkinson, Paul. “Culture, Ethics, and Behavior – Why Are We Still Struggling?” ITSM Tools, 5 July 2018. Web.